mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-12 21:37:22 +00:00
intune conten
This commit is contained in:
parent
331a651569
commit
5492b8c404
@ -98,7 +98,7 @@ Configuration for onboarded machines: telemetry reporting frequency | ./Device/V
|
||||
> - The **Health Status for onboarded machines** policy uses read-only properties and can't be remediated.
|
||||
> - Configuration of telemetry reporting frequency is only available for machines on Windows 10, version 1703.
|
||||
|
||||
### Onboard and monitor endpoints using the Microsoft Intune in the Azure portal
|
||||
### Using the Azure Intune Portal to deploy Windows Defender Advanced Threat Protection policies to Windows 10 1607 and higher
|
||||
|
||||
1. Open the Microsoft Intune configuration package .zip file (*WindowsDefenderATPOnboardingPackage.zip*) that you downloaded from the service onboarding wizard. You can also get the package from the [Windows Defender ATP portal](https://securitycenter.windows.com/):
|
||||
|
||||
@ -108,27 +108,31 @@ Configuration for onboarded machines: telemetry reporting frequency | ./Device/V
|
||||
|
||||

|
||||
|
||||
2. Extract the contents of the .zip file to a shared, read-only location that can be accessed by the network administrators who will deploy the package. You should have a file named *WindowsDefenderATP.onboarding*.
|
||||
2. Extract the contents of the .zip file to a shared, read-only location that can be accessed by the network administrators who will deploy the package. You should have a file named *WindowsDefenderATP.onboarding*.
|
||||
|
||||
3. Login to the (Microsoft Azure portal)[https://portal.azure.com].
|
||||
3. Login to the [Microsoft Azure portal](https://portal.azure.com).
|
||||
|
||||
4. From the Intune blade, choose **Device compliance**.
|
||||
4. From the Intune blade, choose **Device configuration**.
|
||||
|
||||

|
||||

|
||||
|
||||
5. Under **Manage**, choose **Policies** and choose **Create Policy**.
|
||||
5. Under **Manage**, choose **Profiles** and click **Create Profile**.
|
||||
|
||||

|
||||

|
||||
|
||||
6. Type a name, description and choose the platform that you want this policy to apply. The category blade opens.
|
||||
4. Type a name, description and choose **Windows 10 and later** as the Platform and **Windows Defender ATP (Windows 10 Desktop)** as the Profile type.
|
||||
|
||||

|
||||
|
||||
7. Specify information in the **Device Health**, **Device Properties**, and **System Security** settings then click **Create**.
|
||||
7. Click **Settings** > **Configure**.
|
||||
|
||||

|
||||

|
||||
|
||||
8. Deploy the policy.
|
||||
8. Click the folder icon and select the WindowsDefenderATP.onboarding file you extracted earlier. Configure whether you want to allow sample collection from endpoints for [Deep Analysis](investigate-files-windows-defender-advanced-threat-protection.md) by choosing **All**, or disable this feature by choosing **None**. When complete, click **OK**.
|
||||
|
||||

|
||||
|
||||
9. Click **Create**.
|
||||
|
||||
|
||||
|
||||
|
BIN
windows/keep-secure/images/atp-azure-intune-configure.png
Normal file
BIN
windows/keep-secure/images/atp-azure-intune-configure.png
Normal file
Binary file not shown.
After Width: | Height: | Size: 106 KiB |
BIN
windows/keep-secure/images/atp-azure-intune-create-profile.png
Normal file
BIN
windows/keep-secure/images/atp-azure-intune-create-profile.png
Normal file
Binary file not shown.
After Width: | Height: | Size: 68 KiB |
BIN
windows/keep-secure/images/atp-azure-intune-device-config.png
Normal file
BIN
windows/keep-secure/images/atp-azure-intune-device-config.png
Normal file
Binary file not shown.
After Width: | Height: | Size: 132 KiB |
Binary file not shown.
After Width: | Height: | Size: 103 KiB |
Loading…
x
Reference in New Issue
Block a user