This commit is contained in:
Joey Caparas
2020-02-13 16:13:41 -08:00
parent 720a89d387
commit 4cce6a4da4
10 changed files with 96 additions and 7 deletions

View File

@ -18,11 +18,14 @@
#### [Deployment phases](microsoft-defender-atp/deployment-phases.md) #### [Deployment phases](microsoft-defender-atp/deployment-phases.md)
#### [Phase 1: Plan](microsoft-defender-atp/prepare-deployment.md) #### [Phase 1: Plan](microsoft-defender-atp/prepare-deployment.md)
##### [Validate licensing and complete setup](microsoft-defender-atp/licensing.md) #### [Validate licensing and complete setup](microsoft-defender-atp/licensing.md)
##### [Evaluate capabilities](microsoft-defender-atp/evaluation-lab.md)
##### [Security compass](microsoft-defender-atp/security-compass.md)
#### [Phase 2: Pilot/Evaluate the capabilities](microsoft-defender-atp/evaluation-lab.md) #### [Phase 2: Onboard](microsoft-defender-atp/production-deployment.md)
#### [Phase 3: Deploy](microsoft-defender-atp/production-deployment.md)
#### [Phase 3: Configure](microsoft-defender-atp/configure.md)
### [Configuration guide]() ### [Configuration guide]()
#### [Configure and manage capabilities]() #### [Configure and manage capabilities]()
@ -309,9 +312,9 @@
#### [Custom detections]() ##### [Custom detections]()
##### [Understand custom detection rules](microsoft-defender-atp/overview-custom-detections.md) ###### [Understand custom detection rules](microsoft-defender-atp/overview-custom-detections.md)
##### [Create and manage custom detections rules](microsoft-defender-atp/custom-detection-rules.md) ###### [Create and manage custom detections rules](microsoft-defender-atp/custom-detection-rules.md)
#### [Security administration]() #### [Security administration]()
@ -374,7 +377,7 @@
#### [Network firewall](windows-firewall/windows-firewall-with-advanced-security.md) #### [Network firewall](windows-firewall/windows-firewall-with-advanced-security.md)
#### [Next-generation protection](windows-defender-antivirus/windows-defender-antivirus-in-windows-10.md) #### [Next-generation protection](windows-defender-antivirus/windows-defender-antivirus-in-windows-10.md)
##### [Better together: Windows Defender Antivirus and Microsoft Defender ATP](windows-defender-antivirus/why-use-microsoftntivirus.md) ##### [Better together: Windows Defender Antivirus and Microsoft Defender ATP](windows-defender-antivirus/why-use-microsoft-antivirus.md)
#### [Endpoint detection and response]() #### [Endpoint detection and response]()
#####[Endpoint detection and response overview](microsoft-defender-atp/overview-endpoint-detection-response.md) #####[Endpoint detection and response overview](microsoft-defender-atp/overview-endpoint-detection-response.md)

View File

@ -0,0 +1,19 @@
---
title: Configure capabilities
description:
keywords:
search.product: eADQiWindows 10XVcnh
ms.prod: w10
ms.mktglfcycl: deploy
ms.sitesec: library
ms.pagetype: security
ms.author: macapara
author: mjcaparas
ms.localizationpriority: medium
manager: dansimp
audience: ITPro
ms.collection: M365-security-compliance
ms.topic: article
---
# Configure capabilities

View File

@ -18,4 +18,47 @@ ms.topic: article
# Deployment phases # Deployment phases
There are three phases in deploying Microsoft Defender ATP:
<br>
<table border="0" width="100%" align="center">
<tr style="text-align:center;">
<td align="center" style="width:25%; border:0;">
<a href= "/windows/microsoft-defender-atp/prepare-deployment">
<img src="images/plan.png" alt="Plan to deploy Microsoft Defender ATP" title="Plan" />
<br/>Plan </a><br>
</td>
<td align="center">
<a href="/windows/microsoft-defender-atp/production-deployment">
<img src="images/oboard.png" alt="Onboard to the Microsoft Defender ATP service" title="Onboard to Microsoft Defender ATP" />
<br/>Onboard </a><br>
</td>
<td align="center">
<a href="/windows/microsoft-defender-atp/configure">
<img src="images/configure.png" alt="Configure capabilities" title="Configure capabilities" />
<br/>Configure </a><br>
</tr>
</table>
## Plan
The planning phase guides you through what you need to consider when deploying Microsoft Defender ATP.
You will need to consider the following:
- Stakeholders and Sign-off
- Environment considerations
- Access
- Adoption order
You can use the security compass to better prepare you in the deployment journey.
## Onboard
The onboarding phase covers the initial steps you'll take as you first access Microsoft Defender Security Center. You'll be guided on:
- Validating the licensing
- Completing the setup wizard within the portal
- Network configuration
= Onboarding a device
## Configure
Maximize the Microsoft Defender ATP capabilities by configuring the components that make up the platform.

Binary file not shown.

After

Width:  |  Height:  |  Size: 12 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 4.7 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 2.0 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 11 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 11 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 2.6 KiB

View File

@ -0,0 +1,24 @@
---
title: Security compass
description:
keywords:
search.product: eADQiWindows 10XVcnh
ms.prod: w10
ms.mktglfcycl: deploy
ms.sitesec: library
ms.pagetype: security
ms.author: macapara
author: mjcaparas
ms.localizationpriority: medium
manager: dansimp
audience: ITPro
ms.collection: M365-security-compliance
ms.topic: article
---
# Security compass
Use the security compass as a guide in
Put Chris Hatley's visios here