mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-07 18:17:22 +00:00
Added more image borders, some lighbox functionality
This commit is contained in:
parent
b2fb3348bd
commit
66e43bf676
@ -106,18 +106,21 @@ different types of Endpoint security policies.
|
||||
2. Navigate to **Endpoint security > Endpoint detection and response**. Click
|
||||
on **Create Profile**.
|
||||
|
||||

|
||||
> [!div class="mx-imgBorder"]
|
||||
> 
|
||||
|
||||
3. Under **Platform, select Windows 10 and Later, Profile - Endpoint detection
|
||||
and response > Create**.
|
||||
|
||||
4. Enter a name and description, then select **Next**.
|
||||
|
||||

|
||||
> [!div class="mx-imgBorder"]
|
||||
> 
|
||||
|
||||
5. Select settings as required, then select **Next**.
|
||||
|
||||

|
||||
> [!div class="mx-imgBorder"]
|
||||
> 
|
||||
|
||||
> [!NOTE]
|
||||
> In this instance, this has been auto populated as Microsoft Defender ATP has already been integrated with Intune. For more information on the integration, see [Enable Microsoft Defender ATP in Intune](https://docs.microsoft.com/mem/intune/protect/advanced-threat-protection-configure#to-enable-microsoft-defender-atp).
|
||||
@ -128,19 +131,23 @@ different types of Endpoint security policies.
|
||||
|
||||
6. Add scope tags if necessary, then select **Next**.
|
||||
|
||||

|
||||
> [!div class="mx-imgBorder"]
|
||||
> 
|
||||
|
||||
7. Add test group by clicking on **Select groups to include** and choose your group, then select **Next**.
|
||||
|
||||

|
||||
> [!div class="mx-imgBorder"]
|
||||
> 
|
||||
|
||||
8. Review and accept, then select **Create**.
|
||||
|
||||

|
||||
> [!div class="mx-imgBorder"]
|
||||
> 
|
||||
|
||||
9. You can view your completed policy.
|
||||
|
||||

|
||||
> [!div class="mx-imgBorder"]
|
||||
> 
|
||||
|
||||
### Next-generation protection
|
||||
|
||||
@ -301,22 +308,22 @@ To confirm that the configuration policy has been applied to your test device, f
|
||||
steps above. The following example shows the next generation protection settings.
|
||||
|
||||
> [!div class="mx-imgBorder"]
|
||||
> 
|
||||
> [  ](images/43ab6aa74471ee2977e154a4a5ef2d39.png#lightbox)
|
||||
|
||||
2. Select the **Configuration Policy** to view the policy status.
|
||||
|
||||
> [!div class="mx-imgBorder"]
|
||||
> 
|
||||
> [  ](images/55ecaca0e4a022f0e29d45aeed724e6c.png#lightbox)
|
||||
|
||||
3. Select **Device Status** to see the status.
|
||||
|
||||
> [!div class="mx-imgBorder"]
|
||||
> 
|
||||
> [  ](images/18a50df62cc38749000dbfb48e9a4c9b.png#lightbox)
|
||||
|
||||
4. Select **User Status** to see the status.
|
||||
|
||||
> [!div class="mx-imgBorder"]
|
||||
> 
|
||||
> [  ](images/4e965749ff71178af8873bc91f9fe525.png#lightbox)
|
||||
|
||||
5. Select **Per-setting status** to see the status.
|
||||
|
||||
@ -324,7 +331,7 @@ To confirm that the configuration policy has been applied to your test device, f
|
||||
>This view is very useful to identify any settings that conflict with another policy.
|
||||
|
||||
> [!div class="mx-imgBorder"]
|
||||
> 
|
||||
> [  ](images/42acc69d0128ed09804010bdbdf0a43c.png#lightbox)
|
||||
|
||||
### Endpoint detection and response
|
||||
|
||||
@ -333,19 +340,19 @@ To confirm that the configuration policy has been applied to your test device, f
|
||||
Protection service should not be started.
|
||||
|
||||
> [!div class="mx-imgBorder"]
|
||||
> 
|
||||
> [  ](images/b418a232a12b3d0a65fc98248dbb0e31.png#lightbox)
|
||||
|
||||
2. After the configuration has been applied, the Microsoft Defender ATP
|
||||
Protection Service should be started.
|
||||
|
||||
> [!div class="mx-imgBorder"]
|
||||
> 
|
||||
> [  ](images/a621b699899f1b41db211170074ea59e.png#lightbox)
|
||||
|
||||
3. After the services are running on the device, the device appears in Microsoft
|
||||
Defender Security Center.
|
||||
|
||||
> [!div class="mx-imgBorder"]
|
||||
> 
|
||||
> [  ](images/df0c64001b9219cfbd10f8f81a273190.png#lightbox)
|
||||
|
||||
### Next-generation protection
|
||||
|
||||
|
Loading…
x
Reference in New Issue
Block a user