mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-17 11:23:45 +00:00
Merge branch 'master' into user/tudobril/mac-device-control
This commit is contained in:
@ -13,11 +13,16 @@ author: cmcatee-MSFT
|
|||||||
manager: scotv
|
manager: scotv
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.date: 03/10/2021
|
ms.date: 03/16/2021
|
||||||
---
|
---
|
||||||
|
|
||||||
# Roles and permissions in Microsoft Store for Business and Education
|
# Roles and permissions in Microsoft Store for Business and Education
|
||||||
|
|
||||||
|
**Applies to**
|
||||||
|
|
||||||
|
- Windows 10
|
||||||
|
- Windows 10 Mobile
|
||||||
|
|
||||||
> [!IMPORTANT]
|
> [!IMPORTANT]
|
||||||
> Starting on April 14th, 2021, only free apps will be available in Microsoft Store for Business and Education. For more information, see [Microsoft Store for Business and Education](index.md).
|
> Starting on April 14th, 2021, only free apps will be available in Microsoft Store for Business and Education. For more information, see [Microsoft Store for Business and Education](index.md).
|
||||||
|
|
||||||
@ -31,62 +36,65 @@ This table lists the global user accounts and the permissions they have in Micro
|
|||||||
|
|
||||||
| | Global Administrator | Billing Administrator |
|
| | Global Administrator | Billing Administrator |
|
||||||
| ------------------------------ | --------------------- | --------------------- |
|
| ------------------------------ | --------------------- | --------------------- |
|
||||||
| Sign up for Microsoft Store for Business and Education | X |
|
| Sign up for Microsoft Store for Business and Education | X | X |
|
||||||
| Modify company profile settings | X | |
|
| Modify company profile settings | X | X |
|
||||||
| Purchase apps | X | X |
|
| Purchase apps | X | X |
|
||||||
| Distribute apps | X | X |
|
| Distribute apps | X | X |
|
||||||
| Purchase subscription-based software | X | X |
|
| Purchase subscription-based software | X | X |
|
||||||
|
|
||||||
|
- **Global Administrator** and **Billing Administrator** - IT Pros with these accounts have full access to Microsoft Store. They can do everything allowed in the Microsoft Store Admin role, plus they can sign up for Microsoft Store.
|
||||||
|
|
||||||
**Global Administrator** - IT Pros with this account have full access to Microsoft Store. They can do everything allowed in the Microsoft Store Admin role, plus they can sign up for Microsoft Store.
|
## Microsoft Store roles and permissions
|
||||||
|
|
||||||
**Billing Administrator** - IT Pros with this account have the same permissions as Microsoft Store Purchaser role.
|
Microsoft Store for Business has a set of roles that help IT admins and employees manage access to apps and tasks for Microsoft Store. Employees with these roles will need to use their Azure AD account to access Microsoft Store.
|
||||||
|
|
||||||
## Billing account roles and permissions
|
|
||||||
There are a set of roles, managed at your billing account level, that help IT admins and employees manage access to and tasks for Microsoft Store. Employees with these roles will need to use their Azure AD account to access Microsoft Store for Business.
|
|
||||||
|
|
||||||
This table lists the roles and their permissions.
|
This table lists the roles and their permissions.
|
||||||
|
|
||||||
| Role | Buy from<br /><br /> Microsoft Store | Assign<br /><br /> roles | Edit<br /><br /> account | Sign<br /><br /> agreements | View<br /><br /> account |
|
| | Admin | Purchaser | Device Guard signer |
|
||||||
| ------------------------| ------ | -------- | ------ | -------| -------- |
|
| ------------------------------ | ------ | -------- | ------------------- |
|
||||||
| Billing account owner | X | X | X | X | X |
|
| Assign roles | X | | |
|
||||||
| Billing account contributor | | | X | X | X |
|
| Manage Microsoft Store for Business and Education settings | X | | |
|
||||||
| Billing account reader | | | | | X |
|
| Acquire apps | X | X | |
|
||||||
| Signatory | | | | X | X |
|
| Distribute apps | X | X | |
|
||||||
|
| Sign policies and catalogs | X | | |
|
||||||
|
| Sign Device Guard changes | X | | X |
|
||||||
|
|
||||||
<!---
|
|
||||||
These permissions allow people to:
|
These permissions allow people to:
|
||||||
- **Edit account**:
|
|
||||||
- Account information (view only)
|
- **Manage Microsoft Store settings**:
|
||||||
- LOB publishers
|
- Account information (view only)
|
||||||
- Management tools
|
- Device Guard signing
|
||||||
- Offline licensing
|
- LOB publishers
|
||||||
- Permissions
|
- Management tools
|
||||||
- Private store
|
- Offline licensing
|
||||||
- **Acquire apps** - Acquire apps from Microsoft Store and add them to your inventory.
|
- Permissions
|
||||||
- **Distribute apps** - Distribute apps that are in your inventory.
|
- Private store
|
||||||
|
|
||||||
|
- **Acquire apps** - Acquire apps from Microsoft Store and add them to your inventory.
|
||||||
|
|
||||||
|
- **Distribute apps** - Distribute apps that are in your inventory.
|
||||||
- Admins can assign apps to people, add apps to the private store, or use a management tool.
|
- Admins can assign apps to people, add apps to the private store, or use a management tool.
|
||||||
- Purchasers can assign apps to people.
|
- Purchasers can assign apps to people.
|
||||||
-->
|
|
||||||
## Purchasing roles and permissions
|
|
||||||
There are also a set of roles for purchasing and managing items bought.
|
|
||||||
|
|
||||||
This table lists the roles and their permissions.
|
|
||||||
|
|
||||||
| Role | Buy from<br /><br /> Microsoft Store | Manage all items | Manage items<br /><br /> I buy |
|
|
||||||
| ------------| ------ | -------- | ------ |
|
|
||||||
| Purchaser | X | X | |
|
|
||||||
| Basic purchaser | X | | X |
|
|
||||||
|
|
||||||
## Assign roles
|
|
||||||
**To assign roles to people**
|
**To assign roles to people**
|
||||||
|
|
||||||
1. Sign in to [Microsoft Store for Business](https://businessstore.microsoft.com).
|
1. Sign in to Microsoft Store for Business or Microsoft Store for Education.
|
||||||
|
|
||||||
>[!Note]
|
>[!Note]
|
||||||
>You need to be a Global Administrator, or have the Billing account owner role to access **Permissions**.
|
>You need to be a Global Administrator, or have the Microsoft Store Admin role to access the **Permissions** page.
|
||||||
|
|
||||||
2. Select **Manage**, and then select **Permissions**.
|
To assign roles, you need to be a Global Administrator or a Store Administrator.
|
||||||
3. On **Roles**, or **Purchasing roles**, select **Assign roles**.
|
|
||||||
4. Enter a name, choose the role you want to assign, and select **Save**.
|
2. Click **Settings**, and then choose **Permissions**.
|
||||||
If you don't find the name you want, you might need to add people to your Azure AD directory. For more information, see [Manage user accounts](manage-users-and-groups-microsoft-store-for-business.md).
|
|
||||||
|
OR
|
||||||
|
|
||||||
|
Click **Manage**, and then click **Permissions** on the left-hand menu.
|
||||||
|
|
||||||
|
<!---  -->
|
||||||
|
|
||||||
|
3. Click **Add people**, type a name, choose the role you want to assign, and click **Save**.
|
||||||
|
|
||||||
|
<!---  -->
|
||||||
|
|
||||||
|
4. If you don't find the name you want, you might need to add people to your Azure AD directory. For more information, see [Manage user accounts in Microsoft Store for Business and Education](manage-users-and-groups-microsoft-store-for-business.md).
|
@ -13,7 +13,7 @@ author: lomayor
|
|||||||
|
|
||||||
# Azure Active Directory integration with MDM
|
# Azure Active Directory integration with MDM
|
||||||
|
|
||||||
Azure Active Directory is the world largest enterprise cloud identity management service. It’s used by millions of organizations to access Office 365 and thousands of business applications from Microsoft and third party software as a service (SaaS) vendors. Many of the rich Windows 10 experiences for organizational users (such as store access or OS state roaming) use Azure AD as the underlying identity infrastructure. Windows 10 provides an integrated configuration experience with Azure AD, allowing devices to be registered in Azure AD and enrolled into MDM in a smooth integrated flow.
|
Azure Active Directory is the world largest enterprise cloud identity management service. It’s used by millions of organizations to access Office 365 and thousands of business applications from Microsoft and third-party software as a service (SaaS) vendors. Many of the rich Windows 10 experiences for organizational users (such as store access or OS state roaming) use Azure AD as the underlying identity infrastructure. Windows 10 provides an integrated configuration experience with Azure AD, allowing devices to be registered in Azure AD and enrolled into MDM in a smooth integrated flow.
|
||||||
|
|
||||||
Once a device is enrolled in MDM, the MDM can enforce compliance with corporate policies, add or remove apps, and more. Additionally, the MDM can report a device’s compliance Azure AD. This enables Azure AD to allow access to corporate resources or applications secured by Azure AD only to devices that comply with policies. To support these rich experiences with their MDM product, MDM vendors can integrate with Azure AD. This topic describes the steps involved.
|
Once a device is enrolled in MDM, the MDM can enforce compliance with corporate policies, add or remove apps, and more. Additionally, the MDM can report a device’s compliance Azure AD. This enables Azure AD to allow access to corporate resources or applications secured by Azure AD only to devices that comply with policies. To support these rich experiences with their MDM product, MDM vendors can integrate with Azure AD. This topic describes the steps involved.
|
||||||
|
|
||||||
@ -52,19 +52,19 @@ Two Azure AD MDM enrollment scenarios:
|
|||||||
|
|
||||||
In both scenarios, Azure AD is responsible for authenticating the user and the device, which provides a verified unique device identifier that can be used for MDM enrollment.
|
In both scenarios, Azure AD is responsible for authenticating the user and the device, which provides a verified unique device identifier that can be used for MDM enrollment.
|
||||||
|
|
||||||
In both scenarios, the enrollment flow provides an opportunity for the MDM service to render it's own UI, using a web view. MDM vendors should use this to render the Terms of Use (TOU), which can be different for company-owned and BYOD devices. MDM vendors can also use the web view to render additional UI elements, such as asking for a one-time PIN, if this is part of the business process of the organization.
|
In both scenarios, the enrollment flow provides an opportunity for the MDM service to render its own UI, using a web view. MDM vendors should use this to render the Terms of Use (TOU), which can be different for company-owned and BYOD devices. MDM vendors can also use the web view to render additional UI elements, such as asking for a one-time PIN, if this is part of the business process of the organization.
|
||||||
|
|
||||||
In the out-of-the-box scenario, the web view is 100% full screen, which gives the MDM vendor the ability to paint an edge-to-edge experience. With great power comes great responsibility! It is important that MDM vendors who chose to integrate with Azure AD to respect the Windows 10 design guidelines to the letter. This includes using a responsive web design and respecting the Windows accessibility guidelines, which includes the forward and back buttons that are properly wired to the navigation logic. Additional details are provided later in this topic.
|
In the out-of-the-box scenario, the web view is 100% full screen, which gives the MDM vendor the ability to paint an edge-to-edge experience. With great power comes great responsibility! It is important that MDM vendors who chose to integrate with Azure AD respect the Windows 10 design guidelines to the letter. This includes using a responsive web design and respecting the Windows accessibility guidelines, which includes the forward and back buttons that are properly wired to the navigation logic. Additional details are provided later in this topic.
|
||||||
|
|
||||||
For Azure AD enrollment to work for an Active Directory Federated Services (AD FS) backed Azure AD account, you must enable password authentication for the intranet on the ADFS service as described in solution \#2 in [this article](https://go.microsoft.com/fwlink/?LinkId=690246).
|
For Azure AD enrollment to work for an Active Directory Federated Services (AD FS) backed Azure AD account, you must enable password authentication for the intranet on the ADFS service as described in solution \#2 in [Configure Azure MFA as authentication provider with AD FS](https://docs.microsoft.com/windows-server/identity/ad-fs/operations/configure-ad-fs-and-azure-mfa).
|
||||||
|
|
||||||
Once a user has an Azure AD account added to Windows 10 and enrolled in MDM, the enrollment can be manages through **Settings** > **Accounts** > **Work access**. Device management of either Azure AD Join for corporate scenarios or BYOD scenarios are similar.
|
Once a user has an Azure AD account added to Windows 10 and enrolled in MDM, the enrollment can be managed through **Settings** > **Accounts** > **Work access**. Device management of either Azure AD Join for corporate scenarios or BYOD scenarios is similar.
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> Users cannot remove the device enrollment through the **Work access** user interface because management is tied to the Azure AD or work account.
|
> Users cannot remove the device enrollment through the **Work access** user interface because management is tied to the Azure AD or work account.
|
||||||
|
|
||||||
|
|
||||||
### MDM endpoints involved in Azure AD integrated enrollment
|
### MDM endpoints involved in Azure AD–integrated enrollment
|
||||||
|
|
||||||
Azure AD MDM enrollment is a two-step process:
|
Azure AD MDM enrollment is a two-step process:
|
||||||
|
|
||||||
@ -112,27 +112,39 @@ The keys used by the MDM application to request access tokens from Azure AD are
|
|||||||
|
|
||||||
Use the following steps to register a cloud-based MDM application with Azure AD. At this time, you need to work with the Azure AD engineering team to expose this application through the Azure AD app gallery.
|
Use the following steps to register a cloud-based MDM application with Azure AD. At this time, you need to work with the Azure AD engineering team to expose this application through the Azure AD app gallery.
|
||||||
|
|
||||||
1. Login to the Azure Management Portal using an admin account in your home tenant.
|
1. Log in to the Azure Management Portal using an admin account in your home tenant.
|
||||||
|
|
||||||
2. In the left navigation, click on the **Active Directory**.
|
2. In the left navigation, click on the **Active Directory**.
|
||||||
|
|
||||||
3. Click the directory tenant where you want to register the application.
|
3. Click the directory tenant where you want to register the application.
|
||||||
|
|
||||||
Ensure that you are logged into your home tenant.
|
Ensure that you are logged into your home tenant.
|
||||||
|
|
||||||
4. Click the **Applications** tab.
|
4. Click the **Applications** tab.
|
||||||
|
|
||||||
5. In the drawer, click **Add**.
|
5. In the drawer, click **Add**.
|
||||||
|
|
||||||
6. Click **Add an application my organization is developing**.
|
6. Click **Add an application my organization is developing**.
|
||||||
|
|
||||||
7. Enter a friendly name for the application, such as ContosoMDM, select **Web Application and or Web API**, then click **Next**.
|
7. Enter a friendly name for the application, such as ContosoMDM, select **Web Application and or Web API**, then click **Next**.
|
||||||
|
|
||||||
8. Enter the login URL for your MDM service.
|
8. Enter the login URL for your MDM service.
|
||||||
|
|
||||||
9. For the App ID, enter **https://<your\_tenant\_name>/ContosoMDM**, then click OK.
|
9. For the App ID, enter **https://<your\_tenant\_name>/ContosoMDM**, then click OK.
|
||||||
|
|
||||||
10. While still in the Azure portal, click the **Configure** tab of your application.
|
10. While still in the Azure portal, click the **Configure** tab of your application.
|
||||||
|
|
||||||
11. Mark your application as **multi-tenant**.
|
11. Mark your application as **multi-tenant**.
|
||||||
|
|
||||||
12. Find the client ID value and copy it.
|
12. Find the client ID value and copy it.
|
||||||
|
|
||||||
You will need this later when configuring your application. This client ID is used when obtaining access tokens and adding applications to the Azure AD app gallery.
|
You will need this later when configuring your application. This client ID is used when obtaining access tokens and adding applications to the Azure AD app gallery.
|
||||||
|
|
||||||
13. Generate a key for your application and copy it.
|
13. Generate a key for your application and copy it.
|
||||||
|
|
||||||
You will need this to call the Azure AD Graph API to report device compliance. This is covered in the subsequent section.
|
You will need this to call the Azure AD Graph API to report device compliance. This is covered in the subsequent section.
|
||||||
|
|
||||||
For more information about how to register a sample application with Azure AD, see the steps to register the **TodoListService Web API** in [NativeClient-DotNet](https://go.microsoft.com/fwlink/p/?LinkId=613667)
|
For more information about how to register a sample application with Azure AD, see the steps to register the **TodoListService Web API** in [NativeClient-DotNet](https://go.microsoft.com/fwlink/p/?LinkId=613667).
|
||||||
|
|
||||||
### Add an on-premises MDM
|
### Add an on-premises MDM
|
||||||
|
|
||||||
@ -208,7 +220,7 @@ The following table shows the required information to create an entry in the Azu
|
|||||||
|
|
||||||
### Add on-premises MDM to the app gallery
|
### Add on-premises MDM to the app gallery
|
||||||
|
|
||||||
There are no special requirements for adding on-premises MDM to the app gallery.There is a generic entry for administrator to add an app to their tenant.
|
There are no special requirements for adding on-premises MDM to the app gallery. There is a generic entry for administrator to add an app to their tenant.
|
||||||
|
|
||||||
However, key management is different for on-premises MDM. You must obtain the client ID (app ID) and key assigned to the MDM app within the customer's tenant. These are used to obtain authorization to access the Azure AD Graph API and for reporting device compliance.
|
However, key management is different for on-premises MDM. You must obtain the client ID (app ID) and key assigned to the MDM app within the customer's tenant. These are used to obtain authorization to access the Azure AD Graph API and for reporting device compliance.
|
||||||
|
|
||||||
@ -347,6 +359,7 @@ The following claims are expected in the access token passed by Windows to the T
|
|||||||
</tr>
|
</tr>
|
||||||
</tbody>
|
</tbody>
|
||||||
</table>
|
</table>
|
||||||
|
<br/>
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> There is no device ID claim in the access token because the device may not yet be enrolled at this time.
|
> There is no device ID claim in the access token because the device may not yet be enrolled at this time.
|
||||||
@ -355,7 +368,7 @@ To retrieve the list of group memberships for the user, you can use the [Azure A
|
|||||||
|
|
||||||
Here's an example URL.
|
Here's an example URL.
|
||||||
|
|
||||||
```console
|
```http
|
||||||
https://fabrikam.contosomdm.com/TermsOfUse?redirect_uri=ms-appx-web://ContosoMdm/ToUResponse&client-request-id=34be581c-6ebd-49d6-a4e1-150eff4b7213&api-version=1.0
|
https://fabrikam.contosomdm.com/TermsOfUse?redirect_uri=ms-appx-web://ContosoMdm/ToUResponse&client-request-id=34be581c-6ebd-49d6-a4e1-150eff4b7213&api-version=1.0
|
||||||
Authorization: Bearer eyJ0eXAiOi
|
Authorization: Bearer eyJ0eXAiOi
|
||||||
```
|
```
|
||||||
@ -647,7 +660,7 @@ Alert sample:
|
|||||||
|
|
||||||
## Determine when a user is logged in through polling
|
## Determine when a user is logged in through polling
|
||||||
|
|
||||||
An alert is send to the MDM server in DM package\#1.
|
An alert is sent to the MDM server in DM package\#1.
|
||||||
|
|
||||||
- Alert type - com.microsoft/MDM/LoginStatus
|
- Alert type - com.microsoft/MDM/LoginStatus
|
||||||
- Alert format - chr
|
- Alert format - chr
|
||||||
@ -925,5 +938,3 @@ When a user is enrolled into MDM through Azure Active Directory Join and then di
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
@ -112,8 +112,8 @@ Example: Export the Debug logs
|
|||||||
</SyncML>
|
</SyncML>
|
||||||
```
|
```
|
||||||
|
|
||||||
## Collect logs from Windows 10 Mobile devices
|
<!--## Collect logs from Windows 10 Mobile devices-->
|
||||||
|
<!--
|
||||||
Since there is no Event Viewer in Windows 10 Mobile, you can use the [Field Medic](https://www.microsoft.com/p/field-medic/9wzdncrfjb82?activetab=pivot%3aoverviewtab) app to collect logs.
|
Since there is no Event Viewer in Windows 10 Mobile, you can use the [Field Medic](https://www.microsoft.com/p/field-medic/9wzdncrfjb82?activetab=pivot%3aoverviewtab) app to collect logs.
|
||||||
|
|
||||||
**To collect logs manually**
|
**To collect logs manually**
|
||||||
@ -182,11 +182,11 @@ The following table contains a list of common providers and their corresponding
|
|||||||
| e5fc4a0f-7198-492f-9b0f-88fdcbfded48 | Microsoft-Windows Networking VPN |
|
| e5fc4a0f-7198-492f-9b0f-88fdcbfded48 | Microsoft-Windows Networking VPN |
|
||||||
| e5c16d49-2464-4382-bb20-97a4b5465db9 | Microsoft-Windows-WiFiNetworkManager |
|
| e5c16d49-2464-4382-bb20-97a4b5465db9 | Microsoft-Windows-WiFiNetworkManager |
|
||||||
|
|
||||||
|
-->
|
||||||
|
|
||||||
## Collect logs remotely from Windows 10 Holographic or Windows 10 Mobile devices
|
## Collect logs remotely from Windows 10 Holographic
|
||||||
|
|
||||||
For holographic or mobile devices already enrolled in MDM, you can remotely collect MDM logs through the MDM channel using the [DiagnosticLog CSP](diagnosticlog-csp.md).
|
For holographic already enrolled in MDM, you can remotely collect MDM logs through the MDM channel using the [DiagnosticLog CSP](diagnosticlog-csp.md).
|
||||||
|
|
||||||
You can use the DiagnosticLog CSP to enable the ETW provider. The provider ID is 3DA494E4-0FE2-415C-B895-FB5265C5C83B. The following examples show how to enable the ETW provider:
|
You can use the DiagnosticLog CSP to enable the ETW provider. The provider ID is 3DA494E4-0FE2-415C-B895-FB5265C5C83B. The following examples show how to enable the ETW provider:
|
||||||
|
|
||||||
|
@ -39,9 +39,18 @@ The following resources provide additional information about using Windows Updat
|
|||||||
|
|
||||||
## How do I reset Windows Update components?
|
## How do I reset Windows Update components?
|
||||||
|
|
||||||
[Reset Windows Update Client settings script](https://gallery.technet.microsoft.com/scriptcenter/Reset-WindowsUpdateps1-e0c5eb78) will completely reset the Windows Update client settings. It has been tested on Windows 7, 8, 10, and Windows Server 2012 R2. It will configure the services and registry keys related to Windows Update for default settings. It will also clean up files related to Windows Update, in addition to BITS related data.
|
- Try using the [Windows Update Troubleshooter](https://support.microsoft.com/windows/windows-update-troubleshooter-for-windows-10-19bc41ca-ad72-ae67-af3c-89ce169755dd), which will analyze the situation and reset any components that need it.
|
||||||
|
- Try the steps in [Troubleshoot problems updating Windows 10](https://support.microsoft.com/windows/troubleshoot-problems-updating-windows-10-188c2b0f-10a7-d72f-65b8-32d177eb136c).
|
||||||
|
- Try the steps in [Fix Windows Update](https://support.microsoft.com/sbs/windows/fix-windows-update-errors-18b693b5-7818-5825-8a7e-2a4a37d6d787) errors.
|
||||||
|
|
||||||
|
If all else fails, try resetting the Windows Update Agent by running these commands from an elevated command prompt:
|
||||||
|
|
||||||
|
``` console
|
||||||
|
net stop wuauserv
|
||||||
|
rd /s /q %systemroot%\SoftwareDistribution
|
||||||
|
net start wuauserv
|
||||||
|
```
|
||||||
|
|
||||||
[Reset Windows Update Agent script](https://gallery.technet.microsoft.com/scriptcenter/Reset-Windows-Update-Agent-d824badc) allows you to reset the Windows Update Agent, resolving issues with Windows Update.
|
|
||||||
|
|
||||||
## Reset Windows Update components manually
|
## Reset Windows Update components manually
|
||||||
|
|
||||||
|
@ -39,12 +39,12 @@ Microsoft Safety Scanner is a scan tool designed to find and remove malware from
|
|||||||
|
|
||||||
## System requirements
|
## System requirements
|
||||||
|
|
||||||
Safety Scanner helps remove malicious software from computers running Windows 10, Windows 10 Tech Preview, Windows 8.1, Windows 8, Windows 7, Windows Server 2016, Windows Server Tech Preview, Windows Server 2012 R2, Windows Server 2012, Windows Server 2008 R2, or Windows Server 2008. Please refer to the [Microsoft Lifecycle Policy](https://support.microsoft.com/lifecycle).
|
Safety Scanner helps remove malicious software from computers running Windows 10, Windows 10 Tech Preview, Windows 8.1, Windows 8, Windows 7, Windows Server 2019, Windows Server 2016, Windows Server Tech Preview, Windows Server 2012 R2, Windows Server 2012, Windows Server 2008 R2, or Windows Server 2008. Please refer to the [Microsoft Lifecycle Policy](https://support.microsoft.com/lifecycle).
|
||||||
|
|
||||||
## How to run a scan
|
## How to run a scan
|
||||||
|
|
||||||
1. Download this tool and open it.
|
1. Download this tool and open it.
|
||||||
2. Select the type of scan you want run and start the scan.
|
2. Select the type of scan that you want to run and start the scan.
|
||||||
3. Review the scan results displayed on screen. For detailed detection results, view the log at **%SYSTEMROOT%\debug\msert.log**.
|
3. Review the scan results displayed on screen. For detailed detection results, view the log at **%SYSTEMROOT%\debug\msert.log**.
|
||||||
|
|
||||||
To remove this tool, delete the executable file (msert.exe by default).
|
To remove this tool, delete the executable file (msert.exe by default).
|
||||||
|
@ -200,7 +200,7 @@ The following capabilities are included in this integration:
|
|||||||
- Automated onboarding - Defender for Endpoint sensor is automatically enabled on Windows Servers that are onboarded to Azure Security Center. For more information on Azure Security Center onboarding, see [Onboarding to Azure Security Center Standard for enhanced security](https://docs.microsoft.com/azure/security-center/security-center-onboarding).
|
- Automated onboarding - Defender for Endpoint sensor is automatically enabled on Windows Servers that are onboarded to Azure Security Center. For more information on Azure Security Center onboarding, see [Onboarding to Azure Security Center Standard for enhanced security](https://docs.microsoft.com/azure/security-center/security-center-onboarding).
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> Automated onboarding is only applicable for Windows Server 2008 R2 SP1, Windows Server 2012 R2, and Windows Server 2016.
|
> The integration between Azure Defender for Servers and Microsoft Defender for Endpoint has been expanded to support [Windows Server 2019 and Windows Virtual Desktop (WVD)](https://docs.microsoft.com/azure/security-center/release-notes#microsoft-defender-for-endpoint-integration-with-azure-defender-now-supports-windows-server-2019-and-windows-10-virtual-desktop-wvd-in-preview).
|
||||||
|
|
||||||
- Windows servers monitored by Azure Security Center will also be available in Defender for Endpoint - Azure Security Center seamlessly connects to the Defender for Endpoint tenant, providing a single view across clients and servers. In addition, Defender for Endpoint alerts will be available in the Azure Security Center console.
|
- Windows servers monitored by Azure Security Center will also be available in Defender for Endpoint - Azure Security Center seamlessly connects to the Defender for Endpoint tenant, providing a single view across clients and servers. In addition, Defender for Endpoint alerts will be available in the Azure Security Center console.
|
||||||
- Server investigation - Azure Security Center customers can access Microsoft Defender Security Center to perform detailed investigation to uncover the scope of a potential breach.
|
- Server investigation - Azure Security Center customers can access Microsoft Defender Security Center to perform detailed investigation to uncover the scope of a potential breach.
|
||||||
|
@ -47,10 +47,10 @@ To use either of these supported SIEM tools, you'll need to:
|
|||||||
|
|
||||||
- [Enable SIEM integration in Defender for Endpoint](enable-siem-integration.md)
|
- [Enable SIEM integration in Defender for Endpoint](enable-siem-integration.md)
|
||||||
- Configure the supported SIEM tool:
|
- Configure the supported SIEM tool:
|
||||||
- [Configure HP ArcSight to pull Defender for Endpoint detections](configure-arcsight.md)
|
- [Configure Micro Focus ArcSight to pull Defender for Endpoint detections](configure-arcsight.md)
|
||||||
- Configure IBM QRadar to pull Defender for Endpoint detections For more information, see [IBM Knowledge Center](https://www.ibm.com/support/knowledgecenter/SS42VS_DSM/com.ibm.dsm.doc/c_dsm_guide_MS_Win_Defender_ATP_overview.html?cp=SS42VS_7.3.1).
|
- Configure IBM QRadar to pull Defender for Endpoint detections For more information, see [IBM Knowledge Center](https://www.ibm.com/support/knowledgecenter/SS42VS_DSM/com.ibm.dsm.doc/c_dsm_guide_MS_Win_Defender_ATP_overview.html?cp=SS42VS_7.3.1).
|
||||||
|
|
||||||
For more information on the list of fields exposed in the Detection API see, [Defender for Endpoint Detection fields](api-portal-mapping.md).
|
For more information on the list of fields exposed in the Detection API, see [Defender for Endpoint Detection fields](api-portal-mapping.md).
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
@ -105,8 +105,8 @@ getfile c:\Users\user\Desktop\work.txt -auto
|
|||||||
>
|
>
|
||||||
> The following file types **cannot** be downloaded using this command from within Live Response:
|
> The following file types **cannot** be downloaded using this command from within Live Response:
|
||||||
>
|
>
|
||||||
> * [Reparse point files](/windows/desktop/fileio/reparse-points/)
|
> * [Reparse point files](https://docs.microsoft.com/windows/win32/fileio/reparse-points)
|
||||||
> * [Sparse files](/windows/desktop/fileio/sparse-files/)
|
> * [Sparse files](https://docs.microsoft.com/windows/win32/fileio/sparse-files)
|
||||||
> * Empty files
|
> * Empty files
|
||||||
> * Virtual files, or files that are not fully present locally
|
> * Virtual files, or files that are not fully present locally
|
||||||
>
|
>
|
||||||
|
@ -36,6 +36,11 @@ ms.technology: mde
|
|||||||
> [!IMPORTANT]
|
> [!IMPORTANT]
|
||||||
> Support for macOS 10.13 (High Sierra) has been discontinued on February 15th, 2021.
|
> Support for macOS 10.13 (High Sierra) has been discontinued on February 15th, 2021.
|
||||||
|
|
||||||
|
## 101.23.64 (20.121021.12364.0)
|
||||||
|
|
||||||
|
- Added a new option to the command-line tool to view information about the last on-demand scan. To view information about the last on-demand scan, run `mdatp health --details antivirus`
|
||||||
|
- Performance improvements & bug fixes
|
||||||
|
|
||||||
## 101.22.79 (20.121012.12279.0)
|
## 101.22.79 (20.121012.12279.0)
|
||||||
|
|
||||||
- Performance improvements & bug fixes
|
- Performance improvements & bug fixes
|
||||||
|
@ -31,14 +31,11 @@ ms.technology: mde
|
|||||||
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2154037)
|
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2154037)
|
||||||
- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)
|
- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)
|
||||||
|
|
||||||
> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink)
|
> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-preview-abovefoldlink)
|
||||||
|
|
||||||
|
|
||||||
The Defender for Endpoint service is constantly being updated to include new feature enhancements and capabilities.
|
The Defender for Endpoint service is constantly being updated to include new feature enhancements and capabilities.
|
||||||
|
|
||||||
> [!TIP]
|
|
||||||
> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-preview-abovefoldlink)
|
|
||||||
|
|
||||||
Learn about new features in the Defender for Endpoint preview release and be among the first to try upcoming features by turning on the preview experience.
|
Learn about new features in the Defender for Endpoint preview release and be among the first to try upcoming features by turning on the preview experience.
|
||||||
|
|
||||||
>[!TIP]
|
>[!TIP]
|
||||||
@ -64,14 +61,6 @@ The following features are included in the preview release:
|
|||||||
|
|
||||||
- [Device health and compliance report](machine-reports.md) <br/> The device health and compliance report provides high-level information about the devices in your organization.
|
- [Device health and compliance report](machine-reports.md) <br/> The device health and compliance report provides high-level information about the devices in your organization.
|
||||||
|
|
||||||
- [Information protection](information-protection-in-windows-overview.md)<BR>
|
|
||||||
Information protection is an integral part of Microsoft 365 Enterprise suite, providing intelligent protection to keep sensitive data secure while enabling productivity in the workplace. Microsoft Defender for Endpoint is seamlessly integrated in Microsoft Threat Protection to provide a complete and comprehensive data loss prevention (DLP) solution for Windows devices.
|
|
||||||
|
|
||||||
>[!NOTE]
|
|
||||||
>Partially available from Windows 10, version 1809.
|
|
||||||
|
|
||||||
- [Onboard Windows Server 2019](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/configure-server-endpoints#windows-server-version-1803-and-windows-server-2019) <BR> Microsoft Defender for Endpoint now adds support for Windows Server 2019. You'll be able to onboard Windows Server 2019 in the same method available for Windows 10 client devices.
|
|
||||||
|
|
||||||
|
|
||||||
> [!TIP]
|
> [!TIP]
|
||||||
> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-preview-belowfoldlink)
|
> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-preview-belowfoldlink)
|
||||||
|
Reference in New Issue
Block a user