add topic

This commit is contained in:
jcaparas 2017-08-07 14:20:43 -07:00
parent a7f18addf3
commit 605694eea9
2 changed files with 56 additions and 0 deletions

View File

@ -12,6 +12,7 @@
##### [Configure endpoints using Mobile Device Management tools](windows-defender-atp\configure-endpoints-mdm-windows-defender-advanced-threat-protection.md)
###### [Configure endpoints using Microsoft Intune](windows-defender-atp\configure-endpoints-mdm-windows-defender-advanced-threat-protection.md#configure-endpoints-using-microsoft-intune)
##### [Configure endpoints using a local script](windows-defender-atp\configure-endpoints-script-windows-defender-advanced-threat-protection.md)
##### [Configure non-Windows endpoints](windows-defender-atp\configure-endpoints-non-windows-windows-defender-advanced-threat-protection.md)
#### [Configure proxy and Internet settings](windows-defender-atp\configure-proxy-internet-windows-defender-advanced-threat-protection.md)
#### [Troubleshoot onboarding issues](windows-defender-atp\troubleshoot-onboarding-windows-defender-advanced-threat-protection.md)
### [Portal overview](windows-defender-atp\portal-overview-windows-defender-advanced-threat-protection.md)

View File

@ -0,0 +1,55 @@
---
title: Configure non-Windows endpoints in Windows Defender ATP
search.product: eADQiWindows 10XVcnh
ms.prod: w10
ms.mktglfcycl: deploy
ms.sitesec: library
ms.pagetype: security
author: mjcaparas
localizationpriority: high
---
# Configure non-Windows endpoints
**Applies to:**
- Group Policy
- Windows 10 Enterprise
- Windows 10 Education
- Windows 10 Pro
- Windows 10 Pro Education
- Windows Defender Advanced Threat Protection (Windows Defender ATP)
Windows Defender Security Center provides a centralized security operations experience for Windows as well as non-Windows platforms.This experience leverages on a 3rd-party security products telemetry.
### Supported non-Windows endpoints
Windows Defender Security Center supports the following non-Windows endpoints:
- Mac OS (DAN, ARE THERE SPECIFIC VERSIONS THAT WE SUPPORT?)
- Linux (DAN, ARE THERE SPECIFIC VERSIONS THAT WE SUPPORT?)
## Onboard non-Windows endpoints
1. In Windows Defender Security Center portal, select the **Endpoint management** > **Non-Windows endpoint management**.
2. Make sure the 3rd-party solution is listed.
3. Toggle the switch button to turn on the 3rd party solution integration.[LOOKED AT SECURITYCENTER.WINDOWS.COM AND SAW THE TOGGLE - MIGHT CHANGE.]
4. Click **Generate access token** button and then **Copy**.
5. Depending on the 3rd-party implementation you're using, the implementation might vary. Refer to the 3rd-party solution documentation for guidance on how to use the token.
>[!NOTE]
> The access token has limited expiration period. If needed, regenerate the token close to the time you share it with the 3rd party solution.
## Offboard non-Windows endpoints
To effectively offboard the endpoints from the service, you'll need to disable the data push on the 3rd-party portal then switch the toggle to off in Windows Defender Security Center to block the data inbound flow.
1. Follow the 3rd party documentation to opt-out on the 3rd party service side.
2. In Windows Defender Security Center portal, select **Endpoint management**> **Non-Windows endpoint management**.
3. Toggle the switch button to turn off the 3rd party solution integration.