mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-21 21:33:38 +00:00
stuff
This commit is contained in:
@ -18,11 +18,14 @@
|
|||||||
#### [Deployment phases](microsoft-defender-atp/deployment-phases.md)
|
#### [Deployment phases](microsoft-defender-atp/deployment-phases.md)
|
||||||
|
|
||||||
#### [Phase 1: Plan](microsoft-defender-atp/prepare-deployment.md)
|
#### [Phase 1: Plan](microsoft-defender-atp/prepare-deployment.md)
|
||||||
##### [Validate licensing and complete setup](microsoft-defender-atp/licensing.md)
|
#### [Validate licensing and complete setup](microsoft-defender-atp/licensing.md)
|
||||||
|
##### [Evaluate capabilities](microsoft-defender-atp/evaluation-lab.md)
|
||||||
|
##### [Security compass](microsoft-defender-atp/security-compass.md)
|
||||||
|
|
||||||
#### [Phase 2: Pilot/Evaluate the capabilities](microsoft-defender-atp/evaluation-lab.md)
|
#### [Phase 2: Onboard](microsoft-defender-atp/production-deployment.md)
|
||||||
|
|
||||||
#### [Phase 3: Deploy](microsoft-defender-atp/production-deployment.md)
|
|
||||||
|
#### [Phase 3: Configure](microsoft-defender-atp/configure.md)
|
||||||
|
|
||||||
### [Configuration guide]()
|
### [Configuration guide]()
|
||||||
#### [Configure and manage capabilities]()
|
#### [Configure and manage capabilities]()
|
||||||
@ -309,9 +312,9 @@
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
#### [Custom detections]()
|
##### [Custom detections]()
|
||||||
##### [Understand custom detection rules](microsoft-defender-atp/overview-custom-detections.md)
|
###### [Understand custom detection rules](microsoft-defender-atp/overview-custom-detections.md)
|
||||||
##### [Create and manage custom detections rules](microsoft-defender-atp/custom-detection-rules.md)
|
###### [Create and manage custom detections rules](microsoft-defender-atp/custom-detection-rules.md)
|
||||||
|
|
||||||
|
|
||||||
#### [Security administration]()
|
#### [Security administration]()
|
||||||
@ -374,7 +377,7 @@
|
|||||||
#### [Network firewall](windows-firewall/windows-firewall-with-advanced-security.md)
|
#### [Network firewall](windows-firewall/windows-firewall-with-advanced-security.md)
|
||||||
|
|
||||||
#### [Next-generation protection](windows-defender-antivirus/windows-defender-antivirus-in-windows-10.md)
|
#### [Next-generation protection](windows-defender-antivirus/windows-defender-antivirus-in-windows-10.md)
|
||||||
##### [Better together: Windows Defender Antivirus and Microsoft Defender ATP](windows-defender-antivirus/why-use-microsoftntivirus.md)
|
##### [Better together: Windows Defender Antivirus and Microsoft Defender ATP](windows-defender-antivirus/why-use-microsoft-antivirus.md)
|
||||||
|
|
||||||
#### [Endpoint detection and response]()
|
#### [Endpoint detection and response]()
|
||||||
#####[Endpoint detection and response overview](microsoft-defender-atp/overview-endpoint-detection-response.md)
|
#####[Endpoint detection and response overview](microsoft-defender-atp/overview-endpoint-detection-response.md)
|
||||||
|
@ -0,0 +1,19 @@
|
|||||||
|
---
|
||||||
|
title: Configure capabilities
|
||||||
|
description:
|
||||||
|
keywords:
|
||||||
|
search.product: eADQiWindows 10XVcnh
|
||||||
|
ms.prod: w10
|
||||||
|
ms.mktglfcycl: deploy
|
||||||
|
ms.sitesec: library
|
||||||
|
ms.pagetype: security
|
||||||
|
ms.author: macapara
|
||||||
|
author: mjcaparas
|
||||||
|
ms.localizationpriority: medium
|
||||||
|
manager: dansimp
|
||||||
|
audience: ITPro
|
||||||
|
ms.collection: M365-security-compliance
|
||||||
|
ms.topic: article
|
||||||
|
---
|
||||||
|
|
||||||
|
# Configure capabilities
|
@ -18,4 +18,47 @@ ms.topic: article
|
|||||||
|
|
||||||
# Deployment phases
|
# Deployment phases
|
||||||
|
|
||||||
|
There are three phases in deploying Microsoft Defender ATP:
|
||||||
|
|
||||||
|
|
||||||
|
<br>
|
||||||
|
<table border="0" width="100%" align="center">
|
||||||
|
<tr style="text-align:center;">
|
||||||
|
<td align="center" style="width:25%; border:0;">
|
||||||
|
<a href= "/windows/microsoft-defender-atp/prepare-deployment">
|
||||||
|
<img src="images/plan.png" alt="Plan to deploy Microsoft Defender ATP" title="Plan" />
|
||||||
|
<br/>Plan </a><br>
|
||||||
|
</td>
|
||||||
|
<td align="center">
|
||||||
|
<a href="/windows/microsoft-defender-atp/production-deployment">
|
||||||
|
<img src="images/oboard.png" alt="Onboard to the Microsoft Defender ATP service" title="Onboard to Microsoft Defender ATP" />
|
||||||
|
<br/>Onboard </a><br>
|
||||||
|
</td>
|
||||||
|
<td align="center">
|
||||||
|
<a href="/windows/microsoft-defender-atp/configure">
|
||||||
|
<img src="images/configure.png" alt="Configure capabilities" title="Configure capabilities" />
|
||||||
|
<br/>Configure </a><br>
|
||||||
|
</tr>
|
||||||
|
</table>
|
||||||
|
|
||||||
|
## Plan
|
||||||
|
The planning phase guides you through what you need to consider when deploying Microsoft Defender ATP.
|
||||||
|
|
||||||
|
You will need to consider the following:
|
||||||
|
- Stakeholders and Sign-off
|
||||||
|
- Environment considerations
|
||||||
|
- Access
|
||||||
|
- Adoption order
|
||||||
|
|
||||||
|
You can use the security compass to better prepare you in the deployment journey.
|
||||||
|
|
||||||
|
## Onboard
|
||||||
|
The onboarding phase covers the initial steps you'll take as you first access Microsoft Defender Security Center. You'll be guided on:
|
||||||
|
|
||||||
|
- Validating the licensing
|
||||||
|
- Completing the setup wizard within the portal
|
||||||
|
- Network configuration
|
||||||
|
= Onboarding a device
|
||||||
|
|
||||||
|
## Configure
|
||||||
|
Maximize the Microsoft Defender ATP capabilities by configuring the components that make up the platform.
|
Binary file not shown.
After Width: | Height: | Size: 12 KiB |
Binary file not shown.
After Width: | Height: | Size: 4.7 KiB |
Binary file not shown.
After Width: | Height: | Size: 2.0 KiB |
Binary file not shown.
After Width: | Height: | Size: 11 KiB |
Binary file not shown.
After Width: | Height: | Size: 11 KiB |
Binary file not shown.
After Width: | Height: | Size: 2.6 KiB |
@ -0,0 +1,24 @@
|
|||||||
|
---
|
||||||
|
title: Security compass
|
||||||
|
description:
|
||||||
|
keywords:
|
||||||
|
search.product: eADQiWindows 10XVcnh
|
||||||
|
ms.prod: w10
|
||||||
|
ms.mktglfcycl: deploy
|
||||||
|
ms.sitesec: library
|
||||||
|
ms.pagetype: security
|
||||||
|
ms.author: macapara
|
||||||
|
author: mjcaparas
|
||||||
|
ms.localizationpriority: medium
|
||||||
|
manager: dansimp
|
||||||
|
audience: ITPro
|
||||||
|
ms.collection: M365-security-compliance
|
||||||
|
ms.topic: article
|
||||||
|
---
|
||||||
|
|
||||||
|
# Security compass
|
||||||
|
|
||||||
|
Use the security compass as a guide in
|
||||||
|
|
||||||
|
|
||||||
|
Put Chris Hatley's visios here
|
Reference in New Issue
Block a user