From c2f6c213f6d09a57b6eec0dae9492b1376a7dd01 Mon Sep 17 00:00:00 2001 From: ImranHabib <47118050+joinimran@users.noreply.github.com> Date: Mon, 4 Mar 2019 20:45:10 +0500 Subject: [PATCH 01/25] Added Example I have added an example for issue https://github.com/MicrosoftDocs/windows-itpro-docs/issues/2708. --- ...gure-arcsight-windows-defender-advanced-threat-protection.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/windows-defender-atp/configure-arcsight-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/configure-arcsight-windows-defender-advanced-threat-protection.md index 852dfacc9f..8b068cbf17 100644 --- a/windows/security/threat-protection/windows-defender-atp/configure-arcsight-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/configure-arcsight-windows-defender-advanced-threat-protection.md @@ -107,7 +107,7 @@ The following steps assume that you have completed all the required steps in [Be Browse to the location of the *wdatp-connector.properties* file. The name must match the file provided in the .zip that you downloaded. Refresh Token - You can obtain a refresh token in two ways: by generating a refresh token from the **SIEM settings** page or using the restutil tool.

For more information on generating a refresh token from the **Preferences setup** , see [Enable SIEM integration in Windows Defender ATP](enable-siem-integration-windows-defender-advanced-threat-protection.md).

**Get your refresh token using the restutil tool:**
a. Open a command prompt. Navigate to C:\\*folder_location*\current\bin where *folder_location* represents the location where you installed the tool.

b. Type: `arcsight restutil token -config` from the bin directory. A Web browser window will open.

c. Type in your credentials then click on the password field to let the page redirect. In the login prompt, enter your credentials.

d. A refresh token is shown in the command prompt.

e. Copy and paste it into the **Refresh Token** field. + You can obtain a refresh token in two ways: by generating a refresh token from the **SIEM settings** page or using the restutil tool.

For more information on generating a refresh token from the **Preferences setup** , see [Enable SIEM integration in Windows Defender ATP](enable-siem-integration-windows-defender-advanced-threat-protection.md).

**Get your refresh token using the restutil tool:**
a. Open a command prompt. Navigate to C:\\*folder_location*\current\bin where *folder_location* represents the location where you installed the tool.

b. Type: `arcsight restutil token -config` from the bin directory.For example: **arcsight restutil boxtoken -proxy proxy.location.hp.com:8080** A Web browser window will open.

c. Type in your credentials then click on the password field to let the page redirect. In the login prompt, enter your credentials.

d. A refresh token is shown in the command prompt.

e. Copy and paste it into the **Refresh Token** field. From 978dc38e13cb7e4c30da1ed82d3d2a6cdba7a9fc Mon Sep 17 00:00:00 2001 From: MaratMussabekov <48041687+MaratMussabekov@users.noreply.github.com> Date: Tue, 5 Mar 2019 11:46:27 +0500 Subject: [PATCH 02/25] Update create-wip-policy-using-intune-azure.md, issue #2724 source [Protect your enterprise data using Windows Information Protection (WIP)](https://docs.microsoft.com/windows/security/information-protection/windows-information-protection/protect-enterprise-data-using-wip) --- .../create-wip-policy-using-intune-azure.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md b/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md index 042a8923f9..fd3ae5f165 100644 --- a/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md +++ b/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md @@ -524,7 +524,7 @@ WIP can integrate with Microsoft Azure Rights Management to enable secure sharin To configure WIP to use Azure Rights Management, you must set the **AllowAzureRMSForEDP** MDM setting to **1** in Microsoft Intune. This setting tells WIP to encrypt files copied to removable drives with Azure Rights Management, so they can be shared amongst your employees on computers running at least Windows 10, version 1703. -Optionally, if you don’t want everyone in your organization to be able to share your enterprise data, you can set the **RMSTemplateIDForEDP** MDM setting to the **TemplateID** of the Azure Rights Management template used to encrypt the data. You must make sure to mark the template with the **EditRightsData** option. +Optionally, if you don’t want everyone in your organization to be able to share your enterprise data, you can set the **RMSTemplateIDForEDP** MDM setting to the **TemplateID** of the Azure Rights Management template used to encrypt the data. You must make sure to mark the template with the **EditRightsData** option. This template will be applied to the protected data that leaves the device (for example, as an email attachment, or by being copied to removable drive). >[!IMPORTANT] >Curly braces -- {} -- are required around the RMS Template ID. From 03dad0883c811637c5b5d18556538a74de6ff005 Mon Sep 17 00:00:00 2001 From: MaratMussabekov <48041687+MaratMussabekov@users.noreply.github.com> Date: Tue, 5 Mar 2019 11:56:59 +0500 Subject: [PATCH 03/25] issue #2724 source [Protect your enterprise data using Windows Information Protection (WIP)](https://docs.microsoft.com/windows/security/information-protection/windows-information-protection/protect-enterprise-data-using-wip) --- .../create-wip-policy-using-intune-azure.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md b/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md index fd3ae5f165..b709ae0d53 100644 --- a/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md +++ b/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md @@ -524,7 +524,7 @@ WIP can integrate with Microsoft Azure Rights Management to enable secure sharin To configure WIP to use Azure Rights Management, you must set the **AllowAzureRMSForEDP** MDM setting to **1** in Microsoft Intune. This setting tells WIP to encrypt files copied to removable drives with Azure Rights Management, so they can be shared amongst your employees on computers running at least Windows 10, version 1703. -Optionally, if you don’t want everyone in your organization to be able to share your enterprise data, you can set the **RMSTemplateIDForEDP** MDM setting to the **TemplateID** of the Azure Rights Management template used to encrypt the data. You must make sure to mark the template with the **EditRightsData** option. This template will be applied to the protected data that leaves the device (for example, as an email attachment, or by being copied to removable drive). +Optionally, if you don’t want everyone in your organization to be able to share your enterprise data, you can set the **RMSTemplateIDForEDP** MDM setting to the **TemplateID** of the Azure Rights Management template used to encrypt the data. You must make sure to mark the template with the **EditRightsData** option. This template will be applied to the protected data that leaves the device (for example, by being copied to removable drive or sent as an email attachment). >[!IMPORTANT] >Curly braces -- {} -- are required around the RMS Template ID. From 13fa94dc711349ea25cf55da716eadc5998f101a Mon Sep 17 00:00:00 2001 From: Oliver Kieselbach Date: Tue, 5 Mar 2019 17:28:20 +0100 Subject: [PATCH 04/25] fixed MDM OMA-URI for CommercialID fixed MDM OMA-URI for CommercialID from Provider/ProviderID/CommercialID to the correct one Provider/MS DM Server/CommercialID --- windows/deployment/update/windows-analytics-get-started.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/deployment/update/windows-analytics-get-started.md b/windows/deployment/update/windows-analytics-get-started.md index 849127c525..7f168d2c01 100644 --- a/windows/deployment/update/windows-analytics-get-started.md +++ b/windows/deployment/update/windows-analytics-get-started.md @@ -167,7 +167,7 @@ These policies are under Microsoft\Windows\DataCollection: | CommercialDataOptIn (in Windows 7 and Windows 8) | 1 is required for Upgrade Readiness, which is the only solution that runs on Windows 7 or Windows 8. | -You can set these values by using Group Policy (in Computer Configuration > Administrative Templates > Windows Components > Data Collection and Preview Builds) or by using Mobile Device Management (in Provider/ProviderID/CommercialID). For more information about deployment using MDM, see the [DMClient CSP](https://docs.microsoft.com/windows/client-management/mdm/dmclient-csp) topic in MDM documentation. +You can set these values by using Group Policy (in Computer Configuration > Administrative Templates > Windows Components > Data Collection and Preview Builds) or by using Mobile Device Management (in Provider/MS DM Server/CommercialID). For more information about deployment using MDM, see the [DMClient CSP](https://docs.microsoft.com/windows/client-management/mdm/dmclient-csp) topic in MDM documentation. The corresponding preference registry values are available in **HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\DataCollection** and can be configured by the deployment script. If a given setting is configured by both preference registry settings and policy, the policy values will override. However, the **IEDataOptIn** setting is different--you can only set this with the preference registry keys: From 016b03bedc4dc02c6294a822e223a8fdd1dc65f9 Mon Sep 17 00:00:00 2001 From: MaratMussabekov <48041687+MaratMussabekov@users.noreply.github.com> Date: Sun, 10 Mar 2019 13:30:04 +0500 Subject: [PATCH 05/25] update create-wip-policy-using-intune-azure.md --- .../create-wip-policy-using-intune-azure.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md b/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md index b709ae0d53..6400e2fcba 100644 --- a/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md +++ b/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md @@ -524,7 +524,7 @@ WIP can integrate with Microsoft Azure Rights Management to enable secure sharin To configure WIP to use Azure Rights Management, you must set the **AllowAzureRMSForEDP** MDM setting to **1** in Microsoft Intune. This setting tells WIP to encrypt files copied to removable drives with Azure Rights Management, so they can be shared amongst your employees on computers running at least Windows 10, version 1703. -Optionally, if you don’t want everyone in your organization to be able to share your enterprise data, you can set the **RMSTemplateIDForEDP** MDM setting to the **TemplateID** of the Azure Rights Management template used to encrypt the data. You must make sure to mark the template with the **EditRightsData** option. This template will be applied to the protected data that leaves the device (for example, by being copied to removable drive or sent as an email attachment). +Optionally, if you don’t want everyone in your organization to be able to share your enterprise data, you can set the **RMSTemplateIDForEDP** MDM setting to the **TemplateID** of the Azure Rights Management template used to encrypt the data. You must make sure to mark the template with the **EditRightsData** option. This template will be applied to the protected data that is copied to a removable drive. >[!IMPORTANT] >Curly braces -- {} -- are required around the RMS Template ID. From 34855522a5cc2e7d6f4cebb65a285417d5c30d28 Mon Sep 17 00:00:00 2001 From: andreiztm Date: Mon, 11 Mar 2019 17:02:58 +0200 Subject: [PATCH 06/25] Correcting typo --- windows/deployment/update/windows-update-troubleshooting.md | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/windows/deployment/update/windows-update-troubleshooting.md b/windows/deployment/update/windows-update-troubleshooting.md index d9a9463b44..585edba421 100644 --- a/windows/deployment/update/windows-update-troubleshooting.md +++ b/windows/deployment/update/windows-update-troubleshooting.md @@ -102,7 +102,8 @@ netsh winhttp set proxy ProxyServerName:PortNumber If downloads through a proxy server fail with a 0x80d05001 DO_E_HTTP_BLOCKSIZE_MISMATCH error, or if you notice high CPU usage while updates are downloading, check the proxy configuration to permit HTTP RANGE requests to run. -You may choose to apply a rule to permit HTTP RANGE requests for the following URLs: +You may choose to apply a rule to permit HTTP RANGE requests for the following URLs: + *.download.windowsupdate.com *.dl.delivery.mp.microsoft.com *.emdl.ws.microsoft.com From 0db3ea8076df8c4907794c84edecbce71782427a Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Mon, 11 Mar 2019 11:51:59 -0700 Subject: [PATCH 07/25] added wip redirects --- .openpublishing.redirection.json | 20 +++++++++++++++++++ .../overview-create-wip-policy.md | 5 ++--- 2 files changed, 22 insertions(+), 3 deletions(-) diff --git a/.openpublishing.redirection.json b/.openpublishing.redirection.json index 47d3a0ac90..7d3a0ff26f 100644 --- a/.openpublishing.redirection.json +++ b/.openpublishing.redirection.json @@ -6,6 +6,26 @@ "redirect_document_id": true }, { +"source_path": "windows/security/information-protection/windows-information-protection/create-wip-policy-using-mam-intune-azure.md", +"redirect_url": "/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure", +"redirect_document_id": true +}, +{ +"source_path": "windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune.md", +"redirect_url": "/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure", +"redirect_document_id": true +}, +{ +"source_path": "windows/security/information-protection/windows-information-protection/deploy-wip-policy-using-intune.md", +"redirect_url": "/windows/security/information-protection/windows-information-protection/deploy-wip-policy-using-intune-azure", +"redirect_document_id": true +}, +{ +"source_path": "windows/security/information-protection/windows-information-protection/create-vpn-and-wip-policy-using-intune.md", +"redirect_url": "/windows/security/information-protection/windows-information-protection/create-vpn-and-wip-policy-using-intune-azure", +"redirect_document_id": true +}, +{ "source_path": "windows/security/threat-protection/windows-defender-atp/how-hardware-based-containers-help-protect-windows.md", "redirect_url": "/windows/security/threat-protection/windows-defender-system-guard/how-hardware-based-containers-help-protect-windows", "redirect_document_id": true diff --git a/windows/security/information-protection/windows-information-protection/overview-create-wip-policy.md b/windows/security/information-protection/windows-information-protection/overview-create-wip-policy.md index dd7bb4891e..3af1d9b274 100644 --- a/windows/security/information-protection/windows-information-protection/overview-create-wip-policy.md +++ b/windows/security/information-protection/windows-information-protection/overview-create-wip-policy.md @@ -13,7 +13,7 @@ manager: dansimp audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual -ms.date: 03/05/2019 +ms.date: 03/11/2019 --- # Create a Windows Information Protection (WIP) policy using Microsoft Intune @@ -27,7 +27,6 @@ Microsoft Intune helps you create and deploy your enterprise data protection (WI ## In this section |Topic |Description | |------|------------| -|[Create a Windows Information Protection (WIP) policy with MDM using the Azure portal for Microsoft Intune](create-wip-policy-using-intune-azure.md)|Details about how to use the Azure portal for Microsoft Intune to create and deploy your WIP policy with MDM (Mobile Device Management), including letting you choose your protected apps, your WIP-protection level, and how to find enterprise data on the network. | -|[Create a Windows Information Protection (WIP) policy with MAM using the Azure portal for Microsoft Intune](create-wip-policy-using-mam-intune-azure.md)|Details about how to use the Azure portal for Microsoft Intune to create your WIP policy with MAM (Mobile Application Management), including letting you choose your protected apps, your WIP-protection level, and how to find enterprise data on the network.| +|[Create a Windows Information Protection (WIP) policy using the Azure portal for Microsoft Intune](create-wip-policy-using-intune-azure.md)|Details about how to use the Azure portal for Microsoft Intune to create and deploy your WIP policy with MDM (Mobile Device Management), including letting you choose your protected apps, your WIP-protection level, and how to find enterprise data on the network. | |[Create and verify an Encrypting File System (EFS) Data Recovery Agent (DRA) certificate](create-and-verify-an-efs-dra-certificate.md) |Steps to create, verify, and perform a quick recovery using a Encrypting File System (EFS) Data Recovery Agent (DRA) certificate. | |[Determine the Enterprise Context of an app running in Windows Information Protection (WIP)](wip-app-enterprise-context.md) |Use the Task Manager to determine whether an app is considered work, personal or exempt by Windows Information Protection (WIP). | From b77fe6b2ea86ecf24ddb4ccec9253a4625bab7ab Mon Sep 17 00:00:00 2001 From: Jeanie Decker Date: Mon, 11 Mar 2019 18:52:20 +0000 Subject: [PATCH 08/25] Merged PR 14745: Revert commit 68b3dccb Revert commit 68b3dccb --- windows/deployment/update/fod-and-lang-packs.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/deployment/update/fod-and-lang-packs.md b/windows/deployment/update/fod-and-lang-packs.md index c2fcc08b95..471cb01382 100644 --- a/windows/deployment/update/fod-and-lang-packs.md +++ b/windows/deployment/update/fod-and-lang-packs.md @@ -15,9 +15,9 @@ ms.topic: article > Applies to: Windows 10 -As of Windows 10 version 1709, you cannot use Windows Server Update Services (WSUS) to host [Features on Demand](https://docs.microsoft.com/windows-hardware/manufacture/desktop/features-on-demand-v2--capabilities) (FOD) and language packs for Windows 10 clients locally. Instead, you can enforce a Group Policy setting that tells the clients to pull them directly from Windows Update. You can also host FOD and language packs on a network share, but starting with Windows 10 version 1809, FOD and language packs can only be installed from Windows Update. +As of Windows 10 version 1709, you cannot use Windows Server Update Services (WSUS) to host [Features on Demand](https://docs.microsoft.com/windows-hardware/manufacture/desktop/features-on-demand-v2--capabilities) (FOD) and language packs for Windows 10 clients locally. Instead, you can enforce a Group Policy setting that tells the clients to pull them directly from Windows Update. You can also host FOD and language packs on a network share, but starting with Windows 10 version 1809, language packs can only be installed from Windows Update. -For Windows domain environments running WSUS or SCCM, change the **Specify settings for optional component installation and component repair** policy to enable downloading FOD and language packs from Windows Update. This setting is located in `Computer Configuration\Administrative Templates\System` in the Group Policy Editor. +For Windows domain environments running WSUS or SCCM, change the **Specify settings for optional component installation and component repair** policy to enable downloading language and FOD packs from Windows Update. This setting is located in `Computer Configuration\Administrative Templates\System` in the Group Policy Editor. Changing this policy does not affect how other updates are distributed. They continue to come from WSUS or SCCM as you have scheduled them. From 27256c0d8f9ae8c6b58d716ca5ebfea3cbf8488b Mon Sep 17 00:00:00 2001 From: Trudy Hakala Date: Mon, 11 Mar 2019 18:59:24 +0000 Subject: [PATCH 09/25] Merged PR 14748: invoice content updates Updates from review --- .../billing-understand-your-invoice-msfb.md | 4 ++-- store-for-business/sfb-change-history.md | 14 +++++++++----- 2 files changed, 11 insertions(+), 7 deletions(-) diff --git a/store-for-business/billing-understand-your-invoice-msfb.md b/store-for-business/billing-understand-your-invoice-msfb.md index baa42e23a6..d477d66085 100644 --- a/store-for-business/billing-understand-your-invoice-msfb.md +++ b/store-for-business/billing-understand-your-invoice-msfb.md @@ -58,7 +58,7 @@ The **Invoice Summary** is on the top of the first page and shows information ab | P.O. number |An optional purchase order number, assigned by you for tracking | | Invoice number |A unique, Microsoft-generated invoice number used for tracking purposes | | Invoice date |Date that the invoice is generated, typically five to 12 days after end of the Billing cycle. You can check your invoice date in billing profile properties.| -| Payment terms |How you pay for your Microsoft bill. *Net 30 days* means you pay by check or wire transfer within 30 days of the invoice date. | +| Payment terms |How you pay for your Microsoft bill. *Net 30 days* means you pay by following instructions on your invoice, within 30 days of the invoice date. | ### Understand the billing summary The **Billing Summary** shows the charges against the billing profile since the previous billing period, any credits that were applied, tax, and the total amount due. @@ -100,7 +100,7 @@ The total amount due for each service family is calculated by subtracting Azure | Total | The total amount due for the purchase | ### How to pay -At the bottom of the invoice, there are instructions for paying your bill. You can pay by check, wire, or online. If you pay online, you can use a credit/debit card or Azure credits, if applicable. +At the bottom of the invoice, there are instructions for paying your bill. You can pay by wire or online. If you pay online, you can use a credit or debit card, or Azure credits, if applicable. ### Publisher information If you have third-party services in your bill, the name and address of each publisher is listed at the bottom of your invoice. diff --git a/store-for-business/sfb-change-history.md b/store-for-business/sfb-change-history.md index f4429a667f..eb426098c6 100644 --- a/store-for-business/sfb-change-history.md +++ b/store-for-business/sfb-change-history.md @@ -8,16 +8,20 @@ ms.pagetype: store author: TrudyHa ms.author: TrudyHa ms.topic: conceptual -ms.date: 4/26/2018 +ms.date: 3/2/2019 ms.localizationpriority: medium --- # Change history for Microsoft Store for Business and Microsoft Store for Education -**Applies to** - -- Windows 10 -- Windows 10 Mobile +## March 2019 +| New or changed topic | Description | +| --- | --- | +| [Understand your Microsoft Customer Agreement invoice](billing-understand-your-invoice-msfb.md) | New topic | +| [Understand billing profiles](billing-profile.md) | New topic | +| [Payment methods](payment-methods.md) | New topic | +| [Update Microsoft Store for Business and Microsoft Store for Education account settings](update-microsoft-store-for-business-account-settings.md) | Update with information on billing accounts. | +| [Roles and permissions in Microsoft Store for Business and Education](roles-and-permissions-microsoft-store-for-business.md) | Add info for purchasing roles and permissions. | ## April 2018 | New or changed topic | Description | From 38c5d6cc65b599362e130d35fbfde06d1ded9d0f Mon Sep 17 00:00:00 2001 From: Liza Poggemeyer Date: Mon, 11 Mar 2019 13:00:54 -0700 Subject: [PATCH 10/25] setting default build engine --- bcs/docfx.json | 3 ++- browsers/edge/docfx.json | 3 ++- browsers/internet-explorer/docfx.json | 3 ++- devices/hololens/docfx.json | 3 ++- devices/surface-hub/docfx.json | 3 ++- devices/surface/docfx.json | 3 ++- education/docfx.json | 3 ++- gdpr/docfx.json | 3 ++- mdop/docfx.json | 3 ++- smb/docfx.json | 3 ++- store-for-business/docfx.json | 3 ++- windows/application-management/docfx.json | 3 ++- windows/client-management/docfx.json | 3 ++- windows/configuration/docfx.json | 3 ++- windows/deployment/docfx.json | 3 ++- windows/docfx.json | 3 ++- windows/hub/docfx.json | 3 ++- windows/security/docfx.json | 3 ++- windows/whats-new/docfx.json | 3 ++- 19 files changed, 38 insertions(+), 19 deletions(-) diff --git a/bcs/docfx.json b/bcs/docfx.json index 16e842d530..2fa639d038 100644 --- a/bcs/docfx.json +++ b/bcs/docfx.json @@ -40,6 +40,7 @@ }, "fileMetadata": {}, "template": [], - "dest": "bcs-vsts" + "dest": "bcs-vsts", + "markdownEngineName": "dfm" } } \ No newline at end of file diff --git a/browsers/edge/docfx.json b/browsers/edge/docfx.json index 42532b3fb2..c0761e7192 100644 --- a/browsers/edge/docfx.json +++ b/browsers/edge/docfx.json @@ -33,6 +33,7 @@ "externalReference": [ ], "template": "op.html", - "dest": "browsers/edge" + "dest": "browsers/edge", + "markdownEngineName": "dfm" } } \ No newline at end of file diff --git a/browsers/internet-explorer/docfx.json b/browsers/internet-explorer/docfx.json index 323ba3e4bd..0c42ef4158 100644 --- a/browsers/internet-explorer/docfx.json +++ b/browsers/internet-explorer/docfx.json @@ -34,6 +34,7 @@ "externalReference": [ ], "template": "op.html", - "dest": "edges/internet-explorer" + "dest": "edges/internet-explorer", + "markdownEngineName": "dfm" } } \ No newline at end of file diff --git a/devices/hololens/docfx.json b/devices/hololens/docfx.json index 7a67485a17..06af992034 100644 --- a/devices/hololens/docfx.json +++ b/devices/hololens/docfx.json @@ -48,6 +48,7 @@ "template": [ null ], - "dest": "devices/hololens" + "dest": "devices/hololens", + "markdownEngineName": "dfm" } } diff --git a/devices/surface-hub/docfx.json b/devices/surface-hub/docfx.json index 47f420a4d0..88d3dc2f7e 100644 --- a/devices/surface-hub/docfx.json +++ b/devices/surface-hub/docfx.json @@ -36,6 +36,7 @@ "externalReference": [ ], "template": "op.html", - "dest": "devices/surface-hub" + "dest": "devices/surface-hub", + "markdownEngineName": "dfm" } } \ No newline at end of file diff --git a/devices/surface/docfx.json b/devices/surface/docfx.json index 8477cac86f..9bae9c245d 100644 --- a/devices/surface/docfx.json +++ b/devices/surface/docfx.json @@ -33,6 +33,7 @@ "externalReference": [ ], "template": "op.html", - "dest": "devices/surface" + "dest": "devices/surface", + "markdownEngineName": "dfm" } } \ No newline at end of file diff --git a/education/docfx.json b/education/docfx.json index 227546b56a..87d94a2065 100644 --- a/education/docfx.json +++ b/education/docfx.json @@ -33,6 +33,7 @@ "externalReference": [ ], "template": "op.html", - "dest": "education" + "dest": "education", + "markdownEngineName": "dfm" } } diff --git a/gdpr/docfx.json b/gdpr/docfx.json index d426f781dc..2fd5e0e9f9 100644 --- a/gdpr/docfx.json +++ b/gdpr/docfx.json @@ -38,6 +38,7 @@ }, "fileMetadata": {}, "template": [], - "dest": "gdpr" + "dest": "gdpr", + "markdownEngineName": "dfm" } } \ No newline at end of file diff --git a/mdop/docfx.json b/mdop/docfx.json index 530722278f..38b354ec49 100644 --- a/mdop/docfx.json +++ b/mdop/docfx.json @@ -34,6 +34,7 @@ "externalReference": [ ], "template": "op.html", - "dest": "mdop" + "dest": "mdop", + "markdownEngineName": "dfm" } } \ No newline at end of file diff --git a/smb/docfx.json b/smb/docfx.json index 181bf75fda..56500f0150 100644 --- a/smb/docfx.json +++ b/smb/docfx.json @@ -42,6 +42,7 @@ }, "fileMetadata": {}, "template": [], - "dest": "smb" + "dest": "smb", + "markdownEngineName": "dfm" } } \ No newline at end of file diff --git a/store-for-business/docfx.json b/store-for-business/docfx.json index d739d26b28..e02715ff1f 100644 --- a/store-for-business/docfx.json +++ b/store-for-business/docfx.json @@ -49,6 +49,7 @@ }, "fileMetadata": {}, "template": [], - "dest": "store-for-business" + "dest": "store-for-business", + "markdownEngineName": "dfm" } } \ No newline at end of file diff --git a/windows/application-management/docfx.json b/windows/application-management/docfx.json index 5c20bbd8a7..8cb7d083a0 100644 --- a/windows/application-management/docfx.json +++ b/windows/application-management/docfx.json @@ -47,6 +47,7 @@ }, "fileMetadata": {}, "template": [], - "dest": "win-app-management" + "dest": "win-app-management", + "markdownEngineName": "dfm" } } \ No newline at end of file diff --git a/windows/client-management/docfx.json b/windows/client-management/docfx.json index eab3b9f62e..f68b218456 100644 --- a/windows/client-management/docfx.json +++ b/windows/client-management/docfx.json @@ -46,6 +46,7 @@ }, "fileMetadata": {}, "template": [], - "dest": "win-client-management" + "dest": "win-client-management", + "markdownEngineName": "dfm" } } \ No newline at end of file diff --git a/windows/configuration/docfx.json b/windows/configuration/docfx.json index e66228ba49..67eda5ee5a 100644 --- a/windows/configuration/docfx.json +++ b/windows/configuration/docfx.json @@ -47,6 +47,7 @@ }, "fileMetadata": {}, "template": [], - "dest": "win-configuration" + "dest": "win-configuration", + "markdownEngineName": "dfm" } } \ No newline at end of file diff --git a/windows/deployment/docfx.json b/windows/deployment/docfx.json index 0b6ae0597d..45f759e8f4 100644 --- a/windows/deployment/docfx.json +++ b/windows/deployment/docfx.json @@ -48,6 +48,7 @@ }, "fileMetadata": {}, "template": [], - "dest": "win-development" + "dest": "win-development", + "markdownEngineName": "dfm" } } \ No newline at end of file diff --git a/windows/docfx.json b/windows/docfx.json index 9ac35033eb..0e7c823b17 100644 --- a/windows/docfx.json +++ b/windows/docfx.json @@ -25,6 +25,7 @@ "externalReference": [ ], "template": "op.html", - "dest": "windows" + "dest": "windows", + "markdownEngineName": "dfm" } } diff --git a/windows/hub/docfx.json b/windows/hub/docfx.json index 8ef6442201..a44aea3b51 100644 --- a/windows/hub/docfx.json +++ b/windows/hub/docfx.json @@ -50,6 +50,7 @@ }, "fileMetadata": {}, "template": [], - "dest": "windows-hub" + "dest": "windows-hub", + "markdownEngineName": "dfm" } } \ No newline at end of file diff --git a/windows/security/docfx.json b/windows/security/docfx.json index 394ca15239..018d611769 100644 --- a/windows/security/docfx.json +++ b/windows/security/docfx.json @@ -43,6 +43,7 @@ }, "fileMetadata": {}, "template": [], - "dest": "security" + "dest": "security", + "markdownEngineName": "dfm" } } \ No newline at end of file diff --git a/windows/whats-new/docfx.json b/windows/whats-new/docfx.json index 12dd2d0312..15581c3398 100644 --- a/windows/whats-new/docfx.json +++ b/windows/whats-new/docfx.json @@ -47,6 +47,7 @@ }, "fileMetadata": {}, "template": [], - "dest": "win-whats-new" + "dest": "win-whats-new", + "markdownEngineName": "dfm" } } \ No newline at end of file From dd90444a7a16e6e137c67d9611e4574ad7fe58c3 Mon Sep 17 00:00:00 2001 From: Liza Poggemeyer Date: Mon, 11 Mar 2019 13:28:48 -0700 Subject: [PATCH 11/25] removed redirected file --- ...reate-wip-policy-using-mam-intune-azure.md | 663 ------------------ 1 file changed, 663 deletions(-) delete mode 100644 windows/security/information-protection/windows-information-protection/create-wip-policy-using-mam-intune-azure.md diff --git a/windows/security/information-protection/windows-information-protection/create-wip-policy-using-mam-intune-azure.md b/windows/security/information-protection/windows-information-protection/create-wip-policy-using-mam-intune-azure.md deleted file mode 100644 index 234ef89755..0000000000 --- a/windows/security/information-protection/windows-information-protection/create-wip-policy-using-mam-intune-azure.md +++ /dev/null @@ -1,663 +0,0 @@ ---- -title: Create a Windows Information Protection (WIP) policy with MAM using the Azure portal for Microsoft Intune (Windows 10) -description: The Azure portal for Microsoft Intune helps you create and deploy your Windows Information Protection (WIP) policy, supporting mobile application management (MAM), to let you choose your protected apps, your WIP-protection level, and how to find enterprise data on the network. -ms.prod: w10 -ms.mktglfcycl: explore -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: justinha -ms.author: justinha -manager: dansimp -audience: ITPro -ms.collection: M365-security-compliance -ms.topic: conceptual -ms.date: 03/05/2019 ---- - -# Create a Windows Information Protection (WIP) policy with MAM using the Azure portal for Microsoft Intune - -**Applies to:** - -- Windows 10, version 1703 and later -- Windows 10 Mobile, version 1703 and later (except Microsoft Azure Rights Management, which is only available on the desktop) - -By using Microsoft Intune with Mobile application management (MAM), organizations can take advantage of Azure Active Directory (Azure AD) and the app protection policy feature to keep employees from logging in with personal credentials and accessing corporate data. Additionally, MAM solutions can help your enterprise do the following for mobile apps: - -- Configure, update, and deploy mobile apps to employees -- Control what your employees can do with enterprise data, such as copying, pasting, and saving -- Keep enterprise data separate from your employee's personal data -- Remove enterprise data from employee's devices -- Report on mobile app inventory and track usage - -## Alternative steps if you already manage devices with MDM - -This topic covers creating a Windows Information Protection (WIP) policy for organizations using a mobile application management (MAM) solution to deploy your WIP policy to Intune apps without device enrollment. If you are already managing devices by using a Mobile Device Management (MDM) solution, see [Create a Windows Information Protection (WIP) with enrollment policy using the Azure portal for Microsoft Intune](create-wip-policy-using-intune-azure.md). - -If the same user and device are targeted for both MAM-only (without device enrollment) policy and MDM policy, the MDM policy (with device enrollement) will be applied to devices joined to Azure AD. For personal devices that are workplace-joined (that is, added by using **Settings** > **Email & accounts** > **Add a work or school account**), the MAM-only policy will be preferred but it's possible to upgrade the device management to MDM in **Settings**. - -Windows Home edition only supports WIP for MAM-only; upgrading to MDM policy on Home edition will revoke WIP-protected data access. - -## Prerequisites to using MAM with Windows Information Protection (WIP) -Before you can create your WIP policy with MAM, you need to [set up your MAM provider](https://docs.microsoft.com/intune-classic/deploy-use/get-ready-to-configure-app-protection-policies-for-windows-10). - -Additionally, you must have an [Azure AD Premium license](https://docs.microsoft.com/azure/active-directory/active-directory-licensing-what-is) and be running at least Windows 10, version 1703 on your device. - ->[!Important] ->WIP doesn't support multi-identity. Only one managed identity can exist at a time. - -## Add a WIP policy -After you’ve set up Intune for your organization, you must create a WIP-specific policy. - -**To add a WIP policy** -1. Open the Azure portal and click the **Intune service** from the sidebar. - - The Microsoft Intune Overview blade appears. - -2. Click **Client apps**, click **App protection policies**, and then click **Add a policy**. - - ![Microsoft Intune management console: App policy link](images/wip-azure-portal-start-mam.png) - -3. In the **Add a policy** blade, fill out the fields: - - - **Name.** Type a name (required) for your new policy. - - - **Description.** Type an optional description. - - - **Platform.** Choose **Windows 10** to create your MAM policy for desktop client devices. - - - **Enrollment state.** Choose **Without enrollment** as the enrollment state for your policy. - - ![Microsoft Intune management console: Create your new policy in the Add a policy blade](images/wip-azure-add-policy.png) - - >[!Important] - >Choosing **Without enrollment** only applies for organizations using MAM. If you're using MDM, see [Create a Windows Information Protection (WIP) policy with MDM using the Azure portal for Microsoft Intune](create-wip-policy-using-intune-azure.md). - -4. Click **Create**. - - The policy is created and appears in the table on the **Client apps - App protection policies** blade. - - >[!NOTE] - >Optionally, you can also add your apps and set your settings from the **Add a policy** blade, but for the purposes of this documentation, we recommend instead that you create the policy first, and then use the subsequent menus that become available. - -## Add apps to your Protected apps list -During the policy-creation process in Intune, you can choose the apps you want to allow, as well as deny, access to your enterprise data through WIP. Apps included in this list can protect data on behalf of the enterprise and are restricted from copying or moving enterprise data to unprotected apps. - -The steps to add your apps are based on the type of template being applied. You can add a recommended app, a store app (also known as a Universal Windows Platform (UWP) app), or a signed Windows desktop app. You can also import a list of approved apps or add exempt apps. - -In addition, you can create an app deny list related to the policy based on an **action** value. The action can be either **Allow** or **Deny**. When you specify the deny action for an app using the policy, corporate access is denied to the app. - ->[!Important] ->Enlightened apps are expected to prevent enterprise data from going to unprotected network locations and to avoid encrypting personal data. On the other hand, WIP-unaware apps might not respect the corporate network boundary, and WIP-unaware apps will encrypt all files they create or modify. This means that they could encrypt personal data and cause data loss during the revocation process.

Care must be taken to get a support statement from the software provider that their app is safe with WIP before adding it to your **Protected apps** list. If you don’t get this statement, it’s possible that you could experience app compatibility issues due to an app losing the ability to access a necessary file after revocation. - -### Add a Recommended app to your Protected apps list -For this example, we’re going to add a few recommended apps to the **Protected apps** list. - -**To add a recommended app** -1. From the **Client apps - App protection policies** blade, click the name of your policy, and then click **Protected apps** from the menu that appears. - - The **Protected apps** blade appears, showing you any apps that are already included in the list for this policy. - - ![Microsoft Intune management console: Viewing the recommended apps that you can add to your policy](images/wip-azure-allowed-apps-pane.png) - -2. From the **Protected apps** blade, click **Add apps**. - - The **Add apps** blade appears, showing you all **Recommended apps**. - - ![Microsoft Intune management console: Adding recommended apps to your policy](images/wip-azure-add-recommended-apps.png) - -3. Select each app you want to access your enterprise data, and then click **OK**. - - The **Protected apps** blade updates to show you your selected apps. - - ![Microsoft Intune management console: Protected apps blade with recommended apps](images/wip-azure-allowed-apps-with-apps.png) - -4. Click **Save** to save the **Protected apps** list to your policy. - -### Add a Store app to your Protected apps list -For this example, we’re going to add Microsoft Power BI, a Windows store app, to the **Protected apps** list. - -**To add a Store app** -1. From the **Client apps - App protection policies** blade, click the name of your policy, and then click **Protected apps** from the menu that appears. - - The **Protected apps** blade appears, showing you any apps that are already included in the list for this policy. - -2. From the **Protected apps** blade, click **Add apps**. - -3. On the **Add apps** blade, click **Store apps** from the dropdown list. - -4. Type the friendly name of the app, the publisher info, and the product name. For this example, the **Publisher** is `CN=Microsoft Corporation, O=Microsoft Corporation, L=Redmond, S=Washington, C=US` and the **Product name** is `Microsoft.MicrosoftPowerBIForWindows`. - -5. After you’ve entered the info into the fields, click **OK** to add the app to your **Protected apps** list, and then click **Save** to save the **Protected apps** list to your policy. - - >[!NOTE] - >To add multiple Store apps at the same time, you can click the menu **(…)** at the end of the app row, and continue to add more apps. When you’re done, click **OK**. - - ![Microsoft Intune management console: Adding Store app info](images/wip-azure-add-store-apps.png) - -#### Find the Name, Publisher, and Product name for Store apps -If you don't know the publisher or product name for your Store app, you can find them for both desktop devices and Windows 10 Mobile phones by following these steps. - -**To find the publisher and product name values for Store apps without installing them** -1. Go to the [Microsoft Store for Business](https://go.microsoft.com/fwlink/p/?LinkID=722910) website, and find your app. For example, *Microsoft Power BI*. - -2. Copy the ID value from the app URL. For example, Microsoft Power BI ID URL is https://www.microsoft.com/store/p/microsoft-power-bi/9nblgggzlxn1, and you'd copy the ID value, `9nblgggzlxn1`. - -3. In a browser, run the Microsoft Store for Business portal web API, to return a JavaScript Object Notation (JSON) file that includes the publisher and product name values. For example, run https://bspmts.mp.microsoft.com/v1/public/catalog/Retail/Products/9nblgggzlxn1/applockerdata, where `9nblgggzlxn1` is replaced with your ID value. - - The API runs and opens a text editor with the app details. - - ```json - { - "packageIdentityName": "Microsoft.MicrosoftPowerBIForWindows", - "publisherCertificateName": "CN=Microsoft Corporation, O=Microsoft Corporation, L=Redmond, S=Washington, C=US" - } - ``` - -4. Copy the `publisherCertificateName` value into the **Publisher** box and copy the `packageIdentityName` value into the **Name** box of the **Add apps** blade. - - >[!Important] - >The JSON file might also return a windowsPhoneLegacyId value for both the **Publisher Name** and **Product Name** boxes. This means that you have an app that’s using a XAP package and that you must set the **Product Name** as windowsPhoneLegacyId, and set the **Publisher Name** as CN= followed by the windowsPhoneLegacyId.

For example:
- {
"windowsPhoneLegacyId": "ca05b3ab-f157-450c-8c49-a1f127f5e71d",
}
- -**To find the publisher and product name values for apps installed on Windows 10 mobile phones** -1. If you need to add mobile apps that aren't distributed through the Microsoft Store for Business, you must use the **Windows Device Portal** feature. - - >[!NOTE] - >Your PC and phone must be on the same wireless network. - -2. On the Windows Phone, go to **Settings**, choose **Update & security**, and then choose **For developers**. - -3. In the **For developers** screen, turn on **Developer mode**, turn on **Device Discovery**, and then turn on **Device Portal**. - -4. Copy the URL in the **Device Portal** area into your device's browser, and then accept the SSL certificate. - -5. In the **Device discovery** area, press **Pair**, and then enter the PIN into the website from the previous step. - -6. On the **Apps** tab of the website, you can see details for the running apps, including the publisher and product names. - -7. Start the app for which you're looking for the publisher and product name values. - -8. Copy the `publisherCertificateName` value and paste it into the **Publisher Name** box and the `packageIdentityName` value into the **Product Name** box of Intune. - - >[!Important] - >The JSON file might also return a windowsPhoneLegacyId value for both the **Publisher Name** and **Product Name** boxes. This means that you have an app that’s using a XAP package and that you must set the **Product Name** as windowsPhoneLegacyId, and set the **Publisher Name** as CN= followed by the windowsPhoneLegacyId.

For example:
- {
"windowsPhoneLegacyId": "ca05b3ab-f157-450c-8c49-a1f127f5e71d",
}
- -### Add a Desktop app to your Protected apps list -For this example, we’re going to add WordPad, a Desktop app, to the **Protected apps** list. - -**To add a Desktop app** -1. From the **Client apps - App protection policies** blade, click the name of your policy, and then click **Protected apps** from the menu that appears. - - The **Protected apps** blade appears, showing you any apps that are already included in the list for this policy. - -2. From the **Protected apps** blade, click **Add apps**. - -3. On the **Add apps** blade, click **Desktop apps** from the dropdown list. - - The blade changes to show boxes for you to add the following, based on the results you want returned: - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
FieldManages
All fields marked as “*”All files signed by any publisher. (Not recommended)
NameA friendly name for your app. You can't use this field by itself. However, you can use it in conjunction with any of the other fields.
Publisher (required) onlyFilling out this field, gives you all files signed by the named publisher. This might be useful if your company is the publisher and signer of internal line-of-business apps.

This is a required field and must be filled out whether by itself or in conjunction with other fields.
Publisher (required) and Product name onlyIf you only fill out these fields, you’ll get all files for the specified product, signed by the named publisher.
Publisher (required), Product name, and File onlyIf you only fill out these fields, you’ll get any version of the named file or package for the specified product, signed by the named publisher.
Publisher (required), Product name, File, and Min version onlyIf you only fill out these fields, you’ll get the specified version or newer releases of the named file or package for the specified product, signed by the named publisher.

This option is recommended for enlightened apps that weren't previously enlightened.
Publisher (required), Product name, File, and Max version onlyIf you only fill out these fields, you’ll get the specified version or older releases of the named file or package for the specified product, signed by the named publisher.
All fields completedIf you fill out all fields, you’ll get the specified version of the named file or package for the specified product, signed by the named publisher.
- -4. After you’ve entered the info into the fields, click **OK** to add the app to your **Protected apps** list, and then click **Save** to save the **Protected apps** list to your policy. - - >[!Note] - >To add multiple Desktop apps at the same time, you can click the menu **(…)** at the end of the app row, and then continue to add more apps. When you’re done, click **OK**. - - ![Microsoft Intune management console: Adding Desktop app info](images/wip-azure-add-desktop-apps.png) - -#### Find the Publisher and File name for Desktop apps -If you’re unsure about what to include for the publisher, you can run this PowerShell command: - -```ps1 -Get-AppLockerFileInformation -Path "" -``` -Where `""` goes to the location of the app on the device. For example, `Get-AppLockerFileInformation -Path "C:\Program Files\Windows NT\Accessories\wordpad.exe"`. - -In this example, you'd get the following info: - -``` json -Path Publisher ----- --------- -%PROGRAMFILES%\WINDOWS NT\ACCESSORIES\WORDPAD.EXE O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US -``` -Where the text, `O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US` is the publisher name to enter into the **Publisher** box and `WORDPAD.EXE` is the text to enter into the **File** box. - -### Import a list of apps to your Protected apps list -For this example, we’re going to add an AppLocker XML file to the **Protected apps** list. You’ll use this option if you want to add multiple apps at the same time. For more info about AppLocker, see the [AppLocker](https://technet.microsoft.com/itpro/windows/keep-secure/applocker-overview) content. - -**To create a list of Protected apps using the AppLocker tool** - -1. Open the Local Security Policy snap-in (SecPol.msc). - -2. In the left blade, expand **Application Control Policies**, expand **AppLocker**, and then click **Packaged App Rules**. - - ![Local security snap-in, showing the Packaged app Rules](images/wip-applocker-secpol-1.png) - -3. Right-click in the right-hand blade, and then click **Create New Rule**. - - The **Create Packaged app Rules** wizard appears. - -4. On the **Before You Begin** page, click **Next**. - - ![Create Packaged app Rules wizard, showing the Before You Begin page](images/wip-applocker-secpol-wizard-1.png) - -5. On the **Permissions** page, make sure the **Action** is set to **Allow** and the **User or group** is set to **Everyone**, and then click **Next**. - - ![Create Packaged app Rules wizard, showing the Before You Begin page](images/wip-applocker-secpol-wizard-2.png) - -6. On the **Publisher** page, click **Select** from the **Use an installed packaged app as a reference** area. - - ![Create Packaged app Rules wizard, showing the Publisher](images/wip-applocker-secpol-wizard-3.png) - -7. In the **Select applications** box, pick the app that you want to use as the reference for your rule, and then click **OK**. For this example, we’re using Microsoft Dynamics 365. - - ![Create Packaged app Rules wizard, showing the Select applications page](images/wip-applocker-secpol-wizard-4.png) - -8. On the updated **Publisher** page, click **Create**. - - ![Create Packaged app Rules wizard, showing the Microsoft Dynamics 365 on the Publisher page](images/wip-applocker-secpol-wizard-5.png) - -9. Click **No** in the dialog box that appears, asking if you want to create the default rules. You must not create default rules for your WIP policy. - - ![Create Packaged app Rules wizard, showing the Microsoft Dynamics 365 on the Publisher page](images/wip-applocker-default-rule-warning.png) - -9. Review the Local Security Policy snap-in to make sure your rule is correct. - - ![Local security snap-in, showing the new rule](images/wip-applocker-secpol-create.png) - -10. In the left blade, right-click on **AppLocker**, and then click **Export policy**. - - The **Export policy** box opens, letting you export and save your new policy as XML. - - ![Local security snap-in, showing the Export Policy option](images/wip-applocker-secpol-export.png) - -11. In the **Export policy** box, browse to where the policy should be stored, give the policy a name, and then click **Save**. - - The policy is saved and you’ll see a message that says 1 rule was exported from the policy. - - **Example XML file**
- This is the XML file that AppLocker creates for Microsoft Dynamics 365. - - ```xml - - - - - - - - - - - - - - - - - ``` - -12. After you’ve created your XML file, you need to import it by using Microsoft Intune. - -**To import your list of Protected apps using Microsoft Intune** - -1. From the **Protected apps** area, click **Import apps**. - - The blade changes to let you add your import file. - - ![Microsoft Intune, Importing your AppLocker policy file using Intune](images/wip-azure-import-apps.png) - -2. Browse to your exported AppLocker policy file, and then click **Open**. - - The file imports and the apps are added to your **Allowed app** list. - -### Add exempt apps to your policy -If you're running into compatibility issues where your app is incompatible with WIP, but still needs to be used with enterprise data, you can exempt the app from the WIP restrictions. This means that your apps won't include auto-encryption or tagging and won't honor your network restrictions. It also means that your exempted apps might leak. - -**To exempt a Store app, a Desktop app, or an AppLocker policy file from the Protected apps list** - -1. From the **App policy** blade, click the name of your policy, and then click **Exempt apps** from the menu that appears. - - The **Exempt apps** blade appears, showing you any apps that are already included in the list for this policy. - -2. From the **Exempt apps** blade, click **Add apps**. - - Be aware that when you exempt apps, they’re allowed to bypass the WIP restrictions and access your corporate data. To allow apps, see the [Add app rules to your policy](#add-apps-to_your-allowed-apps-list) section of this topic. - -3. Fill out the rest of the app info, based on the type of app you’re adding: - - - **Recommended app.** Follow the instructions in the [Add a Recommended app to your Protected apps list](#add-a-recommended-app-to_your-allowed-apps-list) section of this topic. - - - **Store app.** Follow the instructions in the [Add a Store app to your Protected apps list](#add-a-store-app-to_your-allowed-apps-list) section of this topic. - - - **Desktop app.** Follow the instructions in the [Add a Desktop app to your Protected apps list](#add-a-desktop-app-to_your-allowed-apps-list) section of this topic. - - - **AppLocker policy file.** Follow the instructions to create your app list in the [Import a list of apps to your Protected apps list](#import-a-list-of-apps-to_your-allowed-apps-list) section of this topic, using a list of exempted apps. - -4. Click **OK**. - -## Manage your Required settings -In the **Required settings** blade you must pick your Windows Information Protection mode and you can review or change your **Corporate identity**. - -### Manage the WIP protection mode for your enterprise data -After you've added the apps you want to protect with WIP, you'll need to apply a management and protection mode. - -We recommend that you start with **Silent** or **Allow Overrides** while verifying with a small group that you have the right apps on your allowed apps list. After you're done, you can change to your final enforcement policy, **Block**. - ->[!NOTE] ->For info about how to collect your audit log files, see [How to collect Windows Information Protection (WIP) audit event logs](collect-wip-audit-event-logs.md). - -**To add your protection mode** - -1. From the **Client apps - App protection policies** blade, click the name of your policy, and then click **Required settings** from the menu that appears. - - The **Required settings** blade appears. - - ![Microsoft Intune, Required settings blade showing Windows Information Protection mode](images/wip-azure-required-settings-protection-mode.png) - - |Mode |Description | - |-----|------------| - |Block |WIP looks for inappropriate data sharing practices and stops the employee from completing the action. This can include sharing info across non-enterprise-protected apps in addition to sharing enterprise data between other people and devices outside of your enterprise.| - |Allow Overrides |WIP looks for inappropriate data sharing, warning employees if they do something deemed potentially unsafe. However, this management mode lets the employee override the policy and share the data, logging the action to your audit log. For info about how to collect your audit log files, see [How to collect Windows Information Protection (WIP) audit event logs](collect-wip-audit-event-logs.md).| - |Silent |WIP runs silently, logging inappropriate data sharing, without blocking anything that would’ve been prompted for employee interaction while in Allow Override mode. Unallowed actions, like apps inappropriately trying to access a network resource or WIP-protected data, are still stopped.| - |Off (not recommended) |WIP is turned off and doesn't help to protect or audit your data.

After you turn off WIP, an attempt is made to decrypt any WIP-tagged files on the locally attached drives. Be aware that your previous decryption and policy info isn’t automatically reapplied if you turn WIP protection back on.| - -2. Click **Save**. - -### Define your enterprise-managed corporate identity -Corporate identity, usually expressed as your primary Internet domain (for example, contoso.com), helps to identify and tag your corporate data from apps you’ve marked as protected by WIP. For example, emails using contoso.com are identified as being corporate and are restricted by your Windows Information Protection policies. - -Starting with Windows 10, version 1703, Intune automatically determines your corporate identity and adds it to the **Corporate identity** field. - -**To change your corporate identity** - -1. From the **Client apps - App protection policies** blade, click the name of your policy, and then click **Required settings** from the menu that appears. - - The **Required settings** blade appears. - -2. If the auto-defined identity isn’t correct, you can change the info in the **Corporate identity** field. If you need to add additional domains, for example your email domains, you can do it in the **Advanced settings** area. - - ![Microsoft Intune, Set your corporate identity for your organization](images/wip-azure-required-settings-corp-identity.png) - -## Manage your Advanced settings -In the **Advanced settings** blade you must specify where apps can access your corporate data, upload a Data Recovery Agent (DRA) certificate, and set several optional data protection and access settings. - -### Choose where apps can access enterprise data -After you've added a protection mode to your apps, you'll need to decide where those apps can access enterprise data on your network. - -Intune will add SharePoint sites that are discovered through the Graph API. You must add other network locations. This area applies to any network endpoint device that gets an IP address in your enterprise’s range and is also bound to one of your enterprise domains, including SMB shares. Local file system locations should just maintain encryption (for example, on local NTFS, FAT, ExFAT). - ->[!Important] ->Every WIP policy should include policy that defines your enterprise network locations.
Classless Inter-Domain Routing (CIDR) notation isn’t supported for WIP configurations. - -**To define where your allowed apps can find and send enterprise data on you network** - -1. From the **Client apps - App protection policies** blade, click the name of your policy, and then click **Advanced settings** from the menu that appears. - - The **Advanced settings** blade appears. - -2. Click **Add network boundary** from the **Network perimeter** area. - - The **Add network boundary** blade appears. - - ![Microsoft Intune, Set where your apps can access enterprise data on your network](images/wip-azure-advanced-settings-network.png) - -3. Select the type of network boundary to add from the **Boundary type** box. - -4. Type a name for your boundary into the **Name** box, add your values to the **Value** box, based on the following options, and then click **OK**. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Boundary typeValue formatDescription
Cloud ResourcesWith proxy: contoso.sharepoint.com,contoso.internalproxy1.com|
contoso.visualstudio.com,contoso.internalproxy2.com

Without proxy: contoso.sharepoint.com|contoso.visualstudio.com
Specify the cloud resources to be treated as corporate and protected by WIP.

For each cloud resource, you may also optionally specify a proxy server from your Internal proxy servers list to route traffic for this cloud resource. Be aware that all traffic routed through your Internal proxy servers is considered enterprise.

If you have multiple resources, you must separate them using the "|" delimiter. If you don’t use proxy servers, you must also include the "," delimiter just before the "|". For example: URL <,proxy>|URL <,proxy>.

Important
In some cases, such as when an app connects directly to a cloud resource through an IP address, Windows can’t tell whether it’s attempting to connect to an enterprise cloud resource or to a personal site. In this case, Windows blocks the connection by default. To stop Windows from automatically blocking these connections, you can add the /*AppCompat*/ string to the setting. For example: URL <,proxy>|URL <,proxy>|/*AppCompat*/.

When using this string, we recommend that you also turn on [Azure Active Directory Conditional Access](https://docs.microsoft.com/azure/active-directory/active-directory-conditional-access), using the Domain joined or marked as compliant option, which blocks apps from accessing any enterprise cloud resources that are protected by conditional access.
Network domain namescorp.contoso.com,region.contoso.comStarting with Windows 10, version 1703, this field is optional.

Specify the DNS suffixes used in your environment. All traffic to the fully-qualified domains appearing in this list will be protected.

If you have multiple resources, you must separate them using the "," delimiter.
Proxy serversproxy.contoso.com:80;proxy2.contoso.com:443Specify the proxy servers your devices will go through to reach your cloud resources. Using this server type indicates that the cloud resources you’re connecting to are enterprise resources.

This list shouldn’t include any servers listed in your Internal proxy servers list. Internal proxy servers must be used only for WIP-protected (enterprise) traffic.

If you have multiple resources, you must separate them using the ";" delimiter.
Internal proxy serverscontoso.internalproxy1.com;contoso.internalproxy2.comSpecify the internal proxy servers your devices will go through to reach your cloud resources. Using this server type indicates that the cloud resources you’re connecting to are enterprise resources.

This list shouldn’t include any servers listed in your Proxy servers list. Proxy servers must be used only for non-WIP-protected (non-enterprise) traffic.

If you have multiple resources, you must separate them using the ";" delimiter.
IPv4 ranges**Starting IPv4 Address:** 3.4.0.1
**Ending IPv4 Address:** 3.4.255.254
**Custom URI:** 3.4.0.1-3.4.255.254,
10.0.0.1-10.255.255.254
Starting with Windows 10, version 1703, this field is optional.

Specify the addresses for a valid IPv4 value range within your intranet. These addresses, used with your Network domain names, define your corporate network boundaries.

If you have multiple ranges, you must separate them using the "," delimiter.
IPv6 ranges**Starting IPv6 Address:** 2a01:110::
**Ending IPv6 Address:** 2a01:110:7fff:ffff:ffff:ffff:ffff:ffff
**Custom URI:** 2a01:110:7fff:ffff:ffff:ffff:ffff:ffff,
fd00::-fdff:ffff:ffff:ffff:ffff:ffff:ffff:ffff
Starting with Windows 10, version 1703, this field is optional.

Specify the addresses for a valid IPv6 value range within your intranet. These addresses, used with your Network domain names, define your corporate network boundaries.

If you have multiple ranges, you must separate them using the "," delimiter.
Neutral resourcessts.contoso.com,sts.contoso2.comSpecify your authentication redirection endpoints for your company.

These locations are considered enterprise or personal, based on the context of the connection before the redirection.

If you have multiple resources, you must separate them using the "," delimiter.
- -5. Repeat steps 1-4 to add any additional network boundaries. - -6. Decide if you want to Windows to look for additional network settings: - - ![Microsoft Intune, Choose if you want Windows to search for additional proxy servers or IP ranges in your enterprise](images/wip-azure-advanced-settings-network-autodetect.png) - - - **Enterprise Proxy Servers list is authoritative (do not auto-detect).** Click **On** for Windows to treat the proxy servers you specified in the network boundary definition as the complete list of proxy servers available on your network.Click **Off** and Windows searches for additional proxy servers in your immediate network. - - - **Enterprise IP Ranges list is authoritative (do not auto-detect).** Click **On** for Windows to treat the IP ranges you specified in the network boundary definition as the complete list of IP ranges available on your network. Click **Off** and Windows searches for additional IP ranges on any domain-joined devices connected to your network. - -### Upload your Data Recovery Agent (DRA) certificate -After you create and deploy your WIP policy to your employees, Windows begins to encrypt your corporate data on the employees’ local device drive. If somehow the employees’ local encryption keys get lost or revoked, the encrypted data can become unrecoverable. To help avoid this possibility, the Data Recovery Agent (DRA) certificate lets Windows use an included public key to encrypt the local data while you maintain the private key that can unencrypt the data. - ->[!Important] ->Using a DRA certificate isn’t mandatory. However, we strongly recommend it. For more info about how to find and export your data recovery certificate, see the [Data Recovery and Encrypting File System (EFS)](https://go.microsoft.com/fwlink/p/?LinkId=761462) topic. For more info about creating and verifying your EFS DRA certificate, see the [Create and verify an Encrypting File System (EFS) Data Recovery Agent (DRA) certificate](create-and-verify-an-efs-dra-certificate.md) topic. - -**To upload your DRA certificate** -1. From the **Client apps - App protection policies** blade, click the name of your policy, and then click **Advanced settings** from the menu that appears. - - The **Advanced settings** blade appears. - -2. In the **Upload a Data Recovery Agent (DRA) certificate to allow recovery of encrypted data** box, click **Browse** to add a data recovery certificate for your policy. - - ![Microsoft Intune, Upload your Data Recovery Agent (DRA) certificate](images/wip-azure-advanced-settings-efsdra.png) - -### Choose your optional WIP-related settings -After you've decided where your protected apps can access enterprise data on your network, you’ll be asked to decide if you want to add any optional WIP settings. - -**To set your optional settings** - -1. From the **Client apps - App protection policies** blade, click the name of your policy, and then click **Advanced settings** from the menu that appears. - - The **Advanced settings** blade appears. - -2. Choose to set any or all optional settings: - - ![Microsoft Intune, Choose if you want to include any of the optional settings](images/wip-azure-advanced-settings-optional.png) - - - **Prevent corporate data from being accessed by apps when the device is locked. Applies only to Windows 10 Mobile.** Determines whether to encrypt enterprise data using a key that's protected by an employee's PIN code on a locked device. Apps won't be able to read corporate data when the device is locked. The options are: - - - **On (recommended).** Turns on the feature and provides the additional protection. - - - **Off** Doesn't enable this feature. - - - **Revoke encryption keys on unenroll.** Determines whether to revoke a user’s local encryption keys from a device when it’s unenrolled from Windows Information Protection. If the encryption keys are revoked, a user no longer has access to encrypted corporate data. The options are: - - - **On (recommended).** Revokes local encryption keys from a device during unenrollment. - - - **Off.** Stop local encryption keys from being revoked from a device during unenrollment. For example if you’re migrating between Mobile Device Management (MDM) solutions. - - - **Revoke access to protected data when the device enrolls to MDM.** Determines whether to revoke a user's WIP keys when a device is upgraded from MAM to a higher-security MDM solution. The options are: - - - **On.** Revokes the encryption keys from a device when it's upgraded from MAM to MDM. - - - **Off.** Encryption keys aren't removed and the user can continue to access protected files. This is the recommended setting if the MDM service uses the same WIP EnterpriseID value as the MAM service. - - - **Show the enterprise data protection icon.** Determines whether an icon appears on corporate files in the **Save As** and **File Explorer** views. The options are: - - - **On.** Allows an icon to appear on corporate files in the **Save As** and **File Explorer** views. Additionally, for unenlightened but allowed apps, the icon also appears on the app tile and with Managed text on the app name in the **Start** menu. - - - **Off (recommended).** Stops the icon from appearing on corporate files or unenlightened, but allowed apps. By default, this is turned off. - - - **Use Azure RMS for WIP.** Determines whether to use Azure Rights Management encryption with Windows Information Protection. The options are: - - - **On.** Starts using Azure Rights Management encryption with WIP. By turning this option on, you can also add a TemplateID GUID to specify who can access the Azure Rights Management protected files, and for how long. For more info about setting up Azure Rights management and using a template ID with WIP, see the [Choose to set up Azure Rights Management with WIP](#choose-to-set-up-azure-rights-management-with-wip) section of this topic. - - - **Off.** Stops using Azure Rights Management encryption with WIP. - - - **MDM discovery URL.** Lets the **Windows Settings** > **Accounts** > **Access work or school** sign-in offer an **Upgrade to MDM** link. Additionally, this lets you switch to another MDM provider, so that Microsoft Intune can manage MAM, while the new MDM provider manages the MDM devices. By default, this is specified to use Microsoft Intune. - -#### Choose to set up Azure Rights Management with WIP -WIP can integrate with Microsoft Azure Rights Management to enable secure sharing of files by using removable drives such as USB drives. For more info about Azure Rights Management, see [Microsoft Azure Rights Management](https://products.office.com/business/microsoft-azure-rights-management). To integrate Azure Rights Management with WIP, you must already have Azure Rights Management set up. - -To configure WIP to use Azure Rights Management, you must set the **AllowAzureRMSForEDP** MDM setting to **1** in Microsoft Intune. This setting tells WIP to encrypt files copied to removable drives with Azure Rights Management, so they can be shared amongst your employees on computers running at least Windows 10, version 1703. - -Optionally, if you don’t want everyone in your organization to be able to share your enterprise data, you can set the **RMSTemplateIDForEDP** MDM setting to the **TemplateID** of the Azure Rights Management template used to encrypt the data. You must make sure to mark the template with the **EditRightsData** option. - ->[!IMPORTANT] ->Curly braces -- {} -- are required around the RMS Template ID. - ->[!NOTE] ->For more info about setting the **AllowAzureRMSForEDP** and the **RMSTemplateIDForEDP** MDM settings, see the [EnterpriseDataProtection CSP](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/enterprisedataprotection-csp) topic. For more info about setting up and using a custom template, see [Configuring custom templates for the Azure Rights Management service](https://docs.microsoft.com/information-protection/deploy-use/configure-custom-templates) topic. - -### Choose whether to use and configure Windows Hello for Business -You can turn on Windows Hello for Business, letting your employees use it as a sign-in method for their devices. - -**To turn on and configure Windows Hello for Business** - -1. From the **Client apps - App protection policies** blade, click the name of your policy, and then click **Advanced settings** from the menu that appears. - - The **Advanced settings** blade appears. - -2. Choose to turn on and configure the Windows Hello for Business settings: - - ![Microsoft Intune, Choose to use Windows Hello for Business](images/wip-azure-access-options.png) - - - **Use Windows Hello for Business as a method for signing into Windows.** Turns on Windows Hello for Business. The options are: - - - **On.** Turns on Windows Hello For Business for anyone assigned to this policy. - - - **Off.** Turns off Windows Hello for Business. - - - **Set the minimum number of characters required for the PIN.** Enter a numerical value (4-127 characters) for how many characters must be used to create a valid PIN. Default is 4 characters. - - - **Configure the use of uppercase letters in the Windows Hello for Business PIN.** Lets you decide whether uppercase letters can be used in a valid PIN. The options are: - - - **Allow the use of uppercase letters in PIN.** Lets an employee use uppercase letters in a valid PIN. - - - **Require the use of at least one uppercase letter in PIN.** Requires an employee to use at least 1 uppercase letter in a valid PIN. - - - **Do not allow the use of uppercase letters in PIN.** Prevents an employee from using uppercase letters in a valid PIN. - - - **Configure the use of lowercase letters in the Windows Hello for Business PIN.** Lets you decide whether lowercase letters can be used in a valid PIN. The options are: - - - **Allow the use of lowercase letters in PIN.** Lets an employee use lowercase letters in a valid PIN. - - - **Require the use of at least one lowercase letter in PIN.** Requires an employee to use at least 1 lowercase letter in a valid PIN. - - - **Do not allow the use of lowercase letters in PIN.** Prevents an employee from using lowercase letters in a valid PIN. - - - **Configure the use of special characters in the Windows Hello for Business PIN.** Lets you decide whether special characters can be used in a valid PIN. The options are: - - - **Allow the use of special characters in PIN.** Lets an employee use special characters in a valid PIN. - - - **Require the use of at least one special character in PIN.** Requires an employee to use at least 1 special character in a valid PIN. - - - **Do not allow the use of special characters in PIN.** Prevents an employee from using special characters in a valid PIN. - - - **Specify the period of time (in days) that a PIN can be used before the system requires the user to change it.** Enter a numerical value (0-730 days) for how many days can pass before a PIN must be changed. If you enter a value of 0, the PIN never expires. - - - **Specify the number of past PINs that can be associated to a user account that can't be reused.** Enter a numerical value (0-50 days) for how many days can pass before an employee can reuse a previous PIN. If you enter a value of 0, a PINs can be reused immediately and past PINs aren't stored. - - >[!NOTE] - >PIN history is not preserved through a PIN reset. - - - **Number of authentication failures allowed before the device will be wiped.** Enter a numerical value for how many times the PIN can be incorrectly entered before wiping the device of corporate data. If you enter a value of 0, the device is never wiped, regardless of the number of incorrect PIN entries.

This setting has different behavior for mobile devices and desktops. - - - **On mobile devices.** When an employee reaches the value set here, the device is wiped of corporate data. - - - **On desktop devices.** When an employee reaches the value set here, the desktop is put into BitLocker recovery mode, instead of being wiped. You must have BitLocker installed on the device or this setting is ignored. - - - **Maximum amount of time (in minutes) allowed after the device is idle that will cause the device to become PIN or password locked.** Enter a numerical value for how many days can pass before a PIN must be changed. If you enter a value of 0, the device never becomes PIN or password locked while idle. - - >[!NOTE] - >You can set this value to be anything; however, it can't be longer than the time specified by the **Settings** app. If you exceed the maximum timeout value, this setting is ignored. - - -## Deploy your policy -After you’ve created your policy, you'll need to deploy it to your employees. MAM is deployed to users and not devices. - -**To deploy your policy** - -1. On the **Client apps - App protection policies** pane, click your newly-created policy, click **Assignments** from the menu that appears, and then click **Select groups**. - - A list of user groups, made up of all of the security groups in your Azure Active Directory, appear in the **Add user group** pane. - -2. Choose the group you want your policy to apply to, and then click **Select** to deploy the policy. - - The policy is deployed to the selected group. - - ![Microsoft Intune, Pick your user groups that should get the policy when it's deployed](images/wip-azure-add-user-groups.png) - -## Related topics - -- [Implement server-side support for mobile application management on Windows](https://docs.microsoft.com/windows/client-management/mdm/implement-server-side-mobile-application-management) - -- [Microsoft Intune - Mobile Application Management (MAM) standalone blog post](https://blogs.technet.microsoft.com/cbernier/2016/01/05/microsoft-intune-mobile-application-management-mam-standalone/) - -- [MAM-supported apps](https://www.microsoft.com/cloud-platform/microsoft-intune-apps) - -- [General guidance and best practices for Windows Information Protection (WIP)](guidance-and-best-practices-wip.md) - -- [How to collect Windows Information Protection (WIP) audit event logs](collect-wip-audit-event-logs.md) From adb1fced13cae6c92a48cd5ee21e90ab20b73db1 Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Mon, 11 Mar 2019 13:48:16 -0700 Subject: [PATCH 12/25] changede link --- .../threat-protection/change-history-for-threat-protection.md | 2 +- .../device-control/control-usb-devices-using-intune.md | 2 +- windows/security/threat-protection/index.md | 2 +- .../collect-diagnostic-data-update-compliance.md | 2 +- .../command-line-arguments-windows-defender-antivirus.md | 2 +- ...uration-management-reference-windows-defender-antivirus.md | 2 +- ...onfigure-advanced-scan-types-windows-defender-antivirus.md | 2 +- ...nfigure-block-at-first-sight-windows-defender-antivirus.md | 2 +- ...e-cloud-block-timeout-period-windows-defender-antivirus.md | 2 +- ...nfigure-end-user-interaction-windows-defender-antivirus.md | 2 +- .../configure-exclusions-windows-defender-antivirus.md | 2 +- ...re-extension-file-exclusions-windows-defender-antivirus.md | 2 +- ...igure-local-policy-overrides-windows-defender-antivirus.md | 2 +- ...onfigure-network-connections-windows-defender-antivirus.md | 2 +- .../configure-notifications-windows-defender-antivirus.md | 2 +- ...ocess-opened-file-exclusions-windows-defender-antivirus.md | 2 +- ...onfigure-protection-features-windows-defender-antivirus.md | 2 +- ...nfigure-real-time-protection-windows-defender-antivirus.md | 2 +- .../configure-remediation-windows-defender-antivirus.md | 2 +- .../configure-server-exclusions-windows-defender-antivirus.md | 2 +- .../configure-windows-defender-antivirus-features.md | 2 +- ...e-run-review-remediate-scans-windows-defender-antivirus.md | 2 +- .../deploy-manage-report-windows-defender-antivirus.md | 2 +- .../deploy-windows-defender-antivirus.md | 2 +- .../deployment-vdi-windows-defender-antivirus.md | 2 +- ...ck-potentially-unwanted-apps-windows-defender-antivirus.md | 2 +- .../enable-cloud-protection-windows-defender-antivirus.md | 2 +- .../evaluate-windows-defender-antivirus.md | 2 +- .../limited-periodic-scanning-windows-defender-antivirus.md | 2 +- .../manage-event-based-updates-windows-defender-antivirus.md | 2 +- .../manage-outdated-endpoints-windows-defender-antivirus.md | 2 +- ...e-protection-update-schedule-windows-defender-antivirus.md | 2 +- .../manage-protection-updates-windows-defender-antivirus.md | 2 +- .../manage-updates-baselines-windows-defender-antivirus.md | 2 +- ...e-updates-mobile-devices-vms-windows-defender-antivirus.md | 2 +- ...prevent-end-user-interaction-windows-defender-antivirus.md | 2 +- .../report-monitor-windows-defender-antivirus.md | 2 +- .../restore-quarantined-files-windows-defender-antivirus.md | 2 +- .../review-scan-results-windows-defender-antivirus.md | 2 +- .../run-scan-windows-defender-antivirus.md | 2 +- .../scheduled-catch-up-scans-windows-defender-antivirus.md | 2 +- ...ecify-cloud-protection-level-windows-defender-antivirus.md | 2 +- .../windows-defender-antivirus/troubleshoot-reporting.md | 2 +- .../troubleshoot-windows-defender-antivirus.md | 2 +- .../use-group-policy-windows-defender-antivirus.md | 2 +- .../use-intune-config-manager-windows-defender-antivirus.md | 2 +- .../use-powershell-cmdlets-windows-defender-antivirus.md | 2 +- .../use-wmi-windows-defender-antivirus.md | 2 +- ...e-microsoft-cloud-protection-windows-defender-antivirus.md | 2 +- .../windows-defender-antivirus-compatibility.md | 2 +- .../windows-defender-antivirus-in-windows-10.md | 2 +- .../windows-defender-antivirus-on-windows-server-2016.md | 2 +- .../windows-defender-antivirus/windows-defender-offline.md | 2 +- .../windows-defender-security-center-antivirus.md | 2 +- .../configure-wd-app-guard.md | 2 +- .../windows-defender-application-guard/faq-wd-app-guard.md | 2 +- .../install-wd-app-guard.md | 2 +- .../windows-defender-application-guard/reqs-wd-app-guard.md | 2 +- .../test-scenarios-wd-app-guard.md | 2 +- .../wd-app-guard-overview.md | 2 +- ...ed-features-windows-defender-advanced-threat-protection.md | 2 +- ...t-practices-windows-defender-advanced-threat-protection.md | 2 +- ...g-reference-windows-defender-advanced-threat-protection.md | 2 +- ...lerts-queue-windows-defender-advanced-threat-protection.md | 2 +- ...tal-mapping-windows-defender-advanced-threat-protection.md | 2 +- ...rtal-access-windows-defender-advanced-threat-protection.md | 2 +- ...simulations-windows-defender-advanced-threat-protection.md | 2 +- ...permissions-windows-defender-advanced-threat-protection.md | 2 +- ...nsor-status-windows-defender-advanced-threat-protection.md | 2 +- .../community-windows-defender-advanced-threat-protection.md | 2 +- ...onal-access-windows-defender-advanced-threat-protection.md | 2 +- ...re-arcsight-windows-defender-advanced-threat-protection.md | 2 +- ...onal-access-windows-defender-advanced-threat-protection.md | 2 +- ...tifications-windows-defender-advanced-threat-protection.md | 2 +- ...ndpoints-gp-windows-defender-advanced-threat-protection.md | 2 +- ...dpoints-mdm-windows-defender-advanced-threat-protection.md | 2 +- ...non-windows-windows-defender-advanced-threat-protection.md | 2 +- ...points-sccm-windows-defender-advanced-threat-protection.md | 2 +- ...ints-script-windows-defender-advanced-threat-protection.md | 2 +- ...e-endpoints-windows-defender-advanced-threat-protection.md | 2 +- .../configure-microsoft-threat-experts.md | 2 +- ...ssp-support-windows-defender-advanced-threat-protection.md | 2 +- ...xy-internet-windows-defender-advanced-threat-protection.md | 2 +- ...r-endpoints-windows-defender-advanced-threat-protection.md | 2 +- ...figure-siem-windows-defender-advanced-threat-protection.md | 2 +- ...gure-splunk-windows-defender-advanced-threat-protection.md | 2 +- .../windows-defender-atp/custom-detection-rules.md | 2 +- ...stom-ti-api-windows-defender-advanced-threat-protection.md | 2 +- ...on-settings-windows-defender-advanced-threat-protection.md | 2 +- ...age-privacy-windows-defender-advanced-threat-protection.md | 2 +- ...mpatibility-windows-defender-advanced-threat-protection.md | 2 +- ...e-custom-ti-windows-defender-advanced-threat-protection.md | 2 +- ...ecure-score-windows-defender-advanced-threat-protection.md | 2 +- ...integration-windows-defender-advanced-threat-protection.md | 2 +- .../threat-protection/windows-defender-atp/evaluate-atp.md | 2 +- ...error-codes-windows-defender-advanced-threat-protection.md | 2 +- ...t-custom-ti-windows-defender-advanced-threat-protection.md | 2 +- ...hty-sensors-windows-defender-advanced-threat-protection.md | 2 +- ...-collection-windows-defender-advanced-threat-protection.md | 2 +- ...-collection-windows-defender-advanced-threat-protection.md | 2 +- ...-collection-windows-defender-advanced-threat-protection.md | 2 +- ...-collection-windows-defender-advanced-threat-protection.md | 2 +- .../threat-protection/windows-defender-atp/get-started.md | 2 +- .../threat-protection/windows-defender-atp/incidents-queue.md | 2 +- .../information-protection-in-windows-config.md | 2 +- .../information-protection-in-windows-overview.md | 2 +- ...gate-alerts-windows-defender-advanced-threat-protection.md | 2 +- ...gate-domain-windows-defender-advanced-threat-protection.md | 2 +- ...igate-files-windows-defender-advanced-threat-protection.md | 2 +- ...e-incidents-windows-defender-advanced-threat-protection.md | 2 +- ...estigate-ip-windows-defender-advanced-threat-protection.md | 2 +- ...te-machines-windows-defender-advanced-threat-protection.md | 2 +- ...tigate-user-windows-defender-advanced-threat-protection.md | 2 +- .../licensing-windows-defender-advanced-threat-protection.md | 2 +- ...hine-groups-windows-defender-advanced-threat-protection.md | 2 +- ...ew-overview-windows-defender-advanced-threat-protection.md | 2 +- ...nage-alerts-windows-defender-advanced-threat-protection.md | 2 +- ...locked-list-windows-defender-advanced-threat-protection.md | 2 +- ...ile-uploads-windows-defender-advanced-threat-protection.md | 2 +- ...-exclusions-windows-defender-advanced-threat-protection.md | 2 +- ...e-incidents-windows-defender-advanced-threat-protection.md | 2 +- ...ssion-rules-windows-defender-advanced-threat-protection.md | 2 +- .../threat-protection/windows-defender-atp/management-apis.md | 2 +- .../microsoft-cloud-app-security-config.md | 2 +- .../microsoft-cloud-app-security-integration.md | 2 +- .../windows-defender-atp/microsoft-threat-experts.md | 2 +- ...equirements-windows-defender-advanced-threat-protection.md | 4 ++-- ...ssp-support-windows-defender-advanced-threat-protection.md | 2 +- ...rd-machines-windows-defender-advanced-threat-protection.md | 2 +- ...d-configure-windows-defender-advanced-threat-protection.md | 2 +- ...d-downlevel-windows-defender-advanced-threat-protection.md | 2 +- .../threat-protection/windows-defender-atp/onboard.md | 2 +- .../windows-defender-atp/overview-attack-surface-reduction.md | 2 +- .../windows-defender-atp/overview-custom-detections.md | 2 +- .../overview-endpoint-detection-response.md | 2 +- .../windows-defender-atp/overview-hardware-based-isolation.md | 2 +- ...iew-hunting-windows-defender-advanced-threat-protection.md | 2 +- ...ecure-score-windows-defender-advanced-threat-protection.md | 2 +- .../threat-protection/windows-defender-atp/overview.md | 2 +- ...al-overview-windows-defender-advanced-threat-protection.md | 2 +- ...rbi-reports-windows-defender-advanced-threat-protection.md | 2 +- ...xample-code-windows-defender-advanced-threat-protection.md | 2 +- ...ences-setup-windows-defender-advanced-threat-protection.md | 2 +- ...ew-settings-windows-defender-advanced-threat-protection.md | 2 +- .../preview-windows-defender-advanced-threat-protection.md | 2 +- ...ng-rest-api-windows-defender-advanced-threat-protection.md | 2 +- ...xample-code-windows-defender-advanced-threat-protection.md | 2 +- .../rbac-windows-defender-advanced-threat-protection.md | 2 +- ...file-alerts-windows-defender-advanced-threat-protection.md | 2 +- ...hine-alerts-windows-defender-advanced-threat-protection.md | 2 +- ...nse-actions-windows-defender-advanced-threat-protection.md | 2 +- ...ection-test-windows-defender-advanced-threat-protection.md | 2 +- ...e-dashboard-windows-defender-advanced-threat-protection.md | 2 +- ...s-dashboard-windows-defender-advanced-threat-protection.md | 2 +- ...vice-status-windows-defender-advanced-threat-protection.md | 2 +- ...sponse-apis-windows-defender-advanced-threat-protection.md | 2 +- ...s-dashboard-windows-defender-advanced-threat-protection.md | 2 +- .../windows-defender-atp/threat-analytics.md | 2 +- ...or-concepts-windows-defender-advanced-threat-protection.md | 2 +- .../windows-defender-atp/threat-protection-integration.md | 2 +- ...ion-reports-windows-defender-advanced-threat-protection.md | 2 +- ...me-settings-windows-defender-advanced-threat-protection.md | 2 +- ...t-custom-ti-windows-defender-advanced-threat-protection.md | 2 +- ...or-messages-windows-defender-advanced-threat-protection.md | 2 +- ...-onboarding-windows-defender-advanced-threat-protection.md | 2 +- ...eshoot-siem-windows-defender-advanced-threat-protection.md | 2 +- ...e-custom-ti-windows-defender-advanced-threat-protection.md | 2 +- .../use-windows-defender-advanced-threat-protection.md | 2 +- .../user-roles-windows-defender-advanced-threat-protection.md | 2 +- .../windows-defender-atp/view-incidents-queue.md | 2 +- .../attack-surface-reduction-exploit-guard.md | 2 +- .../audit-windows-defender-exploit-guard.md | 2 +- .../collect-cab-files-exploit-guard-submission.md | 2 +- .../controlled-folders-exploit-guard.md | 2 +- .../customize-attack-surface-reduction.md | 2 +- .../customize-controlled-folders-exploit-guard.md | 2 +- .../customize-exploit-protection.md | 2 +- .../emet-exploit-protection-exploit-guard.md | 2 +- .../enable-controlled-folders-exploit-guard.md | 2 +- .../enable-exploit-protection.md | 2 +- .../enable-network-protection.md | 2 +- ...nable-virtualization-based-protection-of-code-integrity.md | 2 +- .../evaluate-attack-surface-reduction.md | 2 +- .../evaluate-controlled-folder-access.md | 2 +- .../evaluate-exploit-protection.md | 2 +- .../evaluate-network-protection.md | 2 +- .../event-views-exploit-guard.md | 2 +- .../exploit-protection-exploit-guard.md | 2 +- .../import-export-exploit-protection-emet-xml.md | 2 +- .../windows-defender-exploit-guard/memory-integrity.md | 2 +- .../network-protection-exploit-guard.md | 2 +- ...s-for-virtualization-based-protection-of-code-integrity.md | 2 +- .../windows-defender-exploit-guard/troubleshoot-asr.md | 2 +- .../troubleshoot-exploit-protection-mitigations.md | 2 +- .../windows-defender-exploit-guard/troubleshoot-np.md | 2 +- .../windows-defender-exploit-guard.md | 2 +- 196 files changed, 197 insertions(+), 197 deletions(-) diff --git a/windows/security/threat-protection/change-history-for-threat-protection.md b/windows/security/threat-protection/change-history-for-threat-protection.md index 6261639989..1deaa652b8 100644 --- a/windows/security/threat-protection/change-history-for-threat-protection.md +++ b/windows/security/threat-protection/change-history-for-threat-protection.md @@ -1,5 +1,5 @@ --- -title: Change history for [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +title: Change history for [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) description: This topic lists new and updated topics in the WWindows Defender ATP content set. ms.prod: w10 ms.mktglfcycl: deploy diff --git a/windows/security/threat-protection/device-control/control-usb-devices-using-intune.md b/windows/security/threat-protection/device-control/control-usb-devices-using-intune.md index e2554705b5..1439390f50 100644 --- a/windows/security/threat-protection/device-control/control-usb-devices-using-intune.md +++ b/windows/security/threat-protection/device-control/control-usb-devices-using-intune.md @@ -13,7 +13,7 @@ ms.date: 02/22/2019 # How to control USB devices and other removable media using Windows Defender ATP -**Applies to:** [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +**Applies to:** [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Microsoft recommends [a layered approach to securing removable media](https://aka.ms/devicecontrolblog), and Windows Defender ATP provides multiple monitoring and control features to help prevent threats in unauthorized peripherals from compromising your devices: diff --git a/windows/security/threat-protection/index.md b/windows/security/threat-protection/index.md index c3218e2541..44c4ef2a2f 100644 --- a/windows/security/threat-protection/index.md +++ b/windows/security/threat-protection/index.md @@ -12,7 +12,7 @@ ms.localizationpriority: medium --- # Threat Protection -[Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) is a unified platform for preventative protection, post-breach detection, automated investigation, and response. Windows Defender ATP protects endpoints from cyber threats; detects advanced attacks and data breaches, automates security incidents and improves security posture. +[Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) is a unified platform for preventative protection, post-breach detection, automated investigation, and response. Windows Defender ATP protects endpoints from cyber threats; detects advanced attacks and data breaches, automates security incidents and improves security posture.

Windows Defender ATP

diff --git a/windows/security/threat-protection/windows-defender-antivirus/collect-diagnostic-data-update-compliance.md b/windows/security/threat-protection/windows-defender-antivirus/collect-diagnostic-data-update-compliance.md index 06978674b3..61bd6e91de 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/collect-diagnostic-data-update-compliance.md +++ b/windows/security/threat-protection/windows-defender-antivirus/collect-diagnostic-data-update-compliance.md @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) This topic describes how to collect diagnostic data that can be used by Microsoft support and engineering teams to help troubleshoot issues you may encounter when using the Windows Defender AV Assessment section in the Update Compliance add-in. diff --git a/windows/security/threat-protection/windows-defender-antivirus/command-line-arguments-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/command-line-arguments-windows-defender-antivirus.md index 52f53a81bb..2d08b48bfe 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/command-line-arguments-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/command-line-arguments-windows-defender-antivirus.md @@ -18,7 +18,7 @@ ms.date: 12/10/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) You can perform various Windows Defender Antivirus functions with the dedicated command-line tool mpcmdrun.exe. diff --git a/windows/security/threat-protection/windows-defender-antivirus/configuration-management-reference-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/configuration-management-reference-windows-defender-antivirus.md index 2af6cfcbc3..b2246f6bc2 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/configuration-management-reference-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/configuration-management-reference-windows-defender-antivirus.md @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) You can manage and configure Windows Defender Antivirus with the following tools: diff --git a/windows/security/threat-protection/windows-defender-antivirus/configure-advanced-scan-types-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/configure-advanced-scan-types-windows-defender-antivirus.md index b916b9c91e..5714563915 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/configure-advanced-scan-types-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/configure-advanced-scan-types-windows-defender-antivirus.md @@ -19,7 +19,7 @@ ms.date: 10/25/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) **Use Microsoft Intune to configure scanning options** diff --git a/windows/security/threat-protection/windows-defender-antivirus/configure-block-at-first-sight-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/configure-block-at-first-sight-windows-defender-antivirus.md index 8f34c26265..b5d15d6b55 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/configure-block-at-first-sight-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/configure-block-at-first-sight-windows-defender-antivirus.md @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Block at first sight is a feature of next gen protection that provides a way to detect and block new malware within seconds. diff --git a/windows/security/threat-protection/windows-defender-antivirus/configure-cloud-block-timeout-period-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/configure-cloud-block-timeout-period-windows-defender-antivirus.md index e78a18862c..d7ffbcbafd 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/configure-cloud-block-timeout-period-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/configure-cloud-block-timeout-period-windows-defender-antivirus.md @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) When Windows Defender Antivirus finds a suspicious file, it can prevent the file from running while it queries the [Windows Defender Antivirus cloud service](utilize-microsoft-cloud-protection-windows-defender-antivirus.md). diff --git a/windows/security/threat-protection/windows-defender-antivirus/configure-end-user-interaction-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/configure-end-user-interaction-windows-defender-antivirus.md index f467dac2b6..d72265f76a 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/configure-end-user-interaction-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/configure-end-user-interaction-windows-defender-antivirus.md @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) You can configure how users of the endpoints on your network can interact with Windows Defender Antivirus. diff --git a/windows/security/threat-protection/windows-defender-antivirus/configure-exclusions-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/configure-exclusions-windows-defender-antivirus.md index ca5c66c4f2..430acbec64 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/configure-exclusions-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/configure-exclusions-windows-defender-antivirus.md @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) You can exclude certain files, folders, processes, and process-opened files from Windows Defender Antivirus scans. diff --git a/windows/security/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus.md index a9db1100c9..78351fac00 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus.md @@ -18,7 +18,7 @@ ms.date: 12/10/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) You can exclude certain files from Windows Defender Antivirus scans by modifying exclusion lists. diff --git a/windows/security/threat-protection/windows-defender-antivirus/configure-local-policy-overrides-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/configure-local-policy-overrides-windows-defender-antivirus.md index 833abbcaff..9feb4b7840 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/configure-local-policy-overrides-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/configure-local-policy-overrides-windows-defender-antivirus.md @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) By default, Windows Defender Antivirus settings that are deployed via a Group Policy Object to the endpoints in your network will prevent users from locally changing the settings. You can change this in some instances. diff --git a/windows/security/threat-protection/windows-defender-antivirus/configure-network-connections-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/configure-network-connections-windows-defender-antivirus.md index 0cb2288b2e..71db8e1517 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/configure-network-connections-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/configure-network-connections-windows-defender-antivirus.md @@ -18,7 +18,7 @@ ms.date: 10/08/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) To ensure Windows Defender Antivirus cloud-delivered protection works properly, you need to configure your network to allow connections between your endpoints and certain Microsoft servers. diff --git a/windows/security/threat-protection/windows-defender-antivirus/configure-notifications-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/configure-notifications-windows-defender-antivirus.md index 8a98cffbc7..9874e1fe22 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/configure-notifications-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/configure-notifications-windows-defender-antivirus.md @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) In Windows 10, application notifications about malware detection and remediation are more robust, consistent, and concise. diff --git a/windows/security/threat-protection/windows-defender-antivirus/configure-process-opened-file-exclusions-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/configure-process-opened-file-exclusions-windows-defender-antivirus.md index 40785cfdec..15f82314e7 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/configure-process-opened-file-exclusions-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/configure-process-opened-file-exclusions-windows-defender-antivirus.md @@ -18,7 +18,7 @@ ms.date: 12/10/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) You can exclude files that have been opened by specific processes from Windows Defender Antivirus scans. diff --git a/windows/security/threat-protection/windows-defender-antivirus/configure-protection-features-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/configure-protection-features-windows-defender-antivirus.md index acb2c79bcf..de47e8d1a8 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/configure-protection-features-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/configure-protection-features-windows-defender-antivirus.md @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Windows Defender Antivirus uses several methods to provide threat protection: diff --git a/windows/security/threat-protection/windows-defender-antivirus/configure-real-time-protection-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/configure-real-time-protection-windows-defender-antivirus.md index e063f1fda5..84cef362eb 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/configure-real-time-protection-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/configure-real-time-protection-windows-defender-antivirus.md @@ -18,7 +18,7 @@ ms.date: 11/13/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Always-on protection consists of real-time protection, behavior monitoring, and heuristics to identify malware based on known suspicious and malicious activities. diff --git a/windows/security/threat-protection/windows-defender-antivirus/configure-remediation-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/configure-remediation-windows-defender-antivirus.md index 35159b5198..d09e59a96a 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/configure-remediation-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/configure-remediation-windows-defender-antivirus.md @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) When Windows Defender Antivirus runs a scan, it will attempt to remediate or remove threats that it finds. You can configure how Windows Defender Antivirus should react to certain threats, whether it should create a restore point before remediating, and when it should remove remediated threats. diff --git a/windows/security/threat-protection/windows-defender-antivirus/configure-server-exclusions-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/configure-server-exclusions-windows-defender-antivirus.md index b46dab8b82..4afd9a96e5 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/configure-server-exclusions-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/configure-server-exclusions-windows-defender-antivirus.md @@ -17,7 +17,7 @@ ms.author: v-anbic **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Windows Defender Antivirus on Windows Server 2016 computers automatically enrolls you in certain exclusions, as defined by your specified server role. See [the end of this topic](#list-of-automatic-exclusions) for a list of these exclusions. diff --git a/windows/security/threat-protection/windows-defender-antivirus/configure-windows-defender-antivirus-features.md b/windows/security/threat-protection/windows-defender-antivirus/configure-windows-defender-antivirus-features.md index 1451728ecf..862b5513c4 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/configure-windows-defender-antivirus-features.md +++ b/windows/security/threat-protection/windows-defender-antivirus/configure-windows-defender-antivirus-features.md @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) You can configure Windows Defender Antivirus with a number of tools, including: diff --git a/windows/security/threat-protection/windows-defender-antivirus/customize-run-review-remediate-scans-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/customize-run-review-remediate-scans-windows-defender-antivirus.md index ae4eee36d6..b719577c49 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/customize-run-review-remediate-scans-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/customize-run-review-remediate-scans-windows-defender-antivirus.md @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) You can use Group Policy, PowerShell, and Windows Management Instrumentation (WMI) to configure Windows Defender Antivirus scans. diff --git a/windows/security/threat-protection/windows-defender-antivirus/deploy-manage-report-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/deploy-manage-report-windows-defender-antivirus.md index d142dad965..b2bfc0807f 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/deploy-manage-report-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/deploy-manage-report-windows-defender-antivirus.md @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) You can deploy, manage, and report on Windows Defender Antivirus in a number of ways. diff --git a/windows/security/threat-protection/windows-defender-antivirus/deploy-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/deploy-windows-defender-antivirus.md index 59b048bfda..df219115d7 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/deploy-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/deploy-windows-defender-antivirus.md @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Depending on the management tool you are using, you may need to specifically enable or configure Windows Defender Antivirus protection. diff --git a/windows/security/threat-protection/windows-defender-antivirus/deployment-vdi-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/deployment-vdi-windows-defender-antivirus.md index 06b879559b..1bf3ab9c2f 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/deployment-vdi-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/deployment-vdi-windows-defender-antivirus.md @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) In addition to standard on-premises or hardware configurations, you can also use Windows Defender Antivirus in a remote desktop (RDS) or virtual desktop infrastructure (VDI) environment. diff --git a/windows/security/threat-protection/windows-defender-antivirus/detect-block-potentially-unwanted-apps-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/detect-block-potentially-unwanted-apps-windows-defender-antivirus.md index 475e161a65..37859694d9 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/detect-block-potentially-unwanted-apps-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/detect-block-potentially-unwanted-apps-windows-defender-antivirus.md @@ -18,7 +18,7 @@ ms.date: 10/02/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) The potentially unwanted application (PUA) protection feature in Windows Defender Antivirus can identify and block PUAs from downloading and installing on endpoints in your network. diff --git a/windows/security/threat-protection/windows-defender-antivirus/enable-cloud-protection-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/enable-cloud-protection-windows-defender-antivirus.md index 5d2d921020..8a846cc675 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/enable-cloud-protection-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/enable-cloud-protection-windows-defender-antivirus.md @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) >[!NOTE] >The Windows Defender Antivirus cloud service is a mechanism for delivering updated protection to your network and endpoints. Although it is called a cloud service, it is not simply protection for files stored in the cloud; rather, it uses distributed resources and machine learning to deliver protection to your endpoints at a rate that is far faster than traditional Security intelligence updates. diff --git a/windows/security/threat-protection/windows-defender-antivirus/evaluate-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/evaluate-windows-defender-antivirus.md index e40b93abd1..c937715d4a 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/evaluate-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/evaluate-windows-defender-antivirus.md @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Use this guide to determine how well Windows Defender Antivirus protects you from viruses, malware, and potentially unwanted applications. diff --git a/windows/security/threat-protection/windows-defender-antivirus/limited-periodic-scanning-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/limited-periodic-scanning-windows-defender-antivirus.md index 923a59f0ba..93ef8703d6 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/limited-periodic-scanning-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/limited-periodic-scanning-windows-defender-antivirus.md @@ -20,7 +20,7 @@ ms.date: 09/03/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Limited periodic scanning is a special type of threat detection and remediation that can be enabled when you have installed another antivirus product on a Windows 10 device. diff --git a/windows/security/threat-protection/windows-defender-antivirus/manage-event-based-updates-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/manage-event-based-updates-windows-defender-antivirus.md index 6b53608726..4e04685c61 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/manage-event-based-updates-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/manage-event-based-updates-windows-defender-antivirus.md @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Windows Defender Antivirus allows you to determine if updates should (or should not) occur after certain events, such as at startup or after receiving specific reports from the cloud-delivered protection service. diff --git a/windows/security/threat-protection/windows-defender-antivirus/manage-outdated-endpoints-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/manage-outdated-endpoints-windows-defender-antivirus.md index b79024274c..9a77e63d64 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/manage-outdated-endpoints-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/manage-outdated-endpoints-windows-defender-antivirus.md @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Windows Defender Antivirus lets you define how long an endpoint can avoid an update or how many scans it can miss before it is required to update and scan itself. This is especially useful in environments where devices are not often connected to a corporate or external network, or devices that are not used on a daily basis. diff --git a/windows/security/threat-protection/windows-defender-antivirus/manage-protection-update-schedule-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/manage-protection-update-schedule-windows-defender-antivirus.md index bb3a6e46d7..4f8774109a 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/manage-protection-update-schedule-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/manage-protection-update-schedule-windows-defender-antivirus.md @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Windows Defender Antivirus lets you determine when it should look for and download updates. diff --git a/windows/security/threat-protection/windows-defender-antivirus/manage-protection-updates-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/manage-protection-updates-windows-defender-antivirus.md index 9f27cec145..f05c21e0b5 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/manage-protection-updates-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/manage-protection-updates-windows-defender-antivirus.md @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) diff --git a/windows/security/threat-protection/windows-defender-antivirus/manage-updates-baselines-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/manage-updates-baselines-windows-defender-antivirus.md index c43a3b2399..99e2c737d9 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/manage-updates-baselines-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/manage-updates-baselines-windows-defender-antivirus.md @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) There are two types of updates related to keeping Windows Defender Antivirus up to date: 1. Protection updates diff --git a/windows/security/threat-protection/windows-defender-antivirus/manage-updates-mobile-devices-vms-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/manage-updates-mobile-devices-vms-windows-defender-antivirus.md index b62b1c4182..93a9e45f84 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/manage-updates-mobile-devices-vms-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/manage-updates-mobile-devices-vms-windows-defender-antivirus.md @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Mobile devices and VMs may require additional configuration to ensure performance is not impacted by updates. diff --git a/windows/security/threat-protection/windows-defender-antivirus/prevent-end-user-interaction-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/prevent-end-user-interaction-windows-defender-antivirus.md index 880d56c9e3..a156c5b1dd 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/prevent-end-user-interaction-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/prevent-end-user-interaction-windows-defender-antivirus.md @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) You can use Group Policy to prevent users on endpoints from seeing the Windows Defender Antivirus interface. You can also prevent them from pausing scans. diff --git a/windows/security/threat-protection/windows-defender-antivirus/report-monitor-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/report-monitor-windows-defender-antivirus.md index efa0d8b522..6e22b89713 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/report-monitor-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/report-monitor-windows-defender-antivirus.md @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) There are a number of ways you can review protection status and alerts, depending on the management tool you are using for Windows Defender Antivirus. diff --git a/windows/security/threat-protection/windows-defender-antivirus/restore-quarantined-files-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/restore-quarantined-files-windows-defender-antivirus.md index 10d6f5bedc..1718727ee2 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/restore-quarantined-files-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/restore-quarantined-files-windows-defender-antivirus.md @@ -18,7 +18,7 @@ ms.date: 11/16/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) If Windows Defender Antivirus is configured to detect and remediate threats on your device, Windows Defender Antivirus quarantines suspicious files. If you are certain these files do not present a threat, you can restore them. diff --git a/windows/security/threat-protection/windows-defender-antivirus/review-scan-results-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/review-scan-results-windows-defender-antivirus.md index c75f970b7b..ae3a67efe6 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/review-scan-results-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/review-scan-results-windows-defender-antivirus.md @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) After an Windows Defender Antivirus scan completes, whether it is an [on-demand](run-scan-windows-defender-antivirus.md) or [scheduled scan](scheduled-catch-up-scans-windows-defender-antivirus.md), the results are recorded and you can view the results. diff --git a/windows/security/threat-protection/windows-defender-antivirus/run-scan-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/run-scan-windows-defender-antivirus.md index 7f0a6d6037..15a9be7d17 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/run-scan-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/run-scan-windows-defender-antivirus.md @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) You can run an on-demand scan on individual endpoints. These scans will start immediately, and you can define parameters for the scan, such as the location or type. diff --git a/windows/security/threat-protection/windows-defender-antivirus/scheduled-catch-up-scans-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/scheduled-catch-up-scans-windows-defender-antivirus.md index 74b72c9ab1..b22dc34733 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/scheduled-catch-up-scans-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/scheduled-catch-up-scans-windows-defender-antivirus.md @@ -18,7 +18,7 @@ ms.date: 12/10/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) > [!NOTE] > By default, Windows Defender Antivirus checks for an update 15 minutes before the time of any scheduled scans. You can [Manage the schedule for when protection updates should be downloaded and applied](manage-protection-update-schedule-windows-defender-antivirus.md) to override this default. diff --git a/windows/security/threat-protection/windows-defender-antivirus/specify-cloud-protection-level-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/specify-cloud-protection-level-windows-defender-antivirus.md index 9a2b331fae..089226de14 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/specify-cloud-protection-level-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/specify-cloud-protection-level-windows-defender-antivirus.md @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) You can specify the level of cloud-protection offered by Windows Defender Antivirus with Group Policy and System Center Configuration Manager. diff --git a/windows/security/threat-protection/windows-defender-antivirus/troubleshoot-reporting.md b/windows/security/threat-protection/windows-defender-antivirus/troubleshoot-reporting.md index d1ae21771c..85b5650e9c 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/troubleshoot-reporting.md +++ b/windows/security/threat-protection/windows-defender-antivirus/troubleshoot-reporting.md @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) When you use [Windows Analytics Update Compliance to obtain reporting into the protection status of machines or endpoints](/windows/deployment/update/update-compliance-using#wdav-assessment) in your network that are using Windows Defender Antivirus, you may encounter problems or issues. diff --git a/windows/security/threat-protection/windows-defender-antivirus/troubleshoot-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/troubleshoot-windows-defender-antivirus.md index d23df5b8f1..0bdced17c6 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/troubleshoot-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/troubleshoot-windows-defender-antivirus.md @@ -18,7 +18,7 @@ ms.date: 09/11/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) If you encounter a problem with Windows Defender Antivirus, you can search the tables in this topic to find a matching issue and potential solution. diff --git a/windows/security/threat-protection/windows-defender-antivirus/use-group-policy-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/use-group-policy-windows-defender-antivirus.md index f1a344b3d2..dcb8f76069 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/use-group-policy-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/use-group-policy-windows-defender-antivirus.md @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) You can use [Group Policy](https://msdn.microsoft.com/library/ee663280(v=vs.85).aspx) to configure and manage Windows Defender Antivirus on your endpoints. diff --git a/windows/security/threat-protection/windows-defender-antivirus/use-intune-config-manager-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/use-intune-config-manager-windows-defender-antivirus.md index 89cf104935..566898708b 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/use-intune-config-manager-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/use-intune-config-manager-windows-defender-antivirus.md @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) If you are using System Center Configuration Manager or Microsoft Intune to manage the endpoints on your network, you can also use them to manage Windows Defender Antivirus scans. diff --git a/windows/security/threat-protection/windows-defender-antivirus/use-powershell-cmdlets-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/use-powershell-cmdlets-windows-defender-antivirus.md index 73fca55e16..8e45003982 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/use-powershell-cmdlets-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/use-powershell-cmdlets-windows-defender-antivirus.md @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) You can use PowerShell to perform various functions in Windows Defender. Similar to the command prompt or command line, PowerShell is a task-based command-line shell and scripting language designed especially for system administration, and you can read more about it at the [PowerShell hub on MSDN](https://msdn.microsoft.com/powershell/mt173057.aspx). diff --git a/windows/security/threat-protection/windows-defender-antivirus/use-wmi-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/use-wmi-windows-defender-antivirus.md index 0ae7bc9771..c4f3239b0c 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/use-wmi-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/use-wmi-windows-defender-antivirus.md @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Windows Management Instrumentation (WMI) is a scripting interface that allows you to retrieve, modify, and update settings. diff --git a/windows/security/threat-protection/windows-defender-antivirus/utilize-microsoft-cloud-protection-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/utilize-microsoft-cloud-protection-windows-defender-antivirus.md index 0d0f8bbae9..59ec895413 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/utilize-microsoft-cloud-protection-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/utilize-microsoft-cloud-protection-windows-defender-antivirus.md @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Microsoft next-gen technologies in Windows Defender Antivirus provide near-instant, automated protection against new and emerging threats. To dynamically identify new threats, these technologies work with large sets of interconnected data in the Microsoft Intelligent Security Graph and powerful artificial intelligence (AI) systems driven by advanced machine learning models. diff --git a/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-compatibility.md b/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-compatibility.md index c58bf2bb8a..449d118890 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-compatibility.md +++ b/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-compatibility.md @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Windows Defender Antivirus is automatically enabled and installed on endpoints and devices that are running Windows 10. diff --git a/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10.md b/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10.md index 7e7820edbb..de41958e5e 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10.md +++ b/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10.md @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Windows Defender Antivirus is a built-in antimalware solution that provides next generation protection for desktops, portable computers, and servers. diff --git a/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-on-windows-server-2016.md b/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-on-windows-server-2016.md index 2434b61627..f38d0b3823 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-on-windows-server-2016.md +++ b/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-on-windows-server-2016.md @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Windows Defender Antivirus is available on Windows Server 2016. In some instances it is referred to as Endpoint Protection - however, the protection engine is the same. diff --git a/windows/security/threat-protection/windows-defender-antivirus/windows-defender-offline.md b/windows/security/threat-protection/windows-defender-antivirus/windows-defender-offline.md index 9c669d0de5..e860e58f69 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/windows-defender-offline.md +++ b/windows/security/threat-protection/windows-defender-antivirus/windows-defender-offline.md @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Windows Defender Offline is an antimalware scanning tool that lets you boot and run a scan from a trusted environment. The scan runs from outside the normal Windows kernel so it can target malware that attempts to bypass the Windows shell, such as viruses and rootkits that infect or overwrite the master boot record (MBR). diff --git a/windows/security/threat-protection/windows-defender-antivirus/windows-defender-security-center-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/windows-defender-security-center-antivirus.md index 6a03421f8d..4b78bafccb 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/windows-defender-security-center-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/windows-defender-security-center-antivirus.md @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) In Windows 10, version 1703 and later, the Windows Defender app is part of the Windows Security. diff --git a/windows/security/threat-protection/windows-defender-application-guard/configure-wd-app-guard.md b/windows/security/threat-protection/windows-defender-application-guard/configure-wd-app-guard.md index 3579ace8b1..80dbb5a03b 100644 --- a/windows/security/threat-protection/windows-defender-application-guard/configure-wd-app-guard.md +++ b/windows/security/threat-protection/windows-defender-application-guard/configure-wd-app-guard.md @@ -13,7 +13,7 @@ ms.date: 10/17/2017 # Configure Windows Defender Application Guard policy settings -**Applies to:** [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +**Applies to:** [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Windows Defender Application Guard (Application Guard) works with Group Policy to help you manage your organization's computer settings. By using Group Policy, you can configure a setting once, and then copy it onto many computers. For example, you can set up multiple security settings in a GPO, which is linked to a domain, and then apply all those settings to every computer in the domain. diff --git a/windows/security/threat-protection/windows-defender-application-guard/faq-wd-app-guard.md b/windows/security/threat-protection/windows-defender-application-guard/faq-wd-app-guard.md index 0c72267505..0fe3b780be 100644 --- a/windows/security/threat-protection/windows-defender-application-guard/faq-wd-app-guard.md +++ b/windows/security/threat-protection/windows-defender-application-guard/faq-wd-app-guard.md @@ -13,7 +13,7 @@ ms.date: 11/07/2017 # Frequently asked questions - Windows Defender Application Guard -**Applies to:** [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +**Applies to:** [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Answering frequently asked questions about Windows Defender Application Guard (Application Guard) features, integration with the Windows operating system, and general configuration. diff --git a/windows/security/threat-protection/windows-defender-application-guard/install-wd-app-guard.md b/windows/security/threat-protection/windows-defender-application-guard/install-wd-app-guard.md index 0d185ae9bd..2ee928baee 100644 --- a/windows/security/threat-protection/windows-defender-application-guard/install-wd-app-guard.md +++ b/windows/security/threat-protection/windows-defender-application-guard/install-wd-app-guard.md @@ -14,7 +14,7 @@ ms.date: 02/19/2019 # Prepare to install Windows Defender Application Guard **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) ## Review system requirements diff --git a/windows/security/threat-protection/windows-defender-application-guard/reqs-wd-app-guard.md b/windows/security/threat-protection/windows-defender-application-guard/reqs-wd-app-guard.md index 72eb82edac..2f08cd9670 100644 --- a/windows/security/threat-protection/windows-defender-application-guard/reqs-wd-app-guard.md +++ b/windows/security/threat-protection/windows-defender-application-guard/reqs-wd-app-guard.md @@ -13,7 +13,7 @@ ms.date: 11/09/2017 # System requirements for Windows Defender Application Guard -**Applies to:** [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +**Applies to:** [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) The threat landscape is continually evolving. While hackers are busy developing new techniques to breach enterprise networks by compromising workstations, phishing schemes remain one of the top ways to lure employees into social engineering attacks. Windows Defender Application Guard is designed to help prevent old, and newly emerging attacks, to help keep employees productive. diff --git a/windows/security/threat-protection/windows-defender-application-guard/test-scenarios-wd-app-guard.md b/windows/security/threat-protection/windows-defender-application-guard/test-scenarios-wd-app-guard.md index 798a74c87b..8f6c1b0a34 100644 --- a/windows/security/threat-protection/windows-defender-application-guard/test-scenarios-wd-app-guard.md +++ b/windows/security/threat-protection/windows-defender-application-guard/test-scenarios-wd-app-guard.md @@ -14,7 +14,7 @@ ms.date: 01/16/2019 # Application Guard testing scenarios -**Applies to:** [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +**Applies to:** [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) We've come up with a list of scenarios that you can use to test hardware-based isolation in your organization. diff --git a/windows/security/threat-protection/windows-defender-application-guard/wd-app-guard-overview.md b/windows/security/threat-protection/windows-defender-application-guard/wd-app-guard-overview.md index 16fa6c33df..b38bfa09f5 100644 --- a/windows/security/threat-protection/windows-defender-application-guard/wd-app-guard-overview.md +++ b/windows/security/threat-protection/windows-defender-application-guard/wd-app-guard-overview.md @@ -13,7 +13,7 @@ ms.date: 11/27/2018 # Windows Defender Application Guard overview -**Applies to:** [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +**Applies to:** [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Windows Defender Application Guard (Application Guard) is designed to help prevent old and newly emerging attacks to help keep employees productive. Using our unique hardware isolation approach, our goal is to destroy the playbook that attackers use by making current attack methods obsolete. diff --git a/windows/security/threat-protection/windows-defender-atp/advanced-features-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/advanced-features-windows-defender-advanced-threat-protection.md index c87fd3c401..938b358427 100644 --- a/windows/security/threat-protection/windows-defender-atp/advanced-features-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/advanced-features-windows-defender-advanced-threat-protection.md @@ -21,7 +21,7 @@ ms.date: 11/16/2018 # Configure advanced features in Windows Defender ATP **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) >Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-advancedfeats-abovefoldlink) diff --git a/windows/security/threat-protection/windows-defender-atp/advanced-hunting-best-practices-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/advanced-hunting-best-practices-windows-defender-advanced-threat-protection.md index 3589cf3196..6c0c82d32d 100644 --- a/windows/security/threat-protection/windows-defender-atp/advanced-hunting-best-practices-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/advanced-hunting-best-practices-windows-defender-advanced-threat-protection.md @@ -23,7 +23,7 @@ ms.date: 04/24/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) diff --git a/windows/security/threat-protection/windows-defender-atp/advanced-hunting-reference-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/advanced-hunting-reference-windows-defender-advanced-threat-protection.md index 3fbf85c93e..467af897d1 100644 --- a/windows/security/threat-protection/windows-defender-atp/advanced-hunting-reference-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/advanced-hunting-reference-windows-defender-advanced-threat-protection.md @@ -23,7 +23,7 @@ ms.date: 06/01/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) diff --git a/windows/security/threat-protection/windows-defender-atp/alerts-queue-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/alerts-queue-windows-defender-advanced-threat-protection.md index d0a2edbc27..fb04442da2 100644 --- a/windows/security/threat-protection/windows-defender-atp/alerts-queue-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/alerts-queue-windows-defender-advanced-threat-protection.md @@ -21,7 +21,7 @@ ms.date: 04/24/2018 # View and organize the Windows Defender Advanced Threat Protection Alerts queue **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) diff --git a/windows/security/threat-protection/windows-defender-atp/api-portal-mapping-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/api-portal-mapping-windows-defender-advanced-threat-protection.md index edd3eab3fe..1cec1b5053 100644 --- a/windows/security/threat-protection/windows-defender-atp/api-portal-mapping-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/api-portal-mapping-windows-defender-advanced-threat-protection.md @@ -23,7 +23,7 @@ ms.date: 10/16/2017 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) diff --git a/windows/security/threat-protection/windows-defender-atp/assign-portal-access-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/assign-portal-access-windows-defender-advanced-threat-protection.md index e6775508c0..bc87a4503f 100644 --- a/windows/security/threat-protection/windows-defender-atp/assign-portal-access-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/assign-portal-access-windows-defender-advanced-threat-protection.md @@ -23,7 +23,7 @@ ms.date: 11/28/2018 **Applies to:** - Azure Active Directory - Office 365 -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) >Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-assignaccess-abovefoldlink) diff --git a/windows/security/threat-protection/windows-defender-atp/attack-simulations-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/attack-simulations-windows-defender-advanced-threat-protection.md index 76ba536762..a86ee0b027 100644 --- a/windows/security/threat-protection/windows-defender-atp/attack-simulations-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/attack-simulations-windows-defender-advanced-threat-protection.md @@ -23,7 +23,7 @@ ms.date: 11/20/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) diff --git a/windows/security/threat-protection/windows-defender-atp/basic-permissions-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/basic-permissions-windows-defender-advanced-threat-protection.md index 6317c4b3cb..d9fa05ab08 100644 --- a/windows/security/threat-protection/windows-defender-atp/basic-permissions-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/basic-permissions-windows-defender-advanced-threat-protection.md @@ -21,7 +21,7 @@ ms.topic: article **Applies to:** - Azure Active Directory -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) >Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-basicaccess-abovefoldlink) diff --git a/windows/security/threat-protection/windows-defender-atp/check-sensor-status-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/check-sensor-status-windows-defender-advanced-threat-protection.md index 3571e067fc..007cfbede6 100644 --- a/windows/security/threat-protection/windows-defender-atp/check-sensor-status-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/check-sensor-status-windows-defender-advanced-threat-protection.md @@ -21,7 +21,7 @@ ms.date: 04/24/2018 # Check sensor health state in Windows Defender ATP **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) diff --git a/windows/security/threat-protection/windows-defender-atp/community-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/community-windows-defender-advanced-threat-protection.md index bbe7653865..35ed4d4458 100644 --- a/windows/security/threat-protection/windows-defender-atp/community-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/community-windows-defender-advanced-threat-protection.md @@ -22,7 +22,7 @@ ms.date: 04/24/2018 # Access the Windows Defender ATP Community Center **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) diff --git a/windows/security/threat-protection/windows-defender-atp/conditional-access-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/conditional-access-windows-defender-advanced-threat-protection.md index 0db8c85384..d3dff32b11 100644 --- a/windows/security/threat-protection/windows-defender-atp/conditional-access-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/conditional-access-windows-defender-advanced-threat-protection.md @@ -20,7 +20,7 @@ ms.topic: article # Enable conditional access to better protect users, devices, and data **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) diff --git a/windows/security/threat-protection/windows-defender-atp/configure-arcsight-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/configure-arcsight-windows-defender-advanced-threat-protection.md index f6ac3a4c36..989ebec483 100644 --- a/windows/security/threat-protection/windows-defender-atp/configure-arcsight-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/configure-arcsight-windows-defender-advanced-threat-protection.md @@ -23,7 +23,7 @@ ms.date: 12/20/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) diff --git a/windows/security/threat-protection/windows-defender-atp/configure-conditional-access-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/configure-conditional-access-windows-defender-advanced-threat-protection.md index b57e79e61b..cd442ff5d6 100644 --- a/windows/security/threat-protection/windows-defender-atp/configure-conditional-access-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/configure-conditional-access-windows-defender-advanced-threat-protection.md @@ -20,7 +20,7 @@ ms.date: 09/03/2018 # Configure conditional access in Windows Defender ATP **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) This section guides you through all the steps you need to take to properly implement conditional access. diff --git a/windows/security/threat-protection/windows-defender-atp/configure-email-notifications-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/configure-email-notifications-windows-defender-advanced-threat-protection.md index d926b28800..878472814f 100644 --- a/windows/security/threat-protection/windows-defender-atp/configure-email-notifications-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/configure-email-notifications-windows-defender-advanced-threat-protection.md @@ -21,7 +21,7 @@ ms.date: 10/08/2018 # Configure alert notifications in Windows Defender ATP **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) >Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-emailconfig-abovefoldlink) diff --git a/windows/security/threat-protection/windows-defender-atp/configure-endpoints-gp-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/configure-endpoints-gp-windows-defender-advanced-threat-protection.md index ad6b565b7e..de59ce12b7 100644 --- a/windows/security/threat-protection/windows-defender-atp/configure-endpoints-gp-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/configure-endpoints-gp-windows-defender-advanced-threat-protection.md @@ -24,7 +24,7 @@ ms.date: 04/24/2018 - Group Policy -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) diff --git a/windows/security/threat-protection/windows-defender-atp/configure-endpoints-mdm-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/configure-endpoints-mdm-windows-defender-advanced-threat-protection.md index 7eb6e5ace0..57ba954930 100644 --- a/windows/security/threat-protection/windows-defender-atp/configure-endpoints-mdm-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/configure-endpoints-mdm-windows-defender-advanced-threat-protection.md @@ -23,7 +23,7 @@ ms.date: 12/06/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) >Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-configureendpointsmdm-abovefoldlink) diff --git a/windows/security/threat-protection/windows-defender-atp/configure-endpoints-non-windows-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/configure-endpoints-non-windows-windows-defender-advanced-threat-protection.md index 541f53e85e..de556b2903 100644 --- a/windows/security/threat-protection/windows-defender-atp/configure-endpoints-non-windows-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/configure-endpoints-non-windows-windows-defender-advanced-threat-protection.md @@ -22,7 +22,7 @@ ms.topic: article - macOS - Linux -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) >Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-nonwindows-abovefoldlink) diff --git a/windows/security/threat-protection/windows-defender-atp/configure-endpoints-sccm-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/configure-endpoints-sccm-windows-defender-advanced-threat-protection.md index 4136a69a74..c378ca8d9d 100644 --- a/windows/security/threat-protection/windows-defender-atp/configure-endpoints-sccm-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/configure-endpoints-sccm-windows-defender-advanced-threat-protection.md @@ -23,7 +23,7 @@ ms.date: 12/11/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) - System Center 2012 Configuration Manager or later versions diff --git a/windows/security/threat-protection/windows-defender-atp/configure-endpoints-script-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/configure-endpoints-script-windows-defender-advanced-threat-protection.md index 14a13f7b3a..fee63e07dd 100644 --- a/windows/security/threat-protection/windows-defender-atp/configure-endpoints-script-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/configure-endpoints-script-windows-defender-advanced-threat-protection.md @@ -22,7 +22,7 @@ ms.topic: article **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) diff --git a/windows/security/threat-protection/windows-defender-atp/configure-endpoints-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/configure-endpoints-windows-defender-advanced-threat-protection.md index 89b42c84ff..dc4a53e6ea 100644 --- a/windows/security/threat-protection/windows-defender-atp/configure-endpoints-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/configure-endpoints-windows-defender-advanced-threat-protection.md @@ -23,7 +23,7 @@ ms.date: 07/12/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) diff --git a/windows/security/threat-protection/windows-defender-atp/configure-microsoft-threat-experts.md b/windows/security/threat-protection/windows-defender-atp/configure-microsoft-threat-experts.md index dca722db26..f518883f9b 100644 --- a/windows/security/threat-protection/windows-defender-atp/configure-microsoft-threat-experts.md +++ b/windows/security/threat-protection/windows-defender-atp/configure-microsoft-threat-experts.md @@ -21,7 +21,7 @@ ms.date: 02/28/2019 # Configure and manage Microsoft Threat Experts capabilities **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) [!include[Prerelease�information](prerelease.md)] diff --git a/windows/security/threat-protection/windows-defender-atp/configure-mssp-support-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/configure-mssp-support-windows-defender-advanced-threat-protection.md index 785c598a10..738c8f0548 100644 --- a/windows/security/threat-protection/windows-defender-atp/configure-mssp-support-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/configure-mssp-support-windows-defender-advanced-threat-protection.md @@ -21,7 +21,7 @@ ms.date: 09/03/2018 # Configure managed security service provider integration **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) >Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-mssp-support-abovefoldlink) diff --git a/windows/security/threat-protection/windows-defender-atp/configure-proxy-internet-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/configure-proxy-internet-windows-defender-advanced-threat-protection.md index 786987cff0..64a8b911a7 100644 --- a/windows/security/threat-protection/windows-defender-atp/configure-proxy-internet-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/configure-proxy-internet-windows-defender-advanced-threat-protection.md @@ -21,7 +21,7 @@ ms.topic: article # Configure machine proxy and Internet connectivity settings **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) diff --git a/windows/security/threat-protection/windows-defender-atp/configure-server-endpoints-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/configure-server-endpoints-windows-defender-advanced-threat-protection.md index 93dc8a9bec..4b98079963 100644 --- a/windows/security/threat-protection/windows-defender-atp/configure-server-endpoints-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/configure-server-endpoints-windows-defender-advanced-threat-protection.md @@ -25,7 +25,7 @@ ms.date: 12/14/2018 - Windows Server 2016 - Windows Server, version 1803 - Windows Server, 2019 -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) [!include[Prerelease information](prerelease.md)] diff --git a/windows/security/threat-protection/windows-defender-atp/configure-siem-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/configure-siem-windows-defender-advanced-threat-protection.md index b59c733f97..04c596750a 100644 --- a/windows/security/threat-protection/windows-defender-atp/configure-siem-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/configure-siem-windows-defender-advanced-threat-protection.md @@ -23,7 +23,7 @@ ms.date: 10/16/2017 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) >Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-configuresiem-abovefoldlink) diff --git a/windows/security/threat-protection/windows-defender-atp/configure-splunk-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/configure-splunk-windows-defender-advanced-threat-protection.md index ba8f81a9ba..baf0a25a95 100644 --- a/windows/security/threat-protection/windows-defender-atp/configure-splunk-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/configure-splunk-windows-defender-advanced-threat-protection.md @@ -23,7 +23,7 @@ ms.date: 10/16/2017 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) diff --git a/windows/security/threat-protection/windows-defender-atp/custom-detection-rules.md b/windows/security/threat-protection/windows-defender-atp/custom-detection-rules.md index 3938e9b3f5..632b9691c5 100644 --- a/windows/security/threat-protection/windows-defender-atp/custom-detection-rules.md +++ b/windows/security/threat-protection/windows-defender-atp/custom-detection-rules.md @@ -21,7 +21,7 @@ ms.date: 10/29/2018 # Create custom detections rules **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) 1. In the navigation pane, select **Advanced hunting**. diff --git a/windows/security/threat-protection/windows-defender-atp/custom-ti-api-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/custom-ti-api-windows-defender-advanced-threat-protection.md index 14a91c2829..bc9982d2ae 100644 --- a/windows/security/threat-protection/windows-defender-atp/custom-ti-api-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/custom-ti-api-windows-defender-advanced-threat-protection.md @@ -23,7 +23,7 @@ ms.date: 04/24/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) diff --git a/windows/security/threat-protection/windows-defender-atp/data-retention-settings-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/data-retention-settings-windows-defender-advanced-threat-protection.md index 911625d579..8a393d5b81 100644 --- a/windows/security/threat-protection/windows-defender-atp/data-retention-settings-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/data-retention-settings-windows-defender-advanced-threat-protection.md @@ -22,7 +22,7 @@ ms.date: 04/24/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) diff --git a/windows/security/threat-protection/windows-defender-atp/data-storage-privacy-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/data-storage-privacy-windows-defender-advanced-threat-protection.md index 92e081ea4a..32a1c3afe9 100644 --- a/windows/security/threat-protection/windows-defender-atp/data-storage-privacy-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/data-storage-privacy-windows-defender-advanced-threat-protection.md @@ -21,7 +21,7 @@ ms.date: 09/07/2018 # Windows Defender ATP data storage and privacy **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) diff --git a/windows/security/threat-protection/windows-defender-atp/defender-compatibility-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/defender-compatibility-windows-defender-advanced-threat-protection.md index 61c31958f3..5050e3dcb1 100644 --- a/windows/security/threat-protection/windows-defender-atp/defender-compatibility-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/defender-compatibility-windows-defender-advanced-threat-protection.md @@ -24,7 +24,7 @@ ms.date: 04/24/2018 - Windows Defender -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) diff --git a/windows/security/threat-protection/windows-defender-atp/enable-custom-ti-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/enable-custom-ti-windows-defender-advanced-threat-protection.md index aca29a67c7..49545c0428 100644 --- a/windows/security/threat-protection/windows-defender-atp/enable-custom-ti-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/enable-custom-ti-windows-defender-advanced-threat-protection.md @@ -23,7 +23,7 @@ ms.date: 04/24/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) diff --git a/windows/security/threat-protection/windows-defender-atp/enable-secure-score-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/enable-secure-score-windows-defender-advanced-threat-protection.md index 73b494e5e7..c4590d0678 100644 --- a/windows/security/threat-protection/windows-defender-atp/enable-secure-score-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/enable-secure-score-windows-defender-advanced-threat-protection.md @@ -23,7 +23,7 @@ ms.date: 04/24/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) diff --git a/windows/security/threat-protection/windows-defender-atp/enable-siem-integration-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/enable-siem-integration-windows-defender-advanced-threat-protection.md index c8e00fbc8f..b3d89ea8d0 100644 --- a/windows/security/threat-protection/windows-defender-atp/enable-siem-integration-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/enable-siem-integration-windows-defender-advanced-threat-protection.md @@ -21,7 +21,7 @@ ms.date: 12/10/2018 # Enable SIEM integration in Windows Defender ATP **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) >Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-enablesiem-abovefoldlink) diff --git a/windows/security/threat-protection/windows-defender-atp/evaluate-atp.md b/windows/security/threat-protection/windows-defender-atp/evaluate-atp.md index 1311f7c265..6dd9971ceb 100644 --- a/windows/security/threat-protection/windows-defender-atp/evaluate-atp.md +++ b/windows/security/threat-protection/windows-defender-atp/evaluate-atp.md @@ -19,7 +19,7 @@ ms.date: 08/10/2018 --- # Evaluate Windows Defender ATP -[Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) is a unified platform for preventative protection, post-breach detection, automated investigation, and response. +[Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) is a unified platform for preventative protection, post-breach detection, automated investigation, and response. You can evaluate Windows Defender Advanced Threat Protection in your organization by [starting your free trial](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp). diff --git a/windows/security/threat-protection/windows-defender-atp/event-error-codes-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/event-error-codes-windows-defender-advanced-threat-protection.md index af1f166fa2..f49caf3929 100644 --- a/windows/security/threat-protection/windows-defender-atp/event-error-codes-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/event-error-codes-windows-defender-advanced-threat-protection.md @@ -25,7 +25,7 @@ ms.date: 05/21/2018 - Event Viewer -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) diff --git a/windows/security/threat-protection/windows-defender-atp/experiment-custom-ti-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/experiment-custom-ti-windows-defender-advanced-threat-protection.md index c41d6d1439..3e8ba14f02 100644 --- a/windows/security/threat-protection/windows-defender-atp/experiment-custom-ti-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/experiment-custom-ti-windows-defender-advanced-threat-protection.md @@ -23,7 +23,7 @@ ms.date: 11/09/2017 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) diff --git a/windows/security/threat-protection/windows-defender-atp/fix-unhealhty-sensors-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/fix-unhealhty-sensors-windows-defender-advanced-threat-protection.md index c1c26a4658..3a5158d272 100644 --- a/windows/security/threat-protection/windows-defender-atp/fix-unhealhty-sensors-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/fix-unhealhty-sensors-windows-defender-advanced-threat-protection.md @@ -23,7 +23,7 @@ ms.date: 10/23/2017 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) diff --git a/windows/security/threat-protection/windows-defender-atp/get-cvekbmap-collection-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-cvekbmap-collection-windows-defender-advanced-threat-protection.md index 304062eb4b..4251da56b9 100644 --- a/windows/security/threat-protection/windows-defender-atp/get-cvekbmap-collection-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/get-cvekbmap-collection-windows-defender-advanced-threat-protection.md @@ -22,7 +22,7 @@ ms.date: 10/07/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Retrieves a map of CVE's to KB's and CVE details. diff --git a/windows/security/threat-protection/windows-defender-atp/get-kbinfo-collection-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-kbinfo-collection-windows-defender-advanced-threat-protection.md index f44abf8b92..1752cd4d91 100644 --- a/windows/security/threat-protection/windows-defender-atp/get-kbinfo-collection-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/get-kbinfo-collection-windows-defender-advanced-threat-protection.md @@ -22,7 +22,7 @@ ms.date: 10/07/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Retrieves a collection of KB's and KB details. diff --git a/windows/security/threat-protection/windows-defender-atp/get-machinegroups-collection-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-machinegroups-collection-windows-defender-advanced-threat-protection.md index acd0502c87..412c1bd762 100644 --- a/windows/security/threat-protection/windows-defender-atp/get-machinegroups-collection-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/get-machinegroups-collection-windows-defender-advanced-threat-protection.md @@ -22,7 +22,7 @@ ms.date: 10/07/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Retrieves a collection of RBAC machine groups. diff --git a/windows/security/threat-protection/windows-defender-atp/get-machinesecuritystates-collection-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-machinesecuritystates-collection-windows-defender-advanced-threat-protection.md index f118c229d5..0de146e30c 100644 --- a/windows/security/threat-protection/windows-defender-atp/get-machinesecuritystates-collection-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/get-machinesecuritystates-collection-windows-defender-advanced-threat-protection.md @@ -22,7 +22,7 @@ ms.date: 10/07/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Retrieves a collection of machines security states. diff --git a/windows/security/threat-protection/windows-defender-atp/get-started.md b/windows/security/threat-protection/windows-defender-atp/get-started.md index 22b8e3e7ee..6086863cb6 100644 --- a/windows/security/threat-protection/windows-defender-atp/get-started.md +++ b/windows/security/threat-protection/windows-defender-atp/get-started.md @@ -21,7 +21,7 @@ ms.date: 11/20/2018 # Get started with Windows Defender Advanced Threat Protection **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) >[!TIP] >- Learn about the latest enhancements in Windows Defender ATP: [What's new in Windows Defender ATP](https://cloudblogs.microsoft.com/microsoftsecure/2018/11/15/whats-new-in-windows-defender-atp/). diff --git a/windows/security/threat-protection/windows-defender-atp/incidents-queue.md b/windows/security/threat-protection/windows-defender-atp/incidents-queue.md index c8959b8a9b..1a769c409b 100644 --- a/windows/security/threat-protection/windows-defender-atp/incidents-queue.md +++ b/windows/security/threat-protection/windows-defender-atp/incidents-queue.md @@ -19,7 +19,7 @@ ms.topic: conceptual # Incidents in Windows Defender ATP **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) When a cybersecurity threat is emerging, or a potential attacker is deploying its tactics, techniques/tools, and procedures (TTPs) on the network, Windows Defender ATP will quickly trigger alerts and launch matching automatic investigations. diff --git a/windows/security/threat-protection/windows-defender-atp/information-protection-in-windows-config.md b/windows/security/threat-protection/windows-defender-atp/information-protection-in-windows-config.md index 7ca743699d..9eedb8b8f5 100644 --- a/windows/security/threat-protection/windows-defender-atp/information-protection-in-windows-config.md +++ b/windows/security/threat-protection/windows-defender-atp/information-protection-in-windows-config.md @@ -19,7 +19,7 @@ ms.date: 12/05/2018 # Configure information protection in Windows **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) [!include[Prerelease information](prerelease.md)] diff --git a/windows/security/threat-protection/windows-defender-atp/information-protection-in-windows-overview.md b/windows/security/threat-protection/windows-defender-atp/information-protection-in-windows-overview.md index fc95457fbb..976dfff7e4 100644 --- a/windows/security/threat-protection/windows-defender-atp/information-protection-in-windows-overview.md +++ b/windows/security/threat-protection/windows-defender-atp/information-protection-in-windows-overview.md @@ -19,7 +19,7 @@ ms.date: 12/05/2018 # Information protection in Windows overview **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) [!include[Prerelease information](prerelease.md)] diff --git a/windows/security/threat-protection/windows-defender-atp/investigate-alerts-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/investigate-alerts-windows-defender-advanced-threat-protection.md index caeb9391f8..1c60dae5b7 100644 --- a/windows/security/threat-protection/windows-defender-atp/investigate-alerts-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/investigate-alerts-windows-defender-advanced-threat-protection.md @@ -22,7 +22,7 @@ ms.date: 04/24/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) diff --git a/windows/security/threat-protection/windows-defender-atp/investigate-domain-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/investigate-domain-windows-defender-advanced-threat-protection.md index 8da3f67372..010408840d 100644 --- a/windows/security/threat-protection/windows-defender-atp/investigate-domain-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/investigate-domain-windows-defender-advanced-threat-protection.md @@ -22,7 +22,7 @@ ms.date: 04/24/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) diff --git a/windows/security/threat-protection/windows-defender-atp/investigate-files-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/investigate-files-windows-defender-advanced-threat-protection.md index d9ae8a7faf..cf4b455f24 100644 --- a/windows/security/threat-protection/windows-defender-atp/investigate-files-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/investigate-files-windows-defender-advanced-threat-protection.md @@ -22,7 +22,7 @@ ms.date: 04/24/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) diff --git a/windows/security/threat-protection/windows-defender-atp/investigate-incidents-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/investigate-incidents-windows-defender-advanced-threat-protection.md index 4bf073aca3..47c0edb764 100644 --- a/windows/security/threat-protection/windows-defender-atp/investigate-incidents-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/investigate-incidents-windows-defender-advanced-threat-protection.md @@ -20,7 +20,7 @@ ms.topic: article # Investigate incidents in Windows Defender ATP **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Investigate incidents that affect your network, understand what they mean, and collate evidence to resolve them. diff --git a/windows/security/threat-protection/windows-defender-atp/investigate-ip-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/investigate-ip-windows-defender-advanced-threat-protection.md index b197fed832..cf77b8afb9 100644 --- a/windows/security/threat-protection/windows-defender-atp/investigate-ip-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/investigate-ip-windows-defender-advanced-threat-protection.md @@ -22,7 +22,7 @@ ms.date: 04/24/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) diff --git a/windows/security/threat-protection/windows-defender-atp/investigate-machines-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/investigate-machines-windows-defender-advanced-threat-protection.md index 838654bcf3..2b9d2d90f5 100644 --- a/windows/security/threat-protection/windows-defender-atp/investigate-machines-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/investigate-machines-windows-defender-advanced-threat-protection.md @@ -21,7 +21,7 @@ ms.date: 09/18/2018 # Investigate machines in the Windows Defender ATP Machines list **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) >Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-investigatemachines-abovefoldlink) diff --git a/windows/security/threat-protection/windows-defender-atp/investigate-user-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/investigate-user-windows-defender-advanced-threat-protection.md index b47a079791..4260159191 100644 --- a/windows/security/threat-protection/windows-defender-atp/investigate-user-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/investigate-user-windows-defender-advanced-threat-protection.md @@ -21,7 +21,7 @@ ms.date: 04/24/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) diff --git a/windows/security/threat-protection/windows-defender-atp/licensing-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/licensing-windows-defender-advanced-threat-protection.md index 21e8be6036..c1e9c27b9c 100644 --- a/windows/security/threat-protection/windows-defender-atp/licensing-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/licensing-windows-defender-advanced-threat-protection.md @@ -21,7 +21,7 @@ ms.topic: article **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) diff --git a/windows/security/threat-protection/windows-defender-atp/machine-groups-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/machine-groups-windows-defender-advanced-threat-protection.md index 577b8b2663..653407fdf7 100644 --- a/windows/security/threat-protection/windows-defender-atp/machine-groups-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/machine-groups-windows-defender-advanced-threat-protection.md @@ -24,7 +24,7 @@ ms.date: 05/08/2018 - Azure Active Directory - Office 365 -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) diff --git a/windows/security/threat-protection/windows-defender-atp/machines-view-overview-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/machines-view-overview-windows-defender-advanced-threat-protection.md index bf990d1101..c94234e9e1 100644 --- a/windows/security/threat-protection/windows-defender-atp/machines-view-overview-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/machines-view-overview-windows-defender-advanced-threat-protection.md @@ -23,7 +23,7 @@ ms.date: 09/03/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) >Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-machinesview-abovefoldlink) diff --git a/windows/security/threat-protection/windows-defender-atp/manage-alerts-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/manage-alerts-windows-defender-advanced-threat-protection.md index 660e1f0cd1..56f599b483 100644 --- a/windows/security/threat-protection/windows-defender-atp/manage-alerts-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/manage-alerts-windows-defender-advanced-threat-protection.md @@ -21,7 +21,7 @@ ms.date: 09/03/2018 # Manage Windows Defender Advanced Threat Protection alerts **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) >Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-managealerts-abovefoldlink) diff --git a/windows/security/threat-protection/windows-defender-atp/manage-automation-allowed-blocked-list-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/manage-automation-allowed-blocked-list-windows-defender-advanced-threat-protection.md index 94a7712aed..47c3f41079 100644 --- a/windows/security/threat-protection/windows-defender-atp/manage-automation-allowed-blocked-list-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/manage-automation-allowed-blocked-list-windows-defender-advanced-threat-protection.md @@ -23,7 +23,7 @@ ms.date: 06/14/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) diff --git a/windows/security/threat-protection/windows-defender-atp/manage-automation-file-uploads-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/manage-automation-file-uploads-windows-defender-advanced-threat-protection.md index b3d4ebdb7c..84706f7a5a 100644 --- a/windows/security/threat-protection/windows-defender-atp/manage-automation-file-uploads-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/manage-automation-file-uploads-windows-defender-advanced-threat-protection.md @@ -23,7 +23,7 @@ ms.date: 04/24/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) diff --git a/windows/security/threat-protection/windows-defender-atp/manage-automation-folder-exclusions-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/manage-automation-folder-exclusions-windows-defender-advanced-threat-protection.md index f559363b7a..23133475a4 100644 --- a/windows/security/threat-protection/windows-defender-atp/manage-automation-folder-exclusions-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/manage-automation-folder-exclusions-windows-defender-advanced-threat-protection.md @@ -23,7 +23,7 @@ ms.date: 04/24/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) diff --git a/windows/security/threat-protection/windows-defender-atp/manage-incidents-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/manage-incidents-windows-defender-advanced-threat-protection.md index 649d06d0fa..8b8fa19749 100644 --- a/windows/security/threat-protection/windows-defender-atp/manage-incidents-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/manage-incidents-windows-defender-advanced-threat-protection.md @@ -21,7 +21,7 @@ ms.date: 010/08/2018 # Manage Windows Defender ATP incidents **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Managing incidents is an important part of every cybersecurity operation. You can manage incidents by selecting an incident from the **Incidents queue** or the **Incidents management pane**. You can assign incidents to yourself, change the status, classify, rename, or comment on them to keep track of their progress. diff --git a/windows/security/threat-protection/windows-defender-atp/manage-suppression-rules-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/manage-suppression-rules-windows-defender-advanced-threat-protection.md index 0ff8691e5c..1ec412b1f3 100644 --- a/windows/security/threat-protection/windows-defender-atp/manage-suppression-rules-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/manage-suppression-rules-windows-defender-advanced-threat-protection.md @@ -23,7 +23,7 @@ ms.date: 04/24/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) diff --git a/windows/security/threat-protection/windows-defender-atp/management-apis.md b/windows/security/threat-protection/windows-defender-atp/management-apis.md index 8a0deb4397..f28e7a6997 100644 --- a/windows/security/threat-protection/windows-defender-atp/management-apis.md +++ b/windows/security/threat-protection/windows-defender-atp/management-apis.md @@ -21,7 +21,7 @@ ms.date: 09/03/2018 # Overview of management and APIs **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) >Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-mgt-apis-abovefoldlink) diff --git a/windows/security/threat-protection/windows-defender-atp/microsoft-cloud-app-security-config.md b/windows/security/threat-protection/windows-defender-atp/microsoft-cloud-app-security-config.md index 0c182b091a..52627d87be 100644 --- a/windows/security/threat-protection/windows-defender-atp/microsoft-cloud-app-security-config.md +++ b/windows/security/threat-protection/windows-defender-atp/microsoft-cloud-app-security-config.md @@ -21,7 +21,7 @@ ms.date: 10/19/2018 # Configure Microsoft Cloud App Security in Windows **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) [!include[Prerelease�information](prerelease.md)] diff --git a/windows/security/threat-protection/windows-defender-atp/microsoft-cloud-app-security-integration.md b/windows/security/threat-protection/windows-defender-atp/microsoft-cloud-app-security-integration.md index 75ad85f97d..6c2400b885 100644 --- a/windows/security/threat-protection/windows-defender-atp/microsoft-cloud-app-security-integration.md +++ b/windows/security/threat-protection/windows-defender-atp/microsoft-cloud-app-security-integration.md @@ -20,7 +20,7 @@ ms.date: 10/18/2018 # Microsoft Cloud App Security in Windows overview **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) [!include[Prerelease�information](prerelease.md)] diff --git a/windows/security/threat-protection/windows-defender-atp/microsoft-threat-experts.md b/windows/security/threat-protection/windows-defender-atp/microsoft-threat-experts.md index 3e66a55ad7..380af8ef33 100644 --- a/windows/security/threat-protection/windows-defender-atp/microsoft-threat-experts.md +++ b/windows/security/threat-protection/windows-defender-atp/microsoft-threat-experts.md @@ -20,7 +20,7 @@ ms.date: 02/28/2019 # Microsoft Threat Experts **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) [!include[Prerelease�information](prerelease.md)] diff --git a/windows/security/threat-protection/windows-defender-atp/minimum-requirements-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/minimum-requirements-windows-defender-advanced-threat-protection.md index 02bcbfb594..27b07e63d4 100644 --- a/windows/security/threat-protection/windows-defender-atp/minimum-requirements-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/minimum-requirements-windows-defender-advanced-threat-protection.md @@ -21,7 +21,7 @@ ms.date: 11/20/2018 # Minimum requirements for Windows Defender ATP **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) There are some minimum requirements for onboarding machines to the service. @@ -41,7 +41,7 @@ Windows Defender Advanced Threat Protection requires one of the following Micros For more information on the array of features in Windows 10 editions, see [Compare Windows 10 editions](https://www.microsoft.com/en-us/windowsforbusiness/compare). -For a detailed comparison table of Windows 10 commercial edition comparison, see the [comparison PDF](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf). +For a detailed comparison table of Windows 10 commercial edition comparison, see the [comparison PDF](https://go.microsoft.com/fwlink/p/?linkid=2069559). diff --git a/windows/security/threat-protection/windows-defender-atp/mssp-support-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/mssp-support-windows-defender-advanced-threat-protection.md index 1940bd5a74..dfd40d8852 100644 --- a/windows/security/threat-protection/windows-defender-atp/mssp-support-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/mssp-support-windows-defender-advanced-threat-protection.md @@ -21,7 +21,7 @@ ms.date: 10/29/2018 # Managed security service provider support **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) >Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-mssp-support-abovefoldlink) diff --git a/windows/security/threat-protection/windows-defender-atp/offboard-machines-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/offboard-machines-windows-defender-advanced-threat-protection.md index 9e1a9a8972..273bfed16c 100644 --- a/windows/security/threat-protection/windows-defender-atp/offboard-machines-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/offboard-machines-windows-defender-advanced-threat-protection.md @@ -25,7 +25,7 @@ ms.date: 04/24/2018 - Linux - Windows Server 2012 R2 - Windows Server 2016 -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) diff --git a/windows/security/threat-protection/windows-defender-atp/onboard-configure-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/onboard-configure-windows-defender-advanced-threat-protection.md index bc7c30d8a2..a33cae087b 100644 --- a/windows/security/threat-protection/windows-defender-atp/onboard-configure-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/onboard-configure-windows-defender-advanced-threat-protection.md @@ -21,7 +21,7 @@ ms.date: 11/19/2018 # Onboard machines to the Windows Defender ATP service **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) You need to turn on the sensor to give visibility within Windows Defender ATP. diff --git a/windows/security/threat-protection/windows-defender-atp/onboard-downlevel-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/onboard-downlevel-windows-defender-advanced-threat-protection.md index 0bccc2871e..0cb3ee7552 100644 --- a/windows/security/threat-protection/windows-defender-atp/onboard-downlevel-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/onboard-downlevel-windows-defender-advanced-threat-protection.md @@ -25,7 +25,7 @@ ms.topic: article - Windows 7 SP1 Pro - Windows 8.1 Pro - Windows 8.1 Enterprise -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) >Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-downlevel-abovefoldlink) diff --git a/windows/security/threat-protection/windows-defender-atp/onboard.md b/windows/security/threat-protection/windows-defender-atp/onboard.md index 6a260ac891..319d254a8e 100644 --- a/windows/security/threat-protection/windows-defender-atp/onboard.md +++ b/windows/security/threat-protection/windows-defender-atp/onboard.md @@ -21,7 +21,7 @@ ms.date: 09/03/2018 # Configure and manage Windows Defender ATP capabilities **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Configure and manage all the Windows Defender ATP capabilities to get the best security protection for your organization. diff --git a/windows/security/threat-protection/windows-defender-atp/overview-attack-surface-reduction.md b/windows/security/threat-protection/windows-defender-atp/overview-attack-surface-reduction.md index c23a4512ad..c2617a285e 100644 --- a/windows/security/threat-protection/windows-defender-atp/overview-attack-surface-reduction.md +++ b/windows/security/threat-protection/windows-defender-atp/overview-attack-surface-reduction.md @@ -21,7 +21,7 @@ ms.date: 02/21/2019 # Overview of attack surface reduction **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Attack surface reduction capabilities in Windows Defender ATP helps protect the devices and applications in your organization from new and emerging threats. diff --git a/windows/security/threat-protection/windows-defender-atp/overview-custom-detections.md b/windows/security/threat-protection/windows-defender-atp/overview-custom-detections.md index a9c37011dc..13268d34ad 100644 --- a/windows/security/threat-protection/windows-defender-atp/overview-custom-detections.md +++ b/windows/security/threat-protection/windows-defender-atp/overview-custom-detections.md @@ -21,7 +21,7 @@ ms.date: 10/29/2018 # Custom detections overview **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Alerts in Windows Defender ATP are surfaced through the system based on signals gathered from endpoints. With custom detections, you can create custom queries to monitor events for any kind of behavior such as suspicious or emerging threats. diff --git a/windows/security/threat-protection/windows-defender-atp/overview-endpoint-detection-response.md b/windows/security/threat-protection/windows-defender-atp/overview-endpoint-detection-response.md index a282188a74..1fb9eea8e2 100644 --- a/windows/security/threat-protection/windows-defender-atp/overview-endpoint-detection-response.md +++ b/windows/security/threat-protection/windows-defender-atp/overview-endpoint-detection-response.md @@ -22,7 +22,7 @@ ms.date: 09/03/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Windows Defender ATP endpoint detection and response capabilities provide advanced attack detections that are near real-time and actionable. Security analysts can prioritize alerts effectively, gain visibility into the full scope of a breach, and take response actions to remediate threats. diff --git a/windows/security/threat-protection/windows-defender-atp/overview-hardware-based-isolation.md b/windows/security/threat-protection/windows-defender-atp/overview-hardware-based-isolation.md index 6bf35eb789..b86fea8fb4 100644 --- a/windows/security/threat-protection/windows-defender-atp/overview-hardware-based-isolation.md +++ b/windows/security/threat-protection/windows-defender-atp/overview-hardware-based-isolation.md @@ -18,7 +18,7 @@ ms.date: 09/07/2018 # Hardware-based isolation in Windows 10 -**Applies to:** [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +**Applies to:** [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Hardware-based isolation helps protect system integrity in Windows 10 and is integrated with Windows Defender ATP. diff --git a/windows/security/threat-protection/windows-defender-atp/overview-hunting-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/overview-hunting-windows-defender-advanced-threat-protection.md index f23f20f711..8d95c6f102 100644 --- a/windows/security/threat-protection/windows-defender-atp/overview-hunting-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/overview-hunting-windows-defender-advanced-threat-protection.md @@ -20,7 +20,7 @@ ms.date: 09/12/2018 # Overview of advanced hunting **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Advanced hunting allows you to hunt for possible threats across your organization using a powerful search and query tool. You can also create custom detection rules based on the queries you created and surface alerts in Windows Defender Security Center. diff --git a/windows/security/threat-protection/windows-defender-atp/overview-secure-score-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/overview-secure-score-windows-defender-advanced-threat-protection.md index e6b0df0de0..33671e8778 100644 --- a/windows/security/threat-protection/windows-defender-atp/overview-secure-score-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/overview-secure-score-windows-defender-advanced-threat-protection.md @@ -20,7 +20,7 @@ ms.date: 09/03/2018 # Overview of Secure score in Windows Defender Security Center **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) The Secure score dashboard expands your visibility into the overall security posture of your organization. From this dashboard, you'll be able to quickly assess the security posture of your organization, see machines that require attention, as well as recommendations for actions to further reduce the attack surface in your organization - all in one place. From there you can take action based on the recommended configuration baselines. diff --git a/windows/security/threat-protection/windows-defender-atp/overview.md b/windows/security/threat-protection/windows-defender-atp/overview.md index 90ad7887df..f9989d69f7 100644 --- a/windows/security/threat-protection/windows-defender-atp/overview.md +++ b/windows/security/threat-protection/windows-defender-atp/overview.md @@ -21,7 +21,7 @@ ms.date: 11/20/2018 # Overview of Windows Defender ATP capabilities **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Understand the concepts behind the capabilities in Windows Defender ATP so you take full advantage of the complete threat protection platform. diff --git a/windows/security/threat-protection/windows-defender-atp/portal-overview-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/portal-overview-windows-defender-advanced-threat-protection.md index b32528daaa..05d103da75 100644 --- a/windows/security/threat-protection/windows-defender-atp/portal-overview-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/portal-overview-windows-defender-advanced-threat-protection.md @@ -21,7 +21,7 @@ ms.date: 04/24/2018 # Windows Defender Advanced Threat Protection portal overview **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) diff --git a/windows/security/threat-protection/windows-defender-atp/powerbi-reports-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/powerbi-reports-windows-defender-advanced-threat-protection.md index 6c737bf2c1..faa5965b72 100644 --- a/windows/security/threat-protection/windows-defender-atp/powerbi-reports-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/powerbi-reports-windows-defender-advanced-threat-protection.md @@ -21,7 +21,7 @@ ms.date: 11/26/2018 # Create and build Power BI reports using Windows Defender ATP data **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) [!include[Prerelease information](prerelease.md)] diff --git a/windows/security/threat-protection/windows-defender-atp/powershell-example-code-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/powershell-example-code-windows-defender-advanced-threat-protection.md index 406846d961..4a47170925 100644 --- a/windows/security/threat-protection/windows-defender-atp/powershell-example-code-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/powershell-example-code-windows-defender-advanced-threat-protection.md @@ -21,7 +21,7 @@ ms.date: 04/24/2018 # PowerShell code examples for the custom threat intelligence API **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) diff --git a/windows/security/threat-protection/windows-defender-atp/preferences-setup-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/preferences-setup-windows-defender-advanced-threat-protection.md index 980babf64a..91b8900c14 100644 --- a/windows/security/threat-protection/windows-defender-atp/preferences-setup-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/preferences-setup-windows-defender-advanced-threat-protection.md @@ -20,7 +20,7 @@ ms.date: 04/24/2018 # Configure Windows Defender Security Center settings **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) >Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-prefsettings-abovefoldlink) diff --git a/windows/security/threat-protection/windows-defender-atp/preview-settings-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/preview-settings-windows-defender-advanced-threat-protection.md index 7095ae73d1..66f745bb56 100644 --- a/windows/security/threat-protection/windows-defender-atp/preview-settings-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/preview-settings-windows-defender-advanced-threat-protection.md @@ -20,7 +20,7 @@ ms.date: 04/24/2018 # Turn on the preview experience in Windows Defender ATP **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) diff --git a/windows/security/threat-protection/windows-defender-atp/preview-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/preview-windows-defender-advanced-threat-protection.md index b20c0b27fa..934fbed168 100644 --- a/windows/security/threat-protection/windows-defender-atp/preview-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/preview-windows-defender-advanced-threat-protection.md @@ -20,7 +20,7 @@ ms.topic: conceptual # Windows Defender ATP preview features **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) diff --git a/windows/security/threat-protection/windows-defender-atp/pull-alerts-using-rest-api-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/pull-alerts-using-rest-api-windows-defender-advanced-threat-protection.md index e33cf0d910..a29f67c9e1 100644 --- a/windows/security/threat-protection/windows-defender-atp/pull-alerts-using-rest-api-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/pull-alerts-using-rest-api-windows-defender-advanced-threat-protection.md @@ -20,7 +20,7 @@ ms.topic: article # Pull Windows Defender ATP alerts using REST API **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) diff --git a/windows/security/threat-protection/windows-defender-atp/python-example-code-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/python-example-code-windows-defender-advanced-threat-protection.md index 01a648cb4f..f4b63ae583 100644 --- a/windows/security/threat-protection/windows-defender-atp/python-example-code-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/python-example-code-windows-defender-advanced-threat-protection.md @@ -23,7 +23,7 @@ ms.date: 04/24/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) diff --git a/windows/security/threat-protection/windows-defender-atp/rbac-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/rbac-windows-defender-advanced-threat-protection.md index f2c279e739..8446e86a04 100644 --- a/windows/security/threat-protection/windows-defender-atp/rbac-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/rbac-windows-defender-advanced-threat-protection.md @@ -22,7 +22,7 @@ ms.date: 05/08/2018 **Applies to:** - Azure Active Directory - Office 365 -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) >Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-rbac-abovefoldlink) diff --git a/windows/security/threat-protection/windows-defender-atp/respond-file-alerts-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/respond-file-alerts-windows-defender-advanced-threat-protection.md index 8f7a09142a..5334c052ed 100644 --- a/windows/security/threat-protection/windows-defender-atp/respond-file-alerts-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/respond-file-alerts-windows-defender-advanced-threat-protection.md @@ -21,7 +21,7 @@ ms.date: 04/24/2018 # Take response actions on a file **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) diff --git a/windows/security/threat-protection/windows-defender-atp/respond-machine-alerts-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/respond-machine-alerts-windows-defender-advanced-threat-protection.md index c82e80bdbd..37e946eb11 100644 --- a/windows/security/threat-protection/windows-defender-atp/respond-machine-alerts-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/respond-machine-alerts-windows-defender-advanced-threat-protection.md @@ -21,7 +21,7 @@ ms.date: 11/28/2018 # Take response actions on a machine **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) >Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-respondmachine-abovefoldlink) diff --git a/windows/security/threat-protection/windows-defender-atp/response-actions-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/response-actions-windows-defender-advanced-threat-protection.md index 0c62d93571..6e0c39fbf7 100644 --- a/windows/security/threat-protection/windows-defender-atp/response-actions-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/response-actions-windows-defender-advanced-threat-protection.md @@ -21,7 +21,7 @@ ms.date: 11/12/2017 # Take response actions in Windows Defender ATP **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) diff --git a/windows/security/threat-protection/windows-defender-atp/run-detection-test-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/run-detection-test-windows-defender-advanced-threat-protection.md index ec866e736e..b5d51b9cf4 100644 --- a/windows/security/threat-protection/windows-defender-atp/run-detection-test-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/run-detection-test-windows-defender-advanced-threat-protection.md @@ -26,7 +26,7 @@ ms.date: 09/07/2018 - Windows Server 2016 - Windows Server, version 1803 - Windows Server, 2019 -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Run the following PowerShell script on a newly onboarded machine to verify that it is properly reporting to the Windows Defender ATP service. diff --git a/windows/security/threat-protection/windows-defender-atp/secure-score-dashboard-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/secure-score-dashboard-windows-defender-advanced-threat-protection.md index 2a6ed6838b..d501a0d824 100644 --- a/windows/security/threat-protection/windows-defender-atp/secure-score-dashboard-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/secure-score-dashboard-windows-defender-advanced-threat-protection.md @@ -19,7 +19,7 @@ ms.date: 10/26/2018 # Configure the security controls in Secure score **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Each security control lists recommendations that you can take to increase the security posture of your organization. diff --git a/windows/security/threat-protection/windows-defender-atp/security-operations-dashboard-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/security-operations-dashboard-windows-defender-advanced-threat-protection.md index 7c773ae71b..1c071364b8 100644 --- a/windows/security/threat-protection/windows-defender-atp/security-operations-dashboard-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/security-operations-dashboard-windows-defender-advanced-threat-protection.md @@ -21,7 +21,7 @@ ms.date: 09/04/2018 # Windows Defender Security Center Security operations dashboard **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) >Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-secopsdashboard-abovefoldlink) diff --git a/windows/security/threat-protection/windows-defender-atp/service-status-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/service-status-windows-defender-advanced-threat-protection.md index 9189cf364e..a0ace19060 100644 --- a/windows/security/threat-protection/windows-defender-atp/service-status-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/service-status-windows-defender-advanced-threat-protection.md @@ -21,7 +21,7 @@ ms.date: 04/24/2018 # Check the Windows Defender Advanced Threat Protection service health **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) diff --git a/windows/security/threat-protection/windows-defender-atp/supported-response-apis-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/supported-response-apis-windows-defender-advanced-threat-protection.md index bc06fcaf60..14621034da 100644 --- a/windows/security/threat-protection/windows-defender-atp/supported-response-apis-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/supported-response-apis-windows-defender-advanced-threat-protection.md @@ -21,7 +21,7 @@ ms.date: 12/01/2017 # Supported Windows Defender ATP query APIs **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) >Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-supported-response-apis-abovefoldlink) diff --git a/windows/security/threat-protection/windows-defender-atp/threat-analytics-dashboard-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/threat-analytics-dashboard-windows-defender-advanced-threat-protection.md index bbcdcee3cf..225465fee0 100644 --- a/windows/security/threat-protection/windows-defender-atp/threat-analytics-dashboard-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/threat-analytics-dashboard-windows-defender-advanced-threat-protection.md @@ -20,7 +20,7 @@ ms.date: 09/03/2018 # Threat analytics for Spectre and Meltdown **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) The **Threat analytics** dashboard provides insight on how emerging threats affect your organization. It provides information that's specific for your organization. diff --git a/windows/security/threat-protection/windows-defender-atp/threat-analytics.md b/windows/security/threat-protection/windows-defender-atp/threat-analytics.md index a4669b615e..9a145edebb 100644 --- a/windows/security/threat-protection/windows-defender-atp/threat-analytics.md +++ b/windows/security/threat-protection/windows-defender-atp/threat-analytics.md @@ -20,7 +20,7 @@ ms.date: 10/29/2018 # Threat analytics **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Cyberthreats are emerging more frequently and prevalently. It is critical for organizations to be able to quickly assess their security posture, including impact, and organizational resilience in the context of specific emerging threats. diff --git a/windows/security/threat-protection/windows-defender-atp/threat-indicator-concepts-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/threat-indicator-concepts-windows-defender-advanced-threat-protection.md index c5f352e0ed..005f30d3e8 100644 --- a/windows/security/threat-protection/windows-defender-atp/threat-indicator-concepts-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/threat-indicator-concepts-windows-defender-advanced-threat-protection.md @@ -20,7 +20,7 @@ ms.topic: conceptual # Understand threat intelligence concepts **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) diff --git a/windows/security/threat-protection/windows-defender-atp/threat-protection-integration.md b/windows/security/threat-protection/windows-defender-atp/threat-protection-integration.md index 0791b9b679..026ac5e02d 100644 --- a/windows/security/threat-protection/windows-defender-atp/threat-protection-integration.md +++ b/windows/security/threat-protection/windows-defender-atp/threat-protection-integration.md @@ -22,7 +22,7 @@ ms.date: 12/03/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Windows Defender ATP is part of the Microsoft Threat Protection solution that helps implement end-to-end security across possible attack surfaces in the modern workplace. diff --git a/windows/security/threat-protection/windows-defender-atp/threat-protection-reports-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/threat-protection-reports-windows-defender-advanced-threat-protection.md index 6c4e812aaa..d6abe5f327 100644 --- a/windows/security/threat-protection/windows-defender-atp/threat-protection-reports-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/threat-protection-reports-windows-defender-advanced-threat-protection.md @@ -20,7 +20,7 @@ ms.topic: article # Threat protection report in Windows Defender ATP **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) [!include[Prerelease information](prerelease.md)] diff --git a/windows/security/threat-protection/windows-defender-atp/time-settings-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/time-settings-windows-defender-advanced-threat-protection.md index 9fb06adc92..0a8c046f35 100644 --- a/windows/security/threat-protection/windows-defender-atp/time-settings-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/time-settings-windows-defender-advanced-threat-protection.md @@ -21,7 +21,7 @@ ms.date: 02/13/2018 # Windows Defender Security Center time zone settings **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) diff --git a/windows/security/threat-protection/windows-defender-atp/troubleshoot-custom-ti-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/troubleshoot-custom-ti-windows-defender-advanced-threat-protection.md index 89c8c201fd..500048787b 100644 --- a/windows/security/threat-protection/windows-defender-atp/troubleshoot-custom-ti-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/troubleshoot-custom-ti-windows-defender-advanced-threat-protection.md @@ -23,7 +23,7 @@ ms.date: 06/25/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) diff --git a/windows/security/threat-protection/windows-defender-atp/troubleshoot-onboarding-error-messages-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/troubleshoot-onboarding-error-messages-windows-defender-advanced-threat-protection.md index 1c8f25ea55..3f520e22f4 100644 --- a/windows/security/threat-protection/windows-defender-atp/troubleshoot-onboarding-error-messages-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/troubleshoot-onboarding-error-messages-windows-defender-advanced-threat-protection.md @@ -23,7 +23,7 @@ ms.date: 08/01/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) >Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-troublshootonboarding-abovefoldlink) diff --git a/windows/security/threat-protection/windows-defender-atp/troubleshoot-onboarding-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/troubleshoot-onboarding-windows-defender-advanced-threat-protection.md index 82e4b1c6f7..18107685ed 100644 --- a/windows/security/threat-protection/windows-defender-atp/troubleshoot-onboarding-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/troubleshoot-onboarding-windows-defender-advanced-threat-protection.md @@ -21,7 +21,7 @@ ms.date: 09/07/2018 # Troubleshoot Windows Defender Advanced Threat Protection onboarding issues **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) - Windows Server 2012 R2 - Windows Server 2016 diff --git a/windows/security/threat-protection/windows-defender-atp/troubleshoot-siem-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/troubleshoot-siem-windows-defender-advanced-threat-protection.md index e652ed98c1..a3097cd460 100644 --- a/windows/security/threat-protection/windows-defender-atp/troubleshoot-siem-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/troubleshoot-siem-windows-defender-advanced-threat-protection.md @@ -21,7 +21,7 @@ ms.date: 11/08/2018 # Troubleshoot SIEM tool integration issues **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) diff --git a/windows/security/threat-protection/windows-defender-atp/use-custom-ti-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/use-custom-ti-windows-defender-advanced-threat-protection.md index ad0f8cbfec..a5bf6b10dc 100644 --- a/windows/security/threat-protection/windows-defender-atp/use-custom-ti-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/use-custom-ti-windows-defender-advanced-threat-protection.md @@ -21,7 +21,7 @@ ms.date: 04/24/2018 # Use the threat intelligence API to create custom alerts **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) diff --git a/windows/security/threat-protection/windows-defender-atp/use-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/use-windows-defender-advanced-threat-protection.md index ac8f1799c4..07291b3a48 100644 --- a/windows/security/threat-protection/windows-defender-atp/use-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/use-windows-defender-advanced-threat-protection.md @@ -22,7 +22,7 @@ ms.date: 03/12/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) >Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-usewdatp-abovefoldlink) diff --git a/windows/security/threat-protection/windows-defender-atp/user-roles-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/user-roles-windows-defender-advanced-threat-protection.md index 89ee51ebff..ab60042a21 100644 --- a/windows/security/threat-protection/windows-defender-atp/user-roles-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/user-roles-windows-defender-advanced-threat-protection.md @@ -20,7 +20,7 @@ ms.topic: article # Create and manage roles for role-based access control **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) >Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-roles-abovefoldlink) diff --git a/windows/security/threat-protection/windows-defender-atp/view-incidents-queue.md b/windows/security/threat-protection/windows-defender-atp/view-incidents-queue.md index e4a0548379..5f6903dad8 100644 --- a/windows/security/threat-protection/windows-defender-atp/view-incidents-queue.md +++ b/windows/security/threat-protection/windows-defender-atp/view-incidents-queue.md @@ -20,7 +20,7 @@ ms.date: 10/08/2018 # View and organize the Windows Defender Advanced Threat Protection Incidents queue **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) The **Incidents queue** shows a collection of incidents that were flagged from machines in your network. It helps you sort through incidents to prioritize and create an informed cybersecurity response decision. diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard.md b/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard.md index 9e37c6fe7d..653d7f2a5e 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard.md @@ -17,7 +17,7 @@ ms.author: v-anbic **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Attack surface reduction rules help prevent behaviors malware often uses to infect computers with malicious code. You can set attack surface reduction rules for computers running Windows 10, version 1709 or later, Windows Server 2016 1803 or later, or Windows Server 2019. diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/audit-windows-defender-exploit-guard.md b/windows/security/threat-protection/windows-defender-exploit-guard/audit-windows-defender-exploit-guard.md index a17ef04dd9..13222c4b4d 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/audit-windows-defender-exploit-guard.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/audit-windows-defender-exploit-guard.md @@ -19,7 +19,7 @@ ms.date: 09/18/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) You can enable attack surface reduction rules, exploit protection, network protection, and controlled folder access in audit mode. This lets you see a record of what *would* have happened if you had enabled the feature. diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/collect-cab-files-exploit-guard-submission.md b/windows/security/threat-protection/windows-defender-exploit-guard/collect-cab-files-exploit-guard-submission.md index 9448ed601f..2906976656 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/collect-cab-files-exploit-guard-submission.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/collect-cab-files-exploit-guard-submission.md @@ -18,7 +18,7 @@ ms.date: 08/08/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) This topic describes how to collect diagnostic data that can be used by Microsoft support and engineering teams to help troubleshoot issues you may encounter when using attack surface reduction rules, network protection, exploit protection, and controlled folder access. diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/controlled-folders-exploit-guard.md b/windows/security/threat-protection/windows-defender-exploit-guard/controlled-folders-exploit-guard.md index 68bff70bd4..77098d4c10 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/controlled-folders-exploit-guard.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/controlled-folders-exploit-guard.md @@ -18,7 +18,7 @@ ms.date: 11/29/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Controlled folder access helps you protect valuable data from malicious apps and threats, such as ransomware. Controlled folder access is supported on Windows Server 2019 as well as Windows 10 clients. Controlled folder access works best with [Windows Defender Advanced Threat Protection](../windows-defender-atp/windows-defender-advanced-threat-protection.md), which gives you detailed reporting into controlled folder access events and blocks as part of the usual [alert investigation scenarios](../windows-defender-atp/investigate-alerts-windows-defender-advanced-threat-protection.md). diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/customize-attack-surface-reduction.md b/windows/security/threat-protection/windows-defender-exploit-guard/customize-attack-surface-reduction.md index 2b00cbb179..b772be4c4c 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/customize-attack-surface-reduction.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/customize-attack-surface-reduction.md @@ -18,7 +18,7 @@ ms.date: 12/19/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Attack surface reduction rules help prevent actions and apps that are typically used by exploit-seeking malware to infect machines. Attack surface reduction rules are supported on Windows Server 2019 as well as Windows 10 clients. diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/customize-controlled-folders-exploit-guard.md b/windows/security/threat-protection/windows-defender-exploit-guard/customize-controlled-folders-exploit-guard.md index 314c5610e2..05037553e3 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/customize-controlled-folders-exploit-guard.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/customize-controlled-folders-exploit-guard.md @@ -17,7 +17,7 @@ ms.author: v-anbic **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Controlled folder access helps you protect valuable data from malicious apps and threats, such as ransomware. Controlled folder access is supported on Windows Server 2019 as well as Windows 10 clients. diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/customize-exploit-protection.md b/windows/security/threat-protection/windows-defender-exploit-guard/customize-exploit-protection.md index 2ad55e0a66..ce3d7cb53f 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/customize-exploit-protection.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/customize-exploit-protection.md @@ -18,7 +18,7 @@ ms.date: 11/16/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Exploit protection automatically applies a number of exploit mitigation techniques on both the operating system processes and on individual apps. diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/emet-exploit-protection-exploit-guard.md b/windows/security/threat-protection/windows-defender-exploit-guard/emet-exploit-protection-exploit-guard.md index 3b65d090e5..843e0e7f4c 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/emet-exploit-protection-exploit-guard.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/emet-exploit-protection-exploit-guard.md @@ -18,7 +18,7 @@ ms.date: 08/08/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) >[!IMPORTANT] >If you are currently using EMET, you should be aware that [EMET reached end of life on July 31, 2018](https://blogs.technet.microsoft.com/srd/2016/11/03/beyond-emet/). You should consider replacing EMET with exploit protection in Windows Defender ATP. diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/enable-controlled-folders-exploit-guard.md b/windows/security/threat-protection/windows-defender-exploit-guard/enable-controlled-folders-exploit-guard.md index e78c2f8644..8d9f86a947 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/enable-controlled-folders-exploit-guard.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/enable-controlled-folders-exploit-guard.md @@ -17,7 +17,7 @@ ms.author: v-anbic **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) [Controlled folder access](controlled-folders-exploit-guard.md) helps you protect valuable data from malicious apps and threats, such as ransomware. It is part of [Windows Defender Exploit Guard](windows-defender-exploit-guard.md). Controlled folder access is supported on Windows Server 2019 as well as Windows 10 clients. diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/enable-exploit-protection.md b/windows/security/threat-protection/windows-defender-exploit-guard/enable-exploit-protection.md index 69d9054c81..2349416c84 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/enable-exploit-protection.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/enable-exploit-protection.md @@ -18,7 +18,7 @@ ms.date: 02/14/2019 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) [Exploit protection](exploit-protection-exploit-guard.md) helps protect against malware that uses exploits to infect devices and spread. It consists of a number of mitigations that can be applied to either the operating system or individual apps. diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/enable-network-protection.md b/windows/security/threat-protection/windows-defender-exploit-guard/enable-network-protection.md index ee0f20632d..d07a56a851 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/enable-network-protection.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/enable-network-protection.md @@ -18,7 +18,7 @@ ms.date: 02/14/2019 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) [Network protection](network-protection-exploit-guard.md) helps to prevent employees from using any application to access dangerous domains that may host phishing scams, exploits, and other malicious content on the Internet. diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/enable-virtualization-based-protection-of-code-integrity.md b/windows/security/threat-protection/windows-defender-exploit-guard/enable-virtualization-based-protection-of-code-integrity.md index 7328140fee..eba904da4b 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/enable-virtualization-based-protection-of-code-integrity.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/enable-virtualization-based-protection-of-code-integrity.md @@ -17,7 +17,7 @@ ms.date: 11/15/2018 **Applies to** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) This topic covers different ways to enable Hypervisor-protected code integrity (HVCI) on Windows 10. Some applications, including device drivers, may be incompatible with HVCI. diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-attack-surface-reduction.md b/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-attack-surface-reduction.md index 290fbdaae4..5e3d8457aa 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-attack-surface-reduction.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-attack-surface-reduction.md @@ -18,7 +18,7 @@ ms.date: 11/16/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Attack surface reduction rules help prevent actions and apps that are typically used by exploit-seeking malware to infect machines. Attack surface reduction rules are supported on Windows Server 2019 as well as Windows 10 clients. diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-controlled-folder-access.md b/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-controlled-folder-access.md index 3357f3a4fc..a34952ae85 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-controlled-folder-access.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-controlled-folder-access.md @@ -18,7 +18,7 @@ ms.date: 11/16/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) [Controlled folder access](controlled-folders-exploit-guard.md) is a feature that helps protect your documents and files from modification by suspicious or malicious apps. Controlled folder access is supported on Windows Server 2019 as well as Windows 10 clients. diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-exploit-protection.md b/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-exploit-protection.md index ec8690b50d..f1870b1c48 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-exploit-protection.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-exploit-protection.md @@ -18,7 +18,7 @@ ms.date: 11/16/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Exploit protection applies helps protect devices from malware that use exploits to spread and infect. It consists of a number of mitigations that can be applied at either the operating system level, or at the individual app level. diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-network-protection.md b/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-network-protection.md index 9c5516c1de..d0db5aa5a4 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-network-protection.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-network-protection.md @@ -18,7 +18,7 @@ ms.date: 11/16/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Network protection helps prevent employees from using any application to access dangerous domains that may host phishing scams, exploits, and other malicious content on the Internet. diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/event-views-exploit-guard.md b/windows/security/threat-protection/windows-defender-exploit-guard/event-views-exploit-guard.md index fc9d4153fb..7f7c825798 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/event-views-exploit-guard.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/event-views-exploit-guard.md @@ -19,7 +19,7 @@ ms.date: 08/08/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) You can review attack surface reduction events in Event Viewer. This is useful so you can monitor what rules or settings are working, and determine if any settings are too "noisy" or impacting your day to day workflow. diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/exploit-protection-exploit-guard.md b/windows/security/threat-protection/windows-defender-exploit-guard/exploit-protection-exploit-guard.md index e84b78a8a0..41018cb2ea 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/exploit-protection-exploit-guard.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/exploit-protection-exploit-guard.md @@ -18,7 +18,7 @@ ms.date: 11/29/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Exploit protection automatically applies a number of exploit mitigation techniques on both the operating system processes and on individual apps. diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/import-export-exploit-protection-emet-xml.md b/windows/security/threat-protection/windows-defender-exploit-guard/import-export-exploit-protection-emet-xml.md index 99eb36540f..1be2ff6cb2 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/import-export-exploit-protection-emet-xml.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/import-export-exploit-protection-emet-xml.md @@ -18,7 +18,7 @@ ms.date: 04/30/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Exploit protection applies helps protect devices from malware that use exploits to spread and infect. It consists of a number of mitigations that can be applied at either the operating system level, or at the individual app level. diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/memory-integrity.md b/windows/security/threat-protection/windows-defender-exploit-guard/memory-integrity.md index 11ff56a123..aed6d58094 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/memory-integrity.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/memory-integrity.md @@ -18,7 +18,7 @@ ms.date: 08/09/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Memory integrity is a powerful system mitigation that leverages hardware virtualization and the Windows Hyper-V hypervisor to protect Windows kernel-mode processes against the injection and execution of malicious or unverified code. Code integrity validation is performed in a secure environment that is resistant to attack from malicious software, and page permissions for kernel mode are set and maintained by the Hyper-V hypervisor. Memory integrity helps block many types of malware from running on computers that run Windows 10 and Windows Server 2016. diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/network-protection-exploit-guard.md b/windows/security/threat-protection/windows-defender-exploit-guard/network-protection-exploit-guard.md index 78f14e5a59..08ee562873 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/network-protection-exploit-guard.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/network-protection-exploit-guard.md @@ -18,7 +18,7 @@ ms.date: 02/14/2019 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Network protection helps reduce the attack surface of your devices from Internet-based events. It prevents employees from using any application to access dangerous domains that may host phishing scams, exploits, and other malicious content on the Internet. diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/requirements-and-deployment-planning-guidelines-for-virtualization-based-protection-of-code-integrity.md b/windows/security/threat-protection/windows-defender-exploit-guard/requirements-and-deployment-planning-guidelines-for-virtualization-based-protection-of-code-integrity.md index c803573a3f..514a74a4ea 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/requirements-and-deployment-planning-guidelines-for-virtualization-based-protection-of-code-integrity.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/requirements-and-deployment-planning-guidelines-for-virtualization-based-protection-of-code-integrity.md @@ -17,7 +17,7 @@ ms.date: 10/20/2017 **Applies to** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Computers must meet certain hardware, firmware, and software requirements in order to take adavantage of all of the virtualization-based security (VBS) features in [Windows Defender Device Guard](../device-guard/introduction-to-device-guard-virtualization-based-security-and-windows-defender-application-control.md). Computers lacking these requirements can still be protected by Windows Defender Application Control (WDAC) policies—the difference is that those computers will not be as hardened against certain threats. diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/troubleshoot-asr.md b/windows/security/threat-protection/windows-defender-exploit-guard/troubleshoot-asr.md index 46df2bf21d..524e3cc666 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/troubleshoot-asr.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/troubleshoot-asr.md @@ -17,7 +17,7 @@ ms.author: v-anbic **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) When you use [attack surface reduction rules](attack-surface-reduction-exploit-guard.md) you may encounter issues, such as: diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/troubleshoot-exploit-protection-mitigations.md b/windows/security/threat-protection/windows-defender-exploit-guard/troubleshoot-exploit-protection-mitigations.md index ede76cf20a..7820eac52f 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/troubleshoot-exploit-protection-mitigations.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/troubleshoot-exploit-protection-mitigations.md @@ -18,7 +18,7 @@ ms.date: 08/09/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) When you create a set of exploit protection mitigations (known as a configuration), you might find that the configuration export and import process does not remove all unwanted mitigations. diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/troubleshoot-np.md b/windows/security/threat-protection/windows-defender-exploit-guard/troubleshoot-np.md index b091e01721..f7a384b615 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/troubleshoot-np.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/troubleshoot-np.md @@ -18,7 +18,7 @@ ms.date: 08/09/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) - IT administrators diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/windows-defender-exploit-guard.md b/windows/security/threat-protection/windows-defender-exploit-guard/windows-defender-exploit-guard.md index bdf4311dfe..74f7688832 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/windows-defender-exploit-guard.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/windows-defender-exploit-guard.md @@ -18,7 +18,7 @@ ms.date: 08/09/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Windows Defender Exploit Guard (Windows Defender EG) is a new set of host intrusion prevention capabilities for Windows 10, allowing you to manage and reduce the attack surface of apps used by your employees. From fc9d489863a5bce66af5c432b9f60f2732366276 Mon Sep 17 00:00:00 2001 From: Peter Bright Date: Mon, 11 Mar 2019 16:57:02 -0400 Subject: [PATCH 13/25] Fix the table Markdown tables seem very fragile. Something was upsetting this one. --- .../bitlocker/bcd-settings-and-bitlocker.md | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/windows/security/information-protection/bitlocker/bcd-settings-and-bitlocker.md b/windows/security/information-protection/bitlocker/bcd-settings-and-bitlocker.md index 85e8c40982..fb5a32c9ae 100644 --- a/windows/security/information-protection/bitlocker/bcd-settings-and-bitlocker.md +++ b/windows/security/information-protection/bitlocker/bcd-settings-and-bitlocker.md @@ -105,12 +105,12 @@ The following table contains the default BCD validation profile used by BitLocke This following is a full list of BCD settings with friendly names which are ignored by default. These settings are not part of the default BitLocker validation profile, but can be added if you see a need to validate any of these settings before allowing a BitLocker–protected operating system drive to be unlocked. > **Note:**  Additional BCD settings exist that have hex values but do not have friendly names. These settings are not included in this list. -  + | Hex Value | Prefix | Friendly Name | | - | - | - | -| 0x12000004 | all| description| -| 0x12000005| all| locale| -| 0x12000016| all| targetname| +| 0x12000004 | all | description | +| 0x12000005 | all | locale | +| 0x12000016 | all | targetname | | 0x12000019| all| busparams| | 0x1200001d| all| key| | 0x1200004a| all| fontpath| @@ -182,7 +182,7 @@ This following is a full list of BCD settings with friendly names which are igno | 0x25000061 | winload| numproc| | 0x25000063 | winload| configflags| | 0x25000066| winload| groupsize| -| 0x25000071 | winload| msi| +| 0x25000071 | winload| msi| | 0x25000072 | winload| pciexpress| | 0x25000080 | winload| safeboot| | 0x250000a6 | winload| tscsyncpolicy| From 3b6bde3e318ae47680d1ec56bd3ebea743528ad1 Mon Sep 17 00:00:00 2001 From: Jim Fox Date: Mon, 11 Mar 2019 14:02:26 -0700 Subject: [PATCH 14/25] Fix typ in how-wip-works-with-labels.md "Regardless" --- .../windows-information-protection/how-wip-works-with-labels.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/information-protection/windows-information-protection/how-wip-works-with-labels.md b/windows/security/information-protection/windows-information-protection/how-wip-works-with-labels.md index 3b2125c461..bcad37a020 100644 --- a/windows/security/information-protection/windows-information-protection/how-wip-works-with-labels.md +++ b/windows/security/information-protection/windows-information-protection/how-wip-works-with-labels.md @@ -63,7 +63,7 @@ This section covers how WIP works with sensitivity labels in specific use cases. ### User downloads from or creates a document on a work site -If WIP policy is deployed, any document that is downloaded from a work site, or created on a work site, will have WIP protection regradless of whether the document has a sensitivity label. +If WIP policy is deployed, any document that is downloaded from a work site, or created on a work site, will have WIP protection regardless of whether the document has a sensitivity label. If the document also has a sensitivity label, which can be Office or PDF files, WIP protection is applied according to the label. From 68fc5cb5e04915b6805fc34f08d3cb9e010fefe4 Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Mon, 11 Mar 2019 22:18:53 +0000 Subject: [PATCH 15/25] Updated data-storage-privacy-windows-defender-advanced-threat-protection.md --- ...rivacy-windows-defender-advanced-threat-protection.md | 9 ++++++--- 1 file changed, 6 insertions(+), 3 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-atp/data-storage-privacy-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/data-storage-privacy-windows-defender-advanced-threat-protection.md index 32a1c3afe9..67780a3f78 100644 --- a/windows/security/threat-protection/windows-defender-atp/data-storage-privacy-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/data-storage-privacy-windows-defender-advanced-threat-protection.md @@ -15,13 +15,12 @@ manager: dansimp audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual -ms.date: 09/07/2018 --- # Windows Defender ATP data storage and privacy **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) @@ -55,7 +54,7 @@ In all scenarios, data is encrypted using 256-bit [AES encyption](https://en.wik ## Do I have the flexibility to select where to store my data? -When onboarding the service for the first time, you can choose to store your data in Microsoft Azure datacenters in the European Union, the United Kingdom, or the United States. Once configured, you cannot change the location where your data is stored. This provides a convenient way to minimize compliance risk by actively selecting the geographic locations where your data will reside. Customer data in pseudonymized form may also be stored in the central storage and processing systems in the United States. +When onboarding the service for the first time, you can choose to store your data in Microsoft Azure datacenters in the European Union, the United Kingdom, or the United States, or dedicated Azure Government data centers (soon to be in preview). Once configured, you cannot change the location where your data is stored. This provides a convenient way to minimize compliance risk by actively selecting the geographic locations where your data will reside. Customer data in pseudonymized form may also be stored in the central storage and processing systems in the United States. ## Is my data isolated from other customer data? Yes, your data is isolated through access authentication and logical segregation based on customer identifier. Each customer can only access data collected from its own organization and generic data that Microsoft provides. @@ -70,6 +69,9 @@ Microsoft developers and administrators have, by design, been given sufficient p Additionally, Microsoft conducts background verification checks of certain operations personnel, and limits access to applications, systems, and network infrastructure in proportion to the level of background verification. Operations personnel follow a formal process when they are required to access a customer’s account or related information in the performance of their duties. +Access to data for services deployed in Microsoft Azure Government data centers is only granted to operating personnel who have been screened and approved to handle data that is subject to certain government regulations and requirements, such as FedRAMP, NIST 800.171 (DIB), ITAR, IRS 1075, DoD L4, and CJIS. + + ## Is data shared with other customers? No. Customer data is isolated from other customers and is not shared. However, insights on the data resulting from Microsoft processing, and which don’t contain any customer specific data, might be shared with other customers. Each customer can only access data collected from its own organization and generic data that Microsoft provides. @@ -84,6 +86,7 @@ Your data will be kept and will be available to you while the licence is under g ## Can Microsoft help us maintain regulatory compliance? Microsoft provides customers with detailed information about Microsoft's security and compliance programs, including audit reports and compliance packages, to help customers assess Windows Defender ATP services against their own legal and regulatory requirements. Windows Defender ATP is ISO 27001 certified and has a roadmap for obtaining national, regional and industry-specific certifications. +Windows Defender ATP for Government (soon to be in preview) is currently undergoing audit for achieving FedRAMP High accreditation as well as Provisional Authorization (PA) at Impact Levels 4 and 5. By providing customers with compliant, independently-verified services, Microsoft makes it easier for customers to achieve compliance for the infrastructure and applications they run. From c591c8ffeabf32fc31203225f3fc3786c9e27447 Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Mon, 11 Mar 2019 15:31:10 -0700 Subject: [PATCH 16/25] made second pointer false --- .openpublishing.redirection.json | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/.openpublishing.redirection.json b/.openpublishing.redirection.json index 7d3a0ff26f..8f3ea8a965 100644 --- a/.openpublishing.redirection.json +++ b/.openpublishing.redirection.json @@ -13,7 +13,7 @@ { "source_path": "windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune.md", "redirect_url": "/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure", -"redirect_document_id": true +"redirect_document_id": false }, { "source_path": "windows/security/information-protection/windows-information-protection/deploy-wip-policy-using-intune.md", From b20d4a57fbbee92b700467e3d638b01a9c302066 Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Mon, 11 Mar 2019 22:31:50 +0000 Subject: [PATCH 17/25] Merged PR 14761: Update TOC Remove Win mobile legacy link, promote arch poster link --- windows/deployment/TOC.md | 7 ++----- 1 file changed, 2 insertions(+), 5 deletions(-) diff --git a/windows/deployment/TOC.md b/windows/deployment/TOC.md index 13cf82c872..ae6dfa473a 100644 --- a/windows/deployment/TOC.md +++ b/windows/deployment/TOC.md @@ -1,4 +1,5 @@ # [Deploy and update Windows 10](https://docs.microsoft.com/windows/deployment) +## [Architectural planning posters for Windows 10](windows-10-architecture-posters.md) ## [Deploy Windows 10 with Microsoft 365](deploy-m365.md) ## [What's new in Windows 10 deployment](deploy-whats-new.md) ## [Windows 10 deployment scenarios](windows-10-deployment-scenarios.md) @@ -278,8 +279,4 @@ #### [Get started with Device Health](update/device-health-get-started.md) #### [Using Device Health](update/device-health-using.md) ### [Enrolling devices in Windows Analytics](update/windows-analytics-get-started.md) -### [Troubleshooting Windows Analytics and FAQ](update/windows-analytics-FAQ-troubleshooting.md) - -## [Upgrade a Windows Phone 8.1 to Windows 10 Mobile with Mobile Device Management](upgrade/upgrade-windows-phone-8-1-to-10.md) - -## [Architectural planning posters for Windows 10](windows-10-architecture-posters.md) \ No newline at end of file +### [Troubleshooting Windows Analytics and FAQ](update/windows-analytics-FAQ-troubleshooting.md) \ No newline at end of file From 6bdded3cb2643847f0a3acc4a8942ff1cf0ffe87 Mon Sep 17 00:00:00 2001 From: Beth Levin Date: Mon, 11 Mar 2019 15:57:57 -0700 Subject: [PATCH 18/25] updated loc priority --- .../intelligence/top-scoring-industry-antivirus-tests.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/intelligence/top-scoring-industry-antivirus-tests.md b/windows/security/threat-protection/intelligence/top-scoring-industry-antivirus-tests.md index dc8c81098f..4854c2e53f 100644 --- a/windows/security/threat-protection/intelligence/top-scoring-industry-antivirus-tests.md +++ b/windows/security/threat-protection/intelligence/top-scoring-industry-antivirus-tests.md @@ -5,7 +5,7 @@ keywords: security, malware, av-comparatives, av-test, av, antivirus, windows, d ms.prod: w10 ms.mktglfcycl: secure ms.sitesec: library -ms.localizationpriority: medium +ms.localizationpriority: high ms.author: ellevin author: levinec manager: dansimp From 19498c665560c77117eb7993aae808cc5bea2937 Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Mon, 11 Mar 2019 16:09:40 -0700 Subject: [PATCH 19/25] fixed toc --- windows/security/information-protection/TOC.md | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/windows/security/information-protection/TOC.md b/windows/security/information-protection/TOC.md index 5db0c16a9a..f6f4fac5a3 100644 --- a/windows/security/information-protection/TOC.md +++ b/windows/security/information-protection/TOC.md @@ -34,7 +34,8 @@ #### [Create a WIP policy with MDM using the Azure portal for Microsoft Intune](windows-information-protection\create-wip-policy-using-intune-azure.md) ##### [Deploy your WIP policy using the Azure portal for Microsoft Intune](windows-information-protection\deploy-wip-policy-using-intune-azure.md) ##### [Associate and deploy a VPN policy for WIP using the Azure portal for Microsoft Intune](windows-information-protection\create-vpn-and-wip-policy-using-intune-azure.md) -#### [Create a WIP policy with MAM using the Azure portal for Microsoft Intune](windows-information-protection\create-wip-policy-using-mam-intune-azure.md) +#### [Create and verify an EFS Data Recovery Agent (DRA) certificate](windows-information-protection\create-and-verify-an-efs-dra-certificate.md) +#### [Determine the Enterprise Context of an app running in WIP](windows-information-protection\wip-app-enterprise-context.md) ### [Create a WIP policy using System Center Configuration Manager](windows-information-protection\overview-create-wip-policy-sccm.md) #### [Create and deploy a WIP policy using System Center Configuration Manager](windows-information-protection\create-wip-policy-using-sccm.md) #### [Create and verify an EFS Data Recovery Agent (DRA) certificate](windows-information-protection\create-and-verify-an-efs-dra-certificate.md) From abc900b07ddef92cfb51dc026a7e44add4d2318e Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Mon, 11 Mar 2019 16:17:56 -0700 Subject: [PATCH 20/25] edits --- .../create-wip-policy-using-intune-azure.md | 3 +++ 1 file changed, 3 insertions(+) diff --git a/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md b/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md index 309775c588..f2d8314272 100644 --- a/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md +++ b/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md @@ -109,6 +109,9 @@ If you don't know the Store app publisher or product name, you can find them by >The JSON file might also return a `windowsPhoneLegacyId` value for both the **Publisher Name** and **Product Name** boxes. This means that you have an app that’s using a XAP package and that you must set the **Product Name** as `windowsPhoneLegacyId`, and set the **Publisher Name** as `CN=` followed by the `windowsPhoneLegacyId`.

For example:
{
"windowsPhoneLegacyId": "ca05b3ab-f157-450c-8c49-a1f127f5e71d",
}
+ + If you need to add Windows 10 mobile apps that aren't distributed through the Store for Business, you must use the **Windows Device Portal** feature. >**Note**
Your PC and phone must be on the same wireless network. From 489b1520fe2e38651ae65a447fd77410e4917a0f Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Mon, 11 Mar 2019 23:20:25 +0000 Subject: [PATCH 21/25] Updated threat-protection-reports-windows-defender-advanced-threat-protection.md --- ...ion-reports-windows-defender-advanced-threat-protection.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-atp/threat-protection-reports-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/threat-protection-reports-windows-defender-advanced-threat-protection.md index d6abe5f327..71a2b48f0d 100644 --- a/windows/security/threat-protection/windows-defender-atp/threat-protection-reports-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/threat-protection-reports-windows-defender-advanced-threat-protection.md @@ -26,7 +26,7 @@ ms.topic: article The threat protection report provides high-level information about alerts generated in your organization. The report includes trending information showing the detection sources, categories, severities, statuses, classifications, and determinations of alerts across time. -The dashboard is structured into two columns: +The dashboard is structured into two sections: ![Image of the threat protection report](images/atp-threat-protection-reports.png) @@ -43,7 +43,7 @@ By default, the alert trends display alert information from the 30-day period en - 6 months - Custom -While the alerts trends shows trending information alerts, the alert summary shows alert information scoped to 6 months. +While the alerts trends shows trending information alerts, the alert summary shows alert information scoped to the current day. The alert summary allows you to drill down to a particular alert queue with the corresponding filter applied to it. For example, clicking on the EDR bar in the Detection sources card will bring you the alerts queue with results showing only alerts generated from EDR detections. From 1cc4a540a503203e542a85190e4bf2ba5b1bb3e7 Mon Sep 17 00:00:00 2001 From: JasonJiachengZhao <48364192+JasonJiachengZhao@users.noreply.github.com> Date: Mon, 11 Mar 2019 16:28:09 -0700 Subject: [PATCH 22/25] Fixing XML format & example Fixing XML format and replacing string examples with SID examples. --- windows/client-management/mdm/policy-csp-restrictedgroups.md | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/windows/client-management/mdm/policy-csp-restrictedgroups.md b/windows/client-management/mdm/policy-csp-restrictedgroups.md index b3f6a039a4..d744ed476c 100644 --- a/windows/client-management/mdm/policy-csp-restrictedgroups.md +++ b/windows/client-management/mdm/policy-csp-restrictedgroups.md @@ -113,8 +113,7 @@ Here is an example: ``` - - + From 97e4432e199e1c0a2e030164729f9792dc211337 Mon Sep 17 00:00:00 2001 From: Jeanie Decker Date: Tue, 12 Mar 2019 07:14:48 -0700 Subject: [PATCH 23/25] fix provider ID --- windows/deployment/update/windows-analytics-get-started.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/deployment/update/windows-analytics-get-started.md b/windows/deployment/update/windows-analytics-get-started.md index 7f168d2c01..60ddd8b732 100644 --- a/windows/deployment/update/windows-analytics-get-started.md +++ b/windows/deployment/update/windows-analytics-get-started.md @@ -167,7 +167,7 @@ These policies are under Microsoft\Windows\DataCollection: | CommercialDataOptIn (in Windows 7 and Windows 8) | 1 is required for Upgrade Readiness, which is the only solution that runs on Windows 7 or Windows 8. | -You can set these values by using Group Policy (in Computer Configuration > Administrative Templates > Windows Components > Data Collection and Preview Builds) or by using Mobile Device Management (in Provider/MS DM Server/CommercialID). For more information about deployment using MDM, see the [DMClient CSP](https://docs.microsoft.com/windows/client-management/mdm/dmclient-csp) topic in MDM documentation. +You can set these values by using Group Policy (in Computer Configuration > Administrative Templates > Windows Components > Data Collection and Preview Builds) or by using Mobile Device Management (in Provider/*Provider ID*/CommercialID). (If you are using Microsoft Intune, use `MS DM Server` as the provider ID.) For more information about deployment using MDM, see the [DMClient CSP](https://docs.microsoft.com/windows/client-management/mdm/dmclient-csp) topic in MDM documentation. The corresponding preference registry values are available in **HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\DataCollection** and can be configured by the deployment script. If a given setting is configured by both preference registry settings and policy, the policy values will override. However, the **IEDataOptIn** setting is different--you can only set this with the preference registry keys: From c5d8b8fb5fb19eb7740d4ecf5610a2c4af60cffb Mon Sep 17 00:00:00 2001 From: Jeanie Decker Date: Tue, 12 Mar 2019 14:28:05 +0000 Subject: [PATCH 24/25] Merged PR 14774: restore fixes from public PRs 2884 and 2886 that got lost yesterday --- windows/deployment/update/fod-and-lang-packs.md | 6 +++--- windows/deployment/update/windows-update-troubleshooting.md | 1 + 2 files changed, 4 insertions(+), 3 deletions(-) diff --git a/windows/deployment/update/fod-and-lang-packs.md b/windows/deployment/update/fod-and-lang-packs.md index 471cb01382..a87578d48a 100644 --- a/windows/deployment/update/fod-and-lang-packs.md +++ b/windows/deployment/update/fod-and-lang-packs.md @@ -8,16 +8,16 @@ ms.pagetype: article ms.author: elizapo author: lizap ms.localizationpriority: medium -ms.date: 10/18/2018 +ms.date: 03/13/2019 ms.topic: article --- # How to make Features on Demand and language packs available when you're using WSUS/SCCM > Applies to: Windows 10 -As of Windows 10 version 1709, you cannot use Windows Server Update Services (WSUS) to host [Features on Demand](https://docs.microsoft.com/windows-hardware/manufacture/desktop/features-on-demand-v2--capabilities) (FOD) and language packs for Windows 10 clients locally. Instead, you can enforce a Group Policy setting that tells the clients to pull them directly from Windows Update. You can also host FOD and language packs on a network share, but starting with Windows 10 version 1809, language packs can only be installed from Windows Update. +As of Windows 10 version 1709, you cannot use Windows Server Update Services (WSUS) to host [Features on Demand](https://docs.microsoft.com/windows-hardware/manufacture/desktop/features-on-demand-v2--capabilities) (FOD) and language packs for Windows 10 clients locally. Instead, you can enforce a Group Policy setting that tells the clients to pull them directly from Windows Update. You can also host FOD and language packs on a network share, but starting with Windows 10 version 1809, FOD and language packs can only be installed from Windows Update. -For Windows domain environments running WSUS or SCCM, change the **Specify settings for optional component installation and component repair** policy to enable downloading language and FOD packs from Windows Update. This setting is located in `Computer Configuration\Administrative Templates\System` in the Group Policy Editor. +For Windows domain environments running WSUS or SCCM, change the **Specify settings for optional component installation and component repair** policy to enable downloading FOD and language packs from Windows Update. This setting is located in `Computer Configuration\Administrative Templates\System` in the Group Policy Editor. Changing this policy does not affect how other updates are distributed. They continue to come from WSUS or SCCM as you have scheduled them. diff --git a/windows/deployment/update/windows-update-troubleshooting.md b/windows/deployment/update/windows-update-troubleshooting.md index d9a9463b44..5f09b45f16 100644 --- a/windows/deployment/update/windows-update-troubleshooting.md +++ b/windows/deployment/update/windows-update-troubleshooting.md @@ -103,6 +103,7 @@ netsh winhttp set proxy ProxyServerName:PortNumber If downloads through a proxy server fail with a 0x80d05001 DO_E_HTTP_BLOCKSIZE_MISMATCH error, or if you notice high CPU usage while updates are downloading, check the proxy configuration to permit HTTP RANGE requests to run. You may choose to apply a rule to permit HTTP RANGE requests for the following URLs: + *.download.windowsupdate.com *.dl.delivery.mp.microsoft.com *.emdl.ws.microsoft.com From b84087954e7a22bd2ee8a19b29a6f07ae0c7d8a4 Mon Sep 17 00:00:00 2001 From: Jeanie Decker Date: Tue, 12 Mar 2019 14:28:22 +0000 Subject: [PATCH 25/25] Merged PR 14773: update install instructions --- .../volume-activation/images/sql-instance.png | Bin 0 -> 35344 bytes .../volume-activation/images/vamt-db.png | Bin 0 -> 8570 bytes .../volume-activation/install-vamt.md | 48 +++++++++++++----- 3 files changed, 35 insertions(+), 13 deletions(-) create mode 100644 windows/deployment/volume-activation/images/sql-instance.png create mode 100644 windows/deployment/volume-activation/images/vamt-db.png diff --git a/windows/deployment/volume-activation/images/sql-instance.png b/windows/deployment/volume-activation/images/sql-instance.png new file mode 100644 index 0000000000000000000000000000000000000000..379935e01c107a7f76fbc48776497451f5355e15 GIT binary patch literal 35344 zcmb@tV|Zlk6FwN*>Dbo9w#`Y$HYe7^nAo;$OfoSiwrx*rYy17}*S&W4!~a}YcOO(A z)KjOPs=MlrP*IXbM!-h^0|P^rm61>d1A`C)tvA3yfWFK0Bu7C%;4Z4tVqmpXgeRa4 zC`(aAQIJ3!;=3_4XdB*9M%x7p45k0S5BRV{xfvK(M2W0~sM=41i!NwA!qM*fuB$h{ zC*pO%4s;_u?=?$Dk2F$I$broWbR02=;2o&FOJZ^~u?_S6OC>lmEl2p1IxiSFwC#=# z58jH^<23X3D$wHndgAY){(vg{&a!{yPjc7N6Z1=i6b-I;^QM3MlWS;2tGX^u6tn|s z?(%uJ=gXV$IZw3$F%Tpp(*bFN1OZyRz%6HmgMtWbGR+_QpJZ$x{(mQt;fMKu6gcSk zRjN)YO94lpFp>#w*eAhKrMTC_qhboW%B`>Hceyq_Vu-v6%nVgQza9h=04$L4vP+}YW=x0iT+?i+>8Xwd42{!GDqW$yP` z6&{{J3NEu`@b`D!BCg_WIz)=>p(-*PbR^I<%d9D~*Rc)BT7e>E`~X*p-n!k5jSAXg z|}=S|~`97Mm_@6tc==n~*2+o*{j(BKLDpWRAkY|v6oT@%Kr-%=M_*SgqrK(2*D4OF-BvhGxPK%Ci_NI_|U4v2gO@le4oEafP`}_TacF6e#<3(~)>4jE6d35H7 z<+uG3X5k}b=|)FKT}+P^aCaQWw$|*jp6j4%RAmld-3u_uk10!wDQT#OrgHae3(-bJ z2e#5fOH;y;oc^JlVlVu#@j0*V+e%gCowdOU;!tf1`6|Z~?@|W@(kqC=C@L$;L#AwG z9uyzEM6mljsLhyxOo;LH*kDXN48^d=Z?mrtT~EE`JM=RGwT|{`uCV{-!6?wn3&toR z72eMf&IqgopW1LHFm6;-v>;J=}bW=)}v zmdU|G{T)|XE7gU&E;;9^xw3o*`3)8byndGZ>!^z&t;B^5I6ev9FisyHFCwB0x44-G zD-@xVdXgLQ(oz|<&@@oh+3c;|?W+`##*=DN{7QpJ8W*6hZM&-sGREHmU}LAI{z}Br z6XszH0E}^VNQYcMUpBTJsB>~GsDY05K(9Z)D#Ws+K&42vRQB`F#A5&}VtU2{#?rm34oK(&g$Vg6xD(pQfbJ{@_ zGF)l2yb|<&OixeujT!AOXDvyN8q%*Zr6>MDbo@N+?=iP~-NfgXipP(9vf2-z5ap3f zN>6WEc?mK;H85Q1=#{LTFJKSr-*rF##_~YWb9fI7t=PcdMih67gjfXUz;b_N<{p+s63g5x^8yz<(!cia;i+r1g+)wb{C^feSkXgvREB4)4YdegD%E)E#flLE6}6?py1@@*3#6pl&-MPlF!Y}?U5pCh#-zXuj5-JF5kh5SCcI zW^qVGwYo~#i?5a(P7OIr&aYy;0Q38D}tvqlf z0wbKl4kp&Ao*MO8iGpLksi#Z);32(GH(xDn`@~?HHk)%o>$%WP!ac3-Iq;iILKa`d z_wGSJ22dxpDSB$Dc5@eWsD}IXi%Wx4Lj?A%M8zl}Awk3xWYTPSb1e>Em6fOa!*P&l zR>Ugc{@MIbw&MNkyZzDut&?kOk1uz}=;#TgP9Xg-!v#T%>9xDk#V>8NxroBEMyIn< z6n1~wSy)ih;y$lgB*fiP#Tc{Yf{W zQFuc~5#l7_tK9Xir`w{IQBzFE%k^TfTnwGgy8cG{W0+G4h>@_mQgU30$o%wI@>Y2f z1N8D5fTxO~xxPKxy*(bP0FZ;xad9_hW*m3_O6DWP3{hgNjwaCret&(uK*Rt;Ar@%0 zUA9kp*q~#I0VVTA$pK6C?`2HM6 z;pNaV>eHJf;5_41H%qKW$o_Zgj%w~|wW-45MS)=UAbG}iK!vBmrj$booHw%?d>wFY zHE2%0>Q_xMt<)}$BnF_sw)12kABc`HLCNy&Oy$BcCMy5_ho2ZC&_@_de)KRh3Wxcd zR=vz!E20dA%^{OSSsiyUos~L_b zhop0MpSFlFv9SxHEOnLXWP@$a(l~A^w2?k8npmPP`REa& z;nu_S8IjOS81OfC_>i-?_KpWHKJ~9z5tw0G^W?@=8b0(2k^Jt;Q+0Jc%?_*g@R4)B zhUWI0Y-@9{eJzdvmPTKiTHcquWphl;vgLV{Fq*HfO`J0AM)==*d z8m`SAJN20obibN#Yo~B+i=rhFI)a`Q` zV| z(50=nEoTxatiFu;G6svqmxz5s!}B=tXbElWqy@k-V607P`&YC-PPWBVq_Rb5MUG$@ zI^s$i3B*=<40L;yI)89*t3@)PnLnZHj-8RjX;d84aB?|)&94owdwa_Q(!ExdZKLg^ zBVlqY%<>~2+l*4Yc(8xRzyNl;ta}pZY8mM;e!q7p()#|exBwNTch(;(j>O6{gw%cs%pf~g z2py9Uc8NA=$@NjwLeywvZo`Skjm1!Hl!}4x7Bj7S^=TXes~%O6c*F6VnQ%)Z>4LHK z_i=4VV_LtKBGW`kZ|aVuOQ(HnqcEiZ{`8d+?)uqr_b+VGoM6A7QY^4y@?6?&qN=|? zm`&0Jo=)N$No#&}>CeH5T4y@Zg!F~h>Da0i)Tim>v+K6s=pGDJkHaX^ehV0K3!9OH ziBn>oSE-f?TiA&rgJJ||G3sf8IqWjjP|L_Qi0|O^3QYZz8_t7@+qPG;E*a#jHNJ`wpoOjQjvW!%QJdS|o zYRIZh>k{CWN@M zH-_-jwQq|UXg^NQ2yE~-ASo)(*tw(BWB`i>KY=3fu+061j?blrkHUWGdqN_2vibJ z>EjOyyGsTJKHYsI;dc)7h|Y#x_Os}%<@Mz|>YwwQH>MAg5SUrzmI@CE1~xHW(~2RH zp8CrIMhLM`tpwMA(Eg=OO9b|qL)?ORC!hVilvJ!ELFS*E!+GW%!`7dstV2`kF&K|I*rBj3!7k&RPPrJ>A^?p7f0-bpk6|^_v(oC! zt6~_G-Mc`C45z}Bo29QQWWKv^>hm=9?h!_l95hPnv(+CLIHnPxNVVES{DHj z!}l>Y(>=zy)rd!TZqgGxZ?%twFFk&j<^6WEM7X^;qbkuxSwF#Ih%VNpOxr07SXc<% zstPV;(n(5Aotq1H)y%*O!Ez;Ary4v{BoS%6zV7RkYVHo4o-rcHOUQLKOxtL}9EFQm zv0}rCyqTCyw+syUlgBa1MT{9y;4mZ=#X@r!ET)(nm(V%&uT*fQ=dKhCR!2+bkt7gQ z1#d9%f#l@$KE_I(vws@e`3&I@$k0YSP)AYbMD;s=zWfb|qNcX+=~kfyynu{cx5e+_ zl(V2<^Tj7YgcL$_E`!~&POlAuyx5|{2d*A4at-vEOkyOdTn5`;E0FaUxb zct3zXvZmGjG7^-g4kMgOYIIOJMAW&aTY|Z3i`ua!CIc2@mjnujjc&X8028_;T)X-P zI3^t1q}r(I6xNbs>b5KjThxc4n-t6)~(MOIHb_?UAXr}9O^M{ zR5X<670B5L+REz-jdo>R(C2=F`RbXH`m6WuQM}aE)z0tBaQ+1WIq}nA*~WHu9!C=y z-cOeyVai}>M*_Jb(nOGsZ4h>LQ^D|lb9R5>B9=#eA9iNtlH2Uhy9gC?S5~b3$;ZUHBn8VSX-aGP zs;xx)@ZWyXT=6^|==v&ydjC7Y)@?#V&s=Gv{o>^7#ZJee~KCO8}Z4uD3F} z&LwjAZC!ry>E!tBw$%y(C)5lH4lSc-0c_?wONb@vo?)>=s_uOhI_7Y^$?D}i;|^kRZwh=SKo$k-!x?iTNpa3c>8gm!Blz#fnd%JW5_G<0>} zo^SSF?r=~@giKcIckhm;d%U0Q6%{9!YSt$vCa}&WKS<8%x1*SCqmS_($_rzSh5ytU z;4IhgL-cg{`v4tK#ez825(m)eEcm>~S7}1j&(BYP2Wgt0O7@mnC@0tHk*1PovVx}H zAcqB(MXbR(LmVzacX~gdy0cT?x3^|$3Q3ilvA!Ea8ZMeMAQzA6n6 z!BznJMOKpfuQdjiqS8*N18p4?Ib9EztHfIJwjhy-i#-Iqqm5p)W@W>w2{&uP!}W(% z&z4MM1F8^S_?5??(-Q!JV2qwKImtvt9qmv3=l1-jT;s|+CIw{2VU~Q>x8fYsZEQo_ z8|xTjRcn#C=JuAWNP{k)k56!dj)szy!{sy-4fI~KWSOYUrpJ-276pBCZDV6uH;}b_ zdfVUpK zBEbG#Tsj?fPGa)dSEWmgOq-GXkBf~B1t3I4Wie!>45adY`ZI_rnyIQv|I66rXc*~1O*K<9 z7975kP*947QTAN^q=E55w;CUW2@9dt16We^Vi7`2n9@+e{6`MYqX^d%dO3U~F;N|d z2I`lX`=Od&R@~?0Iv2+o4^(}jdg?8 z+2gT$aHT$D#`poFnUM?F5458(qavlWg)<78b&{*4>WEpPs`LlpdIe7DFh*=hKk!{~ zK>>X33x3RpvdVYLl6cuxK0+cC!*6ziloTL{TZHtB{nIMue}MQcECeSEXivO5(gNsT zfg)?H|AVk0tcOMZCs9lU`F~Jg#REZcm#soCG@jAG=)db;pq4jWq3^KhtTOxE>^;l+ zdC^<3fpGfRm)}Dw5nA%{$B0&lGmnp3XFYsSOh-=ZOD?)RdgyX~*ITE|VhL^=nK}yO=LfFOEsC@38)eFN$Ac|W5X@hvSPy@Xq$G6Zi;9+itzL_t#WsdnG z5Q>i-;Di?Q9_yQHLu()RWdi&g0k0NG;4$ATU+Qp=7DsQS+7B zC122!W|I@`1w){D6nd^^%iNIW9qFypg-{eh&+;kIUER?8;=Qfj)8_kno%%q)ZMXIN zMZEdP^hWL_y|`0(!!}|*>-bEH<=vRPi}JZnhw(nFTdjreQ0yQkq^sNr z+Y`%H-?BV)GqE_=WMaRQP^uJ_saD9yNs7mO7+7(*Gxhv_UQ%E#=nPTPDO5cPgTQ3#t0K7+>jB+e-HhwTgepJ;ZZ7PE{zllT1lG(n(y4BMAlS&u!W-In$jw3%^rMa zrG zc@Y=xiZ+ql5kpfP?Y;%d$4EPqlom|Z*Njf_C^LI?LKZEoNpT*=9X--sn-~rLkL)~> zB7v<6p7V}zu@I`DEYYWDpEgm=FCGR2 z?-;&+;zO2Uw<$2C&t0_tMEx1Iv+W2(vdgHU#wa_0Fpm0Bmg# z^ORPIB?fx2L2Ww{vSU;TYXfUjsUOqvV>jL_fYch3M5j=X*le415O^b2hlUI=OkcxOlibvn&IHVg|$O zgpNOn@quaDO63Z6MEd%D7VYi4YuZV)5Mv5HI;K3K@+HpDD~sovSb;@5RpHZ`?P0{D zH5EUz_g{h1-GFm`?B*xe`QNmK@p9;dWt@iVVhr#|NwR1<+jCQ+i&zVtRUJu1UGR$G zea0d_)!>u?#ou}V64QXrS5K!^6xi0)ZX&3co%8KpwgHKvdol!+oe4*7YnzIYQK$N` z-eEJ!#JDDm2-&d3OKBc*@G|+%78Zj!8Y@->^ecS(i-FA;OK==*Ldipv_!x-ZaKi7* zB;cd1qN=KTefyFV1&cE%eec*3KORu6V~$8@@q>%aY4lzDBL~py3iJ4jX2_1${bs60 z*W+?~15bGAz;`qyJiN}CgoD9p_L2g}#qd|BeB^Cj4u2B`qkCdcMQ$?I?prpeO1hZL zT8LttZqM1k=5bvwdB_Vhv4L=hjq&@+mfsL*p_M^!>7nYxkcZLvyZUgg;Do=vo~qvS z-s&cM2lw!F?tx|5t4`8~GG{3{fGr_cex-@m)`PJ7*2* zN`gdk)lLErdq9ZOPG%eKiTVhmE}|<@D6IcCXX&LdmO8=ik#`t)3&82}`+Po1P-L)F zMs#5<7;rAE84c*4AbgdkoK}vyO&O!YsL1v1S!v?rwY2a02DJ{%&U@R@J36&C?wXLn zdwocQ`)|aeKqE#9K^on`#IHHXqA)bULvvb7O(cmPpUd;V8-i&Bf|V;b=s4zY=f}P1zw*z!M&a~K z_B+cmjft62vE|*89=A<34GmMD&OQBJI@*VMg?!*!v&*dI21Es=OZ2=yLnosv{Cv*d zKgG)e>{lkX7dzYiZJOZY%JOwnGX~HW=4=ffV=6sJzl--3RfWY7cHCa8bH1g}33Lri zD}*MT4m4p%SQ1lc==pyiqh|E?Je;^Gva~-)3n~m$UY$G9r*u|KzN7k-#s|`wu?cp7 zXH5xKL;OLqd06b9myXNk@n)=x{xHyg{<-|aBZK_r5EdUYaC&5+#%SC*H4aA(4Nw3Z z-8F7e@TmsC!A=S4TG+cYi~Z9OMCwKb@%auU?Fqu8=om%MPd@rv9~K-wd_vrEeAGz( zpj6H5<^J~EKtZEq=%+DqNn6_eep0jlUFcPZyk2*kxqJY=LH@cD)(z>-_1^!(WYOWV zPI;B+sd?|=!cdt|$mvlQeZ8)>Tj1+H(g^@=$_979fB4i>Awyf-bi9+K%mAv8#oSY% z7nfkEQIZdLCCc~8erRamxcEx=9-?qq9JlXt@-SFDx884qO(iQcTRgJje05NSjbq-v zh}Fg}3IF+)=#e+h088^{ZLw>TQuQ~lZa%B+aE+wGW(jUjuD5eWfiP&SIr8ey)I zrCmr#4xTIs7E1yCIz9)Z`TKhV(b^Q^kZ)~GFEC(IFN=XAyY0fn*j!xkbC3m6ER=g| zzmN_?ldm`%>d@EQc%P8L{#c36M}?R;?QL9HAkPVrjeFvORddHCW*4EsZ3KhMx-Vu$ zs1il^%<(1v8X{*Zhll>DiSccZ`sZkZu#PDRr2BJ=>rqFn2L&Kr2RMXzoR$wln!`}d zUOq>ySZF<_(6}kQ1de81b$^5pg$~s*)YWeOag0_83Ic0v_JN^_Ea3~ z@8bG8b`a)9rYP*UB!a<)!j~6%j;Hfy^RyC?kC~+;qlqrF*n&)hAB?N3&e}Absrbbu z-FqA*;>n|v!yj&!=>CzZix8~#yS0ZmaOX-9hT{m(dZ6QE_i}jO%RAjG*&jnu)HRAi z_05~{cZsYXWl0$0 zsF%9-*Xvdw8iQl=j|mVQE_O88kiwsba|}vzL!wG1myZCBxD1*R##Rd#a-~97GiW5f zfhypIB8m`P$h5c?e9m_n?d_FG1f}UoY>Kc35GffRx;oFXbX^TA-|16Z+FhVK!(|Sk zMx=d75>u}qjtvOUwwZ zEsFqDM;SPC*JUSyysnCxpN=N=RS|@??U%Dw=QhTRS#QhsSV97wLK2!}V0awNN>u=p zKt-*!n#8ph^E7c*;!5}^5X|y4plMT0X{stb3xb1+Cucv=h`OO{ot%w-;ReyLuV(5_ zF9_;$_hvFvtY8Y(BuA-l{`J7>G`%E>T~wFJ)CEOXsb95wZpJTX>%3%gFK;fZ-fDn) z1iaQ4v&;3&!kWg{`MsgbmH)ESh#0Yj7cJEU=@n$+^T)gnGR@J|I;i$CdjWG z6Cv%U9=%2Gbo(e5>9JXYg-d~QK zQ6z1B^Gg-bFQ*?&5x?qNyU^Bc&*#H9D7FmkPb-udhqlJs{;|-xukLU*|bnF*AF5I-Zt zlw8%+Rnyj#SK3;E5F&BhP&xzR11eiPHi(pe>k|5&{VeL5U33N6V3x`m3DehADM-Md z9P#}rEj;~Pw$-JzUgrKn(vJoG9OW{2h5|oi57%Ei`>nTzoF}byiW=TMQvNtFXgnO; z9NOhQ0>dSQd?W`uT2LEJbMAvl_}dyu-<1SgHZ9Tki~kW4b6x_cHd=Ygyz$5)VZ_uNa!%>gq#jQ z0sWU&H#PqHTXW_4$**-yCc`$b2OZto%})O_iQqEKH>oo98!P3%Y>7!Jw1=xmi1G;!*3IKgZqcZGsg!WG4y!0v=rXAxmn!D7fvq6*&V z(_5g2O^U^=vqIl$3WD`Is$tEM9WEzMjz+lV-m~wzC5na&l6ySej!#P%>`wJ2V{|>H zEGXSLB{`Ijdf|yA!|gxP4wl*DP!!Oeu=3Uvz#?Q>rx&S^lD>wmqYJ-BuRON~R(J}m z&q^TJeEcfO1fLQ|8x1yvMgle!h1I|%6Dc_OaA_>40MjulDWrrAURw2zSg1d>JwIyn zD^Pa4PJTiC7s6!KbyR2>W+w3r&W=os4NVPW(+pUO1A;Ns}GTqTc?6W@D~ zV`0O9BE?jVU{xg;_oDfBrtx%decs#kwJk}76wMdFR7RmR*=jhfrlusFy&5EGgGy%FJSd6!+iT6S#K^7&Xv6WCX?*J}){Q$X^OF5<9$H~DDurwd;qehzG}OD-#!GgK z>hQ6fK4U%;n^m_B5EAru{3_^|jw5{G2}32}b3R|*;C@*2(AYNuY7EA5U?WbjnWu>!_Jm@jsHW_o;rH!;Vs670^{ig+7vVJ6Nte}9afuAmrZKb07 zW#5ev7HEFzZ|NQ_R^XzL7}J1!(B8T4Wd;QM)5C&`avt zt!lcxpxQts7lDG&{cdCJW^Sk0_fG8YGYZ?Kr)zb7_(=@vJTf>K^(p1@u&(Ex6Eh8& z=zu-*8qsZDSqdl!%CFBJraGjmGwfobr~lk2D=)9lzgE0C41wZzOrnlgC0G4BR&_P^ z%cF7?R+Y0w=|>Fy{Bn?LleIiNn0?>~2S9cObz^NaO8010F4JH;e-x2&m2?$VfT zio#%jhA1&YvYlq(tQI=Z-}XE0jMn<#BL4bUb>Z{Y?hTB_W9?;a-f&G+SQ6Hv4L|}b zcEriocKQ>uMgJ%K`+f88f4eD=MKy2d zmPga5`g{)Q$oo|dacxu?(>ug*%~-CN_{W!K2#cGBLm{qf^e=30vJ3@#^+YP?&#vrQ z{+XznclocUb7c80%tk?SKe?u21iQA3I{^&z-@T0(R4wq`? zw?Mq^G(ZpO(aq}R2a?tK<6fL~bgzWQ2bZCzeuBTTDvn)(0(<4T<;x1o06^9_Jg9CF z+=C$R;jAmM(yR1x@wVYIxSds|YJg(~jVuk$?@}aIzx8e^YR)Uv)7SG4K@5GjGwu3z zF>CNr-q@DfH!X9E`@^irdy`A$2bZpCU2ec_P!j96GP}>~?G5xTSjz`X@TZ`m3bQfHGP9KPD9g5Mq&WWE-YA zZ%DCpynw`NU7&f6ZYD*{X$iq_1~(+?=CUgGNF!}44li21H^gteZ96(rK zYS9hLVj{?-dmqc zVFgfdmvHhF!LK^Rg0mE6BqnMZa+YBdO4pIGGAI_^bZS;Qt0e^dx_mK6WS|hLVbvSs z&TemSFSy())zZ`pt(xvJoJm)u!&FT;Q|4L#)Mc(pQ;P|AR=vcO(?T3aRxG9=re|*4 z3w@^VQJ}ta%rs$OjbEcj-B#Hc5b9zWZE%3?AHN{u7xlg9En2=;IES`1|1p&Q^oI9^ zBiluvecR?_*iEhNK7Bw!O0Tck=SK!t!J6z`}2dlkxEtP2nshZ*DJ)1B3QRD4*lE^I6@0 zqAXDV{Pz;nqV9Mh9xGT`MS!>H&Rdw3q2S5e(bPpRYXbAEC`*6btwiFD1 zSP;|t4tEL&BAc&2HtAR5sghBi<8*611?oz zZ-485-U=cA;a|d6oKZLq}5%DWlt^@1-#KN!A_Hep(uLugh3u8g`*^uTVXbra#Uw zBD$s5x;y^-F@Kx$IvvB84*dbGI4+@N4CPnc2BdmJ>`; zxkrHy?BP(F=CgWQ`~n<5H9c1N!oXsl12<7J?(`BS*C ztV?ALSBX=QpsL$#&u4V~biKoZpg^nusedKyTO)G-jDG|#(F4T1J@zuY!k`ZgMZuo0 z=@Y2C21+@6rtRvKJk(RuNw^?wc6!YOEqV9!y|0JVUxNDNo}x_I=BUnl{(XWVYzPd6 zfDns7#>G_vE;8``hXZ3gaSHq=-HBUm{^LbekvK#&09O$*%rk5_+GXyNGMhx5o}Xj#`2<^eV-Lxw`n| z+1q$1-;F0Z>F$wZbG#1^ZYd`1$p9b z-*&_4{^Mu*e+7&KhG)K*#pKV-25RTq1w3?i3L&Y3^K_>!!4;3N25{sfe&5w`ozk75 zB{Y|Ag-wJac&wQu@#oA;4~3Tt#;zZ5A?=HWQl@oyN240LW$EYKSGc7|24?XcQBhGf zF*Pwcjg3hj&%Y^>@5L9)qm}3iO*kap0& zm1A8%i6$u6RZkXJOXTspZED8ak}y*{2l(rErBVa0|5Ve|`F;oY*>+^4SQ?&Pot@fR zTU(kP>~E8w>8#E&qR1nTDU44B1qK6<2eoJ?D6yNs&&P{j6lZUIygY5K?XM_=+ycE? zd7P`moG@UEQ@bzHc0VV(^J;dtx&b6K+?qHv1h%@m{Fa*BEliuH_JAH}O@TONyT<|k zKlrd1|FJ22pbeL_Mk4oj2A&3$FK^Ux(a7KzR@~krAXo~hYtl;U2X*`K3uL>S2RjMQ z*KrKb!zEXZ_g9xKY&cTWF#qE0bshg`&6w^+Z)iU_%+XzT*qS!qW`mhC6y)isqk*nn z*5!7E!f$k2MWlQ(v2&0REOr=gyDE@@xA?d2|C;b7!o5?hb9XveM4(wG{4=%8v&(F? z@y}?!V@ED@V}>+Ge~KzIA9$ID?bfS1}O(8PXG95`>n$E%P@p{k5OlV@f~e zaE1c%TR#3iqNV^*ytOvyXIR&Z(^kTDk3!RpD~o{Jb)upg%rkn(Tns zId=naaM3<+;^g))jm9B^%PX?fk;B&7l3(K^CuhprKG%DPX>Q(gxae8)0nY}SVMHN+3uuQ4q@PZiWk)4yO$6Vjkw6rI-ualhdH?GnL)CV`W zdMK9$Y-EvMI^5xhiyYs#iERJ#<@GjZ!|n-xx2wMelC#Esm+op+!xraYckM?g`oE-$ zYqtI0MiJv5sw|&SF0_fT_v}oo6B|+CgjESh!Za}GF=0^+g?pOSH(|a+guP2D71x!T zQ%L3Tba~$%2|DhcABLyzL>YxzojJ^h934EQ_0?*7;UnFzFR;(gjNwm<+lFKk+5R{^ zqQW^hv{34le~*b&%TKN_y=s_UePOMk{o z^p7_BMDN5Fg%xP7qTs#~ob-OV9c+}=R6ft-Y|hI{>SBuUFWy8hp}dd25QKz)?9eeH zU0!m@DzMrZ7#e4;2bE#am3(V!kpD~74iNtf@rs4dcib{~HedP;YPxDa1%fA3m&-XF>}| zWPo$$*i~L08vg!Nu(WV-{9^S5rShXbgSHS2Ay|)zmMaf2l2JVC39)t02*;AUZ850V z>_@I0Q7QNj(u#Nrax(tJ-!eh@jM$pOe<_7r(_!jg%uEl%GwET^4I&h#PymYGNr;kw zc5KZULKiH^y=Ldl{}l_jDGZlZ@? z2#pzvnSvRyWfLjk@coZQw%uze`5y%gRE>oB|3@SP-Oc~!?f#z=II`s^9bgS2?fY6+ z_!5u5_0)qG3+SPfV>)nw;!$i-yo0u)3jFnD)joOuMFxloeRFtHoXl5L-o&qyCx z%o1H}wFuh?iio{I^qw6S%)9^*e);)rANL|Uoj_WZ+i?SM6y5akWP3SxY}o;?$JsL6 zqa(D8cX{d}8Hrev;8%wo7JX2I8<>M8!JY>Po@4r)&*^T<#AXBFhQyj}hsFHM=_#Wn ztXk2vr>QO_9Rk|>{?~~ixMRA&J~luV|=vmpdq(jf6e|sCIDlWxopS_iA6;Giu|C@Ml*sy&{wJdD7>WkFCr3 zmYfgL1jZLHKJdB?Jw(CpUd1v{BoyRD0vwjondsBP6lA_tc`f{x6-7BmeP{$xEpV4i&>wQJj7y z;V`V}Q`AaDB92@*RtNz-8-mtrQLsK{ewn7@7*5Z-J8m zTARTRXNolg{?s=LfdF9KNUPt_qpU0mFy4Xj?ysx7`!=GFe-nuK?uvKTB=i$g*J-64 z_k7`3FTC>NWXdntPT28_;5sXQoHCa5?EzM>k;*dX1B#%}nW1ax+PvhV{`^ve@tT<^ zq{FwX#sljBa-7hybPbkv)hXi>S}?kU$7AZc)u52o!@@@np>0hIPyQSf$XeT0&7y#T zEj}unO-Duab`5+r{`w3aLZjm;yutQPVq~F~HbX$L`sONz0m2e)B|$h2ZEVK#V|EG~ zgPMZ3VuWHwkCCX{-)g_yM@ob#+8w>P8_H4&@;z16`T67NxGdJ8#f`${^76x~WkCiy z-Y!4&+xMpO&jJesy@FnSuh^(qwEsBEpXD}3i*}$m4&94 zyZL#Hqba23J_%K}bt#>8FI*OH7l*`D11o#c1O5Gl{@P&7?ql>p8968{+h~ zulv@8mlLD)qPN$T_;9avYt?TWuSh6)S?Q^{Q%CdD!>LBCGfuZd092FDEC~ z4e0w_--J!r9Dk?EI$nJynIs)GEG8y$RMasbCrbb^x)&;*(%azgR_v4&bNQ;X$O?L8 z9c>_wHS(-o_PxVe-;gqen2Eln@U-P2&Q#C+^|&Q$_5$u%hOT6p;KFAY$FIlcr0@s~ z#56s`fn|X$CF1f6jOaj3C6QP~mpVp_)ISZBo2g{qH~oYERf7x%Rgm4G5FxMc|6#p5 z$)0hOUk(qvFsBuzm0&wVXFn>fPZ3}?QBwxu55hejAdWF(?TQ*Fz|-yIr;`ZVg*&z2 z^>owfKCs4o4+k`$WaPyET~gOMO*Y=Fp$maHW251uTUq~Z%I3&ogv&~2+?Ni9nzCjl zLI;ttcx~;1A&M2C7#juW)I#A@58ay1f`Z4DvKjocQy)PBFoJ!Am&8E$Tdw?*LwC)y zf)(?PVAtkqj$V(R4H1`}h80WA&E|H4wT~D^LY!Vs~(0U0JXwSt-ABWsMO_IEB*%y~;>7Vc6G zYSTROvn*(3Ma7JBCV(7hnvJj9&Eg0hDd7ShZ!))ekeH*zNrAQWd0|HudH8vavLhKus9i{}(f5 zk<;_3_HxtX`n#X@MHXyAt^nPmY>csU+xmfI9X&y0uD)=q$5)E913o=T?Y~{pVnyjX zLFb#lHJTxH4!OcFXNOr?g@XKU2rKWl4;O+IFXYh!hsC?${c(|J3%`jV?0P{~TCrzoxkG;^fW13LD^?VT##xv2Ph6`ol?5&^o zk5xF!N|q#i3A!KxlEBL3q+DQN^|xWFD+XWPH1GY1Zpg4J5JK>3|N6qzq3IE_b8 zr>23UC**tZyt;0_=ztxEE`!C$20H`j!Q{2Rh~UoGxilCVS@AfNl{^`QhmmVjvEpDc z0UAtp>2;kDzKT zEE$4}9{;1b;#5-D{=9S}&TGkpv$(W9o(cUIvu=iJn8~m+PxE>2au8_AoGVI4bSXcRbXK(gHT6vq+U-#|ow;upr%tEeMF;+VrXrP(reLT?ZTSk0{v(@c$_}%#C z*3q6ICh!cSdwEBH*+3m@Q_%N*B}4Z`T^R+X@fd-s-;kZtWjJIEZ3&HZDsdDGr!rlf zJ?u0{1R=?V@mCs=kIJ@+`;(f|P#rvW};BCvx`NT2JxLQJf*W0D4vE{J6 zY*(t*5WBSq%Rdged4jJ078Zw*6=v1CFYBSTkEiq}nHgK%ZYEyFHG$Hh(aL@kom#d1 zNfq2-Qf5P@d&=x7mVbB)<7}#)ipx5VnfIW228EgE~oGv9sCnPF$DbA z@96^#nvc(J8gOjWJ#@?3-Je7Hn`4&$Y(HevZSn^UW9fuRb{SP--haJG+kyB62X_)X zUV8KgNz^FI@^bSVHGEcg18`@QX$y-<5J>zUNARB6{-eIj`t;tel(I|`lpwZ9AzXS! zF2~IIajXD%-nMKZVNXlEXM+NhIGX)&Psd;vecS)V*f~bW)xP1r4H~nt8{4+i*jAH? zZKJVm+iGkl6Wg|viIX-w^Zw5|-_N&Mv-Yf+z317_zHwc@n~UtwkdQY@_{VTyKF0_G zlP&%@_Bb?YQg)!b;`2x*wTnv|X~FN$>)weZMGQ^DjZ^!G$f3}|(%dQ&yr&Tu*T1dE zc{A7~Kzt$=(=f0h??x-iIZOvo#I@r;vRIw*>mLAyC~pFdl;|}oqiZSXr`nIS4Mhbl z-T{q8Wf&W7MUsV`f01Lld^kzr9mp9vlNd9ojvrHKuzw*KH3JqZpIb@4HmUrecxB+% z(!Ko^D74+qW=M^G@9C3^dKmQ@T7t!%AvTOsg#|(_2@u=rD3*^xU}UZ;QNz`Jcjy`{W9f48Y-~OoZ~+ z(8l5|U3CLZM#lz1t1BSY(KGaRZ08CBUtl^3`98~sv7>@Xi8M(PgG%D(GAJhR0b4N` zIouEh@ii(1P$E!6vpKESAkb-LUCl7sZ8I-iXLP4_|0S%H-tFE5H(pD8Xl0^M8Q$V|FQJ&w&E+v%# z>A}KoUu5)<6_++?T%1%n%->Q`%bD}@jS@vrX}iph_Iy8Fly>k?1(#dd^+N)Sm-Ryb zOuL<+1cOyU`22zk1@Nsr%Y!eSd+lLJT%DcC+&I8#jiu5 zN5Pg+f*({D^hLqMu)i7kTuzvvJU)Mu{Y99R@<}rIXo( z=P)Q!5IvTaT5OtxXeD-bNGX*AZp#;D##ds0eB6GA@rao@dH?%KljuZbI2MljE;lXk z_IGJGhEbB*kc5i*=?hSKh|EDk`LU>&*`0ymt9LK%rAP}7Y##n&=2(uvfOhC_vV|vI zj^(8}VG<6))?KH;3&fOI32bn3D}~Zf{D2*ugU0%i?*BrWnY$}I**5h@3p7m< z7$LKg#6(&8k(qAwM~@2OFZ2L*k0qYaiVjbHvdTJr7=|A*v_gd}nW?bBGGTogXV$EZ z$b>?#7e#OL=2V)UK9YbwQqrEGK2yo@@hM!Mvgw@O#~Y6OyKuSMztO-ZKF2N+m=atcDwx;9GKVR|%dL*=){_B2TP^D(mZU|4EpK zqH>Q<&xhOU`pvEFVZ@GLct<>)P5?ZMs;x#kEhO1Hkr=c90)sWs^J>ZZ9p;`>J-ciW!v$$F=KU%o$}XPw(rVJTR< z+pf^_a84%APmKzJ4}I06I@aasVY1Qng{-1QNhCf7FYBEp1`VP>v5xFW;+2s8;r5xq z-NjOl@~ow{;q5IQ)uDT_uthm|#r=3m)70~sQLnv}@iGQnl-BdozJ2;vV2VsYIBB-X z7V3F_>9sr#OJ*k(5KSVD&gG)8{h3|C#NTY~>5oFz62`r8a~OrkMu6*k>Wt^iDmvuU zSl}FBccNt>eb|uKjZRlZJc78GLL-bydo9S*+;W^yCmbyTHhAP6Z*Zi-7B@rbRdHI$ zS@8&daHf-fxkZLm`nz6!G|Ta-AXH-v&s6)&Ms5n)TTVbqWx^-*~|UV3yMakE=v zXL8$Y2x`sCGq`x6iIK*1T4W~wC#)}a7SlM=*vNW3BF?n!Q22D@`0s>cIpKiIekN-~ z3I>k-#3hw7Mx6i`b+Nqu#Jaz|O&Q>HV6;%D<|hd-598!)gHg3eV&S`snn9*g&JZ=l z?mSuE;EMAXa3rS#*y^cmo(Ij`E5;SWC6m*@X(Biiwj9ltbY+GH%32Fpc*-WBQCnf+ zxplXggharLOHVD(BvL-gah_-zAYO}&ZCF*G9)yrQ2R^NYOueq$3)1vfKW+%AHB#WqDF1i$a!smhZiO=24Nc zQ&D-i0_M}%?N-Ks;~|L{0iH06dTIO&x zv!sypRW-caCF5m+yLv0iui43Z&xaqBunUCk|3+5{>loJ6KfeRFt!;2<6FiY*=_SR2*#@mW24Cginhk8L^}na~NS`fKN>LFfKoh z(*q29lZNeEpsGHmQrM}mB364T%mQTnYdkUql%f`JJ`-43maLb95-U>8J8MmuuO*WP+P47;jfFa|xoy7I)$)N>-pl=hhap#!g!phTQOxD}G--RY&LSx@jgI z(c09O+Ld$!ChNSsmqU38G(!^}kC!BOqzPZY7i9#Kd@{24M&c#bI^;$!Ol4duhyJX} zlg3v%zq281*`q1E0|Zl_`un*;cg3d}Wv*LPgpjwqj~|Kx+AqhOv`l0nTE-8Z7KmtM z-9VdK|L5{fEEI63a7*Nv_r!of)x!rTz=#uUKBgGo3)GqWSNHkElcHJg+;5T4B$2bw zgu#;0{?AE%Z|y^4ov<0al;9!YDuqXXv(RlbW6I)Xd4#V~5)r9_)Ot6BfC+Iw|Lv65 z>$gUV=%cu*SX$mg^H0aAl%=f5-XYVwNl>VGs>(`0s*pEFuDLXp?*3$6um3IuH4a(J z6Ro#Nh=eE|xwN{?M^TohnEbYw0aGpSQEGmoDX?z5aYogW5F%V$!{Fp{%goLmFI%2q zsm+lR2QKZM<&&Y`dFZ4|*gVy&ub-o2dVC4f?%>gtF7XjGq~CpeBg;`4(HZle zxrseK%C~UGlX6pvq})lc%8jqcg9{dp)>U!28s>y<3wN!1BeuUTERB4LbcwBtI1%G>f^2Ea%<2nQelHSI zLrb9I3-*hI{2EF!GWbW2WH}QlD!( zOEBw*a)q3k%+-~`kQwkdW#I-Br1Fw`tGwPXA}*^Tu?Oh8F+G;+I7?i5PvD+H`?EGCmyxub(e9#o0noo!=N7U?O!kl9HI>jsFV$W9Av>*ea z%=(Mf_d+g|m9R6ka3u?F5+^AULe-ZC<7H4b8&{r&23C#^yV|tdZ_$67j$9K~EyFPE z){|6js;);{H_v$Y2I=Z==X%AG0PouFuKSCMtU808P6y+i0FldsJGl=u~nh4$y}rYO{X35D@`W>nDg!c*Dzb_x!w6jqv!yvq*(Wd*EqYV&w` z3DF1fuInuOwi=Gxd%PZlB7AYf6a`0_>^=N8mp8-vFbPOTj2KEGTRyuTvnc;|qHx z>bk4m?XNE>bGkq&$KM1v4Xyf{JZ;T~Ms^|acs~;feU?6$ZU!qwh*#P#J5MZixx0p( zpb$=v3BD9xUhP4DC9RMPyGZeEE$%s<+L{P+0|~lbOIV66#VG65#^!4tZ)LVhxT9Qc zxj#HKb76XRmOjjVcY0g6W(KROWW(GpdG6VJZ;l=jPh#^2egls+ScmJ2wtfSXF{TH7 zlNzprlDXoDxgDO)Cq`P433~@Ha;&0(g->97!$`*;yn9$~Fqvz8XIPvqGAw$<2)u!{ zBDuP!{yhy}`zC)`K;4*~>6K-ao&qAJ+1^(Q7AC0y%dn{1CuwLoniYT3MSjl&%~Y^J zq6RBj%S8ZyJpyJyG)@_!mPdjnDr#2if#4E44P4{<)RFO%MsB1q4O^Jq!hs4lqg>uP zU7s)`(AHaGh_a-FDLsw9EU&ZO@YB(`47pL*0Xpy@{AVN{s#Rs5Qi^n6`cSa6oy~%~ z-VfHhOuQuSxG8>5HFsjol^>RHst#_+l9&+_E?Z$h$}%RcHVaXI>x9uK-)D235I}it z^G;ia^GONQPes|7JdXZhB}V1nfgEoB3NeH-=r;FkZt!-q6wDBE1*>Hq4AX>7=w(Pg z1N-00JXCDb4ohjs`Z1U?$sOAV`UG5-Hy0nkorlDer~BrHYc49sO0JM1uVu!;vZ2z_ zk|0HuOBX{`wdyZbR<(PQ77!_gsbXcrl#RX~3rPU74nFOq{LHo3rKXkNHy$k~T;=s` zEZtyo(~ry!A;maZJUrtt<4d@NA&08n9}#e9+pHMojU_B0uGb090LpLUXyWfS)xUJl zwGJ2|zpwd?pGB~!cFCi;da6Oyy4+=_qGOwtmqEan!HGxnMCathPd+6nC}y*Dr&VEw zR&AUqV+5|pnDRw4$z=!t#beRnGbYO~4%5ZuiSPfeB|#F({dBwjeWenP;RY}pp(>k# z;UjTUD<28{{GLFX8B1l^yB<( z?Uq{jS3r5#jZ&Sy0ITXmLh#~&VYzvIh&fD=RWpxA7L9xp;|z>yALsrQz?4QwMIfsA zvaG6v!B$dDR6DG~yqU1L(zJLKIkEVEw*RNijR$pG)_6K@L-fqlNN?5gcQ+W8Vx}gstZ(qN>lCrYETxDr$ z)-!MRs#{}#^`@@EF}^~=G4IV^klCJKuXgMmHUnTNT3cVUB9$Jglff#$tlxOAeqZnq zxOMxob%da;F6+K9es|6BkNcYU@>*2wiW#{)=mD1T*Fjocc0!~_!w^2Ld`*uo8eH0g zT`Q|6o&-DV4I%#@8R42^xxNvt7zws;r=j6LrOBOUkuqR6d5T#`c%9j<7&h}i4amoM z)3O$BG4v$L;J5#pQ{bObH#x$t@d2rNPpAs_Ke5SGC<^!uG5NjEcDEufgI+0e&bm~|L+W%nDT)-{}ZN?Tp^U#Yy1!J z@beYo|NqeaD7--lpWL64WUTeE$c75k{o)xvsZkFw0-~UNkTt>9$6}|7-%Ps>ZR-Sr zh9v60z@5P59OZ2>b!T#*eq^Egug7q$;v&f9{?y<;v{=rcgU5(HbmYHEATmTXr%U&4 z|A`g^=br)P-|_N+>py5CNys4_{@%6|5E;q^iph?`NKxiZK#x!cCdoKd2NY?Bs>o0< zq(yp&LJ%bF?jA(4z#rxd|JC~;lc@5Qdw+4H5u%J5p5R0;o(h{F)i^;3%4u$q$E4iON{gw*_`%L>tK0DnU+x>n^0t!l zuTQ*xOhWHXJ%!~>nVt<>+Q;0~Cw|hN(sNmNce;FlD<#L3ZB3kGSCjkyLPc8cxxi4(His_O;!%3JpS%ZOHqHdQX%W-!SV5i!o)~(cNBBt z?%VR}SWn%QJb&}{n6Y`EW8-}swV!3#({+{9bo8~f9Z3R{XlI*7AimHs1-!y|hpi4< z2G91EDne#l2OPU)=eewx4zNtoaB~&2=fTC!Z%#Lq#{2E>WaZrV7DDrL`0FDq7FR_W zT-d-eCZo!_kHV(h&p;y(Ws;6w?!;d@IaAs=rln`OHUHM0hSRkLDo>O+mm~;R(Ik-` z_nz|lT-=q)7P*wC?56wes7yW>b6ksecH5B{Kvbt^Ol(!HA3Ev3=U%=$awp|7!(^lS zv^vJ~yK7`#Flowk#BNj2?`p9U*NinGqG;tdtohND%R9@RlZd@)_ZAJ!uIWwg z1e9bfc=tY|JzzQ{3_mS;9Q?fM8|<$P08Uo@kc!G$`u zHzxsj*5fBYNBG)prkzX2zXMH&)%Z-v4wI z{xxm@_0F&j#7gsp-Sn9*#d$uEU5w=IY5>bv4@L74By2hb`g=!WBF!xCOYC`4(BGhjR#R)Q^mhy1!_x~Yw&25E zBtIm6l+1yx$cTd09^0w$@&xMVc;AW{ zMi-}S&SbxSsZsBT2#5!9-U1sDigL)Vx3`YWLU4Irh~Z#ReP& zk3eg_bl^%Ka>wrR$4+nFhonF=<@Qpqvwu$^rOjt?9;pqBv)2XFy^&vAnGgtm8h_L+T=}#T z>UI4an9{T!@cA~$J7qP=Yw;P8v(R9FOq>DO^qq`3sRo)|`Dd7i2SY@(jf^i)VZFQ| z!EL8aTxLbM<7SLnMK|R7Kb+o_m`4#`o$fCP&^;Sv_e>pcu55U9S|ND&ARFpNQ3Zkj zMKI8j4Mi{gBpSNb@2|tkQ)6pf&FSF5jojSB6oRy>v_j}vGv z@`R7y3yJ@!!^GQOQ=f0g8Cydq@wgL&0TODyxNX+|rlD$xp?A4wLM`Ets3P<4?GXGt zG7h8j1JR4F8d6rVQ1v!qudGu~we0x#-lzc=vUvClKH5T1qUxsML0oTs(*27hd}N)g z&TEcrsrJ3DjAUl_!;jr&1l{iDX0Z4%TN4qVuf4pHCO2!V{;bu&E-wNmkM_Q;Xevlx zfAM?|3Z20;-sxg>ecDOs2FxYTcOeY-+*`16{$Q=F&gMQ|+nvviVj_}x+vn)9RBQya zBLo_g1bAxh+kD*0n%7JhthraZNs{tH#Fr&%oX-=_tzII*&q?VGsvPRAQ)R*IP>{?pS8MYw`5J7ORi~@Tdz3)v< z9uz(e%j}X=*zt7VEDBiqKc@;ts5hYfKZn?fBFdPW}{XqJjry}9jh9o(Wgg3O6Cp|W9(3KbXV*s z%Ls7YO$M~vHw@I|be?3(W)?%wMy>Z&H()g*dOawm*5Q%vO|iv+{4Q!I1IDqx@-3`%bSmCE)chs z*u?d-B#6~SS=;w4==&Hb2CwKyMY_!YGuSQfHk&5yYO`JS!s2qZP+A!y9=``Xlk5tXSl+Pw@bv%Z@1g!r>ZOVU8P9xCnY!UBTIQ0mJN|CNOGORw*=JPln=3lk zUFu)biYNs(IbFD&IJ&uW)oWQ{)W4vqy015QONt#8ka%03Ob_(kR%LWFekjny)!I8q zaZ5k%9NWjuU+ua#7P9wT$7NCyJrfBsv^T@R+-_@rE*1dS@oCX1)EEIMg48v1bUyk@ z9>xhs`}_~PgNY4^h4T&b6V_xk#fg1J*r3|z28>A5te#E-))cAE(JOBQU$^CzIbnKL z1p~)eqg`j{}bb6uMUU>EdTHsE-Fv%dSerBPGaR8^3xT;LH z?NPPe)Z}+*hlck4ZY9E)0QI2X(faT(vU8aw4k5`CDfw;a7?3Fw+%=BVrdAz-~VrZwvMd?r~zkR z?n=ptB-G$+k*bJ@ui~G1xfR6wX6bAP*AX;+buzOI9vB zjMe2clvTCwf4S@1KObcP0kZkq-`oEFeg=+jf@o-Hv9YnlnU^!OI1)-K1>rN;@Ze>d zBN_=U>K2XIgJXoBs^nB5H@7$-PP;gX9$8YXML!6~oTu@#L?t^plD$!!RZhY<{bx>u zaB-ise&VkYD5G9@Q+T%*OvE)Vt3=iaoI?_kMJ9eVTICQqda7Q_ zx1E{)u8Bnn3#1fDt z&1Q@u8$m-I*jIx#VGB{c|5rYPNuGd|o?EvYg$`P4CB*DM za|_7}ebN#-svW;lOIK~A*^f-H=ib-7*w`HkY4HC%aV~taaw`RU6)mFXdu>quHAC!k zEUDc~J-y&z*ATR|pY>Y44$PfD9!&8=`=fT>LI#gu*h`eRvI@rK4h#&Cl7S77h?7%O zQ$RNj{6JA%x?wAisON9@d9mL1yNuxjPE~cg7p}~3BY9bj55x>vdn*_M&9^3h3@7|CPT|PI8B(>tbPIcYs z`MHUl@}$tpI>%C<>vQ-tC^h3mY%q0cUQUpcn3VOp|M;%D z#V>E!eJIOh&^7AaZ7&_?|9QyjJ{Z!~1!E0-UcwxM;x&o;ljE)0VYGS;UiR~xO2Gy{a6g!11G_lQ_Y?WX_O8CruaCo?n%Cvwb=L=DUoFBfvh#l_Xk zoAZ25jvjd+@=j71Igk*iBjBkgTOOg5S6BCYdXD*X`c!9QLqh{siToc{cB&YkZ!Ah%vH`#p%r;8QwO3f1BMZ-+TUAV9lfUBL#RlmCa`=5DIWoVrdr&x1}EhqBE9=p{0h4;IBB~ zb-ScSh4tVk3N_l>+as4&$P@H^IGrQG{re`3H%LBUr+cq3gt-4%1c^NaSiCX3&j=ax zfB9!f_$f$I^0rj>4(%q(q^FoXX3``>j%sSaD>StG`SvX2e>OW-Y(Lp<&i9HRR^92y zEkf}^aWH?xV)pqAvv6u27c23c=}F19OPmvav-MmT{lw-R$Crpz@aFIT`r7N~NRXH4 zZ+<59d23JD6J8{r?fGad+4uQ=i%pb9Mof^=!?kTFo{{6_Fw5K5>Kpbtd#9u>CjRmtWn``3 zLR;7YYmZ4F`%Z1?^c)>}DNkiJP31)X89tYk>%yKcG<2N1)8#%|W_C{d^xC*GeFG9s z`w#DTi^My;v=%o>VJ_6$(>V?OvN~LU(cbvGws*`$1$jZ~?L5=v^j5Yi_EH$npZ)1f{5 zSlGP1Q#LQ%V_Nfqg4y<&a=))`xpTT)l&dP@JL!b?WT7-ekZGXRqWX&sl0E>befHZ`NcQccZ#m6iV4aVE>9 z4iHf-wHZ=R;6iIaEupTE%_DCkpYoUnb|*}KgnCJ?L}P(TR8C31w&9LQNkb7B^FrvN zeo4zN%VAy)fs4m!Zb6Y2qv!4bAda9Zx!z3wb}1!B<_1k%ZY%gnBJjMY&~x_S%~gx} zNLS?|$I7|W7cUJg#xa;!J6IPdjES1f7e(aT`jzB7hB8L(;OvLKbG$|fsfI?uzm-tB z>)Fl=KWbETWp)AtE=3*-OCO4t_zp&7FqhfwV$t15=%$W?7@&oq9+?Vnx$fpBUX%_q6JE}^+E=K zHo0T8&i#*+M(3bMu<+tBFEiJlqN1oJuv9%qUmx09}AJYgYQW+n;#Pp@x?G4s8Gq`1L|K1PGhfht-Q6yh* z_$J%Ejs}h?CKgUYpPTS~Z?~@&BYcx}d<170KSmcWUP=K6+MD1)KSFP;Gdw8_7{{K!tYt^&ht?2 zbb$7m>}b;jpj}Z*bviybzu$DWb~l57uu+ZPt6Yp+=6B46oee`2uGUil0ZLvPx8)&5 zGr&TtnVq5`vxD#_&HemqXD3>)bDs2lE0s8IL=4M(sIa^-r&-+fUaTszw$qnLaSp z095KU1TV#~X;v+r$1NA3t+hU*)6Tp;*r!KZf6d}{*5&7$oSY=Jn=Yt8giMCTkVR-G zQeP%f21>X%k>})eBo-iZoz5g6d<>xi>!di%w{6wv)LW;agF!a?T8wWAv3saRb26;aduvuzs1_yNe1W8RsN)s$pwepx*&Rbjg*r1R8DN7C^+|5sliPW(IKnQ~E!oh6f7J8XL~4Dme&Wx^V3~wm6u~Ay%P`OG zTT@NS&ZzoC5`AtuLt7Q5>qDn1!q;vGU(0=N0oWC06Z+7!WBF$-0uLspxQw+V_l#-(X< zp^K&Uyq&{Pc5yn7G+74^X}bBZ>p%IkaP|3=Fk$ETt2{6vk3{T7FO$JzWMSMm8>nqd z`D6FSfbUeuu*1yOi?t(d;eS`l%eUWwat2)j-V@_<0zm@avG}N`HSv7z_;_$nquFBz zNRI@QS3xh2IBY&vi`f}$UHV<>9kDVE6*4TciQTXc#nQd?w^b)zFGi(;B4SkOctID9 zGnO`oqX__DGz&XB)HXaU?2V@X=GK;oFsJD_MrP?Jf6N?-VWh*29JfChvSMQ&_vhht zEkN%_6;kxf<78L6$9(kz-~^8Yhz;s-^WW3z-OcsgoWkH0(j~w2?dRXbe27!fApn8G zT%i>~0;c0DnHRc9>274#M+a1`?o&|>2|uel$g{T^9bJAoIK;OWXwA$6Z3jvc(_qZk z)16ITrU5FNTVvkrY)U+)BV&I3(-661f5RaszP-o>C&o)VPlKC|b?nxN*`tV$or<#S z$-X4s$$2vL_qYP?6yZG8wv-H8ygM^}LQW(7SI&|z&pB;oOZqa=AA+z`8jPYPK?99BnOG|BaI5{_`$4g$p zELb!F$MxmWA>W_p$EuyJ$Ow<$!yz;;w*>}v)G83B-D5G%g?v4M(MoYf5#Wxf>D$2f zFlV=`wN~$2L>3q`5)SW?padtI6EeDSnsrb21oK_sjLv zb^CA@E6XJYAKB#q0q=&V>a6RlQy|ADs zsL|V93TEe!V?**q+ci$F(RNQxQ&$nenwTrCFCQ(zI*Alfu48h`%R}?LxQ}R1({>$a z|5$nh%A@`7hGKdzk6Utu;otQVH2uz}n?D!(^XA6`!8Dx9g5STdNFX^j-6QEX0{lzO z{I3kwf8YqL2GnzQ*ypM|GbH%u9wimb7Byx;?`+BUW{;j9n252y4U0rW% z4UX+hn~isLXHj;zl!#F={)}sEyan+&&lO6G`MgvMHu+0%^=^|<)#>s%CZiddRxGDy z^Z;i2n!}K5;h!!9JSOKU0AXiE3KFH*{`xKAcD(_ZR_)Wp1s|8 zqTCicTYK#100d5YVvOU9or$%%-iu3)jT0%pOumQ6jV_X|IQP${Nrnm#=!fb-Dq{}E zz-aSl>~|{cCtOySw`0r*fPAvXo-FILsVQhXCnKfNy8osCi&j^rsGd=uWyC;aK~)|J zskgjdxkyr5R~H4J(+z7*z)@cU0PhX7oZoq zhU_qk4-MF9x19xAvF#tbR|XeJ(A!fv{Z~Tn$r$|3%NY)xObwFK4vBTGSg+-#&*9eB zbKJ6pgvQUyVsoHSXb$5z2==65s(p5P#G1>i%=9fU%5_5lxllw4cF`4f@1cZ({xmw3r9{wsexwYSt z!=K)5e%;fC79g5%w%fk350kkTJh{0He9TTs}G5VE7ggEs>iH z9ylPQ97a^1?uje zfar2luQyXo6xl^m5%jbVBK1y zg^E86zNQ|l$yhDs4+!6rKgB_>tX%dR^}gP~yVDB6_k|Or^SUtIg(i-ICKyfGOt8d! zr($Dv*i!6;#*|ZJFqIL9M+>F-n$zO;ZSP&)*UVItkhhrJ>6l;)& z3QW^UC>Qy)7@AyPBn7NXx4a@veF>(j%eXqc;sQw6d~O$Svi<_zr3z=>&r&JLTg z#O5lpz{kcswcNFyUt^K#jtgd2JYMX;oPkFeVhO~O(pnZF@xu<>EkhgoSy>6Gw*xRb~L1ziQcBjkPagkJ`xi^gDq+zqw+Ws(%U9JIh z9~t-U-M>kOEUp~>KjQ;x6ltX0q=~h4_yHm@zG>{%a+*iGi&T?a1LEY%#7zz(!3GP* zc3Wt6mdnbz!zbqxHeNsm!@Yyc3UY$%&?$YatQHUHY-l?+Q`6(kT!mg2jk~rE^uhcJ z1dX`seOcNoz4tH)aS92kVJQi!=^Tz>c*pZWtI3^`nQ@7TBDHcNTf!C-*9O(N;7Nut z&d_fv6%jQn$%I*|NJrso@hKOjF+O$mG50L(G{-`M0R75{gZM|;{$!rXMblr0=TP>BxJE_d-9Y*+-i2Y{pm|$JMz_-WqCe;*#P91C(AJ>W zq$OcqG;*CADWer27R<6{>M}kK2Qol!&k(gc=O|GIP@73#c*-lTakr;ssqZ{sN~;mm_Nye72C@sI1sSjfHhSAYqVMlX1^oKt1f% z8^Jwax4OHJjD4MZ9r;$Kn~|b*TYr^i1U?|>c9K(W1~-+QJ>xAbHJ895l>HfwDveWv zdxTy3)3n5A_Hcd9?0m31x|jILn%-vo{Lo{-2*9q*T54sR7ocEsF8n&xir?lr$O>?- z3wG6&bi0ioy`rM5!N+E{e%vN}pA7bi!`-#&Q#LNIF~!9rYPD2;D=r_tIC)C>5OwtQ zQVEIamdc}POk8`%OyTCT3eBo*yzWarnj3U+&4C%JjRkF~uJn<){j0Q#ElM@LCbFS9 zY**N-XW5d@F`6w;x3xZTog?frS-B&z)#2c_e6IX?)ayu?%cyAbo!5BmEkP_g+3i*`Xsxz{i46g>9Sl|E+|%*YCZ|?b~&p( zc62&#Cx&gWzrM1nQ~9Tu+4+5JVtIxDc!UcjRVNFF&rfc=)HUbp;Uln+A5M6&zm)?+ zuggC%Jv2XU{ud0$x{|Buh?5PEkq(cHjEjiD->3S&^;HeUEYd%r8 z_Y>&K+s?9U=o4se zYk3oOm^!jJhT*D%J3T2G-RhFBSQ{X-zU(c$o(s8_;oacIsCZszZ*PX}eshP0ihs4i zy0gvCZF)~B#APp_udBvkG8|yIFv3mkV6A#_vsI>Wy`9p|WG)}xa1p(vTju?$O6x8A z+V?v@KqTNDGUyu=j2qX`);Foz4Q2)?j&nYDF*AkfT;EPM^O$pyF~XNJ5RV%<8=tq7 z*7Iz+Ee}kC+x1$f`C~MTq(S{F7ckQ+R;bOKr>cIpBFvph3Pa(*nDc6EY;3#LTz=8S zSEBVH=he;hQlQB-m&JC@R&5|*uq<)FJHD;G;kC;)it?L#9^7(jMz{S*X0RRS69yr> zpxIS!_GONDgJKR3&e8RB|JDfow4kHIPHuIz`drb=q>kI(LqSew!;`HvF?zR~y-pLP zsl4t}dZ)dim*zF&7~eb<3dK^*RRB%E@dv`)W>(OMSg&}0nhjf*jnVBi!R;R7nPHwSZU$SY&D~g$^Js1OfSqURLG1n#pz&YX;ivcAx2K-xKU;YA#WH*anQSxtm?C=X~c_)Z7zz z9c>RnC=HexsugT7zfR53PHRlX)%BvX<4J7fBctQ9Rvo8Dm^9j7f2VrB+U~)urfY6J z*;U7VZD4gPojsC5AJGp6c95DThrdY~ve_brst;Q7xO*%U;xt!o z=^7M4Yf0_bzviiD{!aip2F3ZH;cHfn8)1Mu_=Utw=-tbJvatyoyLHn73q$Abqt>n- zKhlJ-*7X{-G<*NP-McdnWiA~uz+yz|fvn7oqkB?)yCGJ+leQel-nlr$bYRkUaGYf2 zWNhf`?``RveBk2Y-Me`arib;jv7WH&Wy8${{T4nPwm^%-Mgzz z*Raj&<~o{LI{J^=ye`hk!rH;Re>YI2f&GJm`+Gb17#ldyWZ>lVt@FJ7F{j=^5$Ru} zG4ScpqsO{+>sGH`9TgSD<#Kg&boBJ}{ugd40+V4F3r^7LDYWJ*hDmuGP!I)*kxdDd zc;hSr!$};cC}0=%t+gaUDG8i)m?lqPGWOlOU@rKBolZ3_g@L7-@&}7k?=vJQm68UT zsQ)G#w-%TTCx0J@0ied(7cFlp>b2-KrDx!zuV;fQEZDEOjlRAEg#5gOk-&1 z1bm?WYNb>;keCJgHwvN|JAGXncD=fG7;eq3RQ(4?Pg7PP0azTTZ1oKtKyDaV3bWQX zaMo4YfJlf^vIU?~lkxEjyW5x{>?T-%taSCA4GkSMi!0>D`tE}kZ^_=6I^9ZQBv)rh zPTFPyor0q5HX4Gj3JZd^BS|X-SSeswc}trZ0S1^>_qk}t?OjidVhh{u^sFvdv^3c(u!i6q&ktfl}gXCRfbJnjU-wszFIiTb!5NPVz;{>R4m!?0Q^_#0y*8%*X)SUv^ zm6Ggl%`V6<_=_zSHPP6A{nvl}UH$p-#~-z{v^sU_gyZ<+$&>$VjeS2rjkPb{YwTl9 zgxfVr3aG2?#AYkiB>SuJ#Zf#!)HQM9#IUfil`B_Hnlx!zi_erP zQ(|Ib($mwS#{MXv#@ZME!5V9i0F&veK=jsjdV7bBbyRwJf##Bq*f|HRZnjkOOn8XGWRh@W3~fBzm32;@(|*SGuN z!NXg=HWT~|d-duC0x$R9^Z^U@?c3MF!t!_0nA&8_yYCo{!=T3612nDD)zt?VahC7{ zKk)OXeymg~J@5l;@iVlxvaEIi&FRh2hs-LHF)M?9smFU07*qoM6N<$ Ef>;%O)Bpeg literal 0 HcmV?d00001 diff --git a/windows/deployment/volume-activation/images/vamt-db.png b/windows/deployment/volume-activation/images/vamt-db.png new file mode 100644 index 0000000000000000000000000000000000000000..6c353fe8358008a0a5555b8f3966063c137f028a GIT binary patch literal 8570 zcmeHtXE>Z)_wOVkNVF6|v_wes36UWff{0F{6HN5zL?87bi6973f?)LMy_+GJ(PQ-9 ziP6i9GBb?-Jm-B+xz2gd`M>AG`F1|s*M051*WTB<*S&tfwb$A^;+2*%-L<>d0001; zs>%x;0N~Oo`2kU1Cih(a$-GT|UGmUTRsfX!X5Sz;uGqrZO{;68)u3wb?X^PM^ESl$Wat^*gIE9K#p*&06PJ=S-OHBOw2Ukb4p z*>vGb`YXhQzN#cRwe6_TD1=C$G{06wsQO>!w)yy@v&YwhW~jsCH+Hme{j9Lb%XMJ} zae_O^DRv*zEzn9QoD^@)SP?P80GQ)_%moVo4ZKcZApk<=8F2vgvrtZelroy)`8qWe zfMJ(s0Hi;_T!MLA0Ruc^U{oQ$Z{PrKfS8z=va&KKR9v=DRSJ!IDCy9&iS>u6=^H=i z;X&c?49`G!ORE{x6Ty!=3%ftRW7P$PJ^FSoOY+^sv|dmJ^94@_j0%n4xf*yafkpjW zggDolG&OK*ta#igr@YU~s5 zy$kz|{@flw8AUE{cdzRijrNwd$U1eqf;Hx*d9xgkS|3B@0I5u$pgefT_k_nedgquyvbhg*GzRZdTTpOzME7*y`oR;G^$ zs(C@1>FSQ#ooz-+vvJ=XjKdl}o<-0s-ZNcWGVlLwB!RJkc7N8R@5$0Fv+>`kki3m$ zVNYY_@ARuT5Ek-Gu?cqP)hqoD5_jp*)@F(lHV8{Icc1d6N@nhGntp-FeJ4Jon3^Fl zO|39t74}?UN+tyEGZuMdTUqxQb1ReKCbNmO9M}7f)K4LW$)9NBQ;aw+SGs^)N}X=f z*2Y0nUrOB3<#&Roy4*>7BNT3fwa9O@ES_;PiJpsTHgKME?$a)q52$yUPVGJ0@0-k8 z23=iz+#TpYcFmK&mpd(`f(PTi*#0fdnrasqiU?i;BTnTnw*@MoPl^basoMgT{?D%c zZ~6cKwGd&9v^02eh#3lQK~zqqLC#iJ(_3Yr`-bZm)`^NZY%8g3q0pJ8YjY}is^8^y z0Y#e{_{#ak`Bp5ich_KD80t~qz`z#PXWoqSK(}y};^5Dp3Fd_WV~Oj=G6#~C;hNj` zJ=c67a(ic(^C>#*3)}P&Gw-1tfUA8AzJ3HN3`<<%2M+0cPCE z8thsqZ61SVLbbXDlyb|Ms?K5;oaMkODS{uj3M(iNz=fRJ!%N?!=bu@)hb~p@Zskd=*zlyK(#nue1;b6Qtk(=+2 z`n7U*CVUGvr(p2zkg2lHYYhrETSbRH!0L^|{dBJ62LZN#Q1WHZd znVso?=<+Y?=LXQ+&zAe$99v_`YTm9Kv43!X;OtM!s1R6BZ|F@9wqfq^<9a4DIJMYo z!+7XKI=s8_C{(xg%^WW0sY)Q7LOB+q`Q+Zc00d7uJcC(%y{UB8Pj zY+^u*rH)8!cf1&x6uRJi*jKys4aJ^>+W8b10h#FDELb>GRXgJz-%``rGf~q93-PN4 zs%KU_8EE0|%b3THqh42iuy>n_jVlzp!IDB`Nx0uKONs*$4-QqKE8sqR6 z7}cl+RiJN}e?TI4TX?hP`od~1JFSK2?6Jk`Gn+*{Ft0kFK?Li~)q~g!SqGW>EltLA ziTg-KH~Z!TyU=gS7vHmcW7WnIJG~bQ>dtVCc7djwo>G@(+3iyOf@s%%{Q#5XF7}i< z82cpT(G;8eVdg>eu7P`5_2(P@R3iv*4L%H3N3%UGKJ#hm86(irSeW46h62V z*9Ms2Va#G%T^q`In~`?ltuiDR{qT5~SrCrv0uQ_}dTCdp-dAXAF8awm@$6m{bg11z zX!e6Rw)zTqx4MI#z?w?0)Ue&2?o15;DWVsWT2`1ZvTp&lnL}+5dK#rBz*>J#p940aZ<8y>WhPmm}su>EDU%rQ)b&}Fd zr35tnm>LRU*7osKABim-{oxk7HhSOQIlMS#qJ&QuPGDV zpw`rc6=a)oYa)zi+P1ws4=V+}Do&z*D2KFK}vR1@xo>FY4pT%kGAj$ks)U zV3*JLtAaf}JrBt|2z%C^aw#E9`yu_|nP}WWE)ZboG`ADw zJtleC++7bFrt4}+>UTK^xoy_7Ny2T|JapE|L~s>9EUnEnT;Y)3h6Vc)W?P@8`I5Fj z5)S)gyoB;c+}{5%&nwOzJv(C7t~2MY;!EHD;`)uY076Vod$I+Jx5QL5Hkmy8-f$fx zFfr-!34dHWDhsNfH|cu3{rk0yY0qX};ktueb)NSw>PdXA?ct#2@7Ki3d^79tT6+7Z z?RgX|(|kKclHIBfdvz?S9MJ_c>B$kLM5W5iLu#Ib_od?;0_vdGE{@rO%QHV;*_(U$ z8S1c1|M)!FIH#t%?GRj!lAhRMgL7akn%akR?Ubj14AKL~qy1Tjs0*Qiu3v+&LDt;AVI8CLk z-M)3af!(T~I2Oj-tBrV4Hj`r2?67gC9M$a8CSSgHk7W7uR&rlE%<$%~_wk#c`3Ang znfaUMe9L3Tb1LesIhkx4h%(t{+xR8r?=^K}lW`GN4KC=xlNN_&?;y5;Y~FP~{^`la zvSaSG2Z_yZQsF|qT@09yb4K(iTnwcITy?k+> zJ_n!T0)uyys>Wp@(LQ@$!^}IC9h=P87?Xpy9%_cuIBsa^7fV+7OV?GVwcJyG7*x{S z7_d~%U}okbOuQ8Eb7o|o!MA<&?V*F{JhDR*NsjZ=g*7JkGt zkcS1=Cr^juy|c@80T~6x+>~gkw3GYJ15~qmmb<=@^X;+>emjB zh$v0oc~tHloR#V@=Tvyx;ERVkRqmL+0fL)~6L)YWmn#8x z#X5XUvmnWPJm;nRX`@h}U8*xTu~BlCE$j5Cz>4vwZ&e~hNrbYPAl!uFZhm1vpWpE5 z4Ew-j$b3wCISs#IAu|9$fs*Rz<7D;~cxm(DbNkoZR9r`2RwsrlH4R1mvj4I5XK4Qc zyKR@^G`j^jB-iVT2KF9Mj@bqJehZHfj|pLx`eKF&!aI+peV40#qG)mwQqvT#cFkBW zeJZn9R4yJ85yn91$TL(VCUxv|&!usn9#_pDFXmH@E1`3wHza<}FlKa-h>%cDs?RX0 zhn-x*eO!&yQ1*NOMl$oSc=UhCc>WzBpH*$ZZ0MXyLx4C@ z$j9#7!~7L}16Th7y>KIxbCN|qSpCX5$9-~VDI2cUt3*5s*5%EJYeS7+Bh+6I@yU=N z{NkpXtYIcR(fG~dX!59@;pQ5?2U)ABoV>1VYx;N`Mdp*#vYw$K{MyV`)VKZEn#USM zP?JmJI2vk=tOPmLlmVpcT+kOgt%0P)wZzWz_yp!F=RwUf)&0+8{Vz}s#6pA)Z=CME zE?<%NPk_-LH){|!qJp{h4ux;roE0?GE6Xr?^ZMW-l;mIOZ#Z%B+vVo)_=MyV$oIog z*aAdi0;m<6`3}*CL#~-W3S3c3L~E#WUH1HP4pW=_T!$awzMX10Q8d?`|$q z);A29!DDh_oqG8r9VyTIii@Sl`NkhX|InaVvkZ<*^OpHNW_+$+9--V-;X}+q_J=7M zPu;@LRwp`(M91 z0IRu7Gh7ekhY>n`z)h=BRQ#$vf-e#EB_`6CX~b7(f@W91%2uNJW~F;wZW(}0pbDYo zSIL8U+PkH#L3DrpWQ&Gy?v34u8eud@S`^I(mRW%y86WLJf?2v(zj1wvsCSj~y{Q;% zLo}m;^Bnr!NWPz=c&wImr+mPGf4Sj%^fI;sEU*bG6mt?091nOxwiR7o3A0yk)S4@f z;dl92myRrO+!%On6q_!!4~xZ>nuhuZfMXR(h}Fz$`5L=iJLauSliqUIb;kJkdjSmZkAp<;at*S75xL@%JYv#T^YKOvIKxzK3Dx zC>Ye{$>(htDYw()oE_GfA3qwbaMLFWr(Pp4eivi5^mr_S8%y|AMYvbvSzW1_G+tL& za>pjIBIU86_ZW-5|BtpiDxDI#=0dd4xGHl}g8hzeOMv~2^6GKubM#($S|4*qG4%9u z!P&CX+ArZAQuIi5wJU8fvj+mMv3pjW1|zT?Y2K;K72M5QlLv}#t!bylUSvC+7E7)J zd3U$|c45va(bD#M5fhIE)CWsW96?1T8fi*wz6J$g$@np$ChWfi+H0e&lBuC@t?Fr@ zs@@0pS_bQN%^7i%^kn!=qU3=+q=POl_1-=^fi=p1;&YA^ZEjqsfVPtU$2Z=jc0JpNmhV@d-;vXY$7^{NFIZeIh{NtL6HvB3RxLW%Ty2k=%j@gwBGpd^0*AYP za9Nq%WjttLP9i%qvDmPjXN`A@Iltu|=HxpAhK10j9mK+{_b2BpCQMeHAhZs&@&2;= zbtV1`L9WUywWq_B8Dt5V2Wjskmrdj^4mXSFp(z>o-VCw|e$N+7TP49khe1!uP6RPs zo?Hdu>*w5k2cm?P1O^{DI(8n_`L0+l=4XP{ItfakRv`>;Z|fJHwY3NC<<&Y9N;*6k z23gF)d;nn?hY`wOrPAJ(PT!B=O5OMYKeSWth|J1l-fQ*sy}h|12rDwiKsF3khq8;= zIWj*|eev{w9zd7<;>-#ae-s#L-@@y4y9-W!Yl}o&azjU!l#?Bs1{!@xxHS@FI@%8< z6PG3xT$L^|N#G4MmsNNw@V(H+hDpBdq4vet*FEf^kPK&T#bb=3Q=h@`Ow)_HYZZr@9TdaF`dp(ANbmMx>V)i)X#TLTgyd^rK;N04XdBCE*LNWb&53{Nw()T>xX3 z+#A&b7Cy8kkTT{^x+d^^{#R>m8#<^!`I!V9K~GvM>40fs|t@)!!>!Hpvg)bGEKJ0BzQk->blg`e4D44Zvj2#lAbP0kajYE4NXJ}Omml~~kZd2j;(FDXLOEy1Dc;}n zfbwLFud1zegb$*)n&aMIIajy>4pHR21Q#B+D)`@*KK~PZ|D!(o|Aqd&I`aP$JE33~ z%TYkt*q|q9V?f)lO7@EZ*ZCH|Cs)s1A2<$Y(;bJ?U2jO<1_4aA1z4AZXrcUgBp^h# zpAs&6?Kmm==6@RtI_x8FAKe&*h6L**C9VcKh>qL^xVhbR#pTKXaJl3RswDD~HWo{(kSup=}4w7~Mq38G=E(Amwq9TA-Qd4MLZbI<_d;~X%%O3d=B?K4cJmFo~H{o>+!VY zb&8!oRHl+ar>MXtr~f+1%H~uPUusg{*_n( zhOP^ym;o_XRbc4gAM0b|)cMj{UDtK_R;;2tnkwtC)F+rw%XJpZ^q~chAoiH$C35LF z0<9k-`w+2CShq;PP4A zoNOc|t9O*Me)4Z;P>E#))6=0Ig&%J;$8Q8EBIAS@w!0yQ_ZO)Q+K(~m<<{PCnCl~L zYKdfnX}*W%kwOw<0`%vI6F#kIIIU@#jW;Jw@YA=ev$Jbc95rDT$0Ghdq?fKsPc^zE zWSK<~nzWa%r{3m9zF3y}GNk)4)$#3$s;MhpXDgS*x>^&&BWD%?|EO;wS}%mj8P)#5 zLZ2Y37WIp^t2H3qwNBdv>HBh-6j>s_B00(ynRuo$&hWkMe^RdgNAH?fPl4o$hXDDI z$ihq6z{RP%yrKJd7{ZV5!0n?Tv3vZ4vuC{Ia6-R@KKj3U@&io4vM^9x7MWtu_B3i|RIqNv(A2tKzLoH* zd(>>NN`eXJ4I!tzO2D{TJhYx@%BN`k`MzPYhJAqWD-9leWV9>8@Qcs6XTrlL4@VR+ zde7Fb8rSnnsg8s(Ko}C;0f%4RT8-(BPJ@I^z&~HgS;&m|-=@NEe{%(^6RV2gg;6?j zS~%@=4nm3yJ@Qlk>1afx@ltuQFUQ@#oi9UQtXT`)waAShC`0-Jbk7|u=SF-swLh+3A%lohRh^qK`>91+Rg>!GnBk{pW9f`mRP9B;(p z?*@o*D5x1~fKSU3%DW@SXF3JMO4&-y6_mP#%%pA?%Y&v@(;MI_sAxhHVvs%)MZKo` z@vwsL=t+!n6rR&2_Uk((fBi2@$s73FDE16(i_%m73G`cE-oa)8kRE#vp^ZLLkfE6j zXY|xjsQHI4cXRLEjVc_aZLk&H8>!MwO2y5x*xi}*Lr0;qSkxFe!Kr>Z_4ZaoJaMvBpvC34WWqKpA5brw~v)tRU+sP(}o~jKaJ)c!V?^V8`ghTH0Z*~Z>amfnG zdLv&T6T|0**bFd2@(a9NxTb0~U2;;yic?6YaW=U<1f0kC!z4=3#-RxHyEyLjcQ;l7 zt;fh2YAa!^JU{6&b~V%=`zN|}yFwRQd@Y?9)2v4o*nj+GT!|HDaTOgf zi6lKJZ{^_E`gN9$SXZc6Te;Y-9t_~s3_d_IOT}Tb_$I3;c>If6!DGfVnLk9hF@O2L z*gXgpo|FS2^h=IPJ`T`--fgZLevUOWwx5F;f*5N0Axdp1%aZ6C%q@F?^Z+6P`2l1Q z38Eo{3Zvi!_1~&)B6LVEaGvJFF-BLBx2pqhwf|{;wO#mIK=7F{dO}KCe6p70 zQs9E~bRbJr2w#V$Z6xgA+lsDr^bCr^5Jn}*A1m;89RDJAm4(c zq>Sp=Zj}tR6;b{6ww;a#DRuHTMZhf|ctrjhtWm9zyb4czV0Lv8HW%*S*cdB{x}3&k z{&H62f9J4M2aOW=#Laysg(^QnB$}CG5C%!KeT@0rFh~*c;acl3Yz(Z({x}J6`gA34p4S){8QQx1s+56Qd$z literal 0 HcmV?d00001 diff --git a/windows/deployment/volume-activation/install-vamt.md b/windows/deployment/volume-activation/install-vamt.md index 60ff12dd1d..a4905eb8ae 100644 --- a/windows/deployment/volume-activation/install-vamt.md +++ b/windows/deployment/volume-activation/install-vamt.md @@ -8,7 +8,7 @@ ms.sitesec: library ms.pagetype: activation author: jdeckerms ms.localizationpriority: medium -ms.date: 04/25/2018 +ms.date: 03/11/2019 ms.topic: article --- @@ -18,7 +18,7 @@ This topic describes how to install the Volume Activation Management Tool (VAMT) ## Install VAMT -You can install VAMT as part of the [Windows Assessment and Deployment Kit (ADK)](https://go.microsoft.com/fwlink/p/?LinkId=526740) for Windows 10. +You install VAMT as part of the Windows Assessment and Deployment Kit (ADK) for Windows 10. >[!IMPORTANT]   >VAMT requires local administrator privileges on all managed computers in order to deposit confirmation IDs (CIDs), get the client products’ license status, and install product keys. If VAMT is being used to manage products and product keys on the local host computer and you do not have administrator privileges, start VAMT with elevated privileges. For Active Directory-Based Activation use, for best results we recommend running VAMT while logged on as a domain administrator.  @@ -26,24 +26,46 @@ You can install VAMT as part of the [Windows Assessment and Deployment Kit (ADK) >[!NOTE]   >The VAMT Microsoft Management Console snap-in ships as an x86 package. -To install SQL Server Express: -1. Install the Windows ADK. -2. Ensure that **Volume Activation Management Tool** is selected to be installed. -3. Click **Install**. +### Requirements + +- [Windows Server with Desktop Experience](https://docs.microsoft.com/windows-server/get-started/getting-started-with-server-with-desktop-experience), with internet access and all updates applied +- [Windows 10, version 1809 ADK](https://go.microsoft.com/fwlink/?linkid=2026036) +- [SQL Server 2017 Express](https://www.microsoft.com/sql-server/sql-server-editions-express) + +### Install SQL Server 2017 Express + +1. Download and open the [SQL Server 2017 Express](https://www.microsoft.com/sql-server/sql-server-editions-express) package. +2. Select **Basic**. +3. Accept the license terms. +4. Enter an install location or use the default path, and then select **Install**. +5. On the completion page, note the instance name for your installation, select **Close**, and then select **Yes**. + ![In this example, the instance name is SQLEXPRESS01](images/sql-instance.png) + +### Install VAMT using the ADK + +1. Download and open the [Windows 10, version 1809 ADK](https://go.microsoft.com/fwlink/?linkid=2026036) package. +2. Enter an install location or use the default path, and then select **Next**. +3. Select a privacy setting, and then select **Next**. +4. Accept the license terms. +5. On the **Select the features you want to install** page, select **Volume Activation Management Tool (VAMT)**, and then select **Install**. (You can select additional features to install as well.) +6. On the completion page, select **Close**. + +### Configure VAMT to connect to SQL Server 2017 Express + +1. Open **Volume Active Management Tool 3.1** from the Start menu. +2. Enter the server instance name and a name for the database, select **Connect**, and then select **Yes** to create the database. See the following image for an example. + + ![Server name is .\SQLEXPRESS and database name is VAMT](images/vamt-db.png) -## Select a Database -VAMT requires a SQL database. After you install VAMT, if you have a computer information list (CIL) that was created in a previous version of VAMT, you must import the list into a SQL database. If you do not have SQL installed, you can [download a free copy of Microsoft SQL Server Express](https://www.microsoft.com/sql-server/sql-server-editions-express) and create a new database into which you can import the CIL. -You must configure SQL installation to allow remote connections and you must provide the corresponding server name in the format: *Machine Name\\SQL Server Name*. If a new VAMT database needs to be created, provide a name for the new database. ## Uninstall VAMT -To uninstall VAMT via the **Programs and Features** Control Panel: -1. Open the **Control Panel** and select **Programs and Features**. +To uninstall VAMT using the **Programs and Features** Control Panel: +1. Open **Control Panel** and select **Programs and Features**. 2. Select **Assessment and Deployment Kit** from the list of installed programs and click **Change**. Follow the instructions in the Windows ADK installer to remove VAMT. -## Related topics -- [Install and Configure VAMT](install-configure-vamt.md) +