More updates
Before Width: | Height: | Size: 181 KiB After Width: | Height: | Size: 172 KiB |
@ -221,8 +221,6 @@ Running threat simulations using third-party platforms is a good way to evaluate
|
||||
|
||||
After running your simulations, we encourage you to walk through the lab progress bar and explore Microsoft Defender ATP features. See if the attack simulations you ran triggered an automated investigation and remediation, check out the evidence collected and analyzed by the feature.
|
||||
|
||||
|
||||
|
||||
Hunt for attack evidence through advanced hunting by using the rich query language and raw telemetry and check out some world-wide threats documented in Threat analytics.
|
||||
|
||||
|
||||
|
Before Width: | Height: | Size: 66 KiB After Width: | Height: | Size: 36 KiB |
Before Width: | Height: | Size: 55 KiB After Width: | Height: | Size: 28 KiB |
Before Width: | Height: | Size: 35 KiB After Width: | Height: | Size: 36 KiB |
Before Width: | Height: | Size: 75 KiB After Width: | Height: | Size: 106 KiB |
Before Width: | Height: | Size: 10 KiB After Width: | Height: | Size: 10 KiB |
Before Width: | Height: | Size: 101 KiB After Width: | Height: | Size: 101 KiB |
Before Width: | Height: | Size: 100 KiB After Width: | Height: | Size: 95 KiB |
Before Width: | Height: | Size: 173 KiB After Width: | Height: | Size: 171 KiB |
Before Width: | Height: | Size: 135 KiB After Width: | Height: | Size: 80 KiB |
Before Width: | Height: | Size: 70 KiB After Width: | Height: | Size: 68 KiB |
Before Width: | Height: | Size: 291 KiB After Width: | Height: | Size: 249 KiB |
Before Width: | Height: | Size: 221 KiB After Width: | Height: | Size: 225 KiB |
Before Width: | Height: | Size: 9.6 KiB After Width: | Height: | Size: 9.9 KiB |
Before Width: | Height: | Size: 68 KiB After Width: | Height: | Size: 165 KiB |
Before Width: | Height: | Size: 55 KiB After Width: | Height: | Size: 51 KiB |
Before Width: | Height: | Size: 167 KiB After Width: | Height: | Size: 167 KiB |
Before Width: | Height: | Size: 53 KiB After Width: | Height: | Size: 75 KiB |
Before Width: | Height: | Size: 204 KiB After Width: | Height: | Size: 204 KiB |
Before Width: | Height: | Size: 169 KiB After Width: | Height: | Size: 169 KiB |
Before Width: | Height: | Size: 105 KiB After Width: | Height: | Size: 208 KiB |
Before Width: | Height: | Size: 279 KiB After Width: | Height: | Size: 249 KiB |
Before Width: | Height: | Size: 11 KiB After Width: | Height: | Size: 12 KiB |
Before Width: | Height: | Size: 68 KiB After Width: | Height: | Size: 54 KiB |
Before Width: | Height: | Size: 56 KiB After Width: | Height: | Size: 155 KiB |
Before Width: | Height: | Size: 136 KiB After Width: | Height: | Size: 137 KiB |
Before Width: | Height: | Size: 47 KiB After Width: | Height: | Size: 144 KiB |
Before Width: | Height: | Size: 142 KiB After Width: | Height: | Size: 157 KiB |
Before Width: | Height: | Size: 133 KiB After Width: | Height: | Size: 142 KiB |
@ -58,13 +58,10 @@ The following table summarizes the steps you would need to take to deploy and ma
|
||||
Download the installation and onboarding packages from Microsoft Defender Security Center:
|
||||
|
||||
1. In Microsoft Defender Security Center, go to **Settings** > **Device Management** > **Onboarding**.
|
||||
2. In Section 1 of the page, set the operating system to **Linux, macOS, iOS, or Android** and the deployment method to **Mobile Device Management / Microsoft Intune**.
|
||||
2. In Section 1 of the page, set the operating system to **macOS**, **Linux Server**, **iOS**, or **Android** and the deployment method to **Mobile Device Management / Microsoft Intune**.
|
||||
3. In Section 2 of the page, select **Download installation package**. Save it as _wdav.pkg_ to a local directory.
|
||||
4. In Section 2 of the page, select **Download onboarding package**. Save it as _WindowsDefenderATPOnboardingPackage.zip_ to the same directory.
|
||||
5. Download **IntuneAppUtil** from [https://docs.microsoft.com/intune/lob-apps-macos](https://docs.microsoft.com/intune/lob-apps-macos).
|
||||
|
||||

|
||||
|
||||
6. From a command prompt, verify that you have the three files.
|
||||
Extract the contents of the .zip files:
|
||||
|
||||
@ -110,11 +107,11 @@ You do not need any special provisioning for a Mac device beyond a standard [Com
|
||||
|
||||
1. Confirm device management.
|
||||
|
||||

|
||||

|
||||
|
||||
Select **Open System Preferences**, locate **Management Profile** on the list, and select **Approve...**. Your Management Profile would be displayed as **Verified**:
|
||||
Select **Open System Preferences**, locate **Management Profile** on the list, and select **Approve...**. Your Management Profile would be displayed as **Verified**:
|
||||
|
||||

|
||||

|
||||
|
||||
2. Select **Continue** and complete the enrollment.
|
||||
|
||||
|
@ -56,7 +56,7 @@ The following table summarizes the steps you would need to take to deploy and ma
|
||||
Download the installation and onboarding packages from Microsoft Defender Security Center:
|
||||
|
||||
1. In Microsoft Defender Security Center, go to **Settings > Device management > Onboarding**.
|
||||
2. In Section 1 of the page, set the operating system to **Linux, macOS, iOS or Android**.
|
||||
2. In Section 1 of the page, set the operating system to **macOS**, **Linux Server**, **iOS**, or **Android**.
|
||||
3. Set the deployment method to **Mobile Device Management / Microsoft Intune**.
|
||||
|
||||
> [!NOTE]
|
||||
@ -64,9 +64,6 @@ Download the installation and onboarding packages from Microsoft Defender Securi
|
||||
|
||||
4. In Section 2 of the page, select **Download installation package**. Save it as _wdav.pkg_ to a local directory.
|
||||
5. In Section 2 of the page, select **Download onboarding package**. Save it as _WindowsDefenderATPOnboardingPackage.zip_ to the same directory.
|
||||
|
||||

|
||||
|
||||
6. From the command prompt, verify that you have the two files. Extract the contents of the .zip files like so:
|
||||
|
||||
```bash
|
||||
|
@ -319,7 +319,7 @@ endpoints. (This may take few minutes)
|
||||
|
||||

|
||||
|
||||
4. Click **Configuration** tab in Attack Surface reduction rules reports. It shows ASR rules configuration overview and ASR rules status on each devices.
|
||||
4. Click **Configuration** tab in Attack surface reduction rules reports. It shows ASR rules configuration overview and ASR rules status on each devices.
|
||||
|
||||

|
||||
|
||||
|
@ -54,7 +54,7 @@ Once you are in the Software inventory page and have opened the flyout panel by
|
||||
- Data visualizations showing the number of, and severity of, vulnerabilities and misconfigurations. Also, graphs of the number of exposed devices
|
||||
- Tabs with lists of the corresponding security recommendations for the weaknesses and vulnerabilities identified, the named CVEs of discovered vulnerabilities, the names of the devices that the software is installed on, and the specific versions of the software with the number of devices that have each version installed and number of vulnerabilities.
|
||||
|
||||

|
||||

|
||||
|
||||
## Software evidence
|
||||
|
||||
|