mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-18 11:53:37 +00:00
portal sweep
This commit is contained in:
@ -21,7 +21,7 @@
|
|||||||
### [Run simulated attacks on machines](attack-simulations-windows-defender-advanced-threat-protection.md)
|
### [Run simulated attacks on machines](attack-simulations-windows-defender-advanced-threat-protection.md)
|
||||||
### [Configure proxy and Internet connectivity settings](configure-proxy-internet-windows-defender-advanced-threat-protection.md)
|
### [Configure proxy and Internet connectivity settings](configure-proxy-internet-windows-defender-advanced-threat-protection.md)
|
||||||
### [Troubleshoot onboarding issues](troubleshoot-onboarding-windows-defender-advanced-threat-protection.md)
|
### [Troubleshoot onboarding issues](troubleshoot-onboarding-windows-defender-advanced-threat-protection.md)
|
||||||
## [Understand the Windows Defender ATP portal](use-windows-defender-advanced-threat-protection.md)
|
## [Understand the portal](use-windows-defender-advanced-threat-protection.md)
|
||||||
### [Portal overview](portal-overview-windows-defender-advanced-threat-protection.md)
|
### [Portal overview](portal-overview-windows-defender-advanced-threat-protection.md)
|
||||||
### [View the Security operations dashboard](security-operations-dashboard-windows-defender-advanced-threat-protection.md)
|
### [View the Security operations dashboard](security-operations-dashboard-windows-defender-advanced-threat-protection.md)
|
||||||
### [View the Secure Score dashboard and improve your secure score](secure-score-dashboard-windows-defender-advanced-threat-protection.md)
|
### [View the Secure Score dashboard and improve your secure score](secure-score-dashboard-windows-defender-advanced-threat-protection.md)
|
||||||
|
@ -71,7 +71,7 @@ When you complete the integration steps on both portals, you'll be able to see r
|
|||||||
## Office 365 Threat Intelligence connection
|
## Office 365 Threat Intelligence connection
|
||||||
This feature is only available if you have an active Office 365 E5 or the Threat Intelligence add-on. For more information, see the Office 365 Enterprise E5 product page.
|
This feature is only available if you have an active Office 365 E5 or the Threat Intelligence add-on. For more information, see the Office 365 Enterprise E5 product page.
|
||||||
|
|
||||||
When you enable this feature, you'll be able to incorporate data from Office 365 Advanced Threat Protection into the Windows Defender ATP portal to conduct a holistic security investigation across Office 365 mailboxes and Windows machines.
|
When you enable this feature, you'll be able to incorporate data from Office 365 Advanced Threat Protection into Windows Defender Security Center to conduct a holistic security investigation across Office 365 mailboxes and Windows machines.
|
||||||
|
|
||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
>You'll need to have the appropriate license to enable this feature.
|
>You'll need to have the appropriate license to enable this feature.
|
||||||
|
@ -134,7 +134,7 @@ These steps guide you on modifying and overwriting an existing query.
|
|||||||
|
|
||||||
The result set has several capabilities to provide you with effective investigation, including:
|
The result set has several capabilities to provide you with effective investigation, including:
|
||||||
|
|
||||||
- Columns that return entity-related objects, such as Machine name, Machine ID, File name, SHA1, User, IP, and URL, are linked to their entity pages in the Windows Defender ATP portal.
|
- Columns that return entity-related objects, such as Machine name, Machine ID, File name, SHA1, User, IP, and URL, are linked to their entity pages in Windows Defender Security Center.
|
||||||
- You can right-click on a cell in the result set and add a filter to your written query. The current filtering options are **include**, **exclude** or **advanced filter**, which provides additional filtering options on the cell value. These cell values are part of the row set.
|
- You can right-click on a cell in the result set and add a filter to your written query. The current filtering options are **include**, **exclude** or **advanced filter**, which provides additional filtering options on the cell value. These cell values are part of the row set.
|
||||||
|
|
||||||

|

|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Windows Defender ATP alert API fields
|
title: Windows Defender ATP alert API fields
|
||||||
description: Understand how the alert API fields map to the values in the Windows Defender ATP portal.
|
description: Understand how the alert API fields map to the values in Windows Defender Security Center
|
||||||
keywords: alerts, alert fields, fields, api, fields, pull alerts, rest api, request, response
|
keywords: alerts, alert fields, fields, api, fields, pull alerts, rest api, request, response
|
||||||
search.product: eADQiWindows 10XVcnh
|
search.product: eADQiWindows 10XVcnh
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
@ -28,7 +28,7 @@ ms.date: 10/16/2017
|
|||||||
|
|
||||||
>Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-apiportalmapping-abovefoldlink)
|
>Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-apiportalmapping-abovefoldlink)
|
||||||
|
|
||||||
Understand what data fields are exposed as part of the alerts API and how they map to the Windows Defender ATP portal.
|
Understand what data fields are exposed as part of the alerts API and how they map to Windows Defender Security Center.
|
||||||
|
|
||||||
|
|
||||||
## Alert API fields and portal mapping
|
## Alert API fields and portal mapping
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Assign user access to the Windows Defender ATP portal
|
title: Assign user access to Windows Defender Security Center
|
||||||
description: Assign read and write or read only access to the Windows Defender Advanced Threat Protection portal.
|
description: Assign read and write or read only access to the Windows Defender Advanced Threat Protection portal.
|
||||||
keywords: assign user roles, assign read and write access, assign read only access, user, user roles, roles
|
keywords: assign user roles, assign read and write access, assign read only access, user, user roles, roles
|
||||||
search.product: eADQiWindows 10XVcnh
|
search.product: eADQiWindows 10XVcnh
|
||||||
@ -13,7 +13,7 @@ ms.localizationpriority: medium
|
|||||||
ms.date: 04/24/2018
|
ms.date: 04/24/2018
|
||||||
---
|
---
|
||||||
|
|
||||||
# Assign user access to the Windows Defender ATP portal
|
# Assign user access to Windows Defender Security Center
|
||||||
**Applies to:**
|
**Applies to:**
|
||||||
|
|
||||||
- Windows 10 Enterprise
|
- Windows 10 Enterprise
|
||||||
|
@ -30,7 +30,7 @@ There are several spaces you can explore to learn about specific information:
|
|||||||
|
|
||||||
|
|
||||||
There are several ways you can access the Community Center:
|
There are several ways you can access the Community Center:
|
||||||
- In the Windows Defender ATP portal navigation pane, select **Community center**. A new browser tab opens and takes you to the Windows Defender ATP Tech Community page.
|
- In the Windows Defender Security Center navigation pane, select **Community center**. A new browser tab opens and takes you to the Windows Defender ATP Tech Community page.
|
||||||
- Access the community through the [Windows Defender Advanced Threat Protection Tech Community](https://techcommunity.microsoft.com/t5/Windows-Defender-Advanced-Threat/ct-p/WindowsDefenderAdvanced) page
|
- Access the community through the [Windows Defender Advanced Threat Protection Tech Community](https://techcommunity.microsoft.com/t5/Windows-Defender-Advanced-Threat/ct-p/WindowsDefenderAdvanced) page
|
||||||
|
|
||||||
|
|
||||||
|
@ -88,13 +88,13 @@ You need to make sure that all your devices are enrolled in Intune. You can use
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
There are steps you'll need to take in the Windows Defender ATP portal, the Intune portal, and Azure AD portal.
|
There are steps you'll need to take in Windows Defender Security Center, the Intune portal, and Azure AD portal.
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> You'll need a Microsoft Intune environment, with Intune managed and Azure AD joined Windows 10 devices.
|
> You'll need a Microsoft Intune environment, with Intune managed and Azure AD joined Windows 10 devices.
|
||||||
|
|
||||||
Take the following steps to enable conditional access:
|
Take the following steps to enable conditional access:
|
||||||
- Step 1: Turn on the Microsoft Intune connection from the Windows Defender ATP portal
|
- Step 1: Turn on the Microsoft Intune connection from Windows Defender Security Center
|
||||||
- Step 2: Turn on the Windows Defender ATP integration in Intune
|
- Step 2: Turn on the Windows Defender ATP integration in Intune
|
||||||
- Step 3: Create the compliance policy in Intune
|
- Step 3: Create the compliance policy in Intune
|
||||||
- Step 4: Assign the policy
|
- Step 4: Assign the policy
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Configure HP ArcSight to pull Windows Defender ATP alerts
|
title: Configure HP ArcSight to pull Windows Defender ATP alerts
|
||||||
description: Configure HP ArcSight to receive and pull alerts from the Windows Defender ATP portal.
|
description: Configure HP ArcSight to receive and pull alerts from Windows Defender Security Center
|
||||||
keywords: configure hp arcsight, security information and events management tools, arcsight
|
keywords: configure hp arcsight, security information and events management tools, arcsight
|
||||||
search.product: eADQiWindows 10XVcnh
|
search.product: eADQiWindows 10XVcnh
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
|
@ -34,7 +34,7 @@ ms.date: 04/24/2018
|
|||||||
> To use Group Policy (GP) updates to deploy the package, you must be on Windows Server 2008 R2 or later.
|
> To use Group Policy (GP) updates to deploy the package, you must be on Windows Server 2008 R2 or later.
|
||||||
|
|
||||||
## Onboard machines using Group Policy
|
## Onboard machines using Group Policy
|
||||||
1. Open the GP configuration package .zip file (*WindowsDefenderATPOnboardingPackage.zip*) that you downloaded from the service onboarding wizard. You can also get the package from the [Windows Defender ATP portal](https://securitycenter.windows.com/):
|
1. Open the GP configuration package .zip file (*WindowsDefenderATPOnboardingPackage.zip*) that you downloaded from the service onboarding wizard. You can also get the package from [Windows Defender Security Center](https://securitycenter.windows.com/):
|
||||||
|
|
||||||
a. In the navigation pane, select **Settings** > **Onboarding**.
|
a. In the navigation pane, select **Settings** > **Onboarding**.
|
||||||
|
|
||||||
@ -64,7 +64,7 @@ ms.date: 04/24/2018
|
|||||||
> After onboarding the machine, you can choose to run a detection test to verify that the machine is properly onboarded to the service. For more information, see [Run a detection test on a newly onboarded Windows Defender ATP machine](run-detection-test-windows-defender-advanced-threat-protection.md).
|
> After onboarding the machine, you can choose to run a detection test to verify that the machine is properly onboarded to the service. For more information, see [Run a detection test on a newly onboarded Windows Defender ATP machine](run-detection-test-windows-defender-advanced-threat-protection.md).
|
||||||
|
|
||||||
## Additional Windows Defender ATP configuration settings
|
## Additional Windows Defender ATP configuration settings
|
||||||
For each machine, you can state whether samples can be collected from the machine when a request is made through the Windows Defender ATP portal to submit a file for deep analysis.
|
For each machine, you can state whether samples can be collected from the machine when a request is made through Windows Defender Security Center to submit a file for deep analysis.
|
||||||
|
|
||||||
You can use Group Policy (GP) to configure settings, such as settings for the sample sharing used in the deep analysis feature.
|
You can use Group Policy (GP) to configure settings, such as settings for the sample sharing used in the deep analysis feature.
|
||||||
|
|
||||||
@ -120,7 +120,7 @@ For security reasons, the package used to Offboard machines will expire 30 days
|
|||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> Onboarding and offboarding policies must not be deployed on the same machine at the same time, otherwise this will cause unpredictable collisions.
|
> Onboarding and offboarding policies must not be deployed on the same machine at the same time, otherwise this will cause unpredictable collisions.
|
||||||
|
|
||||||
1. Get the offboarding package from the [Windows Defender ATP portal](https://securitycenter.windows.com/):
|
1. Get the offboarding package from [Windows Defender Security Center](https://securitycenter.windows.com/):
|
||||||
|
|
||||||
a. In the navigation pane, select **Settings** > **Offboarding**.
|
a. In the navigation pane, select **Settings** > **Offboarding**.
|
||||||
|
|
||||||
@ -154,7 +154,7 @@ For security reasons, the package used to Offboard machines will expire 30 days
|
|||||||
With Group Policy there isn’t an option to monitor deployment of policies on the machines. Monitoring can be done directly on the portal, or by using the different deployment tools.
|
With Group Policy there isn’t an option to monitor deployment of policies on the machines. Monitoring can be done directly on the portal, or by using the different deployment tools.
|
||||||
|
|
||||||
## Monitor machines using the portal
|
## Monitor machines using the portal
|
||||||
1. Go to the [Windows Defender ATP portal](https://securitycenter.windows.com/).
|
1. Go to [Windows Defender Security Center](https://securitycenter.windows.com/).
|
||||||
2. Click **Machines list**.
|
2. Click **Machines list**.
|
||||||
3. Verify that machines are appearing.
|
3. Verify that machines are appearing.
|
||||||
|
|
||||||
|
@ -54,7 +54,7 @@ For more information on using Windows Defender ATP CSP see, [WindowsAdvancedThre
|
|||||||
- **Onboard Configuration Package**: Browse and select the **WindowsDefenderATP.onboarding** file you downloaded. This file enables a setting so devices can report to the Windows Defender ATP service.
|
- **Onboard Configuration Package**: Browse and select the **WindowsDefenderATP.onboarding** file you downloaded. This file enables a setting so devices can report to the Windows Defender ATP service.
|
||||||
- **Sample sharing for all files**: Allows samples to be collected, and shared with Windows Defender ATP. For example, if you see a suspicious file, you can submit it to Windows Defender ATP for deep analysis.
|
- **Sample sharing for all files**: Allows samples to be collected, and shared with Windows Defender ATP. For example, if you see a suspicious file, you can submit it to Windows Defender ATP for deep analysis.
|
||||||
- **Expedite telemetry reporting frequency**: For devices that are at high risk, enable this setting so it reports telemetry to the Windows Defender ATP service more frequently.
|
- **Expedite telemetry reporting frequency**: For devices that are at high risk, enable this setting so it reports telemetry to the Windows Defender ATP service more frequently.
|
||||||
- **Offboard Configuration Package**: If you want to remove Windows Defender ATP monitoring, you can download an offboarding package from the Windows Defender ATP portal, and add it. Otherwise, skip this property.
|
- **Offboard Configuration Package**: If you want to remove Windows Defender ATP monitoring, you can download an offboarding package from Windows Defender Security Center, and add it. Otherwise, skip this property.
|
||||||
|
|
||||||
7. Select **OK**, and **Create** to save your changes, which creates the profile.
|
7. Select **OK**, and **Create** to save your changes, which creates the profile.
|
||||||
|
|
||||||
@ -62,7 +62,7 @@ For more information on using Windows Defender ATP CSP see, [WindowsAdvancedThre
|
|||||||
|
|
||||||
### Onboard and monitor machines using the classic Intune console
|
### Onboard and monitor machines using the classic Intune console
|
||||||
|
|
||||||
1. Open the Microsoft Intune configuration package .zip file (*WindowsDefenderATPOnboardingPackage.zip*) that you downloaded from the service onboarding wizard. You can also get the package from the [Windows Defender ATP portal](https://securitycenter.windows.com/):
|
1. Open the Microsoft Intune configuration package .zip file (*WindowsDefenderATPOnboardingPackage.zip*) that you downloaded from the service onboarding wizard. You can also get the package from [Windows Defender Security Center](https://securitycenter.windows.com/):
|
||||||
|
|
||||||
a. In the navigation pane, select **Settings** > **Onboarding**.
|
a. In the navigation pane, select **Settings** > **Onboarding**.
|
||||||
|
|
||||||
@ -145,7 +145,7 @@ For security reasons, the package used to Offboard machines will expire 30 days
|
|||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> Onboarding and offboarding policies must not be deployed on the same machine at the same time, otherwise this will cause unpredictable collisions.
|
> Onboarding and offboarding policies must not be deployed on the same machine at the same time, otherwise this will cause unpredictable collisions.
|
||||||
|
|
||||||
1. Get the offboarding package from the [Windows Defender ATP portal](https://securitycenter.windows.com/):
|
1. Get the offboarding package from [Windows Defender Security Center](https://securitycenter.windows.com/):
|
||||||
|
|
||||||
a. In the navigation pane, select **Settings** > **Offboarding**.
|
a. In the navigation pane, select **Settings** > **Offboarding**.
|
||||||
|
|
||||||
|
@ -24,7 +24,7 @@ ms.date: 04/24/2018
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
Windows Defender ATP provides a centralized security operations experience for Windows as well as non-Windows platforms. You'll be able to see alerts from various supported operating systems (OS) in the Windows Defender ATP portal and better protect your organization's network. This experience leverages on a third-party security products’ sensor data.
|
Windows Defender ATP provides a centralized security operations experience for Windows as well as non-Windows platforms. You'll be able to see alerts from various supported operating systems (OS) in Windows Defender Security Center and better protect your organization's network. This experience leverages on a third-party security products’ sensor data.
|
||||||
|
|
||||||
You'll need to know the exact Linux distros and macOS X versions that are compatible with Windows Defender ATP for the integration to work.
|
You'll need to know the exact Linux distros and macOS X versions that are compatible with Windows Defender ATP for the integration to work.
|
||||||
|
|
||||||
|
@ -47,7 +47,7 @@ You can use existing System Center Configuration Manager functionality to create
|
|||||||
### Onboard machines using System Center Configuration Manager
|
### Onboard machines using System Center Configuration Manager
|
||||||
|
|
||||||
|
|
||||||
1. Open the SCCM configuration package .zip file (*WindowsDefenderATPOnboardingPackage.zip*) that you downloaded from the service onboarding wizard. You can also get the package from the [Windows Defender ATP portal](https://securitycenter.windows.com/):
|
1. Open the SCCM configuration package .zip file (*WindowsDefenderATPOnboardingPackage.zip*) that you downloaded from the service onboarding wizard. You can also get the package from [Windows Defender Security Center](https://securitycenter.windows.com/):
|
||||||
|
|
||||||
a. In the navigation pane, select **Settings** > **Onboarding**.
|
a. In the navigation pane, select **Settings** > **Onboarding**.
|
||||||
|
|
||||||
@ -70,7 +70,7 @@ You can use existing System Center Configuration Manager functionality to create
|
|||||||
> After onboarding the machine, you can choose to run a detection test to verify that an machine is properly onboarded to the service. For more information, see [Run a detection test on a newly onboarded Windows Defender ATP machine](run-detection-test-windows-defender-advanced-threat-protection.md).
|
> After onboarding the machine, you can choose to run a detection test to verify that an machine is properly onboarded to the service. For more information, see [Run a detection test on a newly onboarded Windows Defender ATP machine](run-detection-test-windows-defender-advanced-threat-protection.md).
|
||||||
|
|
||||||
### Configure sample collection settings
|
### Configure sample collection settings
|
||||||
For each machine, you can set a configuration value to state whether samples can be collected from the machine when a request is made through the Windows Defender ATP portal to submit a file for deep analysis.
|
For each machine, you can set a configuration value to state whether samples can be collected from the machine when a request is made through Windows Defender Security Center to submit a file for deep analysis.
|
||||||
|
|
||||||
You can set a compliance rule for configuration item in System Center Configuration Manager to change the sample share setting on a machine.
|
You can set a compliance rule for configuration item in System Center Configuration Manager to change the sample share setting on a machine.
|
||||||
This rule should be a *remediating* compliance rule configuration item that sets the value of a registry key on targeted machines to make sure they’re complaint.
|
This rule should be a *remediating* compliance rule configuration item that sets the value of a registry key on targeted machines to make sure they’re complaint.
|
||||||
@ -125,7 +125,7 @@ For security reasons, the package used to Offboard machines will expire 30 days
|
|||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> Onboarding and offboarding policies must not be deployed on the same machine at the same time, otherwise this will cause unpredictable collisions.
|
> Onboarding and offboarding policies must not be deployed on the same machine at the same time, otherwise this will cause unpredictable collisions.
|
||||||
|
|
||||||
1. Get the offboarding package from the [Windows Defender ATP portal](https://securitycenter.windows.com/):
|
1. Get the offboarding package from [Windows Defender Security Center](https://securitycenter.windows.com/):
|
||||||
|
|
||||||
a. In the navigation pane, select **Settings** > **Offboarding**.
|
a. In the navigation pane, select **Settings** > **Offboarding**.
|
||||||
|
|
||||||
|
@ -34,7 +34,7 @@ You can also manually onboard individual machines to Windows Defender ATP. You m
|
|||||||
> The script has been optimized to be used on a limited number of machines (1-10 machines). To deploy to scale, use other deployment options. For more information on using other deployment options, see [Onboard Window 10 machines](configure-endpoints-windows-defender-advanced-threat-protection.md).
|
> The script has been optimized to be used on a limited number of machines (1-10 machines). To deploy to scale, use other deployment options. For more information on using other deployment options, see [Onboard Window 10 machines](configure-endpoints-windows-defender-advanced-threat-protection.md).
|
||||||
|
|
||||||
## Onboard machines
|
## Onboard machines
|
||||||
1. Open the GP configuration package .zip file (*WindowsDefenderATPOnboardingPackage.zip*) that you downloaded from the service onboarding wizard. You can also get the package from the [Windows Defender ATP portal](https://securitycenter.windows.com/):
|
1. Open the GP configuration package .zip file (*WindowsDefenderATPOnboardingPackage.zip*) that you downloaded from the service onboarding wizard. You can also get the package from [Windows Defender Security Center](https://securitycenter.windows.com/):
|
||||||
|
|
||||||
a. In the navigation pane, select **Settings** > **Onboarding**.
|
a. In the navigation pane, select **Settings** > **Onboarding**.
|
||||||
|
|
||||||
@ -66,7 +66,7 @@ For information on how you can manually validate that the machine is compliant a
|
|||||||
> After onboarding the machine, you can choose to run a detection test to verify that an machine is properly onboarded to the service. For more information, see [Run a detection test on a newly onboarded Windows Defender ATP endpoint](run-detection-test-windows-defender-advanced-threat-protection.md).
|
> After onboarding the machine, you can choose to run a detection test to verify that an machine is properly onboarded to the service. For more information, see [Run a detection test on a newly onboarded Windows Defender ATP endpoint](run-detection-test-windows-defender-advanced-threat-protection.md).
|
||||||
|
|
||||||
## Configure sample collection settings
|
## Configure sample collection settings
|
||||||
For each machine, you can set a configuration value to state whether samples can be collected from the machine when a request is made through the Windows Defender ATP portal to submit a file for deep analysis.
|
For each machine, you can set a configuration value to state whether samples can be collected from the machine when a request is made through Windows Defender Security Center to submit a file for deep analysis.
|
||||||
|
|
||||||
You can manually configure the sample sharing setting on the machine by using *regedit* or creating and running a *.reg* file.
|
You can manually configure the sample sharing setting on the machine by using *regedit* or creating and running a *.reg* file.
|
||||||
|
|
||||||
@ -92,7 +92,7 @@ For security reasons, the package used to Offboard machines will expire 30 days
|
|||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> Onboarding and offboarding policies must not be deployed on the same machine at the same time, otherwise this will cause unpredictable collisions.
|
> Onboarding and offboarding policies must not be deployed on the same machine at the same time, otherwise this will cause unpredictable collisions.
|
||||||
|
|
||||||
1. Get the offboarding package from the [Windows Defender ATP portal](https://securitycenter.windows.com/):
|
1. Get the offboarding package from [Windows Defender Security Center](https://securitycenter.windows.com/):
|
||||||
|
|
||||||
a. In the navigation pane, select **Settings** > **Offboarding**.
|
a. In the navigation pane, select **Settings** > **Offboarding**.
|
||||||
|
|
||||||
@ -126,7 +126,7 @@ You can follow the different verification steps in the [Troubleshoot onboarding
|
|||||||
Monitoring can also be done directly on the portal, or by using the different deployment tools.
|
Monitoring can also be done directly on the portal, or by using the different deployment tools.
|
||||||
|
|
||||||
### Monitor machines using the portal
|
### Monitor machines using the portal
|
||||||
1. Go to the Windows Defender ATP portal.
|
1. Go to Windows Defender Security Center.
|
||||||
|
|
||||||
2. Click **Machines list**.
|
2. Click **Machines list**.
|
||||||
|
|
||||||
|
@ -38,7 +38,7 @@ You can onboard VDI machines using a single entry or multiple entries for each m
|
|||||||
>[!WARNING]
|
>[!WARNING]
|
||||||
> For environments where there are low resource configurations, the VDI boot proceedure might slow the Windows Defender ATP sensor onboarding.
|
> For environments where there are low resource configurations, the VDI boot proceedure might slow the Windows Defender ATP sensor onboarding.
|
||||||
|
|
||||||
1. Open the VDI configuration package .zip file (*WindowsDefenderATPOnboardingPackage.zip*) that you downloaded from the service onboarding wizard. You can also get the package from the [Windows Defender ATP portal](https://securitycenter.windows.com/):
|
1. Open the VDI configuration package .zip file (*WindowsDefenderATPOnboardingPackage.zip*) that you downloaded from the service onboarding wizard. You can also get the package from [Windows Defender Security Center](https://securitycenter.windows.com/):
|
||||||
|
|
||||||
a. In the navigation pane, select **Settings** > **Onboarding**.
|
a. In the navigation pane, select **Settings** > **Onboarding**.
|
||||||
|
|
||||||
@ -78,8 +78,8 @@ You can onboard VDI machines using a single entry or multiple entries for each m
|
|||||||
|
|
||||||
d. Logon to machine with another user.
|
d. Logon to machine with another user.
|
||||||
|
|
||||||
e. **For single entry for each machine**: Check only one entry in the Windows Defender ATP portal.<br>
|
e. **For single entry for each machine**: Check only one entry in Windows Defender Security Center.<br>
|
||||||
**For multiple entries for each machine**: Check multiple entries in the Windows Defender ATP portal.
|
**For multiple entries for each machine**: Check multiple entries in Windows Defender Security Center.
|
||||||
|
|
||||||
7. Click **Machines list** on the Navigation pane.
|
7. Click **Machines list** on the Navigation pane.
|
||||||
|
|
||||||
|
@ -57,6 +57,6 @@ Topic | Description
|
|||||||
[Enable SIEM integration in Windows Defender ATP](enable-siem-integration-windows-defender-advanced-threat-protection.md)| Learn about enabling the SIEM integration feature in the **Settings** page in the portal so that you can use and generate the required information to configure supported SIEM tools.
|
[Enable SIEM integration in Windows Defender ATP](enable-siem-integration-windows-defender-advanced-threat-protection.md)| Learn about enabling the SIEM integration feature in the **Settings** page in the portal so that you can use and generate the required information to configure supported SIEM tools.
|
||||||
[Configure Splunk to pull Windows Defender ATP alerts](configure-splunk-windows-defender-advanced-threat-protection.md)| Learn about installing the REST API Modular Input app and other configuration settings to enable Splunk to pull Windows Defender ATP alerts.
|
[Configure Splunk to pull Windows Defender ATP alerts](configure-splunk-windows-defender-advanced-threat-protection.md)| Learn about installing the REST API Modular Input app and other configuration settings to enable Splunk to pull Windows Defender ATP alerts.
|
||||||
[Configure HP ArcSight to pull Windows Defender ATP alerts](configure-arcsight-windows-defender-advanced-threat-protection.md)| Learn about installing the HP ArcSight REST FlexConnector package and the files you need to configure ArcSight to pull Windows Defender ATP alerts.
|
[Configure HP ArcSight to pull Windows Defender ATP alerts](configure-arcsight-windows-defender-advanced-threat-protection.md)| Learn about installing the HP ArcSight REST FlexConnector package and the files you need to configure ArcSight to pull Windows Defender ATP alerts.
|
||||||
[Windows Defender ATP alert API fields](api-portal-mapping-windows-defender-advanced-threat-protection.md) | Understand what data fields are exposed as part of the alerts API and how they map to the Windows Defender ATP portal.
|
[Windows Defender ATP alert API fields](api-portal-mapping-windows-defender-advanced-threat-protection.md) | Understand what data fields are exposed as part of the alerts API and how they map to Windows Defender Security Center.
|
||||||
[Pull Windows Defender ATP alerts using REST API](pull-alerts-using-rest-api-windows-defender-advanced-threat-protection.md) | Use the Client credentials OAuth 2.0 flow to pull alerts from Windows Defender ATP using REST API.
|
[Pull Windows Defender ATP alerts using REST API](pull-alerts-using-rest-api-windows-defender-advanced-threat-protection.md) | Use the Client credentials OAuth 2.0 flow to pull alerts from Windows Defender ATP using REST API.
|
||||||
[Troubleshoot SIEM tool integration issues](troubleshoot-siem-windows-defender-advanced-threat-protection.md) | Address issues you might encounter when using the SIEM integration feature.
|
[Troubleshoot SIEM tool integration issues](troubleshoot-siem-windows-defender-advanced-threat-protection.md) | Address issues you might encounter when using the SIEM integration feature.
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Configure Splunk to pull Windows Defender ATP alerts
|
title: Configure Splunk to pull Windows Defender ATP alerts
|
||||||
description: Configure Splunk to receive and pull alerts from the Windows Defender ATP portal.
|
description: Configure Splunk to receive and pull alerts from Windows Defender Security Center.
|
||||||
keywords: configure splunk, security information and events management tools, splunk
|
keywords: configure splunk, security information and events management tools, splunk
|
||||||
search.product: eADQiWindows 10XVcnh
|
search.product: eADQiWindows 10XVcnh
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
|
@ -135,7 +135,7 @@ Content-Type: application/json;
|
|||||||
}
|
}
|
||||||
```
|
```
|
||||||
|
|
||||||
The following values correspond to the alert sections surfaced on the Windows Defender ATP portal:
|
The following values correspond to the alert sections surfaced on Windows Defender Security Center:
|
||||||

|

|
||||||
|
|
||||||
Highlighted section | JSON key name
|
Highlighted section | JSON key name
|
||||||
|
@ -27,7 +27,7 @@ ms.date: 04/24/2018
|
|||||||
|
|
||||||
>Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-enablecustomti-abovefoldlink)
|
>Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-enablecustomti-abovefoldlink)
|
||||||
|
|
||||||
Before you can create custom threat intelligence (TI) using REST API, you'll need to set up the custom threat intelligence application through the Windows Defender ATP portal.
|
Before you can create custom threat intelligence (TI) using REST API, you'll need to set up the custom threat intelligence application through Windows Defender Security Center.
|
||||||
|
|
||||||
1. In the navigation pane, select **Settings** > **Threat intel**.
|
1. In the navigation pane, select **Settings** > **Threat intel**.
|
||||||
|
|
||||||
|
@ -27,7 +27,7 @@ ms.date: 04/24/2018
|
|||||||
|
|
||||||
>Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-enablesiem-abovefoldlink)
|
>Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-enablesiem-abovefoldlink)
|
||||||
|
|
||||||
Enable security information and event management (SIEM) integration so you can pull alerts from the Windows Defender ATP portal using your SIEM solution or by connecting directly to the alerts REST API.
|
Enable security information and event management (SIEM) integration so you can pull alerts from Windows Defender Security Center using your SIEM solution or by connecting directly to the alerts REST API.
|
||||||
|
|
||||||
1. In the navigation pane, select **Settings** > **SIEM**.
|
1. In the navigation pane, select **Settings** > **SIEM**.
|
||||||
|
|
||||||
@ -55,7 +55,7 @@ Enable security information and event management (SIEM) integration so you can p
|
|||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> You'll need to generate a new Refresh token every 90 days.
|
> You'll need to generate a new Refresh token every 90 days.
|
||||||
|
|
||||||
You can now proceed with configuring your SIEM solution or connecting to the alerts REST API through programmatic access. You'll need to use the tokens when configuring your SIEM solution to allow it to receive alerts from the Windows Defender ATP portal.
|
You can now proceed with configuring your SIEM solution or connecting to the alerts REST API through programmatic access. You'll need to use the tokens when configuring your SIEM solution to allow it to receive alerts from Windows Defender Security Center.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
@ -139,7 +139,7 @@ This step will guide you in simulating an event in connection to a malicious IP
|
|||||||
## Step 4: Explore the custom alert in the portal
|
## Step 4: Explore the custom alert in the portal
|
||||||
This step will guide you in exploring the custom alert in the portal.
|
This step will guide you in exploring the custom alert in the portal.
|
||||||
|
|
||||||
1. Open the [Windows Defender ATP portal](http://securitycenter.windows.com/) on a browser.
|
1. Open [Windows Defender Security Center](http://securitycenter.windows.com/) on a browser.
|
||||||
|
|
||||||
2. Log in with your Windows Defender ATP credentials.
|
2. Log in with your Windows Defender ATP credentials.
|
||||||
|
|
||||||
|
@ -37,7 +37,7 @@ An inactive machine is not necessarily flagged due to an issue. The following ac
|
|||||||
If the machine has not been in use for more than 7 days for any reason, it will remain in an ‘Inactive’ status in the portal.
|
If the machine has not been in use for more than 7 days for any reason, it will remain in an ‘Inactive’ status in the portal.
|
||||||
|
|
||||||
**Machine was reinstalled or renamed**</br>
|
**Machine was reinstalled or renamed**</br>
|
||||||
A reinstalled or renamed machine will generate a new machine entity in Windows Defender ATP portal. The previous machine entity will remain with an ‘Inactive’ status in the portal. If you reinstalled a machine and deployed the Windows Defender ATP package, search for the new machine name to verify that the machine is reporting normally.
|
A reinstalled or renamed machine will generate a new machine entity in Windows Defender Security Center. The previous machine entity will remain with an ‘Inactive’ status in the portal. If you reinstalled a machine and deployed the Windows Defender ATP package, search for the new machine name to verify that the machine is reporting normally.
|
||||||
|
|
||||||
**Machine was offboarded**</br>
|
**Machine was offboarded**</br>
|
||||||
If the machine was offboarded it will still appear in machines list. After 7 days, the machine health state should change to inactive.
|
If the machine was offboarded it will still appear in machines list. After 7 days, the machine health state should change to inactive.
|
||||||
|
@ -50,9 +50,9 @@ To gain access into which licenses are provisioned to your company, and to check
|
|||||||
|
|
||||||

|

|
||||||
|
|
||||||
## Access the Windows Defender ATP portal for the first time
|
## Access Windows Defender Security Center for the first time
|
||||||
|
|
||||||
When accessing the [Windows Defender ATP portal](https://SecurityCenter.Windows.com) for the first time there will be a setup wizard that will guide you through some initial steps. At the end of the setup wizard there will be a dedicated cloud instance of Windows Defender ATP created.
|
When accessing [Windows Defender Security Center](https://SecurityCenter.Windows.com) for the first time there will be a setup wizard that will guide you through some initial steps. At the end of the setup wizard there will be a dedicated cloud instance of Windows Defender ATP created.
|
||||||
|
|
||||||
1. Each time you access the portal you will need to validate that you are authorized to access the product. This **Set up your permissions** step will only be available if you are not currently authorized to access the product.
|
1. Each time you access the portal you will need to validate that you are authorized to access the product. This **Set up your permissions** step will only be available if you are not currently authorized to access the product.
|
||||||
|
|
||||||
@ -64,7 +64,7 @@ When accessing the [Windows Defender ATP portal](https://SecurityCenter.Windows.
|
|||||||
|
|
||||||

|

|
||||||
|
|
||||||
You will need to set up your preferences for the Windows Defender ATP portal.
|
You will need to set up your preferences for Windows Defender Security Center.
|
||||||
|
|
||||||
3. When onboarding the service for the first time, you can choose to store your data in the Microsoft Azure datacenters in the European Union, the United Kingdom, or the United States. Once configured, you cannot change the location where your data is stored. This provides a convenient way to minimize compliance risk by actively selecting the geographic locations where your data will reside. Microsoft will not transfer the data from the specified geolocation.
|
3. When onboarding the service for the first time, you can choose to store your data in the Microsoft Azure datacenters in the European Union, the United Kingdom, or the United States. Once configured, you cannot change the location where your data is stored. This provides a convenient way to minimize compliance risk by actively selecting the geographic locations where your data will reside. Microsoft will not transfer the data from the specified geolocation.
|
||||||
|
|
||||||
@ -108,11 +108,11 @@ When accessing the [Windows Defender ATP portal](https://SecurityCenter.Windows.
|
|||||||
8. You will receive a warning notifying you that you won't be able to change some of your preferences once you click **Continue**.
|
8. You will receive a warning notifying you that you won't be able to change some of your preferences once you click **Continue**.
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> Some of these options can be changed at a later time in the Windows Defender ATP portal.
|
> Some of these options can be changed at a later time in Windows Defender Security Center.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
9. A dedicated cloud instance of the Windows Defender ATP portal is being created at this time. This step will take an average of 5 minutes to complete.
|
9. A dedicated cloud instance of Windows Defender Security Center portal is being created at this time. This step will take an average of 5 minutes to complete.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
|
@ -57,7 +57,7 @@ Whenever a change or comment is made to an alert, it is recorded in the **Commen
|
|||||||
Added comments instantly appear on the pane.
|
Added comments instantly appear on the pane.
|
||||||
|
|
||||||
## Suppress alerts
|
## Suppress alerts
|
||||||
There might be scenarios where you need to suppress alerts from appearing in the Windows Defender ATP portal. Windows Defender ATP lets you create suppression rules for specific alerts that are known to be innocuous such as known tools or processes in your organization.
|
There might be scenarios where you need to suppress alerts from appearing in Windows Defender Security Center. Windows Defender ATP lets you create suppression rules for specific alerts that are known to be innocuous such as known tools or processes in your organization.
|
||||||
|
|
||||||
Suppression rules can be created from an existing alert. They can be disabled and reenabled if needed.
|
Suppression rules can be created from an existing alert. They can be disabled and reenabled if needed.
|
||||||
|
|
||||||
|
@ -157,7 +157,7 @@ Topic | Description
|
|||||||
[Onboard previous versions of Windows](onboard-downlevel-windows-defender-advanced-threat-protection.md)| Onboard Windows 7 and Windows 8.1 machines to Windows Defender ATP.
|
[Onboard previous versions of Windows](onboard-downlevel-windows-defender-advanced-threat-protection.md)| Onboard Windows 7 and Windows 8.1 machines to Windows Defender ATP.
|
||||||
[Onboard Windows 10 machines](configure-endpoints-windows-defender-advanced-threat-protection.md) | You'll need to onboard machines for it to report to the Windows Defender ATP service. Learn about the tools and methods you can use to configure machines in your enterprise.
|
[Onboard Windows 10 machines](configure-endpoints-windows-defender-advanced-threat-protection.md) | You'll need to onboard machines for it to report to the Windows Defender ATP service. Learn about the tools and methods you can use to configure machines in your enterprise.
|
||||||
[Onboard servers](configure-server-endpoints-windows-defender-advanced-threat-protection.md) | Onboard Windows Server 2012 R2 and Windows Server 2016 to Windows Defender ATP
|
[Onboard servers](configure-server-endpoints-windows-defender-advanced-threat-protection.md) | Onboard Windows Server 2012 R2 and Windows Server 2016 to Windows Defender ATP
|
||||||
[Onboard non-Windows machines](configure-endpoints-non-windows-windows-defender-advanced-threat-protection.md) | Windows Defender ATP provides a centralized security operations experience for Windows as well as non-Windows platforms. You'll be able to see alerts from various supported operating systems (OS) in the Windows Defender ATP portal and better protect your organization's network. This experience leverages on a third-party security products' sensor data.
|
[Onboard non-Windows machines](configure-endpoints-non-windows-windows-defender-advanced-threat-protection.md) | Windows Defender ATP provides a centralized security operations experience for Windows as well as non-Windows platforms. You'll be able to see alerts from various supported operating systems (OS) in Windows Defender Security Center and better protect your organization's network. This experience leverages on a third-party security products' sensor data.
|
||||||
[Run a detection test on a newly onboarded machine](run-detection-test-windows-defender-advanced-threat-protection.md) | Run a script on a newly onboarded machine to verify that it is properly reporting to the Windows Defender ATP service.
|
[Run a detection test on a newly onboarded machine](run-detection-test-windows-defender-advanced-threat-protection.md) | Run a script on a newly onboarded machine to verify that it is properly reporting to the Windows Defender ATP service.
|
||||||
[Configure proxy and Internet settings](configure-proxy-internet-windows-defender-advanced-threat-protection.md)| Enable communication with the Windows Defender ATP cloud service by configuring the proxy and Internet connectivity settings.
|
[Configure proxy and Internet settings](configure-proxy-internet-windows-defender-advanced-threat-protection.md)| Enable communication with the Windows Defender ATP cloud service by configuring the proxy and Internet connectivity settings.
|
||||||
[Troubleshoot onboarding issues](troubleshoot-onboarding-windows-defender-advanced-threat-protection.md) | Learn about resolving issues that might arise during onboarding.
|
[Troubleshoot onboarding issues](troubleshoot-onboarding-windows-defender-advanced-threat-protection.md) | Learn about resolving issues that might arise during onboarding.
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: Windows Defender Advanced Threat Protection portal overview
|
title: Windows Defender Advanced Threat Protection portal overview
|
||||||
description: Use the Windows Defender ATP portal to monitor your enterprise network and assist in responding to alerts to potential advanced persistent threat (APT) activity or data breaches.
|
description: Use Windows Defender Security Center to monitor your enterprise network and assist in responding to alerts to potential advanced persistent threat (APT) activity or data breaches.
|
||||||
keywords: Windows Defender ATP portal, portal, cybersecurity threat intelligence, dashboard, alerts queue, machines list, settings, machine management, advanced attacks
|
keywords: Windows Defender Security Center, portal, cybersecurity threat intelligence, dashboard, alerts queue, machines list, settings, machine management, advanced attacks
|
||||||
search.product: eADQiWindows 10XVcnh
|
search.product: eADQiWindows 10XVcnh
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
@ -27,14 +27,14 @@ ms.date: 04/24/2018
|
|||||||
|
|
||||||
>Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-portaloverview-abovefoldlink)
|
>Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-portaloverview-abovefoldlink)
|
||||||
|
|
||||||
Enterprise security teams can use the Windows Defender ATP portal to monitor and assist in responding to alerts of potential advanced persistent threat (APT) activity or data breaches.
|
Enterprise security teams can use Windows Defender Security Center to monitor and assist in responding to alerts of potential advanced persistent threat (APT) activity or data breaches.
|
||||||
|
|
||||||
You can use the [Windows Defender ATP portal](https://securitycenter.windows.com/) to:
|
You can use [Windows Defender Security Center](https://securitycenter.windows.com/) to:
|
||||||
- View, sort, and triage alerts from your endpoints
|
- View, sort, and triage alerts from your endpoints
|
||||||
- Search for more information on observed indicators such as files and IP Addresses
|
- Search for more information on observed indicators such as files and IP Addresses
|
||||||
- Change Windows Defender ATP settings, including time zone and review licensing information.
|
- Change Windows Defender ATP settings, including time zone and review licensing information.
|
||||||
|
|
||||||
## Windows Defender ATP portal
|
## Windows Defender Security Center
|
||||||
When you open the portal, you’ll see the main areas of the application:
|
When you open the portal, you’ll see the main areas of the application:
|
||||||
|
|
||||||

|

|
||||||
|
@ -35,7 +35,7 @@ You can easily get started by:
|
|||||||
- Creating a dashboard on the Power BI service
|
- Creating a dashboard on the Power BI service
|
||||||
- Building a custom dashboard on Power BI Desktop and tweaking it to fit the visual analytics and reporting requirements of your organization
|
- Building a custom dashboard on Power BI Desktop and tweaking it to fit the visual analytics and reporting requirements of your organization
|
||||||
|
|
||||||
You can access these options from the Windows Defender ATP portal. Both the Power BI service and Power BI Desktop are supported.
|
You can access these options from Windows Defender Security Center. Both the Power BI service and Power BI Desktop are supported.
|
||||||
|
|
||||||
## Create a Windows Defender ATP dashboard on Power BI service
|
## Create a Windows Defender ATP dashboard on Power BI service
|
||||||
Windows Defender ATP makes it easy to create a Power BI dashboard by providing an option straight from the portal.
|
Windows Defender ATP makes it easy to create a Power BI dashboard by providing an option straight from the portal.
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Pull Windows Defender ATP alerts using REST API
|
title: Pull Windows Defender ATP alerts using REST API
|
||||||
description: Pull alerts from the Windows Defender ATP portal REST API.
|
description: Pull alerts from Windows Defender ATP REST API.
|
||||||
keywords: alerts, pull alerts, rest api, request, response
|
keywords: alerts, pull alerts, rest api, request, response
|
||||||
search.product: eADQiWindows 10XVcnh
|
search.product: eADQiWindows 10XVcnh
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Use role-based access control to grant fine-grained access to the Windows Defender ATP portal
|
title: Use role-based access control to grant fine-grained access to Windows Defender Security Center
|
||||||
description: Create roles and groups within your security operations to grant access to the portal.
|
description: Create roles and groups within your security operations to grant access to the portal.
|
||||||
keywords: rbac, role, based, access, control, groups, control, tier, aad
|
keywords: rbac, role, based, access, control, groups, control, tier, aad
|
||||||
search.product: eADQiWindows 10XVcnh
|
search.product: eADQiWindows 10XVcnh
|
||||||
@ -57,12 +57,12 @@ Before using RBAC, it's important that you understand the roles that can grant p
|
|||||||
> [!WARNING]
|
> [!WARNING]
|
||||||
> Before enabling the feature, it's important that you have a Global Administrator role or Security Administrator role in Azure AD and that you have your Azure AD groups ready to reduce the risk of being locked out of the portal.
|
> Before enabling the feature, it's important that you have a Global Administrator role or Security Administrator role in Azure AD and that you have your Azure AD groups ready to reduce the risk of being locked out of the portal.
|
||||||
|
|
||||||
When you first log in to the Windows Defender ATP portal, you're granted either full access or read only access. Full access rights are granted to users with Security Administrator or Global Administrator roles in Azure AD. Read only access is granted to users with a Security Reader role in Azure AD.
|
When you first log in to Windows Defender Security Center, you're granted either full access or read only access. Full access rights are granted to users with Security Administrator or Global Administrator roles in Azure AD. Read only access is granted to users with a Security Reader role in Azure AD.
|
||||||
|
|
||||||
Someone with a Windows Defender ATP Global administrator role has unrestricted access to all machines, regardless of their machine group association and the Azure AD user groups assignments
|
Someone with a Windows Defender ATP Global administrator role has unrestricted access to all machines, regardless of their machine group association and the Azure AD user groups assignments
|
||||||
|
|
||||||
> [!WARNING]
|
> [!WARNING]
|
||||||
> Initially, only those with Azure AD Global Administrator or Security Administrator rights will be able to create and assign roles in the Windows Defender ATP portal, therefore, having the right groups ready in Azure AD is important.
|
> Initially, only those with Azure AD Global Administrator or Security Administrator rights will be able to create and assign roles in Windows Defender Security Center, therefore, having the right groups ready in Azure AD is important.
|
||||||
>
|
>
|
||||||
> **Turning on role-based access control will cause users with read-only permissions (for example, users assigned to Azure AD Security reader role) to lose access until they are assigned to a role.**
|
> **Turning on role-based access control will cause users with read-only permissions (for example, users assigned to Azure AD Security reader role) to lose access until they are assigned to a role.**
|
||||||
>
|
>
|
||||||
|
@ -29,11 +29,11 @@ ms.date: 11/28/2017
|
|||||||
|
|
||||||
This page provides detailed steps to troubleshoot issues that might occur when setting up your Windows Defender ATP service.
|
This page provides detailed steps to troubleshoot issues that might occur when setting up your Windows Defender ATP service.
|
||||||
|
|
||||||
If you receive an error message, the Windows Defender ATP portal will provide a detailed explanation on what the issue is and relevant links will be supplied.
|
If you receive an error message, Windows Defender Security Center will provide a detailed explanation on what the issue is and relevant links will be supplied.
|
||||||
|
|
||||||
## No subscriptions found
|
## No subscriptions found
|
||||||
|
|
||||||
If while accessing the Windows Defender ATP portal you get a **No subscriptions found** message, it means the Azure Active Directory (AAD) used to login the user to the portal, does not have a Windows Defender ATP license.
|
If while accessing Windows Defender Security Center you get a **No subscriptions found** message, it means the Azure Active Directory (AAD) used to login the user to the portal, does not have a Windows Defender ATP license.
|
||||||
|
|
||||||
Potential reasons:
|
Potential reasons:
|
||||||
- The Windows E5 and Office E5 licenses are separate licenses.
|
- The Windows E5 and Office E5 licenses are separate licenses.
|
||||||
@ -48,7 +48,7 @@ For both cases you should contact Microsoft support at [General Windows Defender
|
|||||||
|
|
||||||
## Your subscription has expired
|
## Your subscription has expired
|
||||||
|
|
||||||
If while accessing the Windows Defender ATP portal you get a **Your subscription has expired** message, your online service subscription has expired. Windows Defender ATP subscription, like any other online service subscription, has an expiration date.
|
If while accessing Windows Defender Security Center you get a **Your subscription has expired** message, your online service subscription has expired. Windows Defender ATP subscription, like any other online service subscription, has an expiration date.
|
||||||
|
|
||||||
You can choose to renew or extend the license at any point in time. When accessing the portal after the expiration date a **Your subscription has expired** message will be presented with an option to download the machine offboarding package, should you choose to not renew the license.
|
You can choose to renew or extend the license at any point in time. When accessing the portal after the expiration date a **Your subscription has expired** message will be presented with an option to download the machine offboarding package, should you choose to not renew the license.
|
||||||
|
|
||||||
|
@ -32,7 +32,7 @@ If you encounter a server error when trying to access the service, you’ll need
|
|||||||
Configure your browser to allow cookies.
|
Configure your browser to allow cookies.
|
||||||
|
|
||||||
### Elements or data missing on the portal
|
### Elements or data missing on the portal
|
||||||
If some UI elements or data is missing on the Windows Defender ATP portal it’s possible that proxy settings are blocking it.
|
If some UI elements or data is missing on Windows Defender Security Center it’s possible that proxy settings are blocking it.
|
||||||
|
|
||||||
Make sure that `*.securitycenter.windows.com` is included the proxy whitelist.
|
Make sure that `*.securitycenter.windows.com` is included the proxy whitelist.
|
||||||
|
|
||||||
|
@ -36,7 +36,7 @@ You can use the code examples to guide you in creating calls to the custom threa
|
|||||||
Topic | Description
|
Topic | Description
|
||||||
:---|:---
|
:---|:---
|
||||||
[Understand threat intelligence concepts](threat-indicator-concepts-windows-defender-advanced-threat-protection.md) | Understand the concepts around threat intelligence so that you can effectively create custom intelligence for your organization.
|
[Understand threat intelligence concepts](threat-indicator-concepts-windows-defender-advanced-threat-protection.md) | Understand the concepts around threat intelligence so that you can effectively create custom intelligence for your organization.
|
||||||
[Enable the custom threat intelligence application](enable-custom-ti-windows-defender-advanced-threat-protection.md) | Set up the custom threat intelligence application through the Windows Defender ATP portal so that you can create custom threat intelligence (TI) using REST API.
|
[Enable the custom threat intelligence application](enable-custom-ti-windows-defender-advanced-threat-protection.md) | Set up the custom threat intelligence application through Windows Defender Security Center so that you can create custom threat intelligence (TI) using REST API.
|
||||||
[Create custom threat intelligence alerts](custom-ti-api-windows-defender-advanced-threat-protection.md) | Create custom threat intelligence alerts so that you can generate specific alerts that are applicable to your organization.
|
[Create custom threat intelligence alerts](custom-ti-api-windows-defender-advanced-threat-protection.md) | Create custom threat intelligence alerts so that you can generate specific alerts that are applicable to your organization.
|
||||||
[PowerShell code examples](powershell-example-code-windows-defender-advanced-threat-protection.md) | Use the PowerShell code examples to guide you in using the custom threat intelligence API.
|
[PowerShell code examples](powershell-example-code-windows-defender-advanced-threat-protection.md) | Use the PowerShell code examples to guide you in using the custom threat intelligence API.
|
||||||
[Python code examples](python-example-code-windows-defender-advanced-threat-protection.md) | Use the Python code examples to guide you in using the custom threat intelligence API.
|
[Python code examples](python-example-code-windows-defender-advanced-threat-protection.md) | Use the Python code examples to guide you in using the custom threat intelligence API.
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Use the Windows Defender Advanced Threat Protection portal
|
title: Use the Windows Defender Advanced Threat Protection portal
|
||||||
description: Learn about the features on Windows Defender ATP portal, including how alerts work, and suggestions on how to investigate possible breaches and attacks.
|
description: Learn about the features on Windows Defender Security Center, including how alerts work, and suggestions on how to investigate possible breaches and attacks.
|
||||||
keywords: dashboard, alerts queue, manage alerts, investigation, investigate alerts, investigate machines, submit files, deep analysis, high, medium, low, severity, ioc, ioa
|
keywords: dashboard, alerts queue, manage alerts, investigation, investigate alerts, investigate machines, submit files, deep analysis, high, medium, low, severity, ioc, ioa
|
||||||
search.product: eADQiWindows 10XVcnh
|
search.product: eADQiWindows 10XVcnh
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
@ -27,7 +27,7 @@ ms.date: 03/12/2018
|
|||||||
|
|
||||||
>Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-usewdatp-abovefoldlink)
|
>Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-usewdatp-abovefoldlink)
|
||||||
|
|
||||||
You can use the Windows Defender ATP portal to carry out an end-to-end security breach investigation through the dashboards.
|
You can use Windows Defender Security Center to carry out an end-to-end security breach investigation through the dashboards.
|
||||||
|
|
||||||
Use the **Security operations** dashboard to gain insight on the various alerts on machines and users in your network.
|
Use the **Security operations** dashboard to gain insight on the various alerts on machines and users in your network.
|
||||||
|
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Windows Defender Advanced Threat Protection suite
|
title: Windows Defender Advanced Threat Protection
|
||||||
description: Windows Defender Advanced Threat Protection is an enterprise security suite that helps secops to prevent, detect, investigate, and respond to possible cybersecurity threats related to advanced persistent threats.
|
description: Windows Defender Advanced Threat Protection is an enterprise security platform that helps secops to prevent, detect, investigate, and respond to possible cybersecurity threats related to advanced persistent threats.
|
||||||
keywords: introduction to Windows Defender Advanced Threat Protection, introduction to Windows Defender ATP, cybersecurity, advanced persistent threat, enterprise security, machine behavioral sensor, cloud security, analytics, threat intelligence
|
keywords: introduction to Windows Defender Advanced Threat Protection, introduction to Windows Defender ATP, cybersecurity, advanced persistent threat, enterprise security, machine behavioral sensor, cloud security, analytics, threat intelligence
|
||||||
search.product: eADQiWindows 10XVcnh
|
search.product: eADQiWindows 10XVcnh
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
@ -31,12 +31,12 @@ ms.date: 07/01/2018
|
|||||||
|
|
||||||
Windows Defender Advanced Threat Protection is a platform designed to help enterprise networks prevent, detect, investigate, and respond to advanced threats.
|
Windows Defender Advanced Threat Protection is a platform designed to help enterprise networks prevent, detect, investigate, and respond to advanced threats.
|
||||||
|
|
||||||
To help you maximize the effectiveness of the security platform, you can configure individual capabilities that surface in the Windows Defender ATP portal/Windows Defender Security Center.
|
To help you maximize the effectiveness of the security platform, you can configure individual capabilities that surface in Windows Defender Security Center.
|
||||||
|
|
||||||
The Windows Defender ATP platform is where all the capabilities that are available across multiple products come together to give security operations teams the ability to effectively manage their organization's network.
|
The Windows Defender ATP platform is where all the capabilities that are available across multiple products come together to give security operations teams the ability to effectively manage their organization's network.
|
||||||
|
|
||||||
|
|
||||||
Get a quick, but in-depth overview of Windows Defender ATP for Windows 10 and the new capabilities in Windows 10, version 1703 see [Windows Defender ATP for Windows 10 Creators Update](https://technet.microsoft.com/en-au/windows/mt782787).
|
Get a quick, but in-depth overview of Windows Defender ATP and the new capabilities in Windows 10, version 1703 see [Windows Defender ATP for Windows 10 Creators Update](https://technet.microsoft.com/en-au/windows/mt782787).
|
||||||
|
|
||||||
Windows Defender ATP uses the following combination of technology built into Windows 10 and Microsoft's robust cloud service:
|
Windows Defender ATP uses the following combination of technology built into Windows 10 and Microsoft's robust cloud service:
|
||||||
|
|
||||||
|
@ -27,9 +27,9 @@ Topic | Description
|
|||||||
:---|:---
|
:---|:---
|
||||||
Get started | Learn about the minimum requirements, validate licensing and complete setup, know about preview features, understand data storage and privacy, and how to assign user access to the portal.
|
Get started | Learn about the minimum requirements, validate licensing and complete setup, know about preview features, understand data storage and privacy, and how to assign user access to the portal.
|
||||||
[Onboard machines](onboard-configure-windows-defender-advanced-threat-protection.md) | Learn about onboarding client, server, and non-Windows machines. Learn how to run a detection test, configure proxy and Internet connectivity settings, and how to troubleshoot potential onboarding issues.
|
[Onboard machines](onboard-configure-windows-defender-advanced-threat-protection.md) | Learn about onboarding client, server, and non-Windows machines. Learn how to run a detection test, configure proxy and Internet connectivity settings, and how to troubleshoot potential onboarding issues.
|
||||||
[Understand the Windows Defender ATP portal](use-windows-defender-advanced-threat-protection.md) | Understand the Security operations, Secure Score, and Threat analytics dashboards as well as how to navigate the portal.
|
[Understand the portal](use-windows-defender-advanced-threat-protection.md) | Understand the Security operations, Secure Score, and Threat analytics dashboards as well as how to navigate the portal.
|
||||||
Investigate and remediate threats | Investigate alerts, machines, and take response actions to remediate threats.
|
Investigate and remediate threats | Investigate alerts, machines, and take response actions to remediate threats.
|
||||||
API and SIEM support | Use the supported APIs to pull and create custom alerts, or automate workflows. Use the supported SIEM tools to pull alerts from the Windows Defender ATP portal.
|
API and SIEM support | Use the supported APIs to pull and create custom alerts, or automate workflows. Use the supported SIEM tools to pull alerts from Windows Defender Security Center.
|
||||||
Reporting | Create and build Power BI reports using Windows Defender ATP data.
|
Reporting | Create and build Power BI reports using Windows Defender ATP data.
|
||||||
Check service health and sensor state | Verify that the service is running and check the sensor state on machines.
|
Check service health and sensor state | Verify that the service is running and check the sensor state on machines.
|
||||||
[Configure Windows Defender settings](preferences-setup-windows-defender-advanced-threat-protection.md) | Configure general settings, turn on the preview experience, notifications, and enable other features.
|
[Configure Windows Defender settings](preferences-setup-windows-defender-advanced-threat-protection.md) | Configure general settings, turn on the preview experience, notifications, and enable other features.
|
||||||
|
Reference in New Issue
Block a user