updated-4620497

updated
This commit is contained in:
Lovina Saldanha 2020-12-15 22:21:52 +05:30
parent bdb469bf04
commit 7dbd48b899
26 changed files with 56 additions and 48 deletions

View File

@ -24,6 +24,10 @@ ms.topic: conceptual
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
**Applies to:**
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631)
- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)
This topic describes deploying Defender for Endpoint for iOS on Intune Company Portal enrolled devices. For more information about Intune device enrollment, see [Enroll iOS/iPadOS devices in Intune](https://docs.microsoft.com/mem/intune/enrollment/ios-enroll). This topic describes deploying Defender for Endpoint for iOS on Intune Company Portal enrolled devices. For more information about Intune device enrollment, see [Enroll iOS/iPadOS devices in Intune](https://docs.microsoft.com/mem/intune/enrollment/ios-enroll).
## Before you begin ## Before you begin

View File

@ -23,8 +23,8 @@ ms.topic: conceptual
# Privacy information - Microsoft Defender for Endpoint for iOS # Privacy information - Microsoft Defender for Endpoint for iOS
**Applies to:** **Applies to:**
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631)
- [Microsoft Defender for Endpoint](microsoft-defender-atp-ios.md) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)
> [!NOTE] > [!NOTE]
> Defender for Endpoint for iOS uses a VPN to provide the Web Protection feature. This is not a regular VPN and is a local or self-looping VPN that does not take traffic outside the device. **Microsoft or your organization, does not see your browsing activity.** > Defender for Endpoint for iOS uses a VPN to provide the Web Protection feature. This is not a regular VPN and is a local or self-looping VPN that does not take traffic outside the device. **Microsoft or your organization, does not see your browsing activity.**

View File

@ -25,6 +25,10 @@ hideEdit: true
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
**Applies to:**
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631)
- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)
## MICROSOFT APPLICATION LICENSE TERMS: MICROSOFT DEFENDER FOR ENDPOINT ## MICROSOFT APPLICATION LICENSE TERMS: MICROSOFT DEFENDER FOR ENDPOINT

View File

@ -21,7 +21,9 @@ ms.topic: article
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) **Applies to:**
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631)
- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)
- Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) - Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink)

View File

@ -25,8 +25,8 @@ ms.topic: conceptual
**Applies to:** **Applies to:**
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631)
- [Microsoft Defender for Endpoint for Linux](microsoft-defender-atp-linux.md) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)
This article provides information on how to define exclusions that apply to on-demand scans, and real-time protection and monitoring. This article provides information on how to define exclusions that apply to on-demand scans, and real-time protection and monitoring.

View File

@ -26,8 +26,8 @@ ms.topic: conceptual
**Applies to:** **Applies to:**
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631)
- [Microsoft Defender for Endpoint for Linux](microsoft-defender-atp-linux.md) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)
This article describes how to deploy Microsoft Defender for Endpoint for Linux manually. A successful deployment requires the completion of all of the following tasks: This article describes how to deploy Microsoft Defender for Endpoint for Linux manually. A successful deployment requires the completion of all of the following tasks:

View File

@ -26,8 +26,8 @@ ms.topic: conceptual
**Applies to:** **Applies to:**
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631)
- [Microsoft Defender for Endpoint for Linux](microsoft-defender-atp-linux.md) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)
This article describes how to deploy Defender for Endpoint for Linux using Ansible. A successful deployment requires the completion of all of the following tasks: This article describes how to deploy Defender for Endpoint for Linux using Ansible. A successful deployment requires the completion of all of the following tasks:

View File

@ -26,8 +26,8 @@ ms.topic: conceptual
**Applies to:** **Applies to:**
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631)
- [Microsoft Defender for Endpoint for Linux](microsoft-defender-atp-linux.md) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)
This article describes how to deploy Defender for Endpoint for Linux using Puppet. A successful deployment requires the completion of all of the following tasks: This article describes how to deploy Defender for Endpoint for Linux using Puppet. A successful deployment requires the completion of all of the following tasks:

View File

@ -26,8 +26,8 @@ ms.topic: conceptual
**Applies to:** **Applies to:**
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631)
- [Microsoft Defender for Endpoint for Linux](microsoft-defender-atp-linux.md) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)
>[!IMPORTANT] >[!IMPORTANT]
>This topic contains instructions for how to set preferences for Defender for Endpoint for Linux in enterprise environments. If you are interested in configuring the product on a device from the command-line, see [Resources](linux-resources.md#configure-from-the-command-line). >This topic contains instructions for how to set preferences for Defender for Endpoint for Linux in enterprise environments. If you are interested in configuring the product on a device from the command-line, see [Resources](linux-resources.md#configure-from-the-command-line).

View File

@ -23,8 +23,8 @@ ms.topic: conceptual
**Applies to:** **Applies to:**
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631)
- [Microsoft Defender for Endpoint](microsoft-defender-atp-linux.md) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)
Microsoft is committed to providing you with the information and controls you need to make choices about how your data is collected and used when youre using Defender for Endpoint for Linux. Microsoft is committed to providing you with the information and controls you need to make choices about how your data is collected and used when youre using Defender for Endpoint for Linux.

View File

@ -25,8 +25,8 @@ ms.topic: conceptual
**Applies to:** **Applies to:**
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631)
- [Microsoft Defender for Endpoint for Linux](microsoft-defender-atp-linux.md) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)
The potentially unwanted application (PUA) protection feature in Defender for Endpoint for Linux can detect and block PUA files on endpoints in your network. The potentially unwanted application (PUA) protection feature in Defender for Endpoint for Linux can detect and block PUA files on endpoints in your network.

View File

@ -26,8 +26,8 @@ ms.topic: conceptual
**Applies to:** **Applies to:**
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631)
- [Microsoft Defender for Endpoint for Linux](microsoft-defender-atp-linux.md) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)
## Collect diagnostic information ## Collect diagnostic information

View File

@ -26,8 +26,8 @@ ms.topic: conceptual
**Applies to:** **Applies to:**
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631)
- [Microsoft Defender for Endpoint for Linux](microsoft-defender-atp-linux.md) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)
Microsoft Defender ATP can discover a proxy server using the ```HTTPS_PROXY``` environment variable. This setting must be configured **both** at installation time and after the product has been installed. Microsoft Defender ATP can discover a proxy server using the ```HTTPS_PROXY``` environment variable. This setting must be configured **both** at installation time and after the product has been installed.

View File

@ -26,8 +26,8 @@ ms.topic: conceptual
**Applies to:** **Applies to:**
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631)
- [Microsoft Defender for Endpoint for Linux](microsoft-defender-atp-linux.md) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)
## Run the connectivity test ## Run the connectivity test

View File

@ -26,8 +26,8 @@ ms.topic: conceptual
**Applies to:** **Applies to:**
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631)
- [Microsoft Defender for Endpoint for Linux](microsoft-defender-atp-linux.md) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)
## Verify if installation succeeded ## Verify if installation succeeded

View File

@ -25,8 +25,8 @@ ms.topic: conceptual
**Applies to:** **Applies to:**
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631)
- [Microsoft Defender for Endpoint for Linux](microsoft-defender-atp-linux.md) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)
This article provides some general steps that can be used to narrow down performance issues related to Defender for Endpoint for Linux. This article provides some general steps that can be used to narrow down performance issues related to Defender for Endpoint for Linux.

View File

@ -26,8 +26,8 @@ ms.topic: conceptual
**Applies to:** **Applies to:**
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631)
- [Microsoft Defender for Endpoint for Linux](microsoft-defender-atp-linux.md) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)
Microsoft regularly publishes software updates to improve performance, security, and to deliver new features. Microsoft regularly publishes software updates to improve performance, security, and to deliver new features.

View File

@ -23,7 +23,8 @@ ms.topic: article
**Applies to:** **Applies to:**
- [Microsoft Defender for Endpoint](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631)
- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)
Learn about common commands used in live response and see examples on how they are typically used. Learn about common commands used in live response and see examples on how they are typically used.

View File

@ -21,10 +21,9 @@ ms.topic: article
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
**Applies to:** **Applies to:**
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631)
- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)
Live response gives security operations teams instantaneous access to a device (also referred to as a machine) using a remote shell connection. This gives you the power to do in-depth investigative work and take immediate response actions to promptly contain identified threats—in real time. Live response gives security operations teams instantaneous access to a device (also referred to as a machine) using a remote shell connection. This gives you the power to do in-depth investigative work and take immediate response actions to promptly contain identified threats—in real time.

View File

@ -25,8 +25,8 @@ ms.topic: conceptual
**Applies to:** **Applies to:**
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631)
- [Microsoft Defender for Endpoint for Mac](microsoft-defender-atp-mac.md) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)
This article provides information on how to define exclusions that apply to on-demand scans, and real-time protection and monitoring. This article provides information on how to define exclusions that apply to on-demand scans, and real-time protection and monitoring.

View File

@ -23,10 +23,9 @@ ms.topic: conceptual
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
**Applies to:** **Applies to:**
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631)
- [Microsoft Defender for Endpoint for Mac](microsoft-defender-atp-mac.md) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)
1. Enter your credentials. 1. Enter your credentials.

View File

@ -25,8 +25,8 @@ ms.topic: conceptual
**Applies to:** **Applies to:**
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631)
- [Microsoft Defender for Endpoint for macOS](microsoft-defender-atp-mac.md) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)
This topic describes how to deploy Microsoft Defender for Endpoint for macOS manually. A successful deployment requires the completion of all of the following steps: This topic describes how to deploy Microsoft Defender for Endpoint for macOS manually. A successful deployment requires the completion of all of the following steps:
- [Download installation and onboarding packages](#download-installation-and-onboarding-packages) - [Download installation and onboarding packages](#download-installation-and-onboarding-packages)

View File

@ -25,8 +25,8 @@ ms.topic: conceptual
**Applies to:** **Applies to:**
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631)
- [Microsoft Defender for Endpoint for Mac](microsoft-defender-atp-mac.md) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)
Learn how to deploy Microsoft Defender for Endpoint for macOS with Jamf Pro. Learn how to deploy Microsoft Defender for Endpoint for macOS with Jamf Pro.

View File

@ -25,8 +25,8 @@ ms.topic: conceptual
**Applies to:** **Applies to:**
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631)
- [Microsoft Defender for Endpoint for Mac](microsoft-defender-atp-mac.md) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)
## Prerequisites and system requirements ## Prerequisites and system requirements

View File

@ -23,10 +23,9 @@ ms.topic: conceptual
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
**Applies to:** **Applies to:**
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631)
- [Microsoft Defender for Endpoint for Mac](microsoft-defender-atp-mac.md) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)
Set up the device groups similar to Group policy organizational unite (OUs), Microsoft Endpoint Configuration Manager's device collection, and Intune's device groups. Set up the device groups similar to Group policy organizational unite (OUs), Microsoft Endpoint Configuration Manager's device collection, and Intune's device groups.

View File

@ -25,8 +25,8 @@ ms.topic: conceptual
**Applies to:** **Applies to:**
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631)
- [Microsoft Defender for Endpoint for Mac](microsoft-defender-atp-mac.md) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)
## Enroll macOS devices ## Enroll macOS devices