From 3ecb9770addeb51cca42a467134fe2e6379b5819 Mon Sep 17 00:00:00 2001 From: Gary Moore Date: Thu, 17 Dec 2020 15:59:18 -0800 Subject: [PATCH 1/7] Fixed broken note In an alert (like Note), blank lines must also start with an angle bracket to connect the content on both sides of the blank line. --- .../bitlocker/bitlocker-overview-and-requirements-faq.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/information-protection/bitlocker/bitlocker-overview-and-requirements-faq.yml b/windows/security/information-protection/bitlocker/bitlocker-overview-and-requirements-faq.yml index de4338a325..63b1488107 100644 --- a/windows/security/information-protection/bitlocker/bitlocker-overview-and-requirements-faq.yml +++ b/windows/security/information-protection/bitlocker/bitlocker-overview-and-requirements-faq.yml @@ -56,7 +56,7 @@ sections: > [!NOTE] > TPM 2.0 is not supported in Legacy and CSM Modes of the BIOS. Devices with TPM 2.0 must have their BIOS mode configured as Native UEFI only. The Legacy and Compatibility Support Module (CSM) options must be disabled. For added security Enable the Secure Boot feature. - + > > Installed Operating System on hardware in legacy mode will stop the OS from booting when the BIOS mode is changed to UEFI. Use the tool [MBR2GPT](https://docs.microsoft.com/windows/deployment/mbr-to-gpt) before changing the BIOS mode which will prepare the OS and the disk to support UEFI. - question: How can I tell if a TPM is on my computer? From 1ed3377fb1b1e7adfd433197b5fe57c137be6940 Mon Sep 17 00:00:00 2001 From: Samantha Robertson Date: Thu, 17 Dec 2020 16:05:52 -0800 Subject: [PATCH 2/7] Fixing image links --- .../microsoft-defender-atp/deployment-phases.md | 2 +- .../images/phase-diagrams/deployment-phases.png | Bin 0 -> 5744 bytes .../images/phase-diagrams/migration-phases.png | Bin 0 -> 5711 bytes .../images/phase-diagrams/onboard.png | Bin 0 -> 1960 bytes .../images/phase-diagrams/prepare.png | Bin 0 -> 1713 bytes .../images/phase-diagrams/setup.png | Bin 0 -> 1508 bytes .../mcafee-to-microsoft-defender-migration.md | 2 +- .../mcafee-to-microsoft-defender-onboard.md | 2 +- .../mcafee-to-microsoft-defender-prepare.md | 2 +- .../mcafee-to-microsoft-defender-setup.md | 2 +- .../microsoft-defender-atp/onboarding.md | 2 +- .../microsoft-defender-atp/prepare-deployment.md | 2 +- .../production-deployment.md | 2 +- .../switch-to-microsoft-defender-migration.md | 2 +- .../switch-to-microsoft-defender-onboard.md | 2 +- .../switch-to-microsoft-defender-prepare.md | 2 +- .../switch-to-microsoft-defender-setup.md | 2 +- ...mantec-to-microsoft-defender-atp-migration.md | 2 +- ...symantec-to-microsoft-defender-atp-onboard.md | 2 +- ...symantec-to-microsoft-defender-atp-prepare.md | 2 +- .../symantec-to-microsoft-defender-atp-setup.md | 2 +- 21 files changed, 16 insertions(+), 16 deletions(-) create mode 100644 windows/security/threat-protection/microsoft-defender-atp/images/phase-diagrams/deployment-phases.png create mode 100644 windows/security/threat-protection/microsoft-defender-atp/images/phase-diagrams/migration-phases.png create mode 100644 windows/security/threat-protection/microsoft-defender-atp/images/phase-diagrams/onboard.png create mode 100644 windows/security/threat-protection/microsoft-defender-atp/images/phase-diagrams/prepare.png create mode 100644 windows/security/threat-protection/microsoft-defender-atp/images/phase-diagrams/setup.png diff --git a/windows/security/threat-protection/microsoft-defender-atp/deployment-phases.md b/windows/security/threat-protection/microsoft-defender-atp/deployment-phases.md index 6155038acf..71da90cdfd 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/deployment-phases.md +++ b/windows/security/threat-protection/microsoft-defender-atp/deployment-phases.md @@ -37,7 +37,7 @@ Each section corresponds to a separate article in this solution. ![Image of deployment phases with details from table](images/deployment-guide-phases.png) -![Summary of deployment phases: prepare, setup, onboard](/windows/media/phase-diagrams/deployment-phases.png) +![Summary of deployment phases: prepare, setup, onboard](images/phase-diagrams/deployment-phases.png) |Phase | Description | |:-------|:-----| diff --git a/windows/security/threat-protection/microsoft-defender-atp/images/phase-diagrams/deployment-phases.png b/windows/security/threat-protection/microsoft-defender-atp/images/phase-diagrams/deployment-phases.png new file mode 100644 index 0000000000000000000000000000000000000000..4d2a4fa94646c72b26e978c0c02cad12efb50a7f GIT binary patch literal 5744 zcmb_gXEYo@*A`JDSUu5+7DS2OdssCh(R&TDi!7q|MBhcCTU{h<^cFo>y$8##7Q|w; z=-uc2`JMBf@7Mcd?#wy&oS8fK%slr#PwY#5P4Wkf5Ag8t$bnkwuki5h9o?;MNr>(& z&N$5dZX)&6GK1jZkx~C=+?!koxx&Mv=LD*&y!Ol4frq{`M)~)#MI%M;-LkUua(Qj1 zIp#n3@JaXC1UsYF`Td9%I-ZY?MUV%vueqUL2~RW`OV1rR5M7D<+yyEUi810E^ahUR zJb^vBC01m+30X-hZhcWIu4 zmkMK$T!?=7b`Z81u(I5>N*BZ(1)yeyF7^y_Mgdg2C<);JRgzddT5nYn4lewc zNhHcDymwAcy#JQ-id8I`AiS$f^*aLLXziF39v*HM`l+m}?9TFuN=x(6(9qOg#AlRd za)0*MCi`C@jsMjr8Q{adP)dgsq1Le2P~JmqDCcqfx_0oJ<#V%J`$5=R%>Qy1xs=(V$twhOonSTsI>?aI6V@EUapyPG{oX?I z*2(pacgIADf3S>=ZIUuTlzmC7Co4w0rGPxucuz+g4ZEUY$&-ze7X_T0bhIvz-~$sa ziIBg3AHZ*~l+I7v*G@0XmH0o;kdv9|yC@SK9`Rwuf%@S|x5phJTROwPPGRJOS#8(P z<#!DPwZP#Sx93WU7xWNM-?OrT-?`yl>&D6|?G=H+J?R;d*By*$Syp>u1}={u$PPRP z97gU1rycC*QzRHo-6s*0j`_JXm^spaCJ`5)JfUq~c0MQ%59Zt8;_Vz!q!Be?-?E^D zyEqfZtW$Ux3}vDHbHP3&%7=eo!MFLlyI`|MFr1c_Hp2-SN5>Hi`9)a$OzcN7P|$!W z^om1Zsg{5czD7`o^bd!H-a@&Z;W42yK4#4q6(ZgEonwm4ZiTZ8%B&PhkjAdcxkqjha?V%s?2uULDvH-=jz=}u4GekLeG%12}nzo&)PTx;`0WVdv|w| zjY+!RIKYy6{66%9w_g8Xq!CO_XxOzI6Qf{}rEOfUnwp-@4Cbn34ifgl@N?!e*~sx8 z3!h{;)u2>Y;>>Z?YiyyW*x=yc8rR=n&)Tthp^BS6!-2P*vPypZ)ePiqG-$T=h1cWe zGam+1W1y(uW~CC5$w_+CDS3B1q9$T%E9 zxw+UDSjy6;X+?Ms>>uR!Cq+|3S-`(}tYLNsgsA=j4vx`Kd_xjKzo)pRzglDexw3z0 z{S9620%bBbL|z!+v9>8t*=j%N?&0Cl>iV&mf)MV=a%6K{SaL{n_~-P#BJFpAg?E^S z5rmwaT;{~%o}pFy`$NpZX>E$T{YFZl3KkZYR~8oT>dHuSdwSM`)5#K@7qsm2v(eft z{P(_1*@gQ1`%eb4>s^g~(_uSR4LI*?0S551FOx6QlE@C)&ROmWxeXAo>@lX+vdH=N zCT{;|jD)o|A63mz#x-BQOWv=UscNu_auaPXfe~)L zWdzSSy`DqAeEp>Ixb2Bey*!%r5#geg!l(LxRZohFS_P>r zXMU$gea@52B1}>GN3a(`NnKj&+X-3kzaM==;UJ$ z;vCG4cN|t~AG*t)h5mld;^-{6K|T%9TbE6Ter24izBs*qT?7O_eJa?0u2A0#Maw>D zxt@6GWgV;z`{X)5v_}kCL%8@PyvP-?ytkNI z**fd~BC5OJb2AB1xF%RT`@-4*gk^$qYDY+9Hb8u` zVZ3DwmZ>{Kh#6bDC4Rqxsjn+E!lUDA6>Dwz_HP=Q$%35|us5H`mj-FpPvBS3M}X$I z-QAI*K_vTjFUv7I%+*oq3V6-4ixE{Tsigpjsb}JlcEX!z!b|Gv`946^ne8gP97hw8 zsLWqKBXMRZ;GBh>g~4iwkgg%F-r|!!>u}@Fy5||f^TsO%6iJQWzHtjgXME`+ixE5M zdF&Sh+BPWV{7d_m_j{V1+yeV&uk_2&#v7A{4zFJ%QvxR+}Tr(kFx&AJOYwq!4 zQpDrECCJA*WNZ&KFQly77C%kG*Q0k?jLWjqK3Yt+EBQ;rTX;F#xaEHd^V1w3UhV{tdd zChEk0?p3f|p%>lJtCTx_({87OAIt>v6#d*{A1Xi^H&d4--ap}S|0iZhHb^}9 znPut|X#13GkhbFY!8eqBq66aJRLj zz&0J;H|ud!b)eHPL+hxqfdU&Csf7{Z->-Fyvtu zX>!Hc?rp}k7LDsFYg76_|7@E$OEA43#mhOoCWhVbV?~=Q9^2jLO%!j@RfQZq-w+#z z#Rn}%%x#UiPeeHyE3-k*6)@=25K-qe?@l~!>msNV^-fFfz;c=8=bgD3ksM(jG%#8L z$3WyPJ1w&2-{4}QW^?3mRol@-EX;nD^Jl2bGOxpVATSRtkL4+;UMQF(DfrLt?XD83aN4!cATOMqp^!=z)fA26uX?yjk0wRL+yuU{|VZ?k_h^&Ckm@_1em zxnXbUHG}PBM7bh=_3CThvNA&UMw18k-s_;i(0<~Ox^~kWLF9KyZl3k3;qzn?)}`yu z79~e%5ntMbGq9`+Xs!LQd?hLFBKvpDp!gd852FZ? zsCRQ2@5fe7Ry!z&PFqU6^P%e&WOd8jc+Hte@9V(=RyYK5>$cd{ev4shQ zOoKkYG6Uiglk)Ms`d+<3zGr;xJP&&Id#wwHgMixiLi3UA0nvvn)I;-=c9H_nZ5?vjO1!_N{Nm9rSxp0*UI`bUei=Wtn zGRsg8cFwj^dGCl(h#E*eg04wfSy`>0qEILuv&TgNqyt3!>yJX{j3Gi{ym;2(VlJco zo4-r{RqZGR(cDw^e98p zkBrD?!faL~P4?4=X)4S%(26zz1pPPbLnL8Yj*1`pQX-q%+{0u4%S(?fa&Wn6H13l) z&bLDeMB(!v!igvb6{x9mAOJSHQ%9mQ_c{l2)gnSEe6W){WqI)5D2>m8OV)9BN>GEY(AYQt4zWiyv+<|0~=0(|nn_ z{AE68_|dU6RApZ(_~(>-9t3<8l!;6zrbPdm>&pR96HU^4m!_5%Zf<}5ddaCjWDvy!frM6mhdr1bcNy;$?Vu!ku!`n#_m4 z*BNvxQ0Or3tTv5;0F30tkyUE@99vE4=IDSWbzNini`CDy?^<{p4})p$^Z*|J@KQ>$ zQhjnZt6-A^te&faDUiWuvzlc~_#z*;j#fS+my++uOCq!zk%9i4oF=)lg zd)|Qe+ui0*HvTm>V4jHRFC0h{ky+bQ?WNd%j9g&dKG+&<5|RZ^)XX$B#5q z!n+cYzzp~OD0RA)rw{F0orcoRd~e66n=<07hlPO_r~6-|CLnh62+>7#)4m)ni*b%D z-%w9puu=L-&?Tek&?p$(u*{QfPB&)TSSn}sFS7md)$^3Sy1eFh=+U9|MXqP=9kvKx z&y^n1F{#?O6P&dG)%VfQHu%?LKC1lmk%X}eIXecqd7fmUEml#s%?mY!`y)zS$txsY z_arVVJ5K(5xqrumz%wxUgBYwpB%y&oZqj_jQ!pKgEE?HyU|%^0(KI_a-?yvoejh!4 zyTLSFQ_m5kCS^2E>QxZ>)~&JkPxaV&mTH%gfdY5Bu#Nsjm2m5RgxTtqV^p<*#FFQz z$q7ziZJ zRW!0x5`L|hq+6%l0rN#jFEOiM=NA z&N+_ts!l3`=zB!~w$*pmf$Ihg{V5+0)zZuB#z}#A^IrTLcH}7>zg1oqu@Hxgp4kK+ zzcJssS5#mBhT^V(XhNBRo4>}t9Lz(;GQ;zm8>V|O6WlXadiD!bcs-WH39n8NHhd%H z{H46i_;*;>6c&~x5qP;;ANXS=9tJdhM9ZL?m6bIN`B`77MleMPll18T2c}rrf-nnX zukIQ9>0pshO*)Yji+*RmG`x{Lm5|&}vlAK<5HNbGg6uM;S%6%H^h z$fr>y86aDBZoF?<#JM)8_sj3$U4e-zzW;w}n4S63)FeDSJdU=u7a45}fw5g2d~L^@^YkQ!>}k{0QXVTP0* zP>>E^{_DH_F5mTDoLJ{voU_h8>v{J6ebUiVqo#O3K|nx2t)c!*mw(5H^jH6|mj3&lonn)&e_3w@MTiq3WH!DAWrB{^Rd$ z_NL6JjBSRK|G#G7>gpo>uOQxVARXIXOED=($%|^pwLh~J-tU_La5MEXAv zhHeOmc-@}OL#8u!2NWK6PbpOn#G|7{6D&}SKn+xm+?d*o-sm}O4ks=AR4x&12^GtT z6IO=u`&(>9?;g5BxDT~X-<(gUmq|!^m^@PukFB|?e^-;Y!8fm?uSy#U{CBm&e3%?{`CJvH{{ACiY69)wgnqXg&m`2P+->aj-R)5ETsJZq`jVmVW z!ksWT+=Fta#}DR6`x(N{vj6e_!zJFpKAfu+PSga54sMeG9%<85QzO?I0Ow}cyPNGj ztXF4l9p!WLLh$aJp0IVM$n)&$!8liO@?x^e40-$xi;YVJ!}{(|u;>MyXVoPbuG@xh z7@CxS3gwp}wroG`7L#blR<~P31pq=x$;D5NWNMqFgJSa7bM3!b&|$; zey$CQXTja=wL|5=@u_{h{kvC>2PZ4;651{N`*fiAt+w{{Ta>ZDWRd3MK@(pr<2abv z6o`=+f1bf}h+Zk?s69mTKiuNs&k-4+47v&gi%IV4U0t2=Zf`XWQBe|h$a_vdtL7*6 zmpc}c$g%FBpQXx@|4o~}Z8qe>Gf)jjKhTn@@4vEO3&}*LB*=K8XSgbO| zX2=G#wt;g{s1f0_xc$W@&qep3sW-solzs%WsJ|WwI-&T|DH@CGdw|)QK^VL&r05hw z?&lBK8yH(3GM;15<%_kKpu@%3P14mEd2F>6LZA|h#cEAb46stj4#;kG?5G@tY7Zlp zXwG!3>AWWA=Imz3@3NY!l1HZY_mZW^TnGmSFUA+c7K||%Okq(`Ut~yB9gnd5`auLG z^XG?3jny>CvU)^1CEYhQH8to{rHr%eSE&m75r2z_I108)LPEfPuQ|6K!V4d_wR|h2 z_iA<28+qc2+w(Jx>zGr8)ePC({qJ2mI6ibxnWh_jr&c)JndmlDe7Lh;tI{=S*uCIG zTiTl@94xG^HmPo7(w9u_T{v;_WBBkIJX%yy<&At{rUB=CIt7|i5^)bY`;#T5{W~zv zGKY~sLys)J{YJY7c{+M2r2k-V&U-&9w)Sdm-#R1!S>96sV?+<^sZ;O{t zvmiX(kocx?$;SfS(ofF>x&fx$o;$odJOeQV9J- zFC@fkCW{&;ge#1anfbv%ozk6`$3X%UzLb9SH^R4<1;26T!i^(kYR)dA6N_{8Ybe20 znrP`Tz0#`Y9K{y_SuriXl>&*Dq}q9{t7$23F4NA0yEE?IETLZ_((h2p_S{R4Chba# z+V8k7k|FQXDB|lSo%Fczb&O%F^Jeh5%+Fm#S>|l!@qM8QfvLBaOI38{tHxfR^!ICV zoX(z@Q~-NAledzKtA?t-tL%a|K-h2Yeg{79Uo3$XT7jOI+_6Du#WNq=w_nBn+g~ca z*W-VxU0D2!B=237!EuM?+dC~R1#>RJN-&=Ri1-!0r_E6bEkl+p{xNk(SLu&IU9hVe ztFvsSrfIL=m=Uv%_xEO>{^k7y204*f=FYwumW*bJglYPBHeP?l$=cqCpIo2nXql1= z|2~PCUK3>Zy?z~=^l$5fwRxDR@oMbB5RFf!ZDpjr3VapKHmyq8Xb7l(pNgtr?Eek= zj(}F|TW?14^6U_f^`0<2W2}^qNb3%BG%$85mld8%jp9}K7}875a$szd4Rj*WEvZ9w z#u|!G%J;*9lB6DL9lglUk4MQJpoxl-J4?ETdvDeW{G+1`n>`{m{98k$xwRKV5p#Vv z19}CEM0mbQ38!Kf8$OXO2(xNSC68xzWm|1enj~OjkHs18Qk6|cLQw@5j;+gOw`z4{B#Rks0oLJSSOW*#0Pi=YlO+x`? zNwl*F)X&+sg+fYLs3q^Ce1F~C%!!{78h^RmT4ITWUpn-$m{9}>aF((;8f;QWM@{rW z%vYJje!IjY9?~0*RP{YMxx8wx8yH?XSyS0}I=EudT5*ZvQdDGgFm( z;hxhH2xjPH{bVg>>FEBZ;eGhpSX zNt-ICMPYZF$Q@|^@h(o<8HG?+2F8yxgGbUR!m@~`L{NlI)z>*)QIwO5 zTUEF`<50@5gOQHTr0Ic>=MQ@26-l_Zfbs@)4_J#k-2`j4bykkKZw5xX+m>l{^qZnw z`BtMOtCZ5PjCb~)8u~0}U$SD0Fc7KA3c&;wv%%IbD>6R&@(nev@T;vru%T4NfV{YWo^W&$JCnt=cWQDqt!%my* z5fQyv)c2?rWuja&`N-J?2Y!^ozp`1i74Ob4NTO%1hzb3Uw4;Ok%^#U6UWn(%%H9zZ z5wabaIl!*B3o&YbtyamsdQd%2>9d$K2Wqf~^Dk;%s zC%)n|GZMq{R+_1;QUvGFRAz*HdDp;O@ta6ewioqRAA?hMk27gbWhSX$MUyG@o6s^Q z%8dzFv2D-&-L@R_sfjYAz8zP7diFTsdxrRflAk3!f_8uu$L8WLeIV8QZW8TllKgXMM8geBEiy;SmswU%(#=#hxBs|NjA(H$N7}d;|BL4y z@D-&+f7rV$Eh??V)m6(9QK1}1NSAQdD!GfLPA2t7eb#TePkezzlE9X&3ufE z`J&z_)4yrA#wu?^IMZy#c>_>@^Ollr>-;}S+`&^IJ(Sptt``Uq021+x%WY{E*nn1Mn_LYkGw{+ARg;KXq&w3 z4^6hOYP_~}-*v#+7#K;xk;%+ZA0x`CU+g>!q{8WSng9^Y9?u$A@y}i1_i4nkLLZ5B ztZkOR>dC=U_R*y!x*1MRqv|oYqyvy$XdNfJ+aSHT2Rve<`8-2}4Ia5O0A^!j+qmQ4 z=vatO%Fm=tpw=4_zY;9pFecC@XeHv;&Pt-^*ZP5PSYj_}rH;tSH5c6P3@?4{Vyj=ZfGn9_J-K51kHTqdTqm$)6Ct;K%L zHSr`RF`-*!mr@38ZQZq@`So1=p1p&EM-QuUtKT>v$kkO$`RPC~M_lX8@lB?U-kq z>R*dIfAJz3U0*MYImHE5Zh8+74_|d~hFc@cDFbQ*p5InSKssTsCi>M?tnZSy&v)d_ z)NAeZB}{`W808~ui6p1QDxh+Puji_*g4)94GH+Aq9+lD)x5&ESq2R1bY2sf1P*ZrA zR;2b69e;S-BMA#=f9BdfFq>6oey}nBGib*jP1oa?UBxf&=G_s(vkoG3^x0g9+q!@ASz37+& zRiz5ZbNeBnjkF-rSuT-9;!$f3wE%TEd?wE8dyGp%NuWhTHodYsDjl8EoiOA70~80; ziIisw{3uaZ1o{?mSJ>u?y>6$2PT!cEu>Ym4<*@4)$KIOnysvVVREV~B-C5zw|Jk~H zHYB@=oxg|1j@*{RQ(2uM4V}|cVa%xM3zou)&9H7f+0jBM?bbE->6JPZc2D%zM@jUs zE~kz3qNb9TmS1j`PL`Dl;b82_3FCiH_z%~*uXS~$pBm1-)#%O}pHDUQ|HU|Z8et*m zDWk^=3RgD>TSZ^9D7Sdb3UJr&yJJ_rAikBor?F^2L`OKX&%h+y*irCal=Gjt{`5t4 z!ACaW+yBMd&L`5bbtI51;=a)hZTjX3IJapY7J@JS(Uois~9I8#kEZ;0+h!6}U~y`Yh*pvToPsYiFYVs;l%o=%RJtz=`+AJsIDF**IN&JAkjna#i4 zshC=MxNyAP6y)gvQ*W7m-d4k`sezLa#t}Jn{bhS3J)J1$I?D+%`88aB*fW_)EA?Y< z@5qq9L4IpPd4^-rOOr;oTn0u)6;Wn>k*$1XQx_7whG~kE!T+53$JuS3xItmC>cb#M zVm6r?PH76?bE9$zXvBNRhpV7wc~-z>WU28!AC`|}`&sP**O_Wzf5+7zX7`2t4F80$ zGre>#QyLo=y}_q84`&&@m>fmWM6;#Hh2PYXmsvkG`TNnOD2F~F92Z)ReL!9rG%(9R zn+3bDZ@LxK1w`;l1oO~?&0_8-e93F-)1c#Fas_V~X5U8x5aj(Xw7PFvmt!~Kpg4z~ zj(IuHNcY{t{tH#i^j?><5z#hv-0!@uhys%Fd& zM$E-We$>iwEYbsIe%XeL_VD%AD8NmJlR`{do`7Bz?|vfXldbpKpenvLPB0(}k6Z2p z#N3MU#QeNHlj2Yo1Y@u0`p(3j3xluscvkat$Rd;*aF z&!tZwYFyJB%YVT0v=5%6DtDL2>UYP*P8oXYsp_o+?#umqsisLY+N~_e&~`*Z%pDIkt1dwmU5@6>nlwrhbO7=-g1SSi@3YQw{Q92XzCvJ zUv2M?7k|8271#>rAtYV!nchZ(glFG63J;^RSOb0_ksrBKwTzv8x+icrPGq8mHJSAJ zXEWB*Z^t6r>ZW;l*>`OsO*11$ij2FbBUd^08Cc9g;*@Ad;D~Yk>L_6v^rzQ7kQOj7 z_sNbBdUNyDwjc8N1VqHHX}@nS{eC!)%c|{`J<5VKl!jTM?iEPlqGgP;!>wrry$9J0 zXGm$}=S^ys=9inc8J3oo_U&1XMr@5&HL7RevMd&c$5rrSYG%}GUql@SnrljaxPB9g zUSE3opAUF?9;LBuT}>=zog3}oH6a0@0rsu>q|e-HU(T90yJ-|(o(51U6}I{wfz^aI zgS)N5))EN8^5qu~Zz)qx?@Wc!`EyHv$;N9MXJR#1Mi$B9&O(=##TMPhrF@cGZDP2Z z(0$h)ho{0LEJNaNh(Vy z;1frr(}7*)`+zbu8;6IbC0eMoMJzxs_dg(+PWOG-g}kv(#z=!PmR2hJOA2dFS^#=e{JR}V7j)5Lm=^-q^z*c|NL92q zYEO|P6+{>ASB5aJG*|pM(-9V)nRz@R^HmG})EFysds2NPm;LQv(rt)4x>fpQUsYP6 zy$p;HL~!r&h?Yp?b3puW$+=o~xG^+5+|@?t7$27|2Y@W~{u|NNRaMIR`V-4nE@jv# z&h zfsrNb6*c+d_0Q>1R8z@sz@VY;3~HdM^4WOFv(UW*3gRz*Vi9k`hde3gqQHH5quqPr zUW2Bd$L4$}TIL!gsB!i&$$jeWc-7a6eo=GhwcPrjw$fWE{XU(4T$ruPZy}E7TkZHE0bOM13mltP$_NaN%2Ov*a`;S zo0NUHy_@E88W+b9tz|F>Ii4S5a0F_^T_Il4_Ek2+)us^kMi)1{$K_63-V1qdeH2V4hv8S2&w6{LpbYL(0ZjE zgj3^p=vP)_akfZ>288~Juyb(ej@7$+j8Q#2LXKV8L_>C?`K6)8eKOhw%KkwVW))CC zX%am0IbajTLUZyF25|c6#wY5;hU+*J^d9o&pI~K}t&% z^5i5^nXocG@B4~7DI%a((jBpo#gfhk!k~8b4~UTWX%yAEqi1fdnHPO+(1pQm4Qt+h zj4f8)>kkjlhDuGh--uug{$?rI7o(3Gkg%9$_SdfgPR^Fi>>bOiKE+w%`1ssp=kdn9i#5c*XH_7%7b$q&@2t@PB(v^$K z^G}Z(EashMshn7=C6B&rX*tiS2Y`DeB_*h53$nm7&BZ2z+5pG~&)e>kYHDiPhmqwd zZ|BoKcijJUMN(=he-V_GoP&Z!8opP;UY>wt%=p&;V`k6q@_GL0YAvjc!HAno47!CJ zk`D9_XLEmQbAF=&of6d-T{P&Eg5jd@#EgOL;Gkj81M!_N1GnC+fEwv3LrV+?cY+*T zR`$i--c8o7xw$#+xKK2*^W%L8TC=8~Oc&x5;+68ux4ZCI7*z{CgkinX-}L|E7ck58X!e2RyJr@gg3 z=Ihth5#@FxG3L{o>xS;D*7byYJmB#Duk{%}w{1UBb^MpoeRnRi?|y`sg3mm_%D_>Q zbE~3;v}&Fh@~&=UL7PtpX-^4T!%)yOD2iu@5(yOcn@iI%l@~Z9y>V>cmY0VVdU?oq z-A2~)i5z2^fPKmfOhBI3@EIw9l6!Ye-#5$=rt{9$IX;h64}VS0=qU0(j(|7^HJ+*P zLhI=;MCy_jk4L+Ih@^EQ)_=}4w50Nh%z$6JaY^1SvLS6otxFjesD0^PRr+Xb5)IPR z(K?4xyxB@ XSz?>75Vz#;3%y)s#@0B%&^_iqEKr?r literal 0 HcmV?d00001 diff --git a/windows/security/threat-protection/microsoft-defender-atp/images/phase-diagrams/prepare.png b/windows/security/threat-protection/microsoft-defender-atp/images/phase-diagrams/prepare.png new file mode 100644 index 0000000000000000000000000000000000000000..1001e41e0dbf403ec43cf619766ba4096db69553 GIT binary patch literal 1713 zcmV;i22S~jP)h2TO9oLUKx;8<`K z!7YUz0-TC_K+sEoQ$bvkD-{w5sZu~u0p-xDR6x{^3rI$4AQzCyhf|dT<|{E!LiL|8 zmYu}*u0Pi6xAT)$-jA8_c>aDfZ}-h?ireizB?Vi~DQS751ZIvBm^n&d<|u)gqXcG- z5|}wkVCE=+nWF?|PFk#gUT$tKrKhJ`ycY3kUXn>I;A?G)&8)fNnEh*Ii@eh9+Knk-;sQsA_{a149mTGXO|xD zz0m!ww|?KG-kE=tUIwCD;IHoP(e6>?vwZq~-JrR(19SX(3!qEj+bf6k=ac_}UbkhW zQg7`gI{mIRWH~JpPpsbVhM`N~@#WxSZrSAwa&=uH$EP`A%fXl&&WbB4Dkvo-#kVyz zH5uJDEYK`4#@+zllC(1tdNK<)}%i%r4#>PfEJw2t>)m2(tT%@+PHZJXM7@7tC zYa_V0z_oo$Ba0r*^>(_wn$s2*7E*0(EzQi#XwIW}Ny46F!Qvw&CnraA*+oS~zOK8w zyW7{D*VWb0_V%{0dK|;@kw;#W3=9nT@}MlF2PhLm1kxg3u=10E#0mUdyTEApiHQkn zZEX!Wx3I84VVw08%;bD!k>&G>T z92P>ApA2ZW;14oWWBPLnvd@Q2Bb_X4{r&v`*QB@r76mb6T5Pb^U?499 z^38+}fzMINyRj45UYZ%RvZMnBiw8qPL%w}F>j~)060yNjVZAah_N7%vQofnd)kRlC5i1BI{oGcg~O}bV04rQjNMEr%#pV(B`&_Hwx zT>4%r-MN|>k;o8tr15=owE%M>4)`M`eB<6h$j6rw%c%6g`><_G(GA>eDS{jw*Wr*;hB08cKIHpgsFh1wz zUNH5V9%wNJ{=9LXjr<1Cyt7&Iv$9FC(D@&X&C@4s1 z-GZT3Ht4`^w+Dy|aO`k6OkVTIv6R5;>+9kZR@>9l<2ye!HI=|x#TOO=&&|yROz#P{ zNno+Py}i`Y(cwF%Cx0?w>7^^2ohwPg;=%Evxw$#OVS;tf&(Di}*)7A-^8bWqJvurn z_Cw`QMp$^!5TT}~M(oed&iaG{=!*OL`ouosxbeszPfT?mY<3{ln}7v##Zm%GOSBSd zeK2#_TQD9)`j4sMC@U*VR8`{wdx7B*oAoiI5wH~)D=q9}4{7PCSA;Dmzswiwr@-{| zG`ZdGkohsy2V1hkR$#0{hPZUL*bT>%*Yd?N9!-XtMG4y5+gS+A*2#he`{Q}8f5AEj z*b40UEH~iTUTV#Wer&sF%-o#4ULfXaR~No5Hp%etaH6Yc7_7Z$OdIn5v?6Q;c0Tn| z^^l8pyeDE-C#LJl`PhSlgY@9RgOK?f8XBm+zTTkP#t+tB^v>BDWPINIZPO<(#0}>~ zS5{UUQqOp!9#t}juLaj$qPewaJ}dV3s*8(@!{*P+%ZqFMjDoGecxvVRx`*1Z4*RIKXs5z|WKOmkZ81AIGS16DOt( z*x;tXhUeO0x~cWOaJfmG8C}*!c`RVRLqo!M(36T^^NBM^$t+voD|qdsj-3r2c(Yr{ zMaLhCaG83=w%Qoj{$sBXGu3g5DZ+_m^GAw{a9$EgGzxw8hg=tII6d_lP zl`k6_e;jD)AQqG+*{3F(ZF$Tn27wc#boR+obN(8jGksyTEEY2?EDXK9*_aw&;>2dN zkrohzZwpBFoW=^QXbhf9VIb$*D-FKfC!Jf%To|TY)T1Q}t|o5kAxX)g++ATOQ8YYq zxovQ|lw)CVm%nj1D+c4fMCZhVcV3dBazQ$c3wCqktFX#$g)hakP71u=glyx8D9%*` z{W7J=#X`UW?^5jUhJX*g+Kt*SO#b>I3+6D-XetlEh&PILH0SiGL{ghSSkZ&}Ol=QI&=2t6wNm6txGnFfx^ey4bI4#uHYT!kRj8 ziHWf4>gqv(K&Ny#R7F*_*!4uln$l8aLkrM3bM@;JXIurI&Cl z34^`37fVs(!Pt{MgNiz!a^3EBkBRsiuXX+Ui&jq=+eUmuSQs6JLdhVh+?0 zS>S+ym6QcO2cOiE(lhw<9C3Slx^@D9wnESX?GS};%BD}H>wC_-Nx5_mbbJPZS@bn@ z$y{BC7RKkep&J1LUmo`HHpVKZNQL)6sub<~m9eBoTplj1wDU~@&uc@O$$;MC98{0m z?Py@e;+kmYoCuY!F6~RoD;XvR+vFv)DrI5at!uA;w@I7Y8WdkRS~o*0Wl(loA6Jcb zE=w!EC1@eoBcJ=G)-Pn)@Adj;HM>D#z#EG+_V-LpBLv*GI~))-u+Pfc8smF7g&rF) zGe+VaD871>Q{>ER?tNR3^3l_bcA^%Y!-Z;Lf@b;%BSBB%N^_Gn4mfXQ$`NIV>Fw?9 z^w`z7RHTphub=W6SAMb#4(m~(^aV@GHJq^v9XwtCL&733zQ2vW=u;So3u{U zL^T@a9X=xvL5-))Od_-blaFW@8sOWO9v%WO7d28quCR)wu!Ww_JxPxE=~STNLQ9mT)pN7a-6|a z)DQ6+zbBoU+>gg};7a-{;>E0~{MJi9(6I*{6>iJ)Sb?Gj`}~4Ae9ByNbv0y4`n0q) zH8!XcEuW@9_Vc3(K7ERaB$3J4drun?*{lZjo+Lnb5Gy4-KEJvBb+o3F!oRux8~CwQ zaq;sN#MA457Wtg)><2<&>~LgSLJJm)eH%?8HPdJEqjqe)PH?G7 zs;a7wxJye*<#v|-P=9k9ISIApA_xS6smsgB$*G52nl3V})i-055uVX91;EIW(C~0; zH+zUFNh(cotZ!(tC{~Qtf_7}7!|xxeah=`7!NLDcFfNOlMz%pqNW2#{r{B>a-)mPN p(;?_)x+BX^btC^j`7G@bA|PrE{aouA4YU{A04F3GQDcWo{sV3X&OiVF literal 0 HcmV?d00001 diff --git a/windows/security/threat-protection/microsoft-defender-atp/mcafee-to-microsoft-defender-migration.md b/windows/security/threat-protection/microsoft-defender-atp/mcafee-to-microsoft-defender-migration.md index dbb50ab562..6977f6f2c9 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/mcafee-to-microsoft-defender-migration.md +++ b/windows/security/threat-protection/microsoft-defender-atp/mcafee-to-microsoft-defender-migration.md @@ -35,7 +35,7 @@ If you are planning to switch from McAfee Endpoint Security (McAfee) to [Microso When you switch from McAfee to Microsoft Defender for Endpoint, you follow a process that can be divided into three phases, as described in the following table: -![Migration phases - prepare setup onboard](/windows/media/phase-diagrams/migration-phases.png) +![Migration phases - prepare setup onboard](images/phase-diagrams/migration-phases.png) |Phase |Description | diff --git a/windows/security/threat-protection/microsoft-defender-atp/mcafee-to-microsoft-defender-onboard.md b/windows/security/threat-protection/microsoft-defender-atp/mcafee-to-microsoft-defender-onboard.md index 703d353b4c..dd52552ec9 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/mcafee-to-microsoft-defender-onboard.md +++ b/windows/security/threat-protection/microsoft-defender-atp/mcafee-to-microsoft-defender-onboard.md @@ -28,7 +28,7 @@ ms.reviewer: jesquive, chventou, jonix, chriggs, owtho [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] -|[![Phase 1: Prepare](/windows/media/phase-diagrams/prepare.png)](mcafee-to-microsoft-defender-prepare.md)
[Phase 1: Prepare](mcafee-to-microsoft-defender-prepare.md) |[![Phase 2: Set up](/windows/media/phase-diagrams/setup.png)](mcafee-to-microsoft-defender-setup.md)
[Phase 2: Set up](mcafee-to-microsoft-defender-setup.md) |![Phase 3: Onboard](/windows/media/phase-diagrams/onboard.png)
Phase 3: Onboard | +|[![Phase 1: Prepare](images/phase-diagrams/prepare.png)](mcafee-to-microsoft-defender-prepare.md)
[Phase 1: Prepare](mcafee-to-microsoft-defender-prepare.md) |[![Phase 2: Set up](images/phase-diagrams/setup.png)](mcafee-to-microsoft-defender-setup.md)
[Phase 2: Set up](mcafee-to-microsoft-defender-setup.md) |![Phase 3: Onboard](images/phase-diagrams/onboard.png)
Phase 3: Onboard | |--|--|--| || |*You are here!* | diff --git a/windows/security/threat-protection/microsoft-defender-atp/mcafee-to-microsoft-defender-prepare.md b/windows/security/threat-protection/microsoft-defender-atp/mcafee-to-microsoft-defender-prepare.md index 4fa7e47e70..886846f36f 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/mcafee-to-microsoft-defender-prepare.md +++ b/windows/security/threat-protection/microsoft-defender-atp/mcafee-to-microsoft-defender-prepare.md @@ -29,7 +29,7 @@ ms.reviewer: jesquive, chventou, jonix, chriggs, owtho [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] -|![Phase 1: Prepare](/windows/media/phase-diagrams/prepare.png)
Phase 1: Prepare |[![Phase 2: Set up](/windows/media/phase-diagrams/setup.png)](mcafee-to-microsoft-defender-setup.md)
[Phase 2: Set up](mcafee-to-microsoft-defender-setup.md) |[![Phase 3: Onboard](/windows/media/phase-diagrams/onboard.png)](mcafee-to-microsoft-defender-onboard.md)
[Phase 3: Onboard](mcafee-to-microsoft-defender-onboard.md) | +|![Phase 1: Prepare](images/phase-diagrams/prepare.png)
Phase 1: Prepare |[![Phase 2: Set up](images/phase-diagrams/setup.png)](mcafee-to-microsoft-defender-setup.md)
[Phase 2: Set up](mcafee-to-microsoft-defender-setup.md) |[![Phase 3: Onboard](images/phase-diagrams/onboard.png)](mcafee-to-microsoft-defender-onboard.md)
[Phase 3: Onboard](mcafee-to-microsoft-defender-onboard.md) | |--|--|--| |*You are here!*| | | diff --git a/windows/security/threat-protection/microsoft-defender-atp/mcafee-to-microsoft-defender-setup.md b/windows/security/threat-protection/microsoft-defender-atp/mcafee-to-microsoft-defender-setup.md index b9f5ed18c6..432aed7160 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/mcafee-to-microsoft-defender-setup.md +++ b/windows/security/threat-protection/microsoft-defender-atp/mcafee-to-microsoft-defender-setup.md @@ -29,7 +29,7 @@ ms.reviewer: jesquive, chventou, jonix, chriggs, owtho [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] -|[![Phase 1: Prepare](/windows/media/phase-diagrams/prepare.png)](mcafee-to-microsoft-defender-prepare.md)
[Phase 1: Prepare](mcafee-to-microsoft-defender-prepare.md) |![Phase 2: Set up](/windows/media/phase-diagrams/setup.png)
Phase 2: Set up |[![Phase 3: Onboard](/windows/media/phase-diagrams/onboard.png)](mcafee-to-microsoft-defender-onboard.md)
[Phase 3: Onboard](mcafee-to-microsoft-defender-onboard.md) | +|[![Phase 1: Prepare](images/phase-diagrams/prepare.png)](mcafee-to-microsoft-defender-prepare.md)
[Phase 1: Prepare](mcafee-to-microsoft-defender-prepare.md) |![Phase 2: Set up](images/phase-diagrams/setup.png)
Phase 2: Set up |[![Phase 3: Onboard](images/phase-diagrams/onboard.png)](mcafee-to-microsoft-defender-onboard.md)
[Phase 3: Onboard](mcafee-to-microsoft-defender-onboard.md) | |--|--|--| ||*You are here!* | | diff --git a/windows/security/threat-protection/microsoft-defender-atp/onboarding.md b/windows/security/threat-protection/microsoft-defender-atp/onboarding.md index 7c9ce553cb..5cbe6e5c30 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/onboarding.md +++ b/windows/security/threat-protection/microsoft-defender-atp/onboarding.md @@ -29,7 +29,7 @@ ms.topic: article Deploying Defender for Endpoint is a three-phase process: -| [![deployment phase - prepare](/windows/media/phase-diagrams/prepare.png)](prepare-deployment.md)
[Phase 1: Prepare](prepare-deployment.md) | [![deployment phase - setup](/windows/media/phase-diagrams/setup.png)](production-deployment.md)
[Phase 2: Setup](production-deployment.md) | ![deployment phase - onboard](/windows/media/phase-diagrams/onboard.png)
Phase 3: Onboard | +| [![deployment phase - prepare](images/phase-diagrams/prepare.png)](prepare-deployment.md)
[Phase 1: Prepare](prepare-deployment.md) | [![deployment phase - setup](images/phase-diagrams/setup.png)](production-deployment.md)
[Phase 2: Setup](production-deployment.md) | ![deployment phase - onboard](images/phase-diagrams/onboard.png)
Phase 3: Onboard | | ----- | ----- | ----- | | | |*You are here!*| diff --git a/windows/security/threat-protection/microsoft-defender-atp/prepare-deployment.md b/windows/security/threat-protection/microsoft-defender-atp/prepare-deployment.md index 2db4bdf69c..f93867d6d6 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/prepare-deployment.md +++ b/windows/security/threat-protection/microsoft-defender-atp/prepare-deployment.md @@ -33,7 +33,7 @@ ms.topic: article Deploying Defender for Endpoint is a three-phase process: -| ![deployment phase - prepare](/windows/media/phase-diagrams/prepare.png)
Phase 1: Prepare | [![deployment phase - setup](/windows/media/phase-diagrams/setup.png)](production-deployment.md)
[Phase 2: Setup](production-deployment.md) | [![deployment phase - onboard](/windows/media/phase-diagrams/onboard.png)](onboarding.md)
[Phase 3: Onboard](onboarding.md) | +| ![deployment phase - prepare](images/phase-diagrams/prepare.png)
Phase 1: Prepare | [![deployment phase - setup](images/phase-diagrams/setup.png)](production-deployment.md)
[Phase 2: Setup](production-deployment.md) | [![deployment phase - onboard](images/phase-diagrams/onboard.png)](onboarding.md)
[Phase 3: Onboard](onboarding.md) | | ----- | ----- | ----- | |*You are here!* | || diff --git a/windows/security/threat-protection/microsoft-defender-atp/production-deployment.md b/windows/security/threat-protection/microsoft-defender-atp/production-deployment.md index 801cfd63d9..3f5f8aabcc 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/production-deployment.md +++ b/windows/security/threat-protection/microsoft-defender-atp/production-deployment.md @@ -31,7 +31,7 @@ ms.topic: article Deploying Defender for Endpoint is a three-phase process: -| [![deployment phase - prepare](/windows/media/phase-diagrams/prepare.png)](prepare-deployment.md)
[Phase 1: Prepare](prepare-deployment.md) | ![deployment phase - setup](/windows/media/phase-diagrams/setup.png)
Phase 2: Setup | [![deployment phase - onboard](/windows/media/phase-diagrams/onboard.png)](onboarding.md)
[Phase 3: Onboard](onboarding.md) | +| [![deployment phase - prepare](images/phase-diagrams/prepare.png)](prepare-deployment.md)
[Phase 1: Prepare](prepare-deployment.md) | ![deployment phase - setup](images/phase-diagrams/setup.png)
Phase 2: Setup | [![deployment phase - onboard](images/phase-diagrams/onboard.png)](onboarding.md)
[Phase 3: Onboard](onboarding.md) | | ----- | ----- | ----- | | | *You are here!*|| diff --git a/windows/security/threat-protection/microsoft-defender-atp/switch-to-microsoft-defender-migration.md b/windows/security/threat-protection/microsoft-defender-atp/switch-to-microsoft-defender-migration.md index 1a9ceac19e..0a7421bb95 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/switch-to-microsoft-defender-migration.md +++ b/windows/security/threat-protection/microsoft-defender-atp/switch-to-microsoft-defender-migration.md @@ -35,7 +35,7 @@ If you are planning to switch from a non-Microsoft endpoint protection solution When you switch to Microsoft Defender for Endpoint, you follow a process that can be divided into three phases, as described in the following table: -![Migration phases - prepare, setup, onboard](/windows/media/phase-diagrams/migration-phases.png) +![Migration phases - prepare, setup, onboard](images/phase-diagrams/migration-phases.png) |Phase |Description | |--|--| diff --git a/windows/security/threat-protection/microsoft-defender-atp/switch-to-microsoft-defender-onboard.md b/windows/security/threat-protection/microsoft-defender-atp/switch-to-microsoft-defender-onboard.md index 40074d3a9c..18422aba57 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/switch-to-microsoft-defender-onboard.md +++ b/windows/security/threat-protection/microsoft-defender-atp/switch-to-microsoft-defender-onboard.md @@ -25,7 +25,7 @@ ms.reviewer: jesquive, chventou, jonix, chriggs, owtho # Switch to Microsoft Defender for Endpoint - Phase 3: Onboard -|[![Phase 1: Prepare](/windows/media/phase-diagrams/prepare.png)](switch-to-microsoft-defender-prepare.md)
[Phase 1: Prepare](switch-to-microsoft-defender-prepare.md) |[![Phase 2: Set up](/windows/media/phase-diagrams/setup.png)](switch-to-microsoft-defender-setup.md)
[Phase 2: Set up](switch-to-microsoft-defender-setup.md) |![Phase 3: Onboard](/windows/media/phase-diagrams/onboard.png)
Phase 3: Onboard | +|[![Phase 1: Prepare](images/phase-diagrams/prepare.png)](switch-to-microsoft-defender-prepare.md)
[Phase 1: Prepare](switch-to-microsoft-defender-prepare.md) |[![Phase 2: Set up](images/phase-diagrams/setup.png)](switch-to-microsoft-defender-setup.md)
[Phase 2: Set up](switch-to-microsoft-defender-setup.md) |![Phase 3: Onboard](images/phase-diagrams/onboard.png)
Phase 3: Onboard | |--|--|--| || |*You are here!* | diff --git a/windows/security/threat-protection/microsoft-defender-atp/switch-to-microsoft-defender-prepare.md b/windows/security/threat-protection/microsoft-defender-atp/switch-to-microsoft-defender-prepare.md index 334eb1708e..c55bd95f20 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/switch-to-microsoft-defender-prepare.md +++ b/windows/security/threat-protection/microsoft-defender-atp/switch-to-microsoft-defender-prepare.md @@ -25,7 +25,7 @@ ms.reviewer: jesquive, chventou, jonix, chriggs, owtho # Switch to Microsoft Defender for Endpoint - Phase 1: Prepare -|![Phase 1: Prepare](/windows/media/phase-diagrams/prepare.png)
Phase 1: Prepare |[![Phase 2: Set up](/windows/media/phase-diagrams/setup.png)](switch-to-microsoft-defender-setup.md)
[Phase 2: Set up](switch-to-microsoft-defender-setup.md) |[![Phase 3: Onboard](/windows/media/phase-diagrams/onboard.png)](switch-to-microsoft-defender-onboard.md)
[Phase 3: Onboard](switch-to-microsoft-defender-onboard.md) | +|![Phase 1: Prepare](images/phase-diagrams/prepare.png)
Phase 1: Prepare |[![Phase 2: Set up](images/phase-diagrams/setup.png)](switch-to-microsoft-defender-setup.md)
[Phase 2: Set up](switch-to-microsoft-defender-setup.md) |[![Phase 3: Onboard](images/phase-diagrams/onboard.png)](switch-to-microsoft-defender-onboard.md)
[Phase 3: Onboard](switch-to-microsoft-defender-onboard.md) | |--|--|--| |*You are here!*| | | diff --git a/windows/security/threat-protection/microsoft-defender-atp/switch-to-microsoft-defender-setup.md b/windows/security/threat-protection/microsoft-defender-atp/switch-to-microsoft-defender-setup.md index 5fef44d9d6..2d0c515fe8 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/switch-to-microsoft-defender-setup.md +++ b/windows/security/threat-protection/microsoft-defender-atp/switch-to-microsoft-defender-setup.md @@ -25,7 +25,7 @@ ms.reviewer: jesquive, chventou, jonix, chriggs, owtho # Switch to Microsoft Defender for Endpoint - Phase 2: Setup -|[![Phase 1: Prepare](/windows/media/phase-diagrams/prepare.png)](switch-to-microsoft-defender-prepare.md)
[Phase 1: Prepare](switch-to-microsoft-defender-prepare.md) |![Phase 2: Set up](/windows/media/phase-diagrams/setup.png)
Phase 2: Set up |[![Phase 3: Onboard](/windows/media/phase-diagrams/onboard.png)](switch-to-microsoft-defender-onboard.md)
[Phase 3: Onboard](switch-to-microsoft-defender-onboard.md) | +|[![Phase 1: Prepare](images/phase-diagrams/prepare.png)](switch-to-microsoft-defender-prepare.md)
[Phase 1: Prepare](switch-to-microsoft-defender-prepare.md) |![Phase 2: Set up](images/phase-diagrams/setup.png)
Phase 2: Set up |[![Phase 3: Onboard](images/phase-diagrams/onboard.png)](switch-to-microsoft-defender-onboard.md)
[Phase 3: Onboard](switch-to-microsoft-defender-onboard.md) | |--|--|--| ||*You are here!* | | diff --git a/windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-migration.md b/windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-migration.md index cd4d8387d3..0fe3fbf828 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-migration.md +++ b/windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-migration.md @@ -35,7 +35,7 @@ If you are planning to switch from Symantec Endpoint Protection (Symantec) to [M When you switch from Symantec to Microsoft Defender for Endpoint, you follow a process that can be divided into three phases, as described in the following table: -![Migration phases - prepare, setup, onboard](/windows/media/phase-diagrams/migration-phases.png) +![Migration phases - prepare, setup, onboard](images/phase-diagrams/migration-phases.png) |Phase |Description | |--|--| diff --git a/windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-onboard.md b/windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-onboard.md index b78be37a84..a80c0ae736 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-onboard.md +++ b/windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-onboard.md @@ -28,7 +28,7 @@ ms.reviewer: depicker, yongrhee, chriggs [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] -|[![Phase 1: Prepare](/windows/media/phase-diagrams/prepare.png)](symantec-to-microsoft-defender-atp-prepare.md)
[Phase 1: Prepare](symantec-to-microsoft-defender-atp-prepare.md) |[![Phase 2: Set up](/windows/media/phase-diagrams/setup.png)](symantec-to-microsoft-defender-atp-setup.md)
[Phase 2: Set up](symantec-to-microsoft-defender-atp-setup.md) |![Phase 3: Onboard](/windows/media/phase-diagrams/onboard.png)
Phase 3: Onboard | +|[![Phase 1: Prepare](images/phase-diagrams/prepare.png)](symantec-to-microsoft-defender-atp-prepare.md)
[Phase 1: Prepare](symantec-to-microsoft-defender-atp-prepare.md) |[![Phase 2: Set up](images/phase-diagrams/setup.png)](symantec-to-microsoft-defender-atp-setup.md)
[Phase 2: Set up](symantec-to-microsoft-defender-atp-setup.md) |![Phase 3: Onboard](images/phase-diagrams/onboard.png)
Phase 3: Onboard | |--|--|--| || |*You are here!* | diff --git a/windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-prepare.md b/windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-prepare.md index 86b5570c34..10e8d99bb4 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-prepare.md +++ b/windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-prepare.md @@ -28,7 +28,7 @@ ms.reviewer: depicker, yongrhee, chriggs [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] -|![Phase 1: Prepare](/windows/media/phase-diagrams/prepare.png)
Phase 1: Prepare |[![Phase 2: Set up](/windows/media/phase-diagrams/setup.png)](symantec-to-microsoft-defender-atp-setup.md)
[Phase 2: Set up](symantec-to-microsoft-defender-atp-setup.md) |[![Phase 3: Onboard](/windows/media/phase-diagrams/onboard.png)](symantec-to-microsoft-defender-atp-onboard.md)
[Phase 3: Onboard](symantec-to-microsoft-defender-atp-onboard.md) | +|![Phase 1: Prepare](images/phase-diagrams/prepare.png)
Phase 1: Prepare |[![Phase 2: Set up](images/phase-diagrams/setup.png)](symantec-to-microsoft-defender-atp-setup.md)
[Phase 2: Set up](symantec-to-microsoft-defender-atp-setup.md) |[![Phase 3: Onboard](images/phase-diagrams/onboard.png)](symantec-to-microsoft-defender-atp-onboard.md)
[Phase 3: Onboard](symantec-to-microsoft-defender-atp-onboard.md) | |--|--|--| |*You are here!*| | | diff --git a/windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-setup.md b/windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-setup.md index 68a0f10921..401eaec958 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-setup.md +++ b/windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-setup.md @@ -28,7 +28,7 @@ ms.reviewer: depicker, yongrhee, chriggs [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] -|[![Phase 1: Prepare](/windows/media/phase-diagrams/prepare.png)](symantec-to-microsoft-defender-atp-prepare.md)
[Phase 1: Prepare](symantec-to-microsoft-defender-atp-prepare.md) |![Phase 2: Set up](/windows/media/phase-diagrams/setup.png)
Phase 2: Set up |[![Phase 3: Onboard](/windows/media/phase-diagrams/onboard.png)](symantec-to-microsoft-defender-atp-onboard.md)
[Phase 3: Onboard](symantec-to-microsoft-defender-atp-onboard.md) | +|[![Phase 1: Prepare](images/phase-diagrams/prepare.png)](symantec-to-microsoft-defender-atp-prepare.md)
[Phase 1: Prepare](symantec-to-microsoft-defender-atp-prepare.md) |![Phase 2: Set up](images/phase-diagrams/setup.png)
Phase 2: Set up |[![Phase 3: Onboard](images/phase-diagrams/onboard.png)](symantec-to-microsoft-defender-atp-onboard.md)
[Phase 3: Onboard](symantec-to-microsoft-defender-atp-onboard.md) | |--|--|--| ||*You are here!* | | From b51c5a542168bb6cc519325e9db7dd46f15745e1 Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Thu, 17 Dec 2020 16:07:21 -0800 Subject: [PATCH 3/7] edits --- .../microsoft-defender-atp/android-intune.md | 24 +++++++++---------- 1 file changed, 12 insertions(+), 12 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/android-intune.md b/windows/security/threat-protection/microsoft-defender-atp/android-intune.md index d899f7568a..52450260ef 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/android-intune.md +++ b/windows/security/threat-protection/microsoft-defender-atp/android-intune.md @@ -29,7 +29,7 @@ ms.topic: conceptual - [Defender for Endpoint](microsoft-defender-atp-android.md) -This topic describes deploying Defender for Endpoint for Android on Intune +Learn how to deploy Defender for Endpoint for Android on Intune Company Portal enrolled devices. For more information about Intune device enrollment, see [Enroll your device](https://docs.microsoft.com/mem/intune/user-help/enroll-device-android-company-portal). @@ -44,13 +44,13 @@ device](https://docs.microsoft.com/mem/intune/user-help/enroll-device-android-co **Deploy Defender for Endpoint for Android on Intune Company Portal - Device Administrator enrolled devices** -This topic describes how to deploy Defender for Endpoint for Android on Intune Company Portal - Device Administrator enrolled devices. +Learn how to deploy Defender for Endpoint for Android on Intune Company Portal - Device Administrator enrolled devices. ### Add as Android store app 1. In [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431) , go to **Apps** \> -**Android Apps** \> **Add \> Android store app** and click **Select**. +**Android Apps** \> **Add \> Android store app** and choose **Select**. ![Image of Microsoft Endpoint Manager Admin Center](images/mda-addandroidstoreapp.png) @@ -60,13 +60,13 @@ center](https://go.microsoft.com/fwlink/?linkid=2109431) , go to **Apps** \> - **Name** - **Description** - **Publisher** as Microsoft. - - **Appstore URL** as https://play.google.com/store/apps/details?id=com.microsoft.scmx (Defender for Endpoint app Google Play Store URL) + - **App store URL** as https://play.google.com/store/apps/details?id=com.microsoft.scmx (Defender for Endpoint app Google Play Store URL) Other fields are optional. Select **Next**. ![Image of Microsoft Endpoint Manager Admin Center](images/mda-addappinfo.png) -3. In the *Assignments* section, go to the **Required** section and select **Add group.** You can then choose the user group(s) that you would like to target Defender for Endpoint for Android app. Click **Select** and then **Next**. +3. In the *Assignments* section, go to the **Required** section and select **Add group.** You can then choose the user group(s) that you would like to target Defender for Endpoint for Android app. Choose **Select** and then **Next**. >[!NOTE] >The selected user group should consist of Intune enrolled users. @@ -111,7 +111,7 @@ Defender for Endpoint for Android supports Android Enterprise enrolled devices. For more information on the enrollment options supported by Intune, see [Enrollment Options](https://docs.microsoft.com/mem/intune/enrollment/android-enroll). -**Currently, Personally-owned devices with work profile and Corporate-owned fully managed user device enrollments are supported for deployment.** +**Currently, Personally owned devices with work profile and Corporate-owned fully managed user device enrollments are supported for deployment.** @@ -141,7 +141,7 @@ select **Approve**. > ![A screenshot of a Managed Google Play](images/07e6d4119f265037e3b80a20a73b856f.png) -4. You should now be presented with the permissions that Defender for Endpoint +4. You'll be presented with the permissions that Defender for Endpoint obtains for it to work. Review them and then select **Approve**. ![A screenshot of Defender for Endpoint preview app approval](images/206b3d954f06cc58b3466fb7a0bd9f74.png) @@ -218,7 +218,7 @@ Defender ATP should be visible in the apps list. 1. In the **Review + Create** page that comes up next, review all the information and then select **Create**.
- The app configuration policy for Defender for Endpoint auto-granting the storage permission is now assigned to the selected user group. + The app configuration policy for Defender for Endpoint autogranting the storage permission is now assigned to the selected user group. > [!div class="mx-imgBorder"] > ![Image of create app configuration policy](images/android-review-create.png) @@ -244,11 +244,11 @@ above. Then select **Review + Save** and then **Save** again to commence assignment. ### Auto Setup of Always-on VPN -Defender for Endpoint supports Device configuration policies for managed devices via Intune. This capability can be leveraged to **Auto setup of Always-on VPN** on Android Enterprise enrolled devices, so the end user does not need to setup VPN service while onboarding. -1. On **Devices** Page go to **Configuration Profiles** > **Create Profile** > **Platform** > **Android Enterprise** +Defender for Endpoint supports Device configuration policies for managed devices via Intune. This capability can be leveraged to **Auto setup of Always-on VPN** on Android Enterprise enrolled devices, so the end user does not need to set up VPN service while onboarding. +1. On **Devices**, select **Configuration Profiles** > **Create Profile** > **Platform** > **Android Enterprise** Select **Device restrictions** under one of the following, based on your device enrollment type - **Fully Managed, Dedicated, and Corporate-Owned Work Profile** -- **Personally-Owned Work Profile** +- **Personally owned Work Profile** Select **Create**. @@ -292,7 +292,7 @@ displayed here. > ![Image of device installation status](images/900c0197aa59f9b7abd762ab2b32e80c.png) -2. On the device, you can validate the onboarding status by going to the **work profile**. Confirm that Defender for Endpoint is available and that you are enrolled to the **Personally-owned devices with work profile**. If you are enrolled to a **Corporate-owned, fully managed user device**, you will have a single profile on the device where you can confirm that Defender for Endpoint is available. +2. On the device, you can validate the onboarding status by going to the **work profile**. Confirm that Defender for Endpoint is available and that you are enrolled to the **Personally owned devices with work profile**. If you are enrolled to a **Corporate-owned, fully managed user device**, you will have a single profile on the device where you can confirm that Defender for Endpoint is available. ![Image of app in mobile device](images/c2e647fc8fa31c4f2349c76f2497bc0e.png) From 258b1b91dc8dedcb54c7aaf414220be440c789c3 Mon Sep 17 00:00:00 2001 From: Gary Moore Date: Thu, 17 Dec 2020 16:54:27 -0800 Subject: [PATCH 4/7] Indented content in list items --- .../switch-to-microsoft-defender-setup.md | 23 ++++++++++--------- 1 file changed, 12 insertions(+), 11 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/switch-to-microsoft-defender-setup.md b/windows/security/threat-protection/microsoft-defender-atp/switch-to-microsoft-defender-setup.md index 2d0c515fe8..c1ad46027c 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/switch-to-microsoft-defender-setup.md +++ b/windows/security/threat-protection/microsoft-defender-atp/switch-to-microsoft-defender-setup.md @@ -87,11 +87,11 @@ The [DisableAntiSpyware](https://docs.microsoft.com/windows-hardware/customize/d `Dism /online /Get-FeatureInfo /FeatureName:Windows-Defender`
-> [!NOTE] -> When using the DISM command within a task sequence running PS, the following path to cmd.exe is required. -> Example:
-> `c:\windows\sysnative\cmd.exe /c Dism /online /Get-FeatureInfo /FeatureName:Windows-Defender-Features`
-> `c:\windows\sysnative\cmd.exe /c Dism /online /Get-FeatureInfo /FeatureName:Windows-Defender`
+ > [!NOTE] + > When using the DISM command within a task sequence running PS, the following path to cmd.exe is required. + > Example:
+ > `c:\windows\sysnative\cmd.exe /c Dism /online /Get-FeatureInfo /FeatureName:Windows-Defender-Features`
+ > `c:\windows\sysnative\cmd.exe /c Dism /online /Get-FeatureInfo /FeatureName:Windows-Defender`
3. To verify Microsoft Defender Antivirus is running, use the following PowerShell cmdlet:
@@ -227,12 +227,13 @@ To use CMPivot to get your file hash, follow these steps: 6. In the query box, type the following query:
-```kusto -File(c:\\windows\\notepad.exe) -| project Hash -``` -> [!NOTE] -> In the query above, replace *notepad.exe* with the your third-party security product process name. + ```kusto + File(c:\\windows\\notepad.exe) + | project Hash + ``` + + > [!NOTE] + > In the query above, replace *notepad.exe* with the your third-party security product process name. ## Set up your device groups, device collections, and organizational units From b9b89c535deff5eb59b741a509e2b794b29cf7e9 Mon Sep 17 00:00:00 2001 From: Gary Moore Date: Thu, 17 Dec 2020 16:59:08 -0800 Subject: [PATCH 5/7] Indented content in list items --- ...ymantec-to-microsoft-defender-atp-setup.md | 33 +++++++++++-------- 1 file changed, 19 insertions(+), 14 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-setup.md b/windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-setup.md index 401eaec958..04b7812825 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-setup.md +++ b/windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-setup.md @@ -64,15 +64,16 @@ Now that you're moving from Symantec to Microsoft Defender for Endpoint, you'll 1. As a local administrator on the endpoint or device, open Windows PowerShell. -2. Run the following PowerShell cmdlets:
- `Dism /online /Get-FeatureInfo /FeatureName:Windows-Defender-Features`
- `Dism /online /Get-FeatureInfo /FeatureName:Windows-Defender`
+2. Run the following PowerShell cmdlets: -> [!NOTE] -> When using the DISM command within a task sequence running PS, the following path to cmd.exe is required. -> Example:
-> `c:\windows\sysnative\cmd.exe /c Dism /online /Get-FeatureInfo /FeatureName:Windows-Defender-Features`
-> `c:\windows\sysnative\cmd.exe /c Dism /online /Get-FeatureInfo /FeatureName:Windows-Defender`
+ `Dism /online /Get-FeatureInfo /FeatureName:Windows-Defender-Features` + `Dism /online /Get-FeatureInfo /FeatureName:Windows-Defender` + + > [!NOTE] + > When using the DISM command within a task sequence running PS, the following path to cmd.exe is required. + > Example:
+ > `c:\windows\sysnative\cmd.exe /c Dism /online /Get-FeatureInfo /FeatureName:Windows-Defender-Features`
+ > `c:\windows\sysnative\cmd.exe /c Dism /online /Get-FeatureInfo /FeatureName:Windows-Defender`
3. To verify Microsoft Defender Antivirus is running, use the following PowerShell cmdlet:
`Get-Service -Name windefend` @@ -174,10 +175,12 @@ To add exclusions to Microsoft Defender for Endpoint, you create [indicators](ht 3. On the **File hashes** tab, choose **Add indicator**. 3. On the **Indicator** tab, specify the following settings: + - File hash (Need help? See [Find a file hash using CMPivot](#find-a-file-hash-using-cmpivot) in this article.) - Under **Expires on (UTC)**, choose **Never**. 4. On the **Action** tab, specify the following settings: + - **Response Action**: **Allow** - Title and description @@ -203,12 +206,14 @@ To use CMPivot to get your file hash, follow these steps: 6. In the query box, type the following query:
-```kusto -File(c:\\windows\\notepad.exe) -| project Hash -``` -> [!NOTE] -> In the query above, replace *notepad.exe* with the your third-party security product process name. + ```kusto + File(c:\\windows\\notepad.exe) + | project Hash + ``` + + > [!NOTE] + > In the query above, replace *notepad.exe* with the your third-party security product process name. + ## Set up your device groups, device collections, and organizational units From 58c113b28788b0b339dab0c1a9d3b451d10ddb11 Mon Sep 17 00:00:00 2001 From: Gary Moore Date: Thu, 17 Dec 2020 17:05:27 -0800 Subject: [PATCH 6/7] Restored
--- .../symantec-to-microsoft-defender-atp-setup.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-setup.md b/windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-setup.md index 04b7812825..72385ecf92 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-setup.md +++ b/windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-setup.md @@ -66,7 +66,7 @@ Now that you're moving from Symantec to Microsoft Defender for Endpoint, you'll 2. Run the following PowerShell cmdlets: - `Dism /online /Get-FeatureInfo /FeatureName:Windows-Defender-Features` + `Dism /online /Get-FeatureInfo /FeatureName:Windows-Defender-Features`
`Dism /online /Get-FeatureInfo /FeatureName:Windows-Defender` > [!NOTE] From e25ad2d1521b8980512ad262a3cbbbe6c7491954 Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Thu, 17 Dec 2020 17:26:27 -0800 Subject: [PATCH 7/7] add to timeout value in limitiations --- .../threat-protection/microsoft-defender-atp/live-response.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/security/threat-protection/microsoft-defender-atp/live-response.md b/windows/security/threat-protection/microsoft-defender-atp/live-response.md index 312550fb3f..193c067a32 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/live-response.md +++ b/windows/security/threat-protection/microsoft-defender-atp/live-response.md @@ -293,6 +293,7 @@ Each command is tracked with full details such as: - Live response sessions are limited to 10 live response sessions at a time. - Large-scale command execution is not supported. +- Live response session inactive timeout value is 5 minutes. - A user can only initiate one session at a time. - A device can only be in one session at a time. - The following file size limits apply: