mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-21 21:33:38 +00:00
stuff
This commit is contained in:
@ -18,11 +18,14 @@
|
||||
#### [Deployment phases](microsoft-defender-atp/deployment-phases.md)
|
||||
|
||||
#### [Phase 1: Plan](microsoft-defender-atp/prepare-deployment.md)
|
||||
##### [Validate licensing and complete setup](microsoft-defender-atp/licensing.md)
|
||||
#### [Validate licensing and complete setup](microsoft-defender-atp/licensing.md)
|
||||
##### [Evaluate capabilities](microsoft-defender-atp/evaluation-lab.md)
|
||||
##### [Security compass](microsoft-defender-atp/security-compass.md)
|
||||
|
||||
#### [Phase 2: Pilot/Evaluate the capabilities](microsoft-defender-atp/evaluation-lab.md)
|
||||
#### [Phase 2: Onboard](microsoft-defender-atp/production-deployment.md)
|
||||
|
||||
#### [Phase 3: Deploy](microsoft-defender-atp/production-deployment.md)
|
||||
|
||||
#### [Phase 3: Configure](microsoft-defender-atp/configure.md)
|
||||
|
||||
### [Configuration guide]()
|
||||
#### [Configure and manage capabilities]()
|
||||
@ -309,9 +312,9 @@
|
||||
|
||||
|
||||
|
||||
#### [Custom detections]()
|
||||
##### [Understand custom detection rules](microsoft-defender-atp/overview-custom-detections.md)
|
||||
##### [Create and manage custom detections rules](microsoft-defender-atp/custom-detection-rules.md)
|
||||
##### [Custom detections]()
|
||||
###### [Understand custom detection rules](microsoft-defender-atp/overview-custom-detections.md)
|
||||
###### [Create and manage custom detections rules](microsoft-defender-atp/custom-detection-rules.md)
|
||||
|
||||
|
||||
#### [Security administration]()
|
||||
@ -374,7 +377,7 @@
|
||||
#### [Network firewall](windows-firewall/windows-firewall-with-advanced-security.md)
|
||||
|
||||
#### [Next-generation protection](windows-defender-antivirus/windows-defender-antivirus-in-windows-10.md)
|
||||
##### [Better together: Windows Defender Antivirus and Microsoft Defender ATP](windows-defender-antivirus/why-use-microsoftntivirus.md)
|
||||
##### [Better together: Windows Defender Antivirus and Microsoft Defender ATP](windows-defender-antivirus/why-use-microsoft-antivirus.md)
|
||||
|
||||
#### [Endpoint detection and response]()
|
||||
#####[Endpoint detection and response overview](microsoft-defender-atp/overview-endpoint-detection-response.md)
|
||||
|
@ -0,0 +1,19 @@
|
||||
---
|
||||
title: Configure capabilities
|
||||
description:
|
||||
keywords:
|
||||
search.product: eADQiWindows 10XVcnh
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
ms.author: macapara
|
||||
author: mjcaparas
|
||||
ms.localizationpriority: medium
|
||||
manager: dansimp
|
||||
audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: article
|
||||
---
|
||||
|
||||
# Configure capabilities
|
@ -18,4 +18,47 @@ ms.topic: article
|
||||
|
||||
# Deployment phases
|
||||
|
||||
There are three phases in deploying Microsoft Defender ATP:
|
||||
|
||||
|
||||
<br>
|
||||
<table border="0" width="100%" align="center">
|
||||
<tr style="text-align:center;">
|
||||
<td align="center" style="width:25%; border:0;">
|
||||
<a href= "/windows/microsoft-defender-atp/prepare-deployment">
|
||||
<img src="images/plan.png" alt="Plan to deploy Microsoft Defender ATP" title="Plan" />
|
||||
<br/>Plan </a><br>
|
||||
</td>
|
||||
<td align="center">
|
||||
<a href="/windows/microsoft-defender-atp/production-deployment">
|
||||
<img src="images/oboard.png" alt="Onboard to the Microsoft Defender ATP service" title="Onboard to Microsoft Defender ATP" />
|
||||
<br/>Onboard </a><br>
|
||||
</td>
|
||||
<td align="center">
|
||||
<a href="/windows/microsoft-defender-atp/configure">
|
||||
<img src="images/configure.png" alt="Configure capabilities" title="Configure capabilities" />
|
||||
<br/>Configure </a><br>
|
||||
</tr>
|
||||
</table>
|
||||
|
||||
## Plan
|
||||
The planning phase guides you through what you need to consider when deploying Microsoft Defender ATP.
|
||||
|
||||
You will need to consider the following:
|
||||
- Stakeholders and Sign-off
|
||||
- Environment considerations
|
||||
- Access
|
||||
- Adoption order
|
||||
|
||||
You can use the security compass to better prepare you in the deployment journey.
|
||||
|
||||
## Onboard
|
||||
The onboarding phase covers the initial steps you'll take as you first access Microsoft Defender Security Center. You'll be guided on:
|
||||
|
||||
- Validating the licensing
|
||||
- Completing the setup wizard within the portal
|
||||
- Network configuration
|
||||
= Onboarding a device
|
||||
|
||||
## Configure
|
||||
Maximize the Microsoft Defender ATP capabilities by configuring the components that make up the platform.
|
Binary file not shown.
After Width: | Height: | Size: 12 KiB |
Binary file not shown.
After Width: | Height: | Size: 4.7 KiB |
Binary file not shown.
After Width: | Height: | Size: 2.0 KiB |
Binary file not shown.
After Width: | Height: | Size: 11 KiB |
Binary file not shown.
After Width: | Height: | Size: 11 KiB |
Binary file not shown.
After Width: | Height: | Size: 2.6 KiB |
@ -0,0 +1,24 @@
|
||||
---
|
||||
title: Security compass
|
||||
description:
|
||||
keywords:
|
||||
search.product: eADQiWindows 10XVcnh
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
ms.author: macapara
|
||||
author: mjcaparas
|
||||
ms.localizationpriority: medium
|
||||
manager: dansimp
|
||||
audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: article
|
||||
---
|
||||
|
||||
# Security compass
|
||||
|
||||
Use the security compass as a guide in
|
||||
|
||||
|
||||
Put Chris Hatley's visios here
|
Reference in New Issue
Block a user