mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-15 23:07:23 +00:00
Merged PR 13899: add ios and android in whats new
add ios and android in whats new
This commit is contained in:
commit
5291aabbfa
@ -32,7 +32,7 @@ You'll need to take the following steps to onboard non-Windows machines:
|
|||||||
1. Turn on third-party integration
|
1. Turn on third-party integration
|
||||||
2. Run a detection test
|
2. Run a detection test
|
||||||
|
|
||||||
### Turn on third-party integration
|
## Turn on third-party integration
|
||||||
|
|
||||||
1. In the navigation pane, select **Settings** > **Onboarding**. Make sure the third-party solution is listed.
|
1. In the navigation pane, select **Settings** > **Onboarding**. Make sure the third-party solution is listed.
|
||||||
|
|
||||||
|
@ -11,7 +11,6 @@ ms.pagetype: security
|
|||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
author: dansimp
|
author: dansimp
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.date: 01/07/2019
|
|
||||||
---
|
---
|
||||||
|
|
||||||
# What's new in Windows Defender ATP
|
# What's new in Windows Defender ATP
|
||||||
@ -21,19 +20,21 @@ ms.date: 01/07/2019
|
|||||||
Here are the new features in the latest release of Windows Defender ATP.
|
Here are the new features in the latest release of Windows Defender ATP.
|
||||||
|
|
||||||
## Windows Defender ATP 1809
|
## Windows Defender ATP 1809
|
||||||
- [Controlled folder access](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-exploit-guard/enable-controlled-folders-exploit-guard)
|
- [Support for iOS and Android devices](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/configure-endpoints-non-windows-windows-defender-advanced-threat-protection#turn-on-third-party-integration)<br> Support for iOS and Android devices are now supported.
|
||||||
|
|
||||||
|
- [Controlled folder access](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-exploit-guard/enable-controlled-folders-exploit-guard)<br>
|
||||||
Controlled folder access is now supported on Windows Server 2019.
|
Controlled folder access is now supported on Windows Server 2019.
|
||||||
|
|
||||||
- [Attack surface reduction rules](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard)
|
- [Attack surface reduction rules](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard)<br>
|
||||||
All Attack surface reduction rules are now supported on Windows Server 2019.
|
All Attack surface reduction rules are now supported on Windows Server 2019.
|
||||||
For Windows 10, version 1809 there are two new attack surface reduction rules:
|
For Windows 10, version 1809 there are two new attack surface reduction rules:
|
||||||
- Block Adobe Reader from creating child processes
|
- Block Adobe Reader from creating child processes
|
||||||
- Block Office communication application from creating child processes.
|
- Block Office communication application from creating child processes.
|
||||||
|
|
||||||
- [Windows Defender Antivirus](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10)
|
- [Windows Defender Antivirus](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10)
|
||||||
- Antimalware Scan Interface (AMSI) was extended to cover Office VBA macros as well. [Office VBA + AMSI: Parting the veil on malicious macros](https://cloudblogs.microsoft.com/microsoftsecure/2018/09/12/office-vba-amsi-parting-the-veil-on-malicious-macros/).
|
- Antimalware Scan Interface (AMSI) was extended to cover Office VBA macros as well. [Office VBA + AMSI: Parting the veil on malicious macros](https://cloudblogs.microsoft.com/microsoftsecure/2018/09/12/office-vba-amsi-parting-the-veil-on-malicious-macros/).
|
||||||
- Windows Defender Antivirus can now [run within a sandbox](https://cloudblogs.microsoft.com/microsoftsecure/2018/10/26/windows-defender-antivirus-can-now-run-in-a-sandbox/) (preview), increasing its security.
|
- Windows Defender Antivirus can now [run within a sandbox](https://cloudblogs.microsoft.com/microsoftsecure/2018/10/26/windows-defender-antivirus-can-now-run-in-a-sandbox/) (preview), increasing its security.
|
||||||
- [Configure CPU priority settings](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-antivirus/configure-advanced-scan-types-windows-defender-antivirus) for Windows Defender Antivirus scans.
|
- [Configure CPU priority settings](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-antivirus/configure-advanced-scan-types-windows-defender-antivirus) for Windows Defender Antivirus scans.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
@ -56,20 +57,20 @@ Onboard supported versions of Windows machines so that they can send sensor data
|
|||||||
Windows Defender ATP provides multiple monitoring and control features to help prevent threats from removable devices, including new settings to allow or block specific hardware IDs.
|
Windows Defender ATP provides multiple monitoring and control features to help prevent threats from removable devices, including new settings to allow or block specific hardware IDs.
|
||||||
|
|
||||||
## Windows Defender ATP 1803
|
## Windows Defender ATP 1803
|
||||||
- [Attack surface reduction rules](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard)
|
- [Attack surface reduction rules](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard)
|
||||||
New attack surface reduction rules:
|
New attack surface reduction rules:
|
||||||
- Use advanced protection against ransomware
|
- Use advanced protection against ransomware
|
||||||
- Block credential stealing from the Windows local security authority subsystem (lsass.exe)
|
- Block credential stealing from the Windows local security authority subsystem (lsass.exe)
|
||||||
- Block process creations originating from PSExec and WMI commands
|
- Block process creations originating from PSExec and WMI commands
|
||||||
- Block untrusted and unsigned processes that run from USB
|
- Block untrusted and unsigned processes that run from USB
|
||||||
- Block executable content from email client and webmail
|
- Block executable content from email client and webmail
|
||||||
- [Controlled folder access](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-exploit-guard/enable-controlled-folders-exploit-guard)
|
- [Controlled folder access](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-exploit-guard/enable-controlled-folders-exploit-guard)
|
||||||
You can now block untrusted processes from writing to disk sectors using Controlled Folder Access.
|
You can now block untrusted processes from writing to disk sectors using Controlled Folder Access.
|
||||||
- [Windows Defender Antivirus](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10)
|
- [Windows Defender Antivirus](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10)
|
||||||
Windows Defender Antivirus now shares detection status between M365 services and interoperates with Windows Defender ATP. For more information, see [Use next-gen technologies in Windows Defender Antivirus through cloud-delivered protection](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-antivirus/utilize-microsoft-cloud-protection-windows-defender-antivirus). Block at first sight can now block non-portable executable files (such as JS, VBS, or macros) as well as executable files. For more information, see [Enable block at first sight](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-antivirus/configure-block-at-first-sight-windows-defender-antivirus).
|
Windows Defender Antivirus now shares detection status between M365 services and interoperates with Windows Defender ATP. For more information, see [Use next-gen technologies in Windows Defender Antivirus through cloud-delivered protection](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-antivirus/utilize-microsoft-cloud-protection-windows-defender-antivirus). Block at first sight can now block non-portable executable files (such as JS, VBS, or macros) as well as executable files. For more information, see [Enable block at first sight](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-antivirus/configure-block-at-first-sight-windows-defender-antivirus).
|
||||||
- [Advanced Hunting](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/advanced-hunting-windows-defender-advanced-threat-protection) <BR>
|
- [Advanced Hunting](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/advanced-hunting-windows-defender-advanced-threat-protection) <BR>
|
||||||
Query data using Advanced hunting in Windows Defender ATP
|
Query data using Advanced hunting in Windows Defender ATP
|
||||||
- [Automated investigation](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/automated-investigations-windows-defender-advanced-threat-protection)<br> Use Automated investigations to investigate and remediate threats
|
- [Automated investigation](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/automated-investigations-windows-defender-advanced-threat-protection)<br> Use Automated investigations to investigate and remediate threats
|
||||||
- [Conditional access](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-atp/conditional-access-windows-defender-advanced-threat-protection) <br>
|
- [Conditional access](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/conditional-access-windows-defender-advanced-threat-protection) <br>
|
||||||
Enable conditional access to better protect users, devices, and data
|
Enable conditional access to better protect users, devices, and data
|
||||||
|
|
||||||
|
Loading…
x
Reference in New Issue
Block a user