mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-18 00:07:23 +00:00
fix-suggestions
To fix suggestions
This commit is contained in:
parent
c331cfda2c
commit
472b62781d
@ -51,7 +51,7 @@ Learn how to deploy Defender for Endpoint for Android on Intune Company Portal -
|
||||
center](https://go.microsoft.com/fwlink/?linkid=2109431) , go to **Apps** \>
|
||||
**Android Apps** \> **Add \> Android store app** and choose **Select**.
|
||||
|
||||

|
||||

|
||||
|
||||
|
||||
2. On the **Add app** page and in the *App Information* section enter:
|
||||
@ -63,7 +63,7 @@ center](https://go.microsoft.com/fwlink/?linkid=2109431) , go to **Apps** \>
|
||||
|
||||
Other fields are optional. Select **Next**.
|
||||
|
||||

|
||||

|
||||
|
||||
3. In the *Assignments* section, go to the **Required** section and select **Add group.** You can then choose the user group(s) that you would like to target Defender for Endpoint for Android app. Choose **Select** and then **Next**.
|
||||
|
||||
@ -71,14 +71,14 @@ center](https://go.microsoft.com/fwlink/?linkid=2109431) , go to **Apps** \>
|
||||
>The selected user group should consist of Intune enrolled users.
|
||||
|
||||
> [!div class="mx-imgBorder"]
|
||||
> 
|
||||
> 
|
||||
|
||||
|
||||
4. In the **Review+Create** section, verify that all the information entered is correct and then select **Create**.
|
||||
|
||||
In a few moments, the Defender for Endpoint app would be created successfully, and a notification would show up at the top-right corner of the page.
|
||||
|
||||

|
||||

|
||||
|
||||
|
||||
5. In the app information page that is displayed, in the **Monitor** section,
|
||||
@ -86,7 +86,7 @@ select **Device install status** to verify that the device installation has
|
||||
completed successfully.
|
||||
|
||||
> [!div class="mx-imgBorder"]
|
||||
> 
|
||||
> 
|
||||
|
||||
|
||||
### Complete onboarding and check status
|
||||
@ -123,14 +123,14 @@ center](https://go.microsoft.com/fwlink/?linkid=2109431) , go to **Apps** \>
|
||||
**Android Apps** \> **Add** and select **Managed Google Play app**.
|
||||
|
||||
> [!div class="mx-imgBorder"]
|
||||
> 
|
||||
> 
|
||||
|
||||
|
||||
2. On your managed Google Play page that loads subsequently, go to the search
|
||||
box and lookup **Microsoft Defender.** Your search should display the Microsoft
|
||||
Defender for Endpoint app in your Managed Google Play. Click on the Microsoft Defender for Endpoint app from the Apps search result.
|
||||
|
||||

|
||||

|
||||
|
||||
3. In the App description page that comes up next, you should be able to see app
|
||||
details on Defender for Endpoint. Review the information on the page and then
|
||||
@ -180,7 +180,7 @@ Defender ATP should be visible in the apps list.
|
||||
|
||||
1. In the **Apps** page, go to **Policy > App configuration policies > Add > Managed devices**.
|
||||
|
||||

|
||||

|
||||
|
||||
1. In the **Create app configuration policy** page, enter the following details:
|
||||
|
||||
@ -200,19 +200,19 @@ Defender ATP should be visible in the apps list.
|
||||
Then select **OK**.
|
||||
|
||||
> [!div class="mx-imgBorder"]
|
||||
> 
|
||||
> 
|
||||
|
||||
|
||||
1. You should now see both the permissions listed and now you can autogrant both by choosing autogrant in the **Permission state** drop-down and then select **Next**.
|
||||
|
||||
> [!div class="mx-imgBorder"]
|
||||
> 
|
||||
> 
|
||||
|
||||
|
||||
1. In the **Assignments** page, select the user group to which this app config policy would be assigned to. Click **Select groups to include** and selecting the applicable group and then selecting **Next**. The group selected here is usually the same group to which you would assign Microsoft Defender for Endpoint Android app.
|
||||
|
||||
> [!div class="mx-imgBorder"]
|
||||
> 
|
||||
> 
|
||||
|
||||
|
||||
1. In the **Review + Create** page that comes up next, review all the information and then select **Create**. <br>
|
||||
@ -220,7 +220,7 @@ Defender ATP should be visible in the apps list.
|
||||
The app configuration policy for Defender for Endpoint autogranting the storage permission is now assigned to the selected user group.
|
||||
|
||||
> [!div class="mx-imgBorder"]
|
||||
> 
|
||||
> 
|
||||
|
||||
|
||||
10. Select **Microsoft Defender ATP** app in the list \> **Properties** \>
|
||||
|
@ -58,11 +58,11 @@ For the Application registration stage, you must have a **Global administrator**
|
||||
|
||||
- **Note**: WindowsDefenderATP does not appear in the original list. You need to start writing its name in the text box to see it appear.
|
||||
|
||||

|
||||

|
||||
|
||||
- Choose **Application permissions** > **Alert.Read.All** > Click on **Add permissions**
|
||||
|
||||

|
||||

|
||||
|
||||
**Important note**: You need to select the relevant permissions. 'Read All Alerts' is only an example!
|
||||
|
||||
|
@ -31,7 +31,7 @@ Automating security procedures is a standard requirement for every modern Securi
|
||||
|
||||
Microsoft Defender API has an official Flow Connector with many capabilities.
|
||||
|
||||

|
||||

|
||||
|
||||
## Usage example
|
||||
|
||||
@ -41,15 +41,15 @@ The following example demonstrates how to create a Flow that is triggered any ti
|
||||
|
||||
2. Go to **My flows** > **New** > **Automated-from blank**.
|
||||
|
||||

|
||||

|
||||
|
||||
3. Choose a name for your Flow, search for "Microsoft Defender ATP Triggers" as the trigger, and then select the new Alerts trigger.
|
||||
|
||||

|
||||

|
||||
|
||||
Now you have a Flow that is triggered every time a new Alert occurs.
|
||||
|
||||

|
||||

|
||||
|
||||
All you need to do now is choose your next steps.
|
||||
For example, you can isolate the device if the Severity of the Alert is High and send an email about it.
|
||||
@ -63,7 +63,7 @@ The Alert trigger provides only the Alert ID and the Machine ID. You can use the
|
||||
|
||||
3. Set the **Alert ID** from the last step as **Input**.
|
||||
|
||||

|
||||

|
||||
|
||||
### Isolate the device if the Alert's severity is High
|
||||
|
||||
@ -73,7 +73,7 @@ The Alert trigger provides only the Alert ID and the Machine ID. You can use the
|
||||
|
||||
If yes, add the **Microsoft Defender ATP - Isolate machine** action with the Machine ID and a comment.
|
||||
|
||||

|
||||

|
||||
|
||||
3. Add a new step for emailing about the Alert and the Isolation. There are multiple email connectors that are very easy to use, such as Outlook or Gmail.
|
||||
|
||||
|
@ -84,9 +84,9 @@ Field numbers match the numbers in the images below.
|
||||
|
||||

|
||||
|
||||

|
||||

|
||||
|
||||

|
||||

|
||||
|
||||

|
||||
|
||||
|
@ -92,17 +92,17 @@ The first example demonstrates how to connect Power BI to Advanced Hunting API a
|
||||
|
||||
- Click **Edit Credentials**
|
||||
|
||||

|
||||

|
||||
|
||||
- Select **Organizational account** > **Sign in**
|
||||
|
||||

|
||||

|
||||
|
||||
- Enter your credentials and wait to be signed in
|
||||
|
||||
- Click **Connect**
|
||||
|
||||

|
||||

|
||||
|
||||
- Now the results of your query will appear as table and you can start build visualizations on top of it!
|
||||
|
||||
|
Loading…
x
Reference in New Issue
Block a user