mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-12 13:27:23 +00:00
Merged PR 5601: Merge atp-intune-remove to master
This commit is contained in:
commit
62d92ba67d
@ -118,66 +118,6 @@ Configuration for onboarded machines: diagnostic data reporting frequency | ./De
|
|||||||
> After onboarding the endpoint, you can choose to run a detection test to verify that an endpoint is properly onboarded to the service. For more information, see [Run a detection test on a newly onboarded Windows Defender ATP endpoint](run-detection-test-windows-defender-advanced-threat-protection.md).
|
> After onboarding the endpoint, you can choose to run a detection test to verify that an endpoint is properly onboarded to the service. For more information, see [Run a detection test on a newly onboarded Windows Defender ATP endpoint](run-detection-test-windows-defender-advanced-threat-protection.md).
|
||||||
|
|
||||||
|
|
||||||
### Using the Azure Intune Portal to deploy Windows Defender Advanced Threat Protection policies on Windows 10 1607 and higher
|
|
||||||
|
|
||||||
1. Open the Microsoft Intune configuration package .zip file (*WindowsDefenderATPOnboardingPackage.zip*) that you downloaded from the service onboarding wizard. You can also get the package from the [Windows Defender ATP portal](https://securitycenter.windows.com/):
|
|
||||||
|
|
||||||
a. Select **Endpoint management** > **Clients** on the **Navigation pane**.
|
|
||||||
|
|
||||||
b. Select **Mobile Device Management/Microsoft Intune** > **Download package** and save the .zip file.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
2. Extract the contents of the .zip file to a shared, read-only location that can be accessed by the network administrators who will deploy the package. You should have a file named *WindowsDefenderATP.onboarding*.
|
|
||||||
|
|
||||||
3. Login to the [Microsoft Azure portal](https://portal.azure.com).
|
|
||||||
|
|
||||||
4. From the Intune blade, choose **Device configuration**.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
5. Under **Manage**, choose **Profiles** and click **Create Profile**.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
6. Type a name, description and choose **Windows 10 and later** as the Platform and **Custom** as the Profile type.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
7. Click **Settings** > **Configure**.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
8. Under Custom OMA-URI Settings, click **Add**.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
9. Enter the following values, then click **OK**.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
- **Name**: Type a name for the setting.
|
|
||||||
- **Description**: Type a description for the setting.
|
|
||||||
- **OMA-URI**: _./Device/Vendor/MSFT/WindowsAdvancedThreatProtection/Onboarding_
|
|
||||||
- **Value**: Copy and paste the contents of the WindowsDefenderATP.onboarding file you downloaded.
|
|
||||||
|
|
||||||
10. Save the settings by clicking **OK**.
|
|
||||||
|
|
||||||
11. Click **Create**.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
12. To deploy the Profile, click **Assignments**.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
13. Search for and select the Group you want to apply the Configuration Profile to, then click **Select**.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
14. Click **Save** to finish deploying the Configuration Profile.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
### Offboard and monitor endpoints
|
### Offboard and monitor endpoints
|
||||||
|
|
||||||
|
Loading…
x
Reference in New Issue
Block a user