mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-14 06:17:22 +00:00
Merge pull request #3068 from MicrosoftDocs/FromPrivateRepo
From private repo
This commit is contained in:
commit
88f10355e2
@ -11,7 +11,7 @@ manager: dansimp
|
|||||||
audience: ITPro
|
audience: ITPro
|
||||||
ms.collection: M365-security-compliance
|
ms.collection: M365-security-compliance
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 03/15/2019
|
ms.date: 03/25/2019
|
||||||
---
|
---
|
||||||
|
|
||||||
# Create a Windows Information Protection (WIP) policy with MDM using the Azure portal for Microsoft Intune
|
# Create a Windows Information Protection (WIP) policy with MDM using the Azure portal for Microsoft Intune
|
||||||
@ -67,6 +67,9 @@ Before you can create a WIP policy using Intune, you need to configure an MDM or
|
|||||||
- [Recommended apps](#add-recommended-apps)
|
- [Recommended apps](#add-recommended-apps)
|
||||||
- [Store apps](#add-store-apps)
|
- [Store apps](#add-store-apps)
|
||||||
- [Desktop apps](#add-desktop-apps)
|
- [Desktop apps](#add-desktop-apps)
|
||||||
|
|
||||||
|
>[!NOTE]
|
||||||
|
>An application might return access denied errors after removing it from the list of protected apps. Rather than remove it from the list, uninstall and reinstall the application or exempt it from WIP policy.
|
||||||
|
|
||||||
### Add recommended apps
|
### Add recommended apps
|
||||||
|
|
||||||
@ -397,7 +400,7 @@ To define the network boundaries, click **App policy** > the name of your policy
|
|||||||
|
|
||||||

|

|
||||||
|
|
||||||
Select the type of network boundary to add from the **Boundary type** box. Type a name for your boundary into the **Name** box, add your values to the **Value** box, based on the following options, and then click **OK**.
|
Select the type of network boundary to add from the **Boundary type** box. Type a name for your boundary into the **Name** box, add your values to the **Value** box, based on the options covered in the following subsections, and then click **OK**.
|
||||||
|
|
||||||
### Cloud resources
|
### Cloud resources
|
||||||
|
|
||||||
|
@ -13,7 +13,7 @@ manager: dansimp
|
|||||||
audience: ITPro
|
audience: ITPro
|
||||||
ms.collection: M365-security-compliance
|
ms.collection: M365-security-compliance
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 02/26/2019
|
ms.date: 03/25/2019
|
||||||
---
|
---
|
||||||
|
|
||||||
# Recommended Enterprise Cloud Resources and Neutral Resources network settings with Windows Information Protection (WIP)
|
# Recommended Enterprise Cloud Resources and Neutral Resources network settings with Windows Information Protection (WIP)
|
||||||
@ -38,8 +38,15 @@ This table includes the recommended URLs to add to your Enterprise Cloud Resourc
|
|||||||
|Visual Studio Online |contoso.visualstudio.com |
|
|Visual Studio Online |contoso.visualstudio.com |
|
||||||
|Power BI |contoso.powerbi.com |
|
|Power BI |contoso.powerbi.com |
|
||||||
|
|
||||||
>[!NOTE]
|
You can add other work-only apps to the Cloud Resource list, or you can create a packaged app rule for the .exe file to protect every file the app creates or modifies. Depending on how the app is accessed, you might want to add both.
|
||||||
>You can add other work-only apps to the Cloud Resource list, or you can create a packaged app rule for the .exe file to protect every file the app creates or modifies. Depending on how the app is accessed, you might want to add both.
|
|
||||||
|
For Office 365 endpoints, see [Office 365 URLs and IP address ranges](https://docs.microsoft.com/office365/enterprise/urls-and-ip-address-ranges).
|
||||||
|
Office 365 endpoints are updated monthly.
|
||||||
|
Allow the domains listed in section number 46 Allow Required and add also add the apps.
|
||||||
|
Note that apps from officeapps.live.com can also store personal data.
|
||||||
|
|
||||||
|
When multiple files are selected from SharePoint Online or OneDrive, the files are aggregated and the URL can change. In this case, add a entry for a second-level domain and use a wildcard such as .svc.ms.
|
||||||
|
|
||||||
|
|
||||||
## Recommended Neutral Resources
|
## Recommended Neutral Resources
|
||||||
We recommended adding these URLs if you use the Neutral Resources network setting with Windows Information Protection (WIP).
|
We recommended adding these URLs if you use the Neutral Resources network setting with Windows Information Protection (WIP).
|
||||||
|
@ -389,6 +389,7 @@
|
|||||||
#####Rules
|
#####Rules
|
||||||
###### [Manage suppression rules](windows-defender-atp/manage-suppression-rules-windows-defender-advanced-threat-protection.md)
|
###### [Manage suppression rules](windows-defender-atp/manage-suppression-rules-windows-defender-advanced-threat-protection.md)
|
||||||
###### [Manage automation allowed/blocked](windows-defender-atp/manage-automation-allowed-blocked-list-windows-defender-advanced-threat-protection.md)
|
###### [Manage automation allowed/blocked](windows-defender-atp/manage-automation-allowed-blocked-list-windows-defender-advanced-threat-protection.md)
|
||||||
|
###### [Manage allowed/blocked](windows-defender-atp/manage-allowed-blocked-list-windows-defender-advanced-threat-protection.md)
|
||||||
###### [Manage automation file uploads](windows-defender-atp/manage-automation-file-uploads-windows-defender-advanced-threat-protection.md)
|
###### [Manage automation file uploads](windows-defender-atp/manage-automation-file-uploads-windows-defender-advanced-threat-protection.md)
|
||||||
###### [Manage automation folder exclusions](windows-defender-atp/manage-automation-folder-exclusions-windows-defender-advanced-threat-protection.md)
|
###### [Manage automation folder exclusions](windows-defender-atp/manage-automation-folder-exclusions-windows-defender-advanced-threat-protection.md)
|
||||||
|
|
||||||
|
@ -49,4 +49,4 @@ To be eligible for VIA your organization must:
|
|||||||
|
|
||||||
3. Be willing to sign and adhere to the VIA membership agreement.
|
3. Be willing to sign and adhere to the VIA membership agreement.
|
||||||
|
|
||||||
If your organization meets these criteria and is interested in joining, [apply for membership now](https://www.microsoft.com/wdsi/alliances/apply-alliance-membership). If you have questions, [contact us for more information](https://www.microsoft.com/wdsi/alliances/collaboration-inquiry).
|
If your organization meets these criteria and is interested in joining, [apply for membership now](https://www.microsoft.com/en-us/wdsi/alliances/apply-alliance-membership). If you have questions, [contact us for more information](https://www.microsoft.com/en-us/wdsi/alliances/collaboration-inquiry).
|
@ -53,4 +53,4 @@ Your organization must meet the following eligibility requirements to qualify fo
|
|||||||
|
|
||||||
### Apply now
|
### Apply now
|
||||||
|
|
||||||
If your organization meets these criteria and is interested in joining, [apply for membership now](https://www.microsoft.com/wdsi/alliances/apply-alliance-membership). If you have questions, [contact us for more information](https://www.microsoft.com/wdsi/alliances/collaboration-inquiry).
|
If your organization meets these criteria and is interested in joining, [apply for membership now](https://www.microsoft.com/en-us/wdsi/alliances/apply-alliance-membership). If you have questions, [contact us for more information](https://www.microsoft.com/en-us/wdsi/alliances/collaboration-inquiry).
|
||||||
|
@ -376,6 +376,7 @@
|
|||||||
####Rules
|
####Rules
|
||||||
##### [Manage suppression rules](manage-suppression-rules-windows-defender-advanced-threat-protection.md)
|
##### [Manage suppression rules](manage-suppression-rules-windows-defender-advanced-threat-protection.md)
|
||||||
##### [Manage automation allowed/blocked](manage-automation-allowed-blocked-list-windows-defender-advanced-threat-protection.md)
|
##### [Manage automation allowed/blocked](manage-automation-allowed-blocked-list-windows-defender-advanced-threat-protection.md)
|
||||||
|
##### [Manage allowed/blocked](manage-allowed-blocked-list-windows-defender-advanced-threat-protection.md)
|
||||||
##### [Manage automation file uploads](manage-automation-file-uploads-windows-defender-advanced-threat-protection.md)
|
##### [Manage automation file uploads](manage-automation-file-uploads-windows-defender-advanced-threat-protection.md)
|
||||||
##### [Manage automation folder exclusions](manage-automation-folder-exclusions-windows-defender-advanced-threat-protection.md)
|
##### [Manage automation folder exclusions](manage-automation-folder-exclusions-windows-defender-advanced-threat-protection.md)
|
||||||
|
|
||||||
|
@ -15,7 +15,6 @@ manager: dansimp
|
|||||||
audience: ITPro
|
audience: ITPro
|
||||||
ms.collection: M365-security-compliance
|
ms.collection: M365-security-compliance
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
ms.date: 11/16/2018
|
|
||||||
---
|
---
|
||||||
|
|
||||||
# Configure advanced features in Windows Defender ATP
|
# Configure advanced features in Windows Defender ATP
|
||||||
|
@ -0,0 +1,77 @@
|
|||||||
|
---
|
||||||
|
title: Manage allowed/blocked lists
|
||||||
|
description: Create indicators for a file hash, IP address, URLs or domains that define the detection, prevention, and exclusion of entities.
|
||||||
|
keywords: manage, allowed, blocked, whitelist, blacklist, block, clean, malicious, file hash, ip address, urls, domain
|
||||||
|
search.product: eADQiWindows 10XVcnh
|
||||||
|
search.appverid: met150
|
||||||
|
ms.prod: w10
|
||||||
|
ms.mktglfcycl: deploy
|
||||||
|
ms.sitesec: library
|
||||||
|
ms.pagetype: security
|
||||||
|
ms.author: macapara
|
||||||
|
author: mjcaparas
|
||||||
|
ms.localizationpriority: medium
|
||||||
|
manager: dansimp
|
||||||
|
audience: ITPro
|
||||||
|
ms.collection: M365-security-compliance
|
||||||
|
ms.topic: article
|
||||||
|
---
|
||||||
|
|
||||||
|
# Manage allowed/blocked lists
|
||||||
|
|
||||||
|
**Applies to:**
|
||||||
|
- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559)
|
||||||
|
|
||||||
|
[!include[Prerelease information](prerelease.md)]
|
||||||
|
|
||||||
|
>Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-automationexclusionlist-abovefoldlink)
|
||||||
|
|
||||||
|
|
||||||
|
Create indicators that define the detection, prevention, and exclusion of entities. You can define the action to be taken as well as the duration for when to apply the action as well as the scope of the machine group to apply it to.
|
||||||
|
|
||||||
|
On the top navigation you can:
|
||||||
|
- Import a list
|
||||||
|
- Add an indicator
|
||||||
|
- Customize columns to add or remove columns
|
||||||
|
- Export the entire list in CSV format
|
||||||
|
- Select the items to show per page
|
||||||
|
- Navigate between pages
|
||||||
|
- Apply filters
|
||||||
|
|
||||||
|
## Create an indicator
|
||||||
|
1. In the navigation pane, select **Settings** > **Allowed/blocked list**.
|
||||||
|
|
||||||
|
2. Select the tab of the type of entity you'd like to create an indicator for. You can choose any of the following entities:
|
||||||
|
- File hash
|
||||||
|
- IP address
|
||||||
|
- URLs/Domains
|
||||||
|
|
||||||
|
3. Click **Add indicator**.
|
||||||
|
|
||||||
|
4. For each attribute specify the following details:
|
||||||
|
- Indicator - Specify the entity details and define the expiration of the indicator.
|
||||||
|
- Action - Specify the action to be taken and provide a description.
|
||||||
|
- Scope - Define the scope of the machine group.
|
||||||
|
|
||||||
|
5. Review the details in the Summary tab, then click **Save**.
|
||||||
|
|
||||||
|
## Manage indicators
|
||||||
|
1. In the navigation pane, select **Settings** > **Allowed/blocked list**.
|
||||||
|
|
||||||
|
2. Select the tab of the entity type you'd like to manage.
|
||||||
|
|
||||||
|
3. Update the details of the indicator and click **Save** or click the **Delete** button if you'd like to remove the entity from the list.
|
||||||
|
|
||||||
|
## Import a list
|
||||||
|
You can also choose to upload a CSV file that defines the attributes of indicators, the action to be taken, and other details.
|
||||||
|
|
||||||
|
Download the sample CSV to know the supported column attributes.
|
||||||
|
|
||||||
|
|
||||||
|
## Related topics
|
||||||
|
- [Manage automation allowed/blocked lists](manage-automation-allowed-blocked-list-windows-defender-advanced-threat-protection.md)
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
@ -66,7 +66,7 @@ Review the following details to verify minimum system requirements:
|
|||||||
|
|
||||||
- Install either [.NET framework 4.5](https://www.microsoft.com/en-us/download/details.aspx?id=30653) (or later) or [KB3154518](https://support.microsoft.com/help/3154518/support-for-tls-system-default-versions-included-in-the-net-framework)
|
- Install either [.NET framework 4.5](https://www.microsoft.com/en-us/download/details.aspx?id=30653) (or later) or [KB3154518](https://support.microsoft.com/help/3154518/support-for-tls-system-default-versions-included-in-the-net-framework)
|
||||||
|
|
||||||
>[NOTE]
|
>[!NOTE]
|
||||||
>Only applicable for Windows 7 SP1 Enterprise and Windows 7 SP1 Pro.
|
>Only applicable for Windows 7 SP1 Enterprise and Windows 7 SP1 Pro.
|
||||||
>Don't install .NET framework 4.0.x, since it will negate the above installation.
|
>Don't install .NET framework 4.0.x, since it will negate the above installation.
|
||||||
|
|
||||||
|
Loading…
x
Reference in New Issue
Block a user