Update configure-endpoints-windows-advanced-threat-protection.md

This commit is contained in:
Dolcita
2016-04-19 15:37:43 +10:00
parent ca6ff29e5e
commit 55c26feef5

View File

@ -22,7 +22,7 @@ Using the GP configuration package ensures your endpoints will be correctly conf
> **Note**   To use GP updates to deploy the package, you must be on Windows Server 2008 R2 or later. The endpoints must be running Windows 10 TAP.
1. Open the GP configuration package .zip file (*WindowsATPOnboardingPackage.zip*) that you downloaded during the service onboarding wizard. You can also get the package from the [Windows Defender ATP portal](https://seville.windows.com):
1. Open the GP configuration package .zip file (*WindowsATPOnboardingPackage.zip*) that you downloaded from the service onboarding wizard. You can also get the package from the [Windows Defender ATP portal](https://seville.windows.com):
a. Click **Client onboarding** on the **Navigation pane**.
@ -32,9 +32,9 @@ Using the GP configuration package ensures your endpoints will be correctly conf
3. Open the [Group Policy Management Console](https://technet.microsoft.com/en-us/library/cc731212.aspx) (GPMC), right-click the Group Policy Object (GPO) you want to configure and click **Edit**.
4. In the **Group Policy Management Editor***, go to **Computer configuration**, then **Preferences**, and then **Control panel settings**.
4. In the **Group Policy Management Editor**, go to **Computer configuration**, then **Preferences**, and then **Control panel settings**.
5. Right-click **Scheduled tasks**, point to **New** and then click **Immediate task**.
5. Right-click **Scheduled tasks**, point to **New**, and then click **Immediate task**.
6. In the **Task** window that opens, go to the **General** tab. Choose the local SYSTEM user account under **Security options**.
@ -48,37 +48,37 @@ For additional settings, see the [Additional configuration settings section](add
## Configure with System Center Configuration Manager (SCCM)
1. Open the SCCM configuration package .zip file (*WindowsATPOnboardingPackage.zip*) that you downloaded during the service onboarding wizard. You can also get the package from the [Windows Defender ATP portal](https://seville.windows.com): <span style="background-color: yellow;">Naama: Confirm package name</span>
1. Open the SCCM configuration package .zip file (*WindowsATPOnboardingPackage.zip*) that you downloaded from the service onboarding wizard. You can also get the package from the [Windows Defender ATP portal](https://seville.windows.com): <span style="background-color: yellow;">Naama: Confirm package name</span>
a. Click **Client onboarding** on the **Navigation pane**.
b. Select **SCCM**, click **Download package** and save the .zip file. <span style="background-color: yellow;">Iaan: Need to confirm the UI for this</span>
b. Select **SCCM**, click **Download package**, and save the .zip file. <span style="background-color: yellow;">Iaan: Need to confirm the UI for this</span>
2. Copy the .zip file to a shared, read-only location that can be accessed by the network administrators who will be deploying the package.
2. Copy the .zip file to a shared, read-only location that can be accessed by the network administrators who will deploy the package.
<span style="background-color: yellow;">Iaan: Will confirm ui for this</span>
3. In the SCCM console, go to **Software Library**.
4. Under **Application Management**, right click **Packages** and select **Import**.
5. Click Browse and choose the package that was downloaded from the portal (zip file).
4. Under **Application Management**, right-click **Packages** and select **Import**.
5. Click **Browse** and choose the package that was downloaded from the portal (zip file).
6. The package will appear under the Packages page.
7. Right click the Package and choose deploy.
7. Right-click the Package and choose deploy.
8. Choose a predefined device collection to deploy the package to.
<span style="background-color: yellow;">Naama note: If its a package we create then well set the necessary privileges, otherwise provide guidance (Omri: what is the necessary privileges?)</span>
## Configure endpoints manually with registry changes
You can also manually onboard individual endpoints to Windows Defender ATP. You might want to do this when first testing the service before you commit to onboarding all endpoints in your network.
You can also manually onboard individual endpoints to Windows Defender ATP. You might want to do this when testing the service before you commit to onboarding all endpoints in your network.
1. Extract the contents of the configuration package to a location on
the endpoint you want to onboard (for example, the Desktop).
2. Open an elevated command line prompt on the endpoint and run the
2. Open an elevated command-line prompt on the endpoint and run the
script:
a. Click **Start** and type **cmd**.
b. Right-click Command prompt and select **Run as administrator**.
b. Right-click **Command prompt** and select **Run as administrator**.
![Window Start menu pointing to Run as administrator](images/run-as-admin.png)
@ -88,7 +88,7 @@ You can also manually onboard individual endpoints to Windows Defender ATP. You
4. Press the **Enter ** key or click **OK**.
See the [Troubleshoot Windows Defender Advanced Threat Protection onboarding issues](troubleshoot-onboarding-windows-advanced-threat-protection.md) topic for details on how you can manually validate that the endpoint is compliant and correctly reporting telemetry.
See the [Troubleshoot Windows Defender Advanced Threat Protection onboarding issues](troubleshoot-onboarding-windows-advanced-threat-protection.md) topic for details on how you can manually validate that the endpoint is compliant and correctly reports telemetry.
## Related topics
- [Windows Defender ATP service onboarding](service-onboarding-windows-advanced-threat-protection.md)