mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-18 08:17:23 +00:00
Update manage-atp-post-migration-intune.md
This commit is contained in:
parent
71404f4499
commit
6dd8720fbf
@ -19,7 +19,11 @@ ms.topic: article
|
||||
|
||||
# Manage Microsoft Defender Advanced Threat Protection with Intune
|
||||
|
||||
We recommend using Intune to manage threat protection features for the devices (also referred to as endpoints) within your organization. This article lists various tasks you can perform using Intune together with resources to learn more.
|
||||
We recommend using Intune to manage threat protection features for the devices (also referred to as endpoints) within your organization.
|
||||
|
||||
## Configuring Microsoft Defender ATP with Intune
|
||||
|
||||
The following table lists various tasks you can perform to configure Microsoft Defender ATP with Intune.
|
||||
|
||||
|Task |Resources to learn more |
|
||||
|---------|---------|
|
||||
@ -30,5 +34,22 @@ We recommend using Intune to manage threat protection features for the devices (
|
||||
|If necessary, specify exclusions for Microsoft Defender Antivirus <br/><br/>*Generally, you shouldn't need to apply exclusions. Microsoft Defender Antivirus includes a number of automatic exclusions based on known OS behaviors and typical management files, such as those used in enterprise management, database management, and other enterprise scenarios and situations.* |[Virus scanning recommendations for Enterprise computers that are running currently supported versions of Windows](https://support.microsoft.com/help/822158/virus-scanning-recommendations-for-enterprise-computers)<br/><br/>[Device restrictions: Microsoft Defender Antivirus Exclusions for Windows 10 devices](https://docs.microsoft.com/mem/intune/configuration/device-restrictions-windows-10#microsoft-defender-antivirus-exclusions) <br/><br/>[Configure Microsoft Defender Antivirus exclusions on Windows Server 2016 or 2019](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/configure-server-exclusions-microsoft-defender-antivirus)|
|
||||
|Configure your attack surface reduction rules <br/><br/>*TIP: Configure your attack surface reduction rules in [audit mode](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/audit-windows-defender) at first (for at least one week and up to two months). You can monitor status using Power BI ([get our template](https://github.com/microsoft/MDATP-PowerBI-Templates/tree/master/Attack%20Surface%20Reduction%20rules)), and then set those rules to active mode when you're ready.* |[Audit mode in Microsoft Defender ATP](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/audit-windows-defender)<br/><br/>[Endpoint protection: Attack Surface Reduction](https://docs.microsoft.com/mem/intune/protect/endpoint-protection-windows-10?toc=/intune/configuration/toc.json&bc=/intune/configuration/breadcrumb/toc.json#attack-surface-reduction)<br/><br/>[Learn more about attack surface reduction rules](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/attack-surface-reduction) |
|
||||
|Configure your network filtering (this is also referred to as network protection) <br/><br/>*TIP: Make sure that Windows 10 devices have the latest [antimalware platform updates](https://support.microsoft.com/help/4052623/update-for-microsoft-defender-antimalware-platform) installed.*|[Endpoint protection: Network filtering](https://docs.microsoft.com/mem/intune/protect/endpoint-protection-windows-10#network-filtering)<br/><br/>[Review network protection events in Windows Event Viewer](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/evaluate-network-protection#review-network-protection-events-in-windows-event-viewer) |
|
||||
|Configure controlled folder access (this is also referred to as antiransomware) |[Endpoint protection: Controlled folder access](https://docs.microsoft.com/mem/intune/protect/endpoint-protection-windows-10#controlled-folder-access) |
|
||||
| | |
|
||||
|Configure controlled folder access (this is also referred to as antiransomware) |[Endpoint protection: Controlled folder access](https://docs.microsoft.com/mem/intune/protect/endpoint-protection-windows-10#controlled-folder-access) <br/><br/>[Enable controlled folder access in Intune](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/enable-controlled-folders#intune) |
|
||||
| | |
|
||||
|
||||
|
||||
## Configure threat protection settings in Intune
|
||||
|
||||
> [!IMPORTANT]
|
||||
> You must be a global administrator or service administrator in Intune to configure the settings described in this article. To learn more, see [Types of administrators (Intune)](https://docs.microsoft.com/mem/intune/fundamentals/users-add#types-of-administrators).
|
||||
|
||||
1. Go to the Azure portal ([https://portal.azure.com](https://portal.azure.com)) and sign in.
|
||||
|
||||
2. Under **Azure Services**, choose **Intune**.
|
||||
|
||||
3. In the navigation pane on the left, choose **Device configuration**, and then, under **Manage**, choose **Profiles**.
|
||||
|
||||
4. Select an existing profile, or create a new one.
|
||||
|
||||
> [!TIP]
|
||||
> Need help? See [Using Microsoft Defender ATP with Intune](https://docs.microsoft.com/mem/intune/protect/advanced-threat-protection#example-of-using-microsoft-defender-atp-with-intune).
|
Loading…
x
Reference in New Issue
Block a user