image updates etc
@ -35,7 +35,6 @@ Alerts are organized in queues by their workflow status or assignment:
|
|||||||
- **In progress**
|
- **In progress**
|
||||||
- **Resolved**
|
- **Resolved**
|
||||||
- **Assigned to me**
|
- **Assigned to me**
|
||||||
- **Suppression rules**
|
|
||||||
|
|
||||||
To see a list of alerts, click any of the queues under the **Alerts queue** option in the navigation pane.
|
To see a list of alerts, click any of the queues under the **Alerts queue** option in the navigation pane.
|
||||||
|
|
||||||
|
@ -51,5 +51,4 @@ Read the walkthrough document provided with each attack scenario. Each document
|
|||||||
>Simulation files or scripts mimic attack activity but are actually benign and will not harm or compromise the test machine.
|
>Simulation files or scripts mimic attack activity but are actually benign and will not harm or compromise the test machine.
|
||||||
|
|
||||||
## Related topics
|
## Related topics
|
||||||
- [Onboard and set up Windows Defender ATP](onboard-configure-windows-defender-advanced-threat-protection.md)
|
- [Onboard Windows 10 machines](configure-endpoints-windows-defender-advanced-threat-protection.md)
|
||||||
- [Configure client endpoints](configure-endpoints-windows-defender-advanced-threat-protection.md)
|
|
@ -43,7 +43,8 @@ The following image shows the conditional access flow in action:
|
|||||||
1. A user accesses a compromised site and Windows Defender ATP flags the device as high risk.
|
1. A user accesses a compromised site and Windows Defender ATP flags the device as high risk.
|
||||||
2. The high risk assessment is passed along to Intune. In parallel, an automated investigation is initiated to remediate the identified threat.
|
2. The high risk assessment is passed along to Intune. In parallel, an automated investigation is initiated to remediate the identified threat.
|
||||||
3. Based on the policy created in Intune, the device is marked as not compliant and access to applications are blocked.
|
3. Based on the policy created in Intune, the device is marked as not compliant and access to applications are blocked.
|
||||||
4. The automated investigation and remediation is completed and the threat is removed. Windows Defender ATP sees the device as low risk and Intune assesses the device to be in a compliant state. Users can now access applications.
|
4. The automated investigation and remediation is completed and the threat is removed. Windows Defender ATP sees the device as low risk and Intune assesses the device to be in a compliant state.
|
||||||
|
5. Users can now access applications.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
|
@ -131,11 +131,11 @@ For security reasons, the package used to Offboard machines will expire 30 days
|
|||||||
|
|
||||||
a. In the navigation pane, select **Settings** > **Offboarding**.
|
a. In the navigation pane, select **Settings** > **Offboarding**.
|
||||||
|
|
||||||
b. Select Windows 10 as the operating system.
|
b. Select Windows 10 as the operating system.
|
||||||
|
|
||||||
b. In the **Deployment method** field, select **Mobile Device Management / Microsoft Intune**.
|
c. In the **Deployment method** field, select **Mobile Device Management / Microsoft Intune**.
|
||||||
|
|
||||||
c. Click **Download package**, and save the .zip file.
|
d. Click **Download package**, and save the .zip file.
|
||||||
|
|
||||||
2. Extract the contents of the .zip file to a shared, read-only location that can be accessed by the network administrators who will deploy the package. You should have a file named *WindowsDefenderATP_valid_until_YYYY-MM-DD.offboarding*.
|
2. Extract the contents of the .zip file to a shared, read-only location that can be accessed by the network administrators who will deploy the package. You should have a file named *WindowsDefenderATP_valid_until_YYYY-MM-DD.offboarding*.
|
||||||
|
|
||||||
|
@ -50,11 +50,12 @@ You can use existing System Center Configuration Manager functionality to create
|
|||||||
1. Open the SCCM configuration package .zip file (*WindowsDefenderATPOnboardingPackage.zip*) that you downloaded from the service onboarding wizard. You can also get the package from the [Windows Defender ATP portal](https://securitycenter.windows.com/):
|
1. Open the SCCM configuration package .zip file (*WindowsDefenderATPOnboardingPackage.zip*) that you downloaded from the service onboarding wizard. You can also get the package from the [Windows Defender ATP portal](https://securitycenter.windows.com/):
|
||||||
|
|
||||||
a. In the navigation pane, select **Settings** > **Onboarding**.
|
a. In the navigation pane, select **Settings** > **Onboarding**.
|
||||||
|
|
||||||
b. Select Windows 10 as the operating system.
|
b. Select Windows 10 as the operating system.
|
||||||
|
|
||||||
b. In the **Deployment method** field, select **System Center Configuration Manager 2012/2012 R2/1511/1602**.
|
c. In the **Deployment method** field, select **System Center Configuration Manager 2012/2012 R2/1511/1602**.
|
||||||
|
|
||||||
c. Click **Download package**, and save the .zip file.
|
d. Click **Download package**, and save the .zip file.
|
||||||
|
|
||||||
2. Extract the contents of the .zip file to a shared, read-only location that can be accessed by the network administrators who will deploy the package. You should have a file named *WindowsDefenderATPOnboardingScript.cmd*.
|
2. Extract the contents of the .zip file to a shared, read-only location that can be accessed by the network administrators who will deploy the package. You should have a file named *WindowsDefenderATPOnboardingScript.cmd*.
|
||||||
|
|
||||||
|
Before Width: | Height: | Size: 434 KiB After Width: | Height: | Size: 398 KiB |
Before Width: | Height: | Size: 93 KiB After Width: | Height: | Size: 93 KiB |
Before Width: | Height: | Size: 339 KiB After Width: | Height: | Size: 337 KiB |
Before Width: | Height: | Size: 431 KiB After Width: | Height: | Size: 430 KiB |
Before Width: | Height: | Size: 104 KiB After Width: | Height: | Size: 103 KiB |
Before Width: | Height: | Size: 184 KiB After Width: | Height: | Size: 183 KiB |
Before Width: | Height: | Size: 88 KiB After Width: | Height: | Size: 86 KiB |
Before Width: | Height: | Size: 165 KiB After Width: | Height: | Size: 116 KiB |
Before Width: | Height: | Size: 339 KiB After Width: | Height: | Size: 334 KiB |
Before Width: | Height: | Size: 155 KiB After Width: | Height: | Size: 165 KiB |
@ -23,8 +23,6 @@ ms.date: 04/16/2018
|
|||||||
- Windows 10 Pro Education
|
- Windows 10 Pro Education
|
||||||
- Windows Defender Advanced Threat Protection (Windows Defender ATP)
|
- Windows Defender Advanced Threat Protection (Windows Defender ATP)
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
>Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-machinesview-abovefoldlink)
|
>Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-machinesview-abovefoldlink)
|
||||||
|
|
||||||
The **Machines list** shows a list of the machines in your network, the domain of each machine, when it last reported and the local IP Address it reported on, its **Health state**, the number of active alerts on each machine categorized by alert severity level, and the number of active malware detections. This view allows viewing machines ranked by risk or sensor health state, and keeping track of all machines that are reporting sensor data in your network.
|
The **Machines list** shows a list of the machines in your network, the domain of each machine, when it last reported and the local IP Address it reported on, its **Health state**, the number of active alerts on each machine categorized by alert severity level, and the number of active malware detections. This view allows viewing machines ranked by risk or sensor health state, and keeping track of all machines that are reporting sensor data in your network.
|
||||||
|
@ -51,14 +51,13 @@ You can navigate through the portal using the menu options available in all sect
|
|||||||
Area | Description
|
Area | Description
|
||||||
:---|:---
|
:---|:---
|
||||||
(1) Navigation pane | Use the navigation pane to move between the **Dashboards**, **Alerts queue**, **Machines list**, **Service health**, **Settings**, and **Endpoint management**.
|
(1) Navigation pane | Use the navigation pane to move between the **Dashboards**, **Alerts queue**, **Machines list**, **Service health**, **Settings**, and **Endpoint management**.
|
||||||
**Dashboards** | Enables you to view the Security operations, the Secure score, or Threat analytics dashboard.
|
**Dashboards** | Access the Security operations, the Secure score, or Threat analytics dashboard.
|
||||||
**Alerts** | Enables you to view separate queues of new, in progress, resolved alerts, alerts assigned to you, and suppression rules.
|
**Alerts** | View separate queues of new, in progress, resolved alerts, alerts assigned to you.
|
||||||
**Automated investigations** | Displays a list of automated investigations that's been conducted in the network, the status of each investigation and other details such as when the investigation started and the duration of the investigation.
|
**Automated investigations** | Displays a list of automated investigations that's been conducted in the network, the status of each investigation and other details such as when the investigation started and the duration of the investigation.
|
||||||
**Machines list** | Displays the list of machines that are onboarded to Windows Defender ATP, some information about them, and the corresponding number of alerts.
|
**Machines list** | Displays the list of machines that are onboarded to Windows Defender ATP, some information about them, and the corresponding number of alerts.
|
||||||
**Service health** | Provides information on the current status of the Window Defender ATP service. You'll be able to verify that the service health is healthy or if there are current issues.
|
**Service health** | Provides information on the current status of the Window Defender ATP service. You'll be able to verify that the service health is healthy or if there are current issues.
|
||||||
**Advanced hunting** | Advanced hunting allows you to proactively hunt and investigate across your organization using a powerful search and query tool.
|
**Advanced hunting** | Advanced hunting allows you to proactively hunt and investigate across your organization using a powerful search and query tool.
|
||||||
**Settings** | Shows the settings you selected during onboarding and lets you update your industry preferences and retention policy period. You can also set other configuration settings such as email notifications, activate the preview experience, enable or turn off advanced features, SIEM integration, threat intel API, build Power BI reports, and set baselines for the Secure score dashboard.
|
**Settings** | Shows the settings you selected during onboarding and lets you update your industry preferences and retention policy period. You can also set other configuration settings such as email notifications, activate the preview experience, enable or turn off advanced features, SIEM integration, threat intel API, build Power BI reports, and set baselines for the Secure score dashboard.
|
||||||
**Endpoint management** | Provides access to endpoints such as clients and servers. Allows you to download the onboarding configuration package for endpoints. It also provides access to endpoint offboarding.
|
|
||||||
**(2) Main portal** | Main area where you will see the different views such as the Dashboards, Alerts queue, and Machines list.
|
**(2) Main portal** | Main area where you will see the different views such as the Dashboards, Alerts queue, and Machines list.
|
||||||
**(3) Search, Community center, Time settings, Help and support, Feedback** | **Search** - Provides access to the search bar where you can search for file, IP, machine, URL, and user. Displays the Search box: the drop-down list allows you to select the entity type and then enter the search query text.</br></br> **Community center** -Access the Community center to learn, collaborate, and share experiences about the product. </br></br> **Time settings** - Gives you access to the configuration settings where you can set time zones and view license information. </br></br> **Help and support** - Gives you access to the Windows Defender ATP guide, Microsoft support, and Premier support.</br></br> **Feedback** - Access the feedback button to provide comments about the portal.
|
**(3) Search, Community center, Time settings, Help and support, Feedback** | **Search** - Provides access to the search bar where you can search for file, IP, machine, URL, and user. Displays the Search box: the drop-down list allows you to select the entity type and then enter the search query text.</br></br> **Community center** -Access the Community center to learn, collaborate, and share experiences about the product. </br></br> **Time settings** - Gives you access to the configuration settings where you can set time zones and view license information. </br></br> **Help and support** - Gives you access to the Windows Defender ATP guide, Microsoft support, and Premier support.</br></br> **Feedback** - Access the feedback button to provide comments about the portal.
|
||||||
|
|
||||||
|
@ -39,7 +39,7 @@ Use the **Secure score** dashboard to expand your visibility on the overall secu
|
|||||||
Topic | Description
|
Topic | Description
|
||||||
:---|:---
|
:---|:---
|
||||||
[Portal overview](portal-overview-windows-defender-advanced-threat-protection.md) | Understand the portal layout and area descriptions.
|
[Portal overview](portal-overview-windows-defender-advanced-threat-protection.md) | Understand the portal layout and area descriptions.
|
||||||
[View the Windows Defender Advanced Threat Protection Security operations dashboard](dashboard-windows-defender-advanced-threat-protection.md) | The Windows Defender ATP **Security operations dashboard** provides a snapshot of your network. You can view aggregates of alerts, the overall status of the service of the endpoints on your network, investigate machines, files, and URLs, and see snapshots of threats seen on machines.
|
[View the Security operations dashboard](dashboard-windows-defender-advanced-threat-protection.md) | The Windows Defender ATP **Security operations dashboard** provides a snapshot of your network. You can view aggregates of alerts, the overall status of the service of the endpoints on your network, investigate machines, files, and URLs, and see snapshots of threats seen on machines.
|
||||||
[View the Windows Defender Advanced Threat Protection Secure score dashboard](security-analytics-dashboard-windows-defender-advanced-threat-protection.md) | The **Secure score dashboard** expands your visibility into the overall security posture of your organization. From this dashboard, you'll be able to quickly assess the security posture of your organization, see machines that require attention, as well as recommendations for actions to further reduce the attack surface in your organization - all in one place.
|
[View the Secure score dashboard and improve your secure score](security-analytics-dashboard-windows-defender-advanced-threat-protection.md) | The **Secure score dashboard** expands your visibility into the overall security posture of your organization. From this dashboard, you'll be able to quickly assess the security posture of your organization, see machines that require attention, as well as recommendations for actions to further reduce the attack surface in your organization - all in one place.
|
||||||
|
|
||||||
|
|
||||||
|