Merged PR 14915: TIMNA preview updates
@ -551,7 +551,11 @@
|
|||||||
]
|
]
|
||||||
},
|
},
|
||||||
"need_generate_pdf_url_template": true,
|
"need_generate_pdf_url_template": true,
|
||||||
"targets": {},
|
"targets": {
|
||||||
|
"Pdf": {
|
||||||
|
"template_folder": "_themes.pdf"
|
||||||
|
}
|
||||||
|
},
|
||||||
"need_generate_pdf": false,
|
"need_generate_pdf": false,
|
||||||
"need_generate_intellisense": false
|
"need_generate_intellisense": false
|
||||||
}
|
}
|
@ -13934,5 +13934,10 @@
|
|||||||
"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis",
|
"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis",
|
||||||
"redirect_document_id": false
|
"redirect_document_id": false
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"source_path": "windows/security/threat-protection/windows-defender-atp/threat-analytics-dashboard-windows-defender-advanced-threat-protection.md",
|
||||||
|
"redirect_url": "/windows/security/threat-protection/windows-defender-atp/threat-analytics",
|
||||||
|
"redirect_document_id": true
|
||||||
|
},
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -28,6 +28,7 @@ In order to switch to the Chinese or Japanese version of HoloLens, you’ll need
|
|||||||
8. Select **Install software** and follow the instructions to finish installing.
|
8. Select **Install software** and follow the instructions to finish installing.
|
||||||
9. Once the build is installed, HoloLens setup will start automatically. Put on the device and follow the setup directions.
|
9. Once the build is installed, HoloLens setup will start automatically. Put on the device and follow the setup directions.
|
||||||
|
|
||||||
|
When you’re done with setup, go to **Settings -> Update & Security -> Windows Insider Program** and check that you’re configured to receive the latest preview builds. The Chinese/Japanese version of HoloLens will be kept up-to-date with the latest preview builds via the Windows Insider Program the same way the English version is.
|
||||||
|
|
||||||
## Note for language support
|
## Note for language support
|
||||||
|
|
||||||
|
@ -24,6 +24,7 @@
|
|||||||
## [Enable PEAP, EAP-FAST, and Cisco LEAP on Surface devices](enable-peap-eap-fast-and-cisco-leap-on-surface-devices.md)
|
## [Enable PEAP, EAP-FAST, and Cisco LEAP on Surface devices](enable-peap-eap-fast-and-cisco-leap-on-surface-devices.md)
|
||||||
## [Manage Surface UEFI settings](manage-surface-uefi-settings.md)
|
## [Manage Surface UEFI settings](manage-surface-uefi-settings.md)
|
||||||
### [Advanced UEFI security features for Surface Pro 3](advanced-uefi-security-features-for-surface-pro-3.md)
|
### [Advanced UEFI security features for Surface Pro 3](advanced-uefi-security-features-for-surface-pro-3.md)
|
||||||
|
### [Surface System SKU reference](surface-system-sku-reference.md)
|
||||||
## [Surface Enterprise Management Mode](surface-enterprise-management-mode.md)
|
## [Surface Enterprise Management Mode](surface-enterprise-management-mode.md)
|
||||||
### [Enroll and configure Surface devices with SEMM](enroll-and-configure-surface-devices-with-semm.md)
|
### [Enroll and configure Surface devices with SEMM](enroll-and-configure-surface-devices-with-semm.md)
|
||||||
### [Unenroll Surface devices from SEMM](unenroll-surface-devices-from-semm.md)
|
### [Unenroll Surface devices from SEMM](unenroll-surface-devices-from-semm.md)
|
||||||
|
@ -13,6 +13,13 @@ ms.topic: article
|
|||||||
|
|
||||||
This topic lists new and updated topics in the Surface documentation library.
|
This topic lists new and updated topics in the Surface documentation library.
|
||||||
|
|
||||||
|
## March 2019
|
||||||
|
|
||||||
|
New or changed topic | Description
|
||||||
|
--- | ---
|
||||||
|
[Surface System SKU reference](surface-system-sku-reference.md) | New
|
||||||
|
|
||||||
|
|
||||||
## February 2019
|
## February 2019
|
||||||
|
|
||||||
New or changed topic | Description
|
New or changed topic | Description
|
||||||
|
59
devices/surface/surface-system-sku-reference.md
Normal file
@ -0,0 +1,59 @@
|
|||||||
|
---
|
||||||
|
title: System SKU reference (Surface)
|
||||||
|
description: See a reference of System Model and System SKU names.
|
||||||
|
keywords: uefi, configure, firmware, secure, semm
|
||||||
|
ms.prod: w10
|
||||||
|
ms.mktglfcycl: manage
|
||||||
|
ms.pagetype: surface, devices, security
|
||||||
|
ms.sitesec: library
|
||||||
|
author: coveminer
|
||||||
|
ms.author: v-jokai
|
||||||
|
ms.topic: article
|
||||||
|
ms.date: 03/20/2019
|
||||||
|
---
|
||||||
|
|
||||||
|
# System SKU reference
|
||||||
|
|
||||||
|
This document provides a reference of System Model and System SKU names that you can use to quickly determine the machine state of a specific device using PowerShell, WMI,
|
||||||
|
|
||||||
|
System Model and System SKU are variables stored in System Management BIOS (SMBIOS) tables in the UEFI layer of Surface devices. The System SKU name is required to differentiate between devices with the same System Model name, such as Surface Pro and Surface Pro with LTE Advanced.
|
||||||
|
|
||||||
|
| Device | System Model | System SKU |
|
||||||
|
| ---------- | ----------- | -------------- |
|
||||||
|
| Surface 3 WiFI | Surface 3 | Surface_3 |
|
||||||
|
| Surface 3 LTE AT&T | Surface 3 | Surface_3_US1 |
|
||||||
|
| Surface 3 LTE Verizon | Surface 3 | Surface_3_US2 |
|
||||||
|
| Surface 3 LTE North America | Surface 3 | Surface_3_NAG |
|
||||||
|
| Surface 3 LTE Outside of North America and T-Mobile In Japan | Surface 3 | Surface_3_ROW |
|
||||||
|
| Surface Pro | Surface Pro | Surface_Pro_1796 |
|
||||||
|
| Surface Pro with LTE Advanced | Surface Pro | Surface_Pro_1807 |
|
||||||
|
| Surface Book 2 13inch | Surface Book 2 | Surface_Book_1832 |
|
||||||
|
| Surface Book 2 15inch | Surface Book 2 | Surface_Book_1793 |
|
||||||
|
| Surface Go Consumer | Surface Go | Surface_Go_1824_Consumer |
|
||||||
|
| Surface Go Commercial | Surface Go | Surface_Go_1824_Commercial |
|
||||||
|
| Surface Pro 6 Consumer | Surface Pro 6 | Surface_Pro_6_1796_Consumer |
|
||||||
|
| Surface Pro 6 Commercial | Surface Pro 6 | Surface_Pro_6_1796_Commercial |
|
||||||
|
| Surface Laptop 2 Consumer | Surface Laptop 2 | Surface_Laptop_2_1769_Consumer |
|
||||||
|
| Surface Laptop 2 Commercial | Surface Laptop 2 | Surface_Laptop_2_1769_Commercial |
|
||||||
|
|
||||||
|
## Examples
|
||||||
|
|
||||||
|
**PowerShell**
|
||||||
|
Use the following PowerShell command to pull System SKU:
|
||||||
|
|
||||||
|
```
|
||||||
|
gwmi -namespace root\wmi -class MS_SystemInformation | select SystemSKU
|
||||||
|
```
|
||||||
|
|
||||||
|
**System Information**
|
||||||
|
You can also find the System SKU and System Model for a device in System Information.
|
||||||
|
|
||||||
|
- Go to **Start** > **MSInfo32**.
|
||||||
|
|
||||||
|
One example of how you could use this in Microsoft Deployment Toolkit (MDT) or System Center Configuration Manager is as part of a Task Sequence WMI Condition. For example:
|
||||||
|
|
||||||
|
**Task Sequence WMI Condition**
|
||||||
|
|
||||||
|
|
||||||
|
- WMI Namespace – Root\WMI
|
||||||
|
- WQL Query – SELECT * FROM MS_SystemInformation WHERE SystemSKU = "Surface_Pro_1796"
|
@ -34,7 +34,7 @@ Teachers and IT administrators can now get early access to **Minecraft: Educatio
|
|||||||
- **Minecraft: Education Edition** requires Windows 10.
|
- **Minecraft: Education Edition** requires Windows 10.
|
||||||
- Trials or subscriptions of **Minecraft: Education Edition** are offered to education tenants that are managed by Azure Active Directory (Azure AD).
|
- Trials or subscriptions of **Minecraft: Education Edition** are offered to education tenants that are managed by Azure Active Directory (Azure AD).
|
||||||
- If your school doesn't have an Azure AD tenant, the [IT administrator can set one up](school-get-minecraft.md) as part of the process of getting **Minecraft: Education Edition**.
|
- If your school doesn't have an Azure AD tenant, the [IT administrator can set one up](school-get-minecraft.md) as part of the process of getting **Minecraft: Education Edition**.
|
||||||
* Office 365 Education, which includes online versions of Office apps plus 1 TB online storage and [Microsoft Classroom](https://classroom.microsoft.com/), is free for teachers and students. [Sign up your school for Office 365 Education.](https://products.office.com/academic/office-365-education-plan)
|
* Office 365 Education, which includes online versions of Office apps plus 1 TB online storage. [Sign up your school for Office 365 Education.](https://products.office.com/academic/office-365-education-plan)
|
||||||
* If your school has an Office 365 Education subscription, it includes a free Azure AD subscription. [Register your free Azure AD subscription.](https://msdn.microsoft.com/library/windows/hardware/mt703369%28v=vs.85%29.aspx)
|
* If your school has an Office 365 Education subscription, it includes a free Azure AD subscription. [Register your free Azure AD subscription.](https://msdn.microsoft.com/library/windows/hardware/mt703369%28v=vs.85%29.aspx)
|
||||||
|
|
||||||
<!--  -->
|
<!--  -->
|
||||||
|
@ -101,7 +101,7 @@ The following diagram shows the BitLocker configuration service provider in tree
|
|||||||
</tr>
|
</tr>
|
||||||
<tr>
|
<tr>
|
||||||
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
||||||
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
||||||
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
||||||
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
||||||
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
||||||
@ -149,7 +149,7 @@ The following diagram shows the BitLocker configuration service provider in tree
|
|||||||
</tr>
|
</tr>
|
||||||
<tr>
|
<tr>
|
||||||
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
||||||
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
||||||
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
||||||
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
||||||
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
||||||
@ -227,7 +227,7 @@ The following diagram shows the BitLocker configuration service provider in tree
|
|||||||
</tr>
|
</tr>
|
||||||
<tr>
|
<tr>
|
||||||
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
||||||
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
||||||
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
||||||
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
||||||
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
||||||
@ -324,7 +324,7 @@ The following diagram shows the BitLocker configuration service provider in tree
|
|||||||
</tr>
|
</tr>
|
||||||
<tr>
|
<tr>
|
||||||
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
||||||
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
||||||
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
||||||
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
||||||
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
||||||
@ -393,7 +393,7 @@ The following diagram shows the BitLocker configuration service provider in tree
|
|||||||
</tr>
|
</tr>
|
||||||
<tr>
|
<tr>
|
||||||
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
||||||
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
||||||
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
||||||
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
||||||
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
||||||
@ -474,7 +474,7 @@ The following diagram shows the BitLocker configuration service provider in tree
|
|||||||
</tr>
|
</tr>
|
||||||
<tr>
|
<tr>
|
||||||
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
||||||
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
||||||
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
||||||
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
||||||
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
||||||
@ -572,7 +572,7 @@ The following diagram shows the BitLocker configuration service provider in tree
|
|||||||
</tr>
|
</tr>
|
||||||
<tr>
|
<tr>
|
||||||
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
||||||
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
||||||
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
||||||
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
||||||
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
||||||
@ -671,7 +671,7 @@ The following diagram shows the BitLocker configuration service provider in tree
|
|||||||
</tr>
|
</tr>
|
||||||
<tr>
|
<tr>
|
||||||
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
||||||
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
||||||
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
||||||
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
||||||
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
||||||
@ -733,7 +733,7 @@ The following diagram shows the BitLocker configuration service provider in tree
|
|||||||
</tr>
|
</tr>
|
||||||
<tr>
|
<tr>
|
||||||
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
||||||
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
||||||
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
||||||
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
||||||
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
||||||
@ -814,7 +814,7 @@ The following diagram shows the BitLocker configuration service provider in tree
|
|||||||
</tr>
|
</tr>
|
||||||
<tr>
|
<tr>
|
||||||
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
||||||
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
||||||
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
||||||
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
||||||
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
||||||
|
@ -725,12 +725,12 @@ Required. Added in Windows 10, version 1803. This node allows the MDM to set cus
|
|||||||
Supported operations are Add, Get, Delete, and Replace. Value type is string.
|
Supported operations are Add, Get, Delete, and Replace. Value type is string.
|
||||||
|
|
||||||
<a href="" id="provider-providerid-firstsyncstatus-skipdevicestatuspage"></a>**Provider/*ProviderID*/FirstSyncStatus/SkipDeviceStatusPage**
|
<a href="" id="provider-providerid-firstsyncstatus-skipdevicestatuspage"></a>**Provider/*ProviderID*/FirstSyncStatus/SkipDeviceStatusPage**
|
||||||
Required. Device only. Added in Windows 10, version 1803. This node decides wheter or not the MDM device progress page skips after Azure AD joined or Hybrid Azure AD joined in OOBE.
|
Required. Device only. Added in Windows 10, version 1803. This node decides whether or not the MDM device progress page skips after Azure AD joined or Hybrid Azure AD joined in OOBE.
|
||||||
|
|
||||||
Supported operations are Get and Replace. Value type is bool.
|
Supported operations are Get and Replace. Value type is bool.
|
||||||
|
|
||||||
<a href="" id="provider-providerid-firstsyncstatus-skipuserstatuspage"></a>**Provider/*ProviderID*/FirstSyncStatus/SkipUserStatusPage**
|
<a href="" id="provider-providerid-firstsyncstatus-skipuserstatuspage"></a>**Provider/*ProviderID*/FirstSyncStatus/SkipUserStatusPage**
|
||||||
Required. Device only. Added in Windows 10, version 1803. This node decides wheter or not the MDM user progress page skips after Azure AD joined or DJ++ after user login.
|
Required. Device only. Added in Windows 10, version 1803. This node decides whether or not the MDM user progress page skips after Azure AD joined or DJ++ after user login.
|
||||||
|
|
||||||
Supported operations are Get and Replace. Value type is bool.
|
Supported operations are Get and Replace. Value type is bool.
|
||||||
|
|
||||||
|
@ -42,11 +42,10 @@ These steps will show you how to configure an Active Directory account with the
|
|||||||
5. User cannot change password: Select
|
5. User cannot change password: Select
|
||||||
6. Password never expires: Select
|
6. Password never expires: Select
|
||||||
3. In an elevated Windows PowerShell prompt (run as Administrator), run the following commands and press **Enter** after each command:
|
3. In an elevated Windows PowerShell prompt (run as Administrator), run the following commands and press **Enter** after each command:
|
||||||
``` syntax
|
```powershell
|
||||||
Set-ExecutionPolicy -ExecutionPolicy RemoteSigned -Force
|
Set-ExecutionPolicy -ExecutionPolicy RemoteSigned -Force
|
||||||
Set-Location C:\Setup\Scripts
|
Set-Location C:\Setup\Scripts
|
||||||
.\Set-OUPermissions.ps1 -Account MDT_JD
|
.\Set-OUPermissions.ps1 -Account MDT_JD -TargetOU "OU=Workstations,OU=Computers,OU=Contoso"
|
||||||
-TargetOU "OU=Workstations,OU=Computers,OU=Contoso"
|
|
||||||
```
|
```
|
||||||
4. The Set-OUPermissions.ps1 script allows the MDT\_JD user account permissions to manage computer accounts in the Contoso / Computers OU. Below you find a list of the permissions being granted:
|
4. The Set-OUPermissions.ps1 script allows the MDT\_JD user account permissions to manage computer accounts in the Contoso / Computers OU. Below you find a list of the permissions being granted:
|
||||||
1. Scope: This object and all descendant objects
|
1. Scope: This object and all descendant objects
|
||||||
|
@ -179,7 +179,7 @@ The following tables list registry values that correspond to the Group Policy se
|
|||||||
| --- | --- | --- |
|
| --- | --- | --- |
|
||||||
| AlwaysAutoRebootAtScheduledTime | REG_DWORD | 0: disable automatic reboot after update installation at scheduled time</br>1: enable automatic reboot after update installation at ascheduled time |
|
| AlwaysAutoRebootAtScheduledTime | REG_DWORD | 0: disable automatic reboot after update installation at scheduled time</br>1: enable automatic reboot after update installation at ascheduled time |
|
||||||
| AlwaysAutoRebootAtScheduledTimeMinutes | REG_DWORD | 15-180: set automatic reboot to occur after given minutes |
|
| AlwaysAutoRebootAtScheduledTimeMinutes | REG_DWORD | 15-180: set automatic reboot to occur after given minutes |
|
||||||
| AUOptions | REG_DWORD | 2: notify for download and automatically install updates</br>3: automatically download and notify for installation of updates</br>4: Automatically download and schedule installation of updates</br>5: allow the local admin to configure these settings</br>**Note:** To configure restart behavior, set this value to **4** |
|
| AUOptions | REG_DWORD | 2: notify for download and notify for installation of updates</br>3: automatically download and notify for installation of updates</br>4: Automatically download and schedule installation of updates</br>5: allow the local admin to configure these settings</br>**Note:** To configure restart behavior, set this value to **4** |
|
||||||
| NoAutoRebootWithLoggedOnUsers | REG_DWORD | 0: disable do not reboot if users are logged on</br>1: do not reboot after an update installation if a user is logged on</br>**Note:** If disabled : Automatic Updates will notify the user that the computer will automatically restart in 5 minutes to complete the installation |
|
| NoAutoRebootWithLoggedOnUsers | REG_DWORD | 0: disable do not reboot if users are logged on</br>1: do not reboot after an update installation if a user is logged on</br>**Note:** If disabled : Automatic Updates will notify the user that the computer will automatically restart in 5 minutes to complete the installation |
|
||||||
| ScheduledInstallTime | REG_DWORD | 0-23: schedule update installation time to a specific hour</br>starts with 12 AM (0) and ends with 11 PM (23) |
|
| ScheduledInstallTime | REG_DWORD | 0-23: schedule update installation time to a specific hour</br>starts with 12 AM (0) and ends with 11 PM (23) |
|
||||||
|
|
||||||
|
@ -78,7 +78,7 @@ If you have deployed images that have not been generalized, then many of them mi
|
|||||||
|
|
||||||
[](images/device-reliability-device-count.png)
|
[](images/device-reliability-device-count.png)
|
||||||
|
|
||||||
If you have devices that appear in other solutions, but not Device Health, follow these steps to investigate the issue:
|
If you have devices that appear in other solutions, but not Device Health (the Device Health overview tile shows "Performing Assessment" or the device count is lower than expected), follow these steps to investigate the issue:
|
||||||
1. Using the Azure portal, remove the Device Health (appears as DeviceHealthProd on some pages) solution from your Log Analytics workspace. After completing this, add the Device Health solution to you workspace again.
|
1. Using the Azure portal, remove the Device Health (appears as DeviceHealthProd on some pages) solution from your Log Analytics workspace. After completing this, add the Device Health solution to you workspace again.
|
||||||
2. Confirm that the devices are running Windows 10.
|
2. Confirm that the devices are running Windows 10.
|
||||||
3. Verify that the Commercial ID is present in the device's registry. For details see [https://gpsearch.azurewebsites.net/#13551](https://gpsearch.azurewebsites.net/#13551).
|
3. Verify that the Commercial ID is present in the device's registry. For details see [https://gpsearch.azurewebsites.net/#13551](https://gpsearch.azurewebsites.net/#13551).
|
||||||
|
@ -32,6 +32,7 @@ To perform a user-driven hybrid AAD joined deployment using Windows Autopilot:
|
|||||||
- The device must be connected to the Internet and have access to an Active Directory domain controller.
|
- The device must be connected to the Internet and have access to an Active Directory domain controller.
|
||||||
- The Intune Connector for Active Directory must be installed.
|
- The Intune Connector for Active Directory must be installed.
|
||||||
- Note: The Intune Connector will perform an on-prem AD join, therefore users do not need on-prem AD-join permission, assuming the Connector is [configured to perform this action](https://docs.microsoft.com/intune/windows-autopilot-hybrid#increase-the-computer-account-limit-in-the-organizational-unit) on the user's behalf.
|
- Note: The Intune Connector will perform an on-prem AD join, therefore users do not need on-prem AD-join permission, assuming the Connector is [configured to perform this action](https://docs.microsoft.com/intune/windows-autopilot-hybrid#increase-the-computer-account-limit-in-the-organizational-unit) on the user's behalf.
|
||||||
|
- If using Proxy, WDAP Proxy settings option must be enabled and configured.
|
||||||
|
|
||||||
**AAD device join**: The hybrid AAD join process uses the system context to perform device AAD join, therefore it is not affected by user based AAD join permission settings. In addition, all users are enabled to join devices to AAD by default.
|
**AAD device join**: The hybrid AAD join process uses the system context to perform device AAD join, therefore it is not affected by user based AAD join permission settings. In addition, all users are enabled to join devices to AAD by default.
|
||||||
|
|
||||||
|
@ -28,6 +28,8 @@ November 13 marks the revised start of the servicing timeline for the Semi-Annua
|
|||||||
|
|
||||||
For information about the re-release and updates to the support lifecycle, refer to [John Cable's blog](https://blogs.windows.com/windowsexperience/2018/10/09/updated-version-of-windows-10-october-2018-update-released-to-windows-insiders/), [Windows 10 Update History](https://support.microsoft.com/help/4464619), and the [Windows lifecycle fact sheet](https://support.microsoft.com/help/13853).
|
For information about the re-release and updates to the support lifecycle, refer to [John Cable's blog](https://blogs.windows.com/windowsexperience/2018/10/09/updated-version-of-windows-10-october-2018-update-released-to-windows-insiders/), [Windows 10 Update History](https://support.microsoft.com/help/4464619), and the [Windows lifecycle fact sheet](https://support.microsoft.com/help/13853).
|
||||||
|
|
||||||
|
<br>
|
||||||
|
|
||||||
<div class="m-rich-content-block" data-grid="col-12">
|
<div class="m-rich-content-block" data-grid="col-12">
|
||||||
<div id="winrelinfo" xmlns="http://www.w3.org/1999/xhtml"><iframe width="100%" height="866px" id="winrelinfo_iframe" src="https://winreleaseinfoprod.blob.core.windows.net/winreleaseinfoprod/en-US.html" frameborder="0" marginwidth="0" marginheight="0" scrolling="auto"></iframe></div>
|
<div id="winrelinfo" xmlns="http://www.w3.org/1999/xhtml"><iframe width="100%" height="866px" id="winrelinfo_iframe" src="https://winreleaseinfoprod.blob.core.windows.net/winreleaseinfoprod/en-US.html" frameborder="0" marginwidth="0" marginheight="0" scrolling="auto"></iframe></div>
|
||||||
<script src="https://winreleaseinfoprod.blob.core.windows.net/winreleaseinfoprod/iframe.js" xmlns="http://www.w3.org/1999/xhtml"></script>
|
<script src="https://winreleaseinfoprod.blob.core.windows.net/winreleaseinfoprod/iframe.js" xmlns="http://www.w3.org/1999/xhtml"></script>
|
||||||
|
Before Width: | Height: | Size: 116 KiB After Width: | Height: | Size: 116 KiB |
Before Width: | Height: | Size: 95 KiB After Width: | Height: | Size: 95 KiB |
@ -73,8 +73,8 @@
|
|||||||
|
|
||||||
|
|
||||||
#### [Secure score](windows-defender-atp/overview-secure-score-windows-defender-advanced-threat-protection.md)
|
#### [Secure score](windows-defender-atp/overview-secure-score-windows-defender-advanced-threat-protection.md)
|
||||||
##### [Threat analytics](windows-defender-atp/threat-analytics.md)
|
#### [Threat analytics](windows-defender-atp/threat-analytics.md)
|
||||||
###### [Threat analytics for Spectre and Meltdown](windows-defender-atp/threat-analytics-dashboard-windows-defender-advanced-threat-protection.md)
|
|
||||||
#### [Advanced hunting](windows-defender-atp/overview-hunting-windows-defender-advanced-threat-protection.md)
|
#### [Advanced hunting](windows-defender-atp/overview-hunting-windows-defender-advanced-threat-protection.md)
|
||||||
##### [Query data using Advanced hunting](windows-defender-atp/advanced-hunting-windows-defender-advanced-threat-protection.md)
|
##### [Query data using Advanced hunting](windows-defender-atp/advanced-hunting-windows-defender-advanced-threat-protection.md)
|
||||||
###### [Advanced hunting reference](windows-defender-atp/advanced-hunting-reference-windows-defender-advanced-threat-protection.md)
|
###### [Advanced hunting reference](windows-defender-atp/advanced-hunting-reference-windows-defender-advanced-threat-protection.md)
|
||||||
|
@ -89,16 +89,6 @@ By default, members of the **Administrators** group, the System account, and ser
|
|||||||
|
|
||||||
When non-administrators need to access a server using Remote Desktop, add the users to the **Remote Desktop Users** group rather than assining them this user right.
|
When non-administrators need to access a server using Remote Desktop, add the users to the **Remote Desktop Users** group rather than assining them this user right.
|
||||||
|
|
||||||
### Vulnerability
|
|
||||||
|
|
||||||
>**Caution:** A user account that is given this user right has complete control over the system, and it can lead to the system being compromised. We highly recommend that you do not assign this right to any user accounts.
|
|
||||||
|
|
||||||
Windows examines a user's access token to determine the level of the user's privileges. Access tokens are built when users log on to the local device or connect to a remote device over a network. When you revoke a privilege, the change is immediately recorded, but the change is not reflected in the user's access token until the next time the user logs on or connects. Users with the ability to create or modify tokens can change the level of access for any currently logged on account. They could escalate their privileges or create a denial-of-service (DoS) condition.
|
|
||||||
|
|
||||||
### Countermeasure
|
|
||||||
|
|
||||||
Do not assign the **Create a token object** user right to any users. Processes that require this user right should use the Local System account, which already includes it, instead of a separate user account with this user right assigned.
|
|
||||||
|
|
||||||
### Potential impact
|
### Potential impact
|
||||||
|
|
||||||
None. Not Defined is the default domain policy configuration.
|
None. Not Defined is the default domain policy configuration.
|
||||||
|
@ -33,6 +33,8 @@ Custom exclusions take precedence over automatic exclusions.
|
|||||||
> [!TIP]
|
> [!TIP]
|
||||||
> Custom and duplicate exclusions do not conflict with automatic exclusions.
|
> Custom and duplicate exclusions do not conflict with automatic exclusions.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
Windows Defender Antivirus uses the Deployment Image Servicing and Management (DISM) tools to determine which roles are installed on your computer.
|
Windows Defender Antivirus uses the Deployment Image Servicing and Management (DISM) tools to determine which roles are installed on your computer.
|
||||||
|
|
||||||
## Opt out of automatic exclusions
|
## Opt out of automatic exclusions
|
||||||
@ -45,6 +47,9 @@ In Windows Server 2016, the predefined exclusions delivered by Security intellig
|
|||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> This setting is only supported on Windows Server 2016. While this setting exists in Windows 10, it doesn't have an effect on exclusions.
|
> This setting is only supported on Windows Server 2016. While this setting exists in Windows 10, it doesn't have an effect on exclusions.
|
||||||
|
|
||||||
|
> [!TIP]
|
||||||
|
> Since the predefined exclusions only exclude **default paths**, if you move NTDS and SYSVOL to another drive or path *different than the original one*, you would have to manually add the exclusions using the information [here](configure-extension-file-exclusions-windows-defender-antivirus.md#configure-the-list-of-exclusions-based-on-folder-name-or-file-extension) .
|
||||||
|
|
||||||
You can disable the automatic exclusion lists with Group Policy, PowerShell cmdlets, and WMI.
|
You can disable the automatic exclusion lists with Group Policy, PowerShell cmdlets, and WMI.
|
||||||
|
|
||||||
**Use Group Policy to disable the auto-exclusions list on Windows Server 2016:**
|
**Use Group Policy to disable the auto-exclusions list on Windows Server 2016:**
|
||||||
|
@ -41,7 +41,7 @@ System Center Configuration Manager ([1](#fn1))|Use the [Endpoint Protection poi
|
|||||||
Group Policy and Active Directory (domain-joined)|Use a Group Policy Object to deploy configuration changes and ensure Windows Defender Antivirus is enabled.|Use Group Policy Objects (GPOs) to [Configure update options for Windows Defender Antivirus][] and [Configure Windows Defender features][]|Endpoint reporting is not available with Group Policy. You can generate a list of [Group Policies to determine if any settings or policies are not applied][]
|
Group Policy and Active Directory (domain-joined)|Use a Group Policy Object to deploy configuration changes and ensure Windows Defender Antivirus is enabled.|Use Group Policy Objects (GPOs) to [Configure update options for Windows Defender Antivirus][] and [Configure Windows Defender features][]|Endpoint reporting is not available with Group Policy. You can generate a list of [Group Policies to determine if any settings or policies are not applied][]
|
||||||
PowerShell|Deploy with Group Policy, System Center Configuration Manager, or manually on individual endpoints.|Use the [Set-MpPreference][] and [Update-MpSignature] [] cmdlets available in the Defender module|Use the appropriate [Get- cmdlets available in the Defender module][]
|
PowerShell|Deploy with Group Policy, System Center Configuration Manager, or manually on individual endpoints.|Use the [Set-MpPreference][] and [Update-MpSignature] [] cmdlets available in the Defender module|Use the appropriate [Get- cmdlets available in the Defender module][]
|
||||||
Windows Management Instrumentation|Deploy with Group Policy, System Center Configuration Manager, or manually on individual endpoints.|Use the [Set method of the MSFT_MpPreference class][] and the [Update method of the MSFT_MpSignature class][]|Use the [MSFT_MpComputerStatus][] class and the get method of associated classes in the [Windows Defender WMIv2 Provider][]
|
Windows Management Instrumentation|Deploy with Group Policy, System Center Configuration Manager, or manually on individual endpoints.|Use the [Set method of the MSFT_MpPreference class][] and the [Update method of the MSFT_MpSignature class][]|Use the [MSFT_MpComputerStatus][] class and the get method of associated classes in the [Windows Defender WMIv2 Provider][]
|
||||||
Microsoft Azure|Deploy Microsoft Antimalware for Azure in the [Azure portal, by using Visual Studio virtual machine configuration, or using Azure PowerShell cmdlets](https://docs.microsoft.com/azure/security/azure-security-antimalware#antimalware-deployment-scenarios). You can also [Install Endpoint protection in Azure Security Center](https://docs.microsoft.com/azure/security-center/security-center-install-endpoint-protection)|Configure [Microsoft Antimalware for Virtual Machines and Cloud Services with Azure PowerShell cmdlets](https://docs.microsoft.com/powershell/servicemanagement/azure.antimalware/v3.4.0/azure.antimalware) or [use code samples](https://gallery.technet.microsoft.com/Antimalware-For-Azure-5ce70efe)|Use [Microsoft Antimalware for Virtual Machines and Cloud Services with Azure PowerShell cmdlets](https://docs.microsoft.com/powershell/servicemanagement/azure.antimalware/v3.4.0/azure.antimalware) to enable monitoring. You can also review usage reports in Azure Active Directory to determine suspicious activity, including the [Possibly infected devices][] report and configure an SIEM tool to report on [Windows Defender Antivirus events][] and add that tool as an app in AAD.
|
Microsoft Azure|Deploy Microsoft Antimalware for Azure in the [Azure portal, by using Visual Studio virtual machine configuration, or using Azure PowerShell cmdlets](https://docs.microsoft.com/azure/security/azure-security-antimalware#antimalware-deployment-scenarios). You can also [Install Endpoint protection in Azure Security Center](https://docs.microsoft.com/azure/security-center/security-center-install-endpoint-protection)|Configure [Microsoft Antimalware for Virtual Machines and Cloud Services with Azure PowerShell cmdlets](https://docs.microsoft.com/azure/security/azure-security-antimalware#enable-and-configure-antimalware-using-powershell-cmdlets) or [use code samples](https://gallery.technet.microsoft.com/Antimalware-For-Azure-5ce70efe)|Use [Microsoft Antimalware for Virtual Machines and Cloud Services with Azure PowerShell cmdlets](https://docs.microsoft.com/azure/security/azure-security-antimalware#enable-and-configure-antimalware-using-powershell-cmdlets) to enable monitoring. You can also review usage reports in Azure Active Directory to determine suspicious activity, including the [Possibly infected devices][] report and configure an SIEM tool to report on [Windows Defender Antivirus events][] and add that tool as an app in AAD.
|
||||||
|
|
||||||
1. <span id="fn1" />The availability of some functions and features, especially related to cloud-delivered protection, differ between System Center Configuration Manager (Current Branch) and System Center Configuration Manager 2012. In this library, we've focused on Windows 10, Windows Server 2016, and System Center Configuration Manager (Current Branch). See [Use Microsoft cloud-provided protection in Windows Defender Antivirus](utilize-microsoft-cloud-protection-windows-defender-antivirus.md) for a table that describes the major differences. [(Return to table)](#ref2)
|
1. <span id="fn1" />The availability of some functions and features, especially related to cloud-delivered protection, differ between System Center Configuration Manager (Current Branch) and System Center Configuration Manager 2012. In this library, we've focused on Windows 10, Windows Server 2016, and System Center Configuration Manager (Current Branch). See [Use Microsoft cloud-provided protection in Windows Defender Antivirus](utilize-microsoft-cloud-protection-windows-defender-antivirus.md) for a table that describes the major differences. [(Return to table)](#ref2)
|
||||||
|
|
||||||
|
After Width: | Height: | Size: 11 KiB |
After Width: | Height: | Size: 63 KiB |
After Width: | Height: | Size: 25 KiB |
After Width: | Height: | Size: 42 KiB |
After Width: | Height: | Size: 170 KiB |
After Width: | Height: | Size: 46 KiB |
After Width: | Height: | Size: 64 KiB |
After Width: | Height: | Size: 43 KiB |
After Width: | Height: | Size: 20 KiB |
After Width: | Height: | Size: 29 KiB |
After Width: | Height: | Size: 70 KiB |
After Width: | Height: | Size: 35 KiB |
After Width: | Height: | Size: 85 KiB |
After Width: | Height: | Size: 86 KiB |
After Width: | Height: | Size: 5.2 KiB |
After Width: | Height: | Size: 18 KiB |
After Width: | Height: | Size: 80 KiB |
After Width: | Height: | Size: 22 KiB |
After Width: | Height: | Size: 25 KiB |
After Width: | Height: | Size: 177 KiB |
After Width: | Height: | Size: 36 KiB |
After Width: | Height: | Size: 55 KiB |
After Width: | Height: | Size: 415 KiB |
After Width: | Height: | Size: 94 KiB |
After Width: | Height: | Size: 99 KiB |
After Width: | Height: | Size: 49 KiB |
After Width: | Height: | Size: 46 KiB |
After Width: | Height: | Size: 37 KiB |
After Width: | Height: | Size: 27 KiB |
After Width: | Height: | Size: 61 KiB |
After Width: | Height: | Size: 36 KiB |
After Width: | Height: | Size: 987 B |
After Width: | Height: | Size: 5.7 KiB |
@ -0,0 +1,489 @@
|
|||||||
|
---
|
||||||
|
title: Microsoft Defender ATP for Mac
|
||||||
|
description: Describes how to install and use Microsoft Defender ATP for Mac.
|
||||||
|
keywords: microsoft, defender, atp, mac, installation, deploy, uninstallation, intune, jamf, macos, mojave, high sierra, sierra
|
||||||
|
search.product: eADQiWindows 10XVcnh
|
||||||
|
search.appverid: met150
|
||||||
|
ms.prod: w10
|
||||||
|
ms.mktglfcycl: deploy
|
||||||
|
ms.sitesec: library
|
||||||
|
ms.pagetype: security
|
||||||
|
ms.author: macapara
|
||||||
|
author: mjcaparas
|
||||||
|
ms.localizationpriority: medium
|
||||||
|
manager: dansimp
|
||||||
|
audience: ITPro
|
||||||
|
ms.collection: M365-security-compliance
|
||||||
|
ms.topic: conceptual
|
||||||
|
---
|
||||||
|
|
||||||
|
# Microsoft Defender ATP for Mac
|
||||||
|
|
||||||
|
>[!IMPORTANT]
|
||||||
|
>Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
|
||||||
|
|
||||||
|
This topic describes how to install and use Microsoft Defender ATP for Mac. It supports the preview program and the information here is subject to change.
|
||||||
|
Microsoft Defender ATP for Mac is not yet widely available, and this topic only applies to enterprise customers who have been accepted into the preview program.
|
||||||
|
|
||||||
|
## Prerequisites
|
||||||
|
You should have beginner-level experience in macOS and BASH scripting. You must have administrative privileges on the machine.
|
||||||
|
|
||||||
|
You should also have access to Windows Defender Security Center.
|
||||||
|
|
||||||
|
### System Requirements
|
||||||
|
Microsoft Defender ATP for Mac system requirements:
|
||||||
|
- macOS version: 10.14 (Mojave), 10.13 (High Sierra), 10.12 (Sierra)
|
||||||
|
- Disk space during preview: 1GB
|
||||||
|
- The following URLs must be accessible from the Mac device:
|
||||||
|
- ```https://fresno.blob.core.windows.net/preview/macos/wdav.pkg ```<br>
|
||||||
|
- ```https://cdn.x.cp.wd.microsoft.com/ ```<br>
|
||||||
|
- ```https://eu-cdn.x.cp.wd.microsoft.com/ ```<br>
|
||||||
|
- ```https://wu-cdn.x.cp.wd.microsoft.com/ ``` <br>
|
||||||
|
- ```https://x.cp.wd.microsoft.com/ ``` <br>
|
||||||
|
- ```https://asia.x.cp.wd.microsoft.com/ ``` <br>
|
||||||
|
- ```https://australia.x.cp.wd.microsoft.com/ ``` <br>
|
||||||
|
- ```https://europe.x.cp.wd.microsoft.com/ ``` <br>
|
||||||
|
- ```https://unitedkingdom.x.cp.wd.microsoft.com/ ``` <br>
|
||||||
|
- ```https://unitedstates.x.cp.wd.microsoft.com/ ``` <br>
|
||||||
|
|
||||||
|
## Installation and configuration overview
|
||||||
|
There are various methods and deployment tools that you can use to install and configure Microsoft Defender ATP for Mac.
|
||||||
|
In general you'll need to take the following steps:
|
||||||
|
- [Register macOS devices](#register-macos-devices) with Windows Defender ATP
|
||||||
|
- Deploy Microsoft Defender ATP for Mac using any of the following deployment methods and tools:
|
||||||
|
- [Microsoft Intune based deployment](#microsoft-intune-based-deployment)
|
||||||
|
- [JAMF based deployment](#jamf-based-deployment)
|
||||||
|
- [Manual deployment](#manual-deployment)
|
||||||
|
|
||||||
|
## Register macOS devices
|
||||||
|
To onboard your devices for Microsoft Defender ATP for Mac, you must register the devices with Windows Defender ATP and provide consent to submit telemetry.
|
||||||
|
|
||||||
|
Use the following URL to give consent to submit telemetry: ```https://login.microsoftonline.com/common/oauth2/authorize?prompt=consent&client_id=f9eb614c-7a8e-422a-947d-2059e657d855&response_type=code&sso_reload=true```
|
||||||
|
|
||||||
|
> [!NOTE]
|
||||||
|
> You may get an error that a page on ```https://ppe.fresno.wd.microsoft.com``` cannot be opened. Disregard the error as it does not affect the onboarding process.
|
||||||
|
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
## Deploy Microsoft Defender ATP for Mac
|
||||||
|
Use any of the supported methods to deploy Microsoft Defender ATP for Mac
|
||||||
|
|
||||||
|
## Microsoft Intune based deployment
|
||||||
|
|
||||||
|
### Download installation and onboarding packages
|
||||||
|
Download the installation and onboarding packages from Windows Defender Security Center:
|
||||||
|
1. In Windows Defender Security Center, go to **Settings > Machine Management > Onboarding**.
|
||||||
|
2. In Section 1 of the page, set operating system to **Linux, macOS, iOS or Android** and Deployment method to **Mobile Device Management / Microsoft Intune**.
|
||||||
|
3. In Section 2 of the page, click **Download installation package**. Save it as wdav.pkg to a local directory.
|
||||||
|
4. In Section 2 of the page, click **Download onboarding package**. Save it as WindowsDefenderATPOnboardingPackage.zip to the same directory.
|
||||||
|
5. Download IntuneAppUtil from https://docs.microsoft.com/en-us/intune/lob-apps-macos.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
6. From a command prompt, verify that you have the three files.
|
||||||
|
Extract the contents of the .zip files:
|
||||||
|
|
||||||
|
```
|
||||||
|
mavel-macmini:Downloads test$ ls -l
|
||||||
|
total 721688
|
||||||
|
-rw-r--r-- 1 test staff 269280 Mar 15 11:25 IntuneAppUtil
|
||||||
|
-rw-r--r-- 1 test staff 11821 Mar 15 09:23 WindowsDefenderATPOnboardingPackage.zip
|
||||||
|
-rw-r--r-- 1 test staff 354531845 Mar 13 08:57 wdav.pkg
|
||||||
|
mavel-macmini:Downloads test$ unzip WindowsDefenderATPOnboardingPackage.zip
|
||||||
|
Archive: WindowsDefenderATPOnboardingPackage.zip
|
||||||
|
warning: WindowsDefenderATPOnboardingPackage.zip appears to use backslashes as path separators
|
||||||
|
inflating: intune/kext.xml
|
||||||
|
inflating: intune/WindowsDefenderATPOnboarding.xml
|
||||||
|
inflating: jamf/WindowsDefenderATPOnboarding.plist
|
||||||
|
mavel-macmini:Downloads test$
|
||||||
|
```
|
||||||
|
7. Make IntuneAppUtil an executable:
|
||||||
|
|
||||||
|
```mavel-macmini:Downloads test$ chmod +x IntuneAppUtil```
|
||||||
|
|
||||||
|
8. Create the wdav.pkg.intunemac package from wdav.pkg:
|
||||||
|
|
||||||
|
```
|
||||||
|
mavel-macmini:Downloads test$ ./IntuneAppUtil -c wdav.pkg -o . -i "com.microsoft.wdav" -n "1.0.0"
|
||||||
|
Microsoft Intune Application Utility for Mac OS X
|
||||||
|
Version: 1.0.0.0
|
||||||
|
Copyright 2018 Microsoft Corporation
|
||||||
|
|
||||||
|
Creating intunemac file for /Users/test/Downloads/wdav.pkg
|
||||||
|
Composing the intunemac file output
|
||||||
|
Output written to ./wdav.pkg.intunemac.
|
||||||
|
|
||||||
|
IntuneAppUtil successfully processed "wdav.pkg",
|
||||||
|
to deploy refer to the product documentation.
|
||||||
|
```
|
||||||
|
|
||||||
|
### Client Machine Setup
|
||||||
|
You need no special provisioning for a Mac machine beyond a standard [Company Portal installation](https://docs.microsoft.com/en-us/intune-user-help/enroll-your-device-in-intune-macos-cp).
|
||||||
|
|
||||||
|
1. You'll be asked to confirm device management.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
2. Click the **Continue** button, and your Management Profile is displayed as verified:
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
You can enroll additional machines. Optionally, you can do it later, after system configuration and application package are provisioned.
|
||||||
|
|
||||||
|
3. In Intune, open the **Manage > Devices > All devices** blade. You'll see your machine:
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
### Create System Configuration profiles
|
||||||
|
1. In Intune open the **Manage > Device configuration** blade. Click **Manage > Profiles > Create Profile**.
|
||||||
|
2. Choose a name for the profile. Change **Platform=macOS**, **Profile type=Custom**. Click **Configure**.
|
||||||
|
3. Open the configuration profile and upload intune/kext.xml. This file was created during the Generate settings step above.
|
||||||
|
4. Click **OK**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
5. **Click Manage > Assignments**. In the **Include** tab, click **Assign to All Users & All devices**.
|
||||||
|
7. Repeat these steps with the second profile.
|
||||||
|
8. Create Profile one more time, give it a name, upload the intune/WindowsDefenderATPOnboarding.xml file.
|
||||||
|
9. Click **Manage > Assignments**. In the Include tab, click **Assign to All Users & All devices**.
|
||||||
|
|
||||||
|
After Intune changes are propagated to the enrolled machines, you'll see it on the **Monitor > Device status** blade:
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
### Publish application
|
||||||
|
|
||||||
|
1. In Intune, open the **Manage > Client apps** blade. Click **Apps > Add**.
|
||||||
|
2. Select **App type=Other/Line-of-business app**.
|
||||||
|
3. Select **file=wdav.pkg.intunemac**. Click **OK** to upload.
|
||||||
|
4. Click **Configure** and add the required information.
|
||||||
|
5. Use **macOS Sierra 10.12** as the minimum OS. Other settings can be any other value.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
6. Click **OK** and **Add**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
7. It will take a while to upload the package. After it's done, click the name and then go to **Assignments** and **Add group**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
8. Change **Assignment type=Required**.
|
||||||
|
9. Click **Included Groups**. Select M**ake this app required for all devices=Yes**. Click **Select group to include** and add a group that contains the users you want to target. Select **OK** and **Save**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
10. After some time the application will be published to all enrolled machines. You'll see it on the **Monitor > Device** install status blade:
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
### Verify client machine state
|
||||||
|
1. After the configuration profiles are deployed to your machines, on your Mac device, open **System Preferences > Profiles**.
|
||||||
|
|
||||||
|

|
||||||
|

|
||||||
|
|
||||||
|
2. Verify the three profiles listed there:
|
||||||
|

|
||||||
|
|
||||||
|
3. The **Management Profile** should be the Intune system profile.
|
||||||
|
4. wdav-config and wdav-kext are system configuration profiles that we added in Intune.
|
||||||
|
5. You should also see the Microsoft Defender icon in the top-right corner:
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
## JAMF based deployment
|
||||||
|
### Prerequsites
|
||||||
|
You need to be familiar with JAMF administration tasks, have a JAMF tenant, and know how to deploy packages. This includes a properly configured distribution point. JAMF has many alternative ways to complete the same task. These instructions provide you an example for most common processes. Your organization might use a different workflow.
|
||||||
|
|
||||||
|
|
||||||
|
### Download installation and onboarding packages
|
||||||
|
Download the installation and onboarding packages from Windows Defender Security Center:
|
||||||
|
1. In Windows Defender Security Center, go to **Settings > Machine Management > Onboarding**.
|
||||||
|
2. In Section 1 of the page, set operating system to **Linux, macOS, iOS or Android** and Deployment method to **Mobile Device Management / Microsoft Intune**.
|
||||||
|
3. In Section 2 of the page, click **Download installation package**. Save it as wdav.pkg to a local directory.
|
||||||
|
4. In Section 2 of the page, click **Download onboarding package**. Save it as WindowsDefenderATPOnboardingPackage.zip to the same directory.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
5. From a command prompt, verify that you have the two files.
|
||||||
|
Extract the contents of the .zip files:
|
||||||
|
|
||||||
|
```
|
||||||
|
mavel-macmini:Downloads test$ ls -l
|
||||||
|
total 721160
|
||||||
|
-rw-r--r-- 1 test staff 11821 Mar 15 09:23 WindowsDefenderATPOnboardingPackage.zip
|
||||||
|
-rw-r--r-- 1 test staff 354531845 Mar 13 08:57 wdav.pkg
|
||||||
|
mavel-macmini:Downloads test$ unzip WindowsDefenderATPOnboardingPackage.zip
|
||||||
|
Archive: WindowsDefenderATPOnboardingPackage.zip
|
||||||
|
warning: WindowsDefenderATPOnboardingPackage.zip appears to use backslashes as path separators
|
||||||
|
inflating: intune/kext.xml
|
||||||
|
inflating: intune/WindowsDefenderATPOnboarding.xml
|
||||||
|
inflating: jamf/WindowsDefenderATPOnboarding.plist
|
||||||
|
mavel-macmini:Downloads test$
|
||||||
|
```
|
||||||
|
|
||||||
|
### Create JAMF Policies
|
||||||
|
You need to create a configuration profile and a policy to start deploying Microsoft Defender ATP for Mac to client machines.
|
||||||
|
|
||||||
|
#### Configuration Profile
|
||||||
|
The configuration profile contains one custom settings payload that includes:
|
||||||
|
|
||||||
|
- Microsoft Defender ATP for Mac onboarding information
|
||||||
|
- Approved Kernel Extensions payload to enable the Microsoft kernel driver to run
|
||||||
|
|
||||||
|
|
||||||
|
1. Upload jamf/WindowsDefenderATPOnboarding.plist as the Property List File.
|
||||||
|
|
||||||
|
>[!NOTE]
|
||||||
|
> You must use exactly "com.microsoft.wdav.atp" as the Preference Domain.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
#### Approved Kernel Extension
|
||||||
|
|
||||||
|
To approve the kernel extension:
|
||||||
|
1. In **Computers > Configuration Profiles** click **Options > Approved Kernel Extensions**.
|
||||||
|
2. Use **UBF8T346G9** for Team Id.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
#### Configuration Profile's Scope
|
||||||
|
Configure the appropriate scope to specify the machines that will receive this configuration profile.
|
||||||
|
|
||||||
|
In the Configuration Profiles, click **Scope > Targets**. Select the appropriate Target computers.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
Save the **Configuration Profile**.
|
||||||
|
|
||||||
|
Use the **Logs** tab to monitor deployment status for each enrolled machine.
|
||||||
|
|
||||||
|
#### Package
|
||||||
|
1. Create a package in **Settings > Computer Management > Packages**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
2. Upload wdav.pkg to the Distribution Point.
|
||||||
|
3. In the **filename** field, enter the name of the package. For example, wdav.pkg.
|
||||||
|
|
||||||
|
#### Policy
|
||||||
|
Your policy should contain a single package for Microsoft Defender.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
Configure the appropriate scope to specify the computers that will receive this policy.
|
||||||
|
|
||||||
|
After you save the Configuration Profile, you can use the Logs tab to monitor the deployment status for each enrolled machine.
|
||||||
|
|
||||||
|
### Client machine setup
|
||||||
|
You need no special provisioning for a macOS computer beyond the standard JAMF Enrollment.
|
||||||
|
|
||||||
|
> [!NOTE]
|
||||||
|
> After a computer is enrolled, it will show up in the Computers inventory (All Computers).
|
||||||
|
|
||||||
|
1. Open the machine details, from **General** tab, and make sure that **User Approved MDM** is set to **Yes**. If it's set to No, the user needs to open **System Preferences > Profiles** and click **Approve** on the MDM Profile.
|
||||||
|
|
||||||
|

|
||||||
|

|
||||||
|
|
||||||
|
After some time, the machine's User Approved MDM status will change to Yes.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
You can enroll additional machines now. Optionally, can do it after system configuration and application packages are provisioned.
|
||||||
|
|
||||||
|
|
||||||
|
### Deployment
|
||||||
|
Enrolled client machines periodically poll the JAMF Server and install new configuration profiles and policies as soon as they are detected.
|
||||||
|
|
||||||
|
#### Status on server
|
||||||
|
You can monitor the deployment status in the Logs tab:
|
||||||
|
- **Pending** means that the deployment is scheduled but has not yet happened
|
||||||
|
- **Completed** means that the deployment succeeded and is no longer scheduled
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
|
||||||
|
#### Status on client machine
|
||||||
|
After the Configuration Profile is deployed, you'll see the profile on the machine in the **System Preferences > Profiles >** Name of Configuration Profile.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
After the policy is applied, you'll see the Microsoft Defender icon in the macOS status bar in the top-right corner.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
You can monitor policy installation on a machine by following the JAMF's log file:
|
||||||
|
|
||||||
|
```
|
||||||
|
mavel-mojave:~ testuser$ tail -f /var/log/jamf.log
|
||||||
|
Thu Feb 21 11:11:41 mavel-mojave jamf[7960]: No patch policies were found.
|
||||||
|
Thu Feb 21 11:16:41 mavel-mojave jamf[8051]: Checking for policies triggered by "recurring check-in" for user "testuser"...
|
||||||
|
Thu Feb 21 11:16:43 mavel-mojave jamf[8051]: Executing Policy WDAV
|
||||||
|
Thu Feb 21 11:17:02 mavel-mojave jamf[8051]: Installing Microsoft Defender...
|
||||||
|
Thu Feb 21 11:17:23 mavel-mojave jamf[8051]: Successfully installed Microsoft Defender.
|
||||||
|
Thu Feb 21 11:17:23 mavel-mojave jamf[8051]: Checking for patches...
|
||||||
|
Thu Feb 21 11:17:23 mavel-mojave jamf[8051]: No patch policies were found.
|
||||||
|
```
|
||||||
|
|
||||||
|
You can also check the onboarding status:
|
||||||
|
```
|
||||||
|
mavel-mojave:~ testuser$ /Library/Extensions/wdavkext.kext/Contents/Resources/Tools/wdavconfig.py
|
||||||
|
uuid : 69EDB575-22E1-53E1-83B8-2E1AB1E410A6
|
||||||
|
orgid : 79109c9d-83bb-4f3e-9152-8d75ee59ae22
|
||||||
|
orgid managed : 79109c9d-83bb-4f3e-9152-8d75ee59ae22
|
||||||
|
orgid effective : 79109c9d-83bb-4f3e-9152-8d75ee59ae22
|
||||||
|
```
|
||||||
|
|
||||||
|
- **orgid/orgid managed**: This is the Microsoft Defender ATP org id specified in the configuration profile. If this value is blank, then the Configuration Profile was not properly set.
|
||||||
|
|
||||||
|
- **orgid effective**: This is the Microsoft Defender ATP org id currently in use. If it does not match the value in the Configuration Profile, then the configuration has not been refreshed.
|
||||||
|
|
||||||
|
### Uninstalling Microsoft Defender ATP for Mac
|
||||||
|
#### Uninstalling with a script
|
||||||
|
|
||||||
|
Create a script in **Settings > Computer Management > Scripts**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
For example, this script removes Microsoft Defender ATP from the /Applications directory:
|
||||||
|
|
||||||
|
```
|
||||||
|
echo "Is WDAV installed?"
|
||||||
|
ls -ld '/Applications/Microsoft Defender.app' 2>/dev/null
|
||||||
|
|
||||||
|
echo "Uninstalling WDAV..."
|
||||||
|
rm -rf '/Applications/Microsoft Defender.app'
|
||||||
|
|
||||||
|
echo "Is WDAV still installed?"
|
||||||
|
ls -ld '/Applications/Microsoft Defender.app' 2>/dev/null
|
||||||
|
|
||||||
|
echo "Done!"
|
||||||
|
```
|
||||||
|
|
||||||
|
#### Uninstalling with a policy
|
||||||
|
Your policy should contain a single script:
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
Configure the appropriate scope in the **Scope** tab to specify the machines that will receive this policy.
|
||||||
|
|
||||||
|
### Check onboarding status
|
||||||
|
|
||||||
|
You can check that machines are correctly onboarded by creating a script. For example, the following script checks that enrolled machines are onboarded:
|
||||||
|
|
||||||
|
```
|
||||||
|
/Library/Extensions/wdavkext.kext/Contents/Resources/Tools/wdavconfig.py | grep -E 'orgid effective : [-a-zA-Z0-9]+'
|
||||||
|
```
|
||||||
|
|
||||||
|
This script returns 0 if Microsoft Defender ATP is registered with the Windows Defender ATP service, and another exit code if it is not installed or registered.
|
||||||
|
|
||||||
|
## Manual deployment
|
||||||
|
|
||||||
|
### Download installation and onboarding packages
|
||||||
|
Download the installation and onboarding packages from Windows Defender Security Center:
|
||||||
|
1. In Windows Defender Security Center, go to **Settings > Machine Management > Onboarding**.
|
||||||
|
2. In Section 1 of the page, set operating system to **Linux, macOS, iOS or Android** and Deployment method to **Mobile Device Management / Microsoft Intune**.
|
||||||
|
3. In Section 2 of the page, click **Download installation package**. Save it as wdav.pkg to a local directory.
|
||||||
|
4. In Section 2 of the page, click **Download onboarding package**. Save it as WindowsDefenderATPOnboardingPackage.zip to the same directory.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
5. From a command prompt, verify that you have the two files.
|
||||||
|
Extract the contents of the .zip files:
|
||||||
|
|
||||||
|
```
|
||||||
|
mavel-macmini:Downloads test$ ls -l
|
||||||
|
total 721152
|
||||||
|
-rw-r--r-- 1 test staff 6185 Mar 15 10:45 WindowsDefenderATPOnboardingPackage.zip
|
||||||
|
-rw-r--r-- 1 test staff 354531845 Mar 13 08:57 wdav.pkg
|
||||||
|
mavel-macmini:Downloads test$ unzip WindowsDefenderATPOnboardingPackage.zip
|
||||||
|
Archive: WindowsDefenderATPOnboardingPackage.zip
|
||||||
|
inflating: WindowsDefenderATPOnboarding.py
|
||||||
|
```
|
||||||
|
|
||||||
|
### Application installation
|
||||||
|
To complete this process, you must have admin privileges on the machine.
|
||||||
|
|
||||||
|
1. Download the wdav.pkg from: https://fresno.blob.core.windows.net/preview/macos/wdav.pkg.
|
||||||
|
|
||||||
|
2. Navigate to the downloaded wdav.pkg in Finder and open it.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
3. Click **Continue**, agree with the License terms, and enter the password when prompted.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
> [!IMPORTANT]
|
||||||
|
> You will be prompted to allow a driver from Microsoft to be installed (either "System Exception Blocked" or "Installation is on hold" or both. The driver must be allowed to be installed.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
4. Click **Open Security Preferences** or **Open System Preferences > Security & Privacy**. Click **Allow**:
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
|
||||||
|
The installation will proceed.
|
||||||
|
|
||||||
|
> [!NOTE]
|
||||||
|
> If you don't click **Allow**, the installation will fail after 5 minutes. You can restart it again at any time.
|
||||||
|
|
||||||
|
### Client configuration
|
||||||
|
1. Copy wdav.pkg and WindowsDefenderATPOnboarding.py to the machine where you deploy Microsoft Defender ATP for Mac.
|
||||||
|
|
||||||
|
The client machine is not associated with orgId. Note that the orgid is blank.
|
||||||
|
|
||||||
|
```
|
||||||
|
mavel-mojave:wdavconfig testuser$ /Library/Extensions/wdavkext.kext/Contents/Resources/Tools/wdavconfig.py
|
||||||
|
uuid : 69EDB575-22E1-53E1-83B8-2E1AB1E410A6
|
||||||
|
orgid :
|
||||||
|
```
|
||||||
|
2. Install the configuration file on a client machine:
|
||||||
|
|
||||||
|
```
|
||||||
|
mavel-mojave:wdavconfig testuser$ python WindowsDefenderATPOnboarding.py
|
||||||
|
Generating /Library/Application Support/Microsoft/Defender/com.microsoft.wdav.atp.plist ... (You may be required to enter sudos password)
|
||||||
|
```
|
||||||
|
|
||||||
|
3. Verify that the machine is now associated with orgId:
|
||||||
|
|
||||||
|
```
|
||||||
|
mavel-mojave:wdavconfig testuser$ /Library/Extensions/wdavkext.kext/Contents/Resources/Tools/wdavconfig.py
|
||||||
|
uuid : 69EDB575-22E1-53E1-83B8-2E1AB1E410A6
|
||||||
|
orgid : E6875323-A6C0-4C60-87AD-114BBE7439B8
|
||||||
|
```
|
||||||
|
After installation, you'll see the Microsoft Defender icon in the macOS status bar in the top-right corner.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
## Uninstallation
|
||||||
|
### Removing Microsoft Defender ATP from Mac devices
|
||||||
|
To remove Microsoft Defender ATP from your macOS devices:
|
||||||
|
|
||||||
|
- Open **Finder > Applications**. Right click on **Microsoft Defender ATP > Move to Trash**.
|
||||||
|
|
||||||
|
Or, from a command line:
|
||||||
|
|
||||||
|
- ```sudo rm -rf '/Applications/Microsoft Defender ATP'```
|
||||||
|
|
||||||
|
## Known issues
|
||||||
|
- Microsoft Defender ATP is not yet optimized for performance or disk space.
|
||||||
|
- Centrally managed uninstall using Intune/JAMF is still in development. To uninstall (as a workaround an uninstall action has to be completed on each client device).
|
||||||
|
- Geo preference for telemetry traffic is not yet supported. Cloud traffic (definition updates) routed to US only.
|
||||||
|
- Full Windows Defender ATP integration is not yet available
|
||||||
|
- Not localized yet
|
||||||
|
- There might be accessibility issues
|
||||||
|
|
||||||
|
### Installation issues
|
||||||
|
If an error occurs during installation, the installer will only report a general failure. The detailed log is saved to /Library/Logs/Microsoft/wdav.install.log. If you experience issues during installation, send us this file so we can help diagnose the cause. You can also contact xplatpreviewsupport@microsoft.com for support on onboarding issues.
|
||||||
|
|
||||||
|
|
||||||
|
For feedback on the preview, contact: mdatpfeedback@microsoft.com.
|
||||||
|
|
||||||
|
|
||||||
|
|
@ -76,6 +76,11 @@ Application Guard functionality is turned off by default. However, you can quick
|
|||||||
Application Guard and its underlying dependencies are all installed.
|
Application Guard and its underlying dependencies are all installed.
|
||||||
|
|
||||||
**To install by using PowerShell**
|
**To install by using PowerShell**
|
||||||
|
|
||||||
|
>[!NOTE]
|
||||||
|
>Ensure your devices have met all system requirements prior to this step. PowerShell will install the feature without checking system requirements. If your devices don't meet the system requirements, Application Guard may not work. This step is recommended for enterprise managed scenarios only.
|
||||||
|
|
||||||
|
|
||||||
1. Click the **Search** or **Cortana** icon in the Windows 10 taskbar and type **PowerShell**.
|
1. Click the **Search** or **Cortana** icon in the Windows 10 taskbar and type **PowerShell**.
|
||||||
|
|
||||||
2. Right-click **Windows PowerShell**, and then click **Run as administrator**.
|
2. Right-click **Windows PowerShell**, and then click **Run as administrator**.
|
||||||
|
@ -70,8 +70,8 @@
|
|||||||
|
|
||||||
|
|
||||||
### [Secure score](overview-secure-score-windows-defender-advanced-threat-protection.md)
|
### [Secure score](overview-secure-score-windows-defender-advanced-threat-protection.md)
|
||||||
#### [Threat analytics](threat-analytics.md)
|
### [Threat analytics](threat-analytics.md)
|
||||||
#### [Threat analytics for Spectre and Meltdown](threat-analytics-dashboard-windows-defender-advanced-threat-protection.md)
|
|
||||||
|
|
||||||
|
|
||||||
### [Advanced hunting](overview-hunting-windows-defender-advanced-threat-protection.md)
|
### [Advanced hunting](overview-hunting-windows-defender-advanced-threat-protection.md)
|
||||||
|
@ -40,7 +40,7 @@ For tenants created on or after Windows 10, version 1809 the automated investiga
|
|||||||
|
|
||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
> - The result of the auto-resolve action may influence the Machine risk level calculation which is based on the active alerts found on a machine.
|
> - The result of the auto-resolve action may influence the Machine risk level calculation which is based on the active alerts found on a machine.
|
||||||
>- If a security operations analyst manually sets the status of an alert to "In progress" or "Resolved" the auto-resolve capability will not overrite it.
|
>- If a security operations analyst manually sets the status of an alert to "In progress" or "Resolved" the auto-resolve capability will not overwrite it.
|
||||||
|
|
||||||
|
|
||||||
## Block file
|
## Block file
|
||||||
@ -91,6 +91,14 @@ When you enable this feature, you'll be able to incorporate data from Office 365
|
|||||||
|
|
||||||
To receive contextual machine integration in Office 365 Threat Intelligence, you'll need to enable the Windows Defender ATP settings in the Security & Compliance dashboard. For more information, see [Office 365 Threat Intelligence overview](https://support.office.com/en-us/article/Office-365-Threat-Intelligence-overview-32405DA5-BEE1-4A4B-82E5-8399DF94C512).
|
To receive contextual machine integration in Office 365 Threat Intelligence, you'll need to enable the Windows Defender ATP settings in the Security & Compliance dashboard. For more information, see [Office 365 Threat Intelligence overview](https://support.office.com/en-us/article/Office-365-Threat-Intelligence-overview-32405DA5-BEE1-4A4B-82E5-8399DF94C512).
|
||||||
|
|
||||||
|
## Microsoft Threat Experts
|
||||||
|
This feature is currently on public preview. When you enable this feature, you'll receive targeted attack notifications from Microsoft Threat Experts through your Windows Defender ATP portal's alerts dashboard and via email if you configure it.
|
||||||
|
|
||||||
|
>[!NOTE]
|
||||||
|
>This feature will be available with an E5 license for [Enterprise Mobility + Security](https://www.microsoft.com/cloud-platform/enterprise-mobility-security) on machines running Windows 10 version 1809 or later.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
## Microsoft Cloud App Security
|
## Microsoft Cloud App Security
|
||||||
Enabling this setting forwards Windows Defender ATP signals to Microsoft Cloud App Security to provide deeper visibility into cloud application usage. Forwarded data is stored and processed in the same location as your Cloud App Security data.
|
Enabling this setting forwards Windows Defender ATP signals to Microsoft Cloud App Security to provide deeper visibility into cloud application usage. Forwarded data is stored and processed in the same location as your Cloud App Security data.
|
||||||
|
|
||||||
|
@ -82,26 +82,48 @@ You can partner with Microsoft Threat Experts who can be engaged directly from w
|
|||||||
c. Remember to use the ID number from the **Open a support ticket** tab page and include it to the details you will provide in the subsequent Customer Services and Support (CSS) pages. <br>
|
c. Remember to use the ID number from the **Open a support ticket** tab page and include it to the details you will provide in the subsequent Customer Services and Support (CSS) pages. <br>
|
||||||
|
|
||||||
**Step 2: Open a support ticket**
|
**Step 2: Open a support ticket**
|
||||||
|
>[!NOTE]
|
||||||
>[!NOTE]
|
>To experience the full Microsoft Threat Experts preview capability in Windows Defender ATP, you need to have a Premier customer service and support account. However, you will not be charged for the Experts-on-demand service during the preview.
|
||||||
>To experience the full Microsoft Threat Experts preview capability in Windows Defender ATP, you need to have a Premier customer service and support account. However, you will not be charged for the Experts-on-demand service during the preview.
|
|
||||||
|
|
||||||
a. In the **New support request** customer support page, select the following from the dropdown menu and then click **Next**: <br>
|
a. In the **New support request** customer support page, select the following from the dropdown menu and then click **Next**: <br>
|
||||||
|
|
||||||
- **Select the product family**: **Security**
|
**Select the product family**: **Security**<br>
|
||||||
- **Select a product**: **Microsoft Threat Experts**
|
**Select a product**: **Microsoft Threat Experts**<br>
|
||||||
- **Select a category that best describes the issue**: **Windows Defender ATP**
|
**Select a category that best describes the issue**: **Windows Defender ATP**<br>
|
||||||
- **Select a problem that best describes the issue**: Choose according to your inquiry category
|
**Select a problem that best describes the issue**: Choose according to your inquiry category<br>
|
||||||
|
|
||||||
b. Fill out the fields with the necessary information about the issue and use the auto-generated ID when you open a Customer Services and Support (CSS) ticket. Then, click **Next**.
|
b. Fill out the fields with the necessary information about the issue and use the auto-generated ID when you open a Customer Services and Support (CSS) ticket. Then, click **Next**. <br>
|
||||||
|
|
||||||
c. In the **Select a support plan** page, select **Professional No Charge**.
|
c. In the **Select a support plan** page, select **Professional No Charge**. <br>
|
||||||
|
|
||||||
d. The severity of your issue has been pre-selected by default, per the support plan, **Professional No Charge**, that you'll use for this public preview. Select the time zone by which you'd like to receive the correspondence. Then, click **Next**.
|
d. The severity of your issue has been pre-selected by default, per the support plan, **Professional No Charge**, that you'll use for this public preview. Select the time zone by which you'd like to receive the correspondence. Then, click **Next**. <br>
|
||||||
|
|
||||||
e. Verify your contact details and add another if necessary. Then, click **Next**.
|
e. Verify your contact details and add another if necessary. Then, click **Next**. <br>
|
||||||
|
|
||||||
f. Review the summary of your support request, and update if necessary. Make sure that you read and understand the **Microsoft Services Agreement** and **Privacy Statement**. Then, click **Submit**. You will see the confirmation page indicating the response time and your support request number.
|
f. Review the summary of your support request, and update if necessary. Make sure that you read and understand the **Microsoft Services Agreement** and **Privacy Statement**. Then, click **Submit**. You will see the confirmation page indicating the response time and your support request number. <br>
|
||||||
|
|
||||||
|
## Sample questions to ask Microsoft Threat Experts
|
||||||
|
**Alert information**
|
||||||
|
- We see a new type of alert for a living-off-the-land binary: [AlertID]. Can you tell us something more about this alert and how we can investigate further?
|
||||||
|
- We’ve observed two similar attacks which try to execute malicious PowerShell scripts but generate different alerts. One is "Suspicious Powershell command line" and the other is "A malicious file was detected based on indication provided by O365". What is the difference?
|
||||||
|
- I receive an odd alert today for abnormal number of failed logins from a high profile user’s device. I cannot find any further evidence around these sign-in attempts. How can Windows Defender see these attempts? What type of sign-ins are being monitored?
|
||||||
|
- Can you give more context or insights about this alert: “Suspicious behavior by a system utility was observed”.
|
||||||
|
|
||||||
|
**Possible machine compromise**
|
||||||
|
- Can you please help answer why we see “Unknown process observed?” This is seen quite frequently on many machines and we would appreciate input on whether this is related to malicious activity.
|
||||||
|
- Can you help validate a possible compromise on the following system on [date] with similar behaviors as the previous [malware name] malware detection on the same system in [month]?
|
||||||
|
|
||||||
|
**Threat intelligence details**
|
||||||
|
- This morning, we detected a phishing email that delivered a malicious Word document to a user. This caused a series of suspicious events which triggered multiple Windows Defender alerts for [malware name] malware. Do you have any information on this malware? If yes, can you please send me a link?
|
||||||
|
- I recently saw a [social media reference e.g. Twitter or blog] post about a threat that is targeting my industry. Can you help me understand what protection WDATP provides against this threat actor?
|
||||||
|
|
||||||
|
**Microsoft Threat Experts’ alert communications**
|
||||||
|
- Can your incident response team help us address the targeted attack notification that we got?
|
||||||
|
- I received this targeted attack notification from Microsoft Threat Experts. We don’t have our own incident response team. What can we do now, and how can we contain the incident?
|
||||||
|
- I received a targeted attack notification from Microsoft Threat Experts. What data can you provide to us that we can pass on to our incident response team?
|
||||||
|
|
||||||
|
>[!NOTE]
|
||||||
|
>Microsoft Threat Experts is a managed cybersecurity hunting service and not an incident response service. However, the experts can seamlessly transition the investigation to Microsoft Cybersecurity Solutions Group (CSG)'s Detection and Response Team (DART) services, when necessary. You can also opt to engage with your own incident response team to address issues that requires an incident response.
|
||||||
|
|
||||||
## Scenario
|
## Scenario
|
||||||
|
|
||||||
|
@ -1,57 +0,0 @@
|
|||||||
---
|
|
||||||
title: Threat analytics for Spectre and Meltdown
|
|
||||||
description: Get a tailored organizational risk evaluation and actionable steps you can take to minimize risks in your organization.
|
|
||||||
keywords: threat analytics, risk evaluation, OS mitigation, microcode mitigation, mitigation status
|
|
||||||
search.product: eADQiWindows 10XVcnh
|
|
||||||
search.appverid: met150
|
|
||||||
ms.prod: w10
|
|
||||||
ms.mktglfcycl: deploy
|
|
||||||
ms.sitesec: library
|
|
||||||
ms.pagetype: security
|
|
||||||
ms.author: macapara
|
|
||||||
author: mjcaparas
|
|
||||||
ms.localizationpriority: medium
|
|
||||||
manager: dansimp
|
|
||||||
audience: ITPro
|
|
||||||
ms.collection: M365-security-compliance
|
|
||||||
ms.topic: article
|
|
||||||
ms.date: 09/03/2018
|
|
||||||
---
|
|
||||||
|
|
||||||
# Threat analytics for Spectre and Meltdown
|
|
||||||
**Applies to:**
|
|
||||||
- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559)
|
|
||||||
|
|
||||||
The **Threat analytics** dashboard provides insight on how emerging threats affect your organization. It provides information that's specific for your organization.
|
|
||||||
|
|
||||||
[Spectre and Meltdown](https://cloudblogs.microsoft.com/microsoftsecure/2018/01/09/understanding-the-performance-impact-of-spectre-and-meltdown-mitigations-on-windows-systems/) is a new class of exploits that take advantage of critical vulnerabilities in the CPU processors, allowing attackers running user-level, non-admin code to steal data from kernel memory. These exploits can potentially allow arbitrary non-admin code running on a host machine to harvest sensitive data belonging to other apps or system processes, including apps on guest VMs.
|
|
||||||
|
|
||||||
Mitigating these vulnerabilities involves a complex multivendor update. It requires updates to Windows and Microsoft browsers using the [January 2018 Security Updates from Microsoft](https://portal.msrc.microsoft.com/en-us/security-guidance/releasenotedetail/858123b8-25ca-e711-a957-000d3a33cf99) and updates to processor microcode using fixes released by OEM and CPU vendors.
|
|
||||||
|
|
||||||
## Prerequisites
|
|
||||||
Note the following requirements and limitations of the charts and what you might be able to do to improve visibility of the mitigation status of machines in your network:
|
|
||||||
|
|
||||||
- Only active machines running Windows 10 are checked for OS mitigations.
|
|
||||||
- When checking for microcode mitgations, Windows Defender ATP currently checks for updates applicable to Intel CPU processors only.
|
|
||||||
- To determine microcode mitigation status, machines must enable Windows Defender Antivirus and update to Security intelligence version 1.259.1545.0 or above.
|
|
||||||
- To be covered under the overall mitigation status, machines must have both OS and microcode mitigation information.
|
|
||||||
|
|
||||||
## Assess organizational risk with Threat analytics
|
|
||||||
|
|
||||||
Threat analytics helps you continually assess and control risk exposure to Spectre and Meltdown. Use the charts to quickly identify machines for the presence or absence of the following mitigations:
|
|
||||||
|
|
||||||
- **OS mitigation**: Identifies machines that have installed the January 2018 Security Updates from Microsoft and have not explicitly disabled any of the OS mitigations provided with these updates
|
|
||||||
- **Microcode mitigation**: Identifies machines that have installed the necessary microcode updates or those that do not require them
|
|
||||||
- **Overall mitigation status**: Identifies the completeness by which machines have mitigated against the Spectre and Meltdown exploits
|
|
||||||
|
|
||||||
|
|
||||||
To access Threat analytics, from the navigation pane select **Dashboards** > **Threat analytics**.
|
|
||||||
|
|
||||||
Click a section of each chart to get a list of the machines in the corresponding mitigation status.
|
|
||||||
|
|
||||||
## Related topics
|
|
||||||
- [Threat analytics](threat-analytics.md)
|
|
||||||
- [Overview of Secure Score in Windows Defender Security Center](overview-secure-score-windows-defender-advanced-threat-protection.md)
|
|
||||||
- [Configure the security controls in Secure score](secure-score-dashboard-windows-defender-advanced-threat-protection.md)
|
|
||||||
|
|
||||||
|
|
@ -14,14 +14,13 @@ manager: dansimp
|
|||||||
audience: ITPro
|
audience: ITPro
|
||||||
ms.collection: M365-security-compliance
|
ms.collection: M365-security-compliance
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
ms.date: 12/08/2017
|
|
||||||
---
|
---
|
||||||
|
|
||||||
# Indicator resource type
|
# Indicator resource type
|
||||||
|
|
||||||
**Applies to:** - Windows Defender Advanced Threat Protection (Windows Defender ATP)
|
**Applies to:** - Windows Defender Advanced Threat Protection (Windows Defender ATP)
|
||||||
|
|
||||||
[!include[Prerelease<EFBFBD>information](prerelease.md)]
|
[!include[Prerelease information](prerelease.md)]
|
||||||
|
|
||||||
Method|Return Type |Description
|
Method|Return Type |Description
|
||||||
:---|:---|:---
|
:---|:---|:---
|
||||||
|
@ -9,7 +9,7 @@ manager: dansimp
|
|||||||
ms.collection: M365-identity-device-management
|
ms.collection: M365-identity-device-management
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.date: 10/8/2018
|
ms.date: 3/20/2019
|
||||||
---
|
---
|
||||||
|
|
||||||
# Common Criteria Certifications
|
# Common Criteria Certifications
|
||||||
@ -22,6 +22,7 @@ Microsoft is committed to optimizing the security of its products and services.
|
|||||||
|
|
||||||
The Security Target describes security functionality and assurance measures used to evaluate Windows.
|
The Security Target describes security functionality and assurance measures used to evaluate Windows.
|
||||||
|
|
||||||
|
- [Microsoft Windows 10 (April 2018 Update)](http://download.microsoft.com/download/0/7/6/0764E933-DD0B-45A7-9144-1DD9F454DCEF/Windows%2010%201803%20GP%20OS%20Security%20Target.pdf)
|
||||||
- [Microsoft Windows 10 (Fall Creators Update)](https://download.microsoft.com/download/B/6/A/B6A5EC2C-6351-4FB9-8FF1-643D4BD5BE6E/Windows%2010%201709%20GP%20OS%20Security%20Target.pdf)
|
- [Microsoft Windows 10 (Fall Creators Update)](https://download.microsoft.com/download/B/6/A/B6A5EC2C-6351-4FB9-8FF1-643D4BD5BE6E/Windows%2010%201709%20GP%20OS%20Security%20Target.pdf)
|
||||||
- [Microsoft Windows 10 (Creators Update)](https://download.microsoft.com/download/e/8/b/e8b8c42a-a0b6-4ba1-9bdc-e704e8289697/windows%2010%20version%201703%20gp%20os%20security%20target%20-%20public%20\(january%2016,%202018\)\(final\)\(clean\).pdf)
|
- [Microsoft Windows 10 (Creators Update)](https://download.microsoft.com/download/e/8/b/e8b8c42a-a0b6-4ba1-9bdc-e704e8289697/windows%2010%20version%201703%20gp%20os%20security%20target%20-%20public%20\(january%2016,%202018\)\(final\)\(clean\).pdf)
|
||||||
- [Microsoft Windows Server 2016, Microsoft Windows Server 2012 R2, and Microsoft Windows 10 Hyper-V](https://download.microsoft.com/download/1/c/3/1c3b5ab0-e064-4350-a31f-48312180d9b5/st_vid10823-st.pdf)
|
- [Microsoft Windows Server 2016, Microsoft Windows Server 2012 R2, and Microsoft Windows 10 Hyper-V](https://download.microsoft.com/download/1/c/3/1c3b5ab0-e064-4350-a31f-48312180d9b5/st_vid10823-st.pdf)
|
||||||
@ -58,6 +59,7 @@ These documents describe how to configure Windows to replicate the configuration
|
|||||||
**Windows 10, Windows 10 Mobile, Windows Server 2016, Windows Server 2012 R2**
|
**Windows 10, Windows 10 Mobile, Windows Server 2016, Windows Server 2012 R2**
|
||||||
|
|
||||||
|
|
||||||
|
- [Microsoft Windows 10 (April 2018 Update)](http://download.microsoft.com/download/6/C/1/6C13FBFF-9CB0-455F-A1C8-3E3CB0ACBD7B/Windows%2010%201803%20GP%20OS%20Administrative%20Guide.pdf)
|
||||||
- [Microsoft Windows 10 (Fall Creators Update)](https://download.microsoft.com/download/5/D/2/5D26F473-0FCE-4AC4-9065-6AEC0FE5B693/Windows%2010%201709%20GP%20OS%20Administrative%20Guide.pdf)
|
- [Microsoft Windows 10 (Fall Creators Update)](https://download.microsoft.com/download/5/D/2/5D26F473-0FCE-4AC4-9065-6AEC0FE5B693/Windows%2010%201709%20GP%20OS%20Administrative%20Guide.pdf)
|
||||||
- [Microsoft Windows 10 (Creators Update)](https://download.microsoft.com/download/e/9/7/e97f0c7f-e741-4657-8f79-2c0a7ca928e3/windows%2010%20cu%20gp%20os%20operational%20guidance%20\(jan%208%202017%20-%20public\).pdf)
|
- [Microsoft Windows 10 (Creators Update)](https://download.microsoft.com/download/e/9/7/e97f0c7f-e741-4657-8f79-2c0a7ca928e3/windows%2010%20cu%20gp%20os%20operational%20guidance%20\(jan%208%202017%20-%20public\).pdf)
|
||||||
- [Microsoft Windows Server 2016, Microsoft Windows Server 2012 R2, and Microsoft Windows 10 Hyper-V](https://download.microsoft.com/download/d/c/4/dc40b5c8-49c2-4587-8a04-ab3b81eb6fc4/st_vid10823-agd.pdf)
|
- [Microsoft Windows Server 2016, Microsoft Windows Server 2012 R2, and Microsoft Windows 10 Hyper-V](https://download.microsoft.com/download/d/c/4/dc40b5c8-49c2-4587-8a04-ab3b81eb6fc4/st_vid10823-agd.pdf)
|
||||||
@ -134,6 +136,7 @@ These documents describe how to configure Windows to replicate the configuration
|
|||||||
|
|
||||||
An Evaluation Technical Report (ETR) is a report submitted to the Common Criteria certification authority for how Windows complies with the claims made in the Security Target. A Certification / Validation Report provides the results of the evaluation by the validation team.
|
An Evaluation Technical Report (ETR) is a report submitted to the Common Criteria certification authority for how Windows complies with the claims made in the Security Target. A Certification / Validation Report provides the results of the evaluation by the validation team.
|
||||||
|
|
||||||
|
- [Microsoft Windows 10 (April 2018 Update)](http://download.microsoft.com/download/6/7/1/67167BF2-885D-4646-A61E-96A0024B52BB/Windows%2010%201803%20GP%20OS%20Certification%20Report.pdf)
|
||||||
- [Microsoft Windows 10 (Fall Creators Update)](https://download.microsoft.com/download/2/C/2/2C20D013-0610-4047-B2FA-516819DFAE0A/Windows%2010%201709%20GP%20OS%20Certification%20Report.pdf)
|
- [Microsoft Windows 10 (Fall Creators Update)](https://download.microsoft.com/download/2/C/2/2C20D013-0610-4047-B2FA-516819DFAE0A/Windows%2010%201709%20GP%20OS%20Certification%20Report.pdf)
|
||||||
- [Microsoft Windows 10 (Creators Update)](https://download.microsoft.com/download/3/2/c/32cdf627-dd23-4266-90ff-2f9685fd15c0/2017-49%20inf-2218%20cr.pdf)
|
- [Microsoft Windows 10 (Creators Update)](https://download.microsoft.com/download/3/2/c/32cdf627-dd23-4266-90ff-2f9685fd15c0/2017-49%20inf-2218%20cr.pdf)
|
||||||
- [Microsoft Windows Server 2016, Microsoft Windows Server 2012 R2, and Microsoft Windows 10 Hyper-V](https://download.microsoft.com/download/a/3/3/a336f881-4ac9-4c79-8202-95289f86bb7a/st_vid10823-vr.pdf)
|
- [Microsoft Windows Server 2016, Microsoft Windows Server 2012 R2, and Microsoft Windows 10 Hyper-V](https://download.microsoft.com/download/a/3/3/a336f881-4ac9-4c79-8202-95289f86bb7a/st_vid10823-vr.pdf)
|
||||||
|