diff --git a/windows/security/threat-protection/microsoft-defender-atp/deployment-phases.md b/windows/security/threat-protection/microsoft-defender-atp/deployment-phases.md index 2e7b70aab7..684a434a83 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/deployment-phases.md +++ b/windows/security/threat-protection/microsoft-defender-atp/deployment-phases.md @@ -29,23 +29,29 @@ ms.topic: article Learn how to deploy Microsoft Defender for Endpoint so that your enterprise can take advantage of preventative protection, post-breach detection, automated investigation, and response. -This solution provides guidance on the three phases of deployment. The deployment guide will guide you through the recommended path in deploying Defender for Endpoint. +This solution provides guidance on the three phases of deployment. Each section corresponds to a separate article in this solution. +![Image of deployment phases](images/deployment-phases.png) -|Phase | Description | -|:-------|:-----| -| ![Phase 1: Prepare](images/prepare.png)
[Phase 1: Prepare](prepare-deployment.md)| Learn about what you need to consider when deploying Defender for Endpoint:

- Stakeholders and approvals
- Environment considerations
- Access
- Adoption order -| ![Phase 2: Setup](images/setup.png)
[Phase 2: Setup](production-deployment.md)| Take the initial steps to access Microsoft Defender Security Center. You'll be guided on:

- Validating the licensing
- Completing the setup wizard within the portal
- Network configuration| -| ![Phase 3: Onboard](images/onboard.png)
[Phase 3: Onboard](onboarding.md) | Onboard devices to the service so the Microsoft Defender ATP service can get sensor data from them. - - - - -If you're unfamiliar with the general deployment planning steps, check out the [Plan deployment](deployment-strategy.md) guidance to get a high-level overview of the general deployment steps and methods. +Regardless of the environment architecture and method of deployment you choose outlined in the [Plan deployment](deployment-strategy.md) guidance, this guide is going to support you in onboarding endpoints. -## In Scope + +## Prepare +Learn about what you need to consider when deploying Defender for Endpoint such as stakeholder approvals, environment considerations, access permissions, and adoption order of capabilities. + +## Setup +Get guidance on the initial steps you need to take so that you can access the portal such as validating licensing, completing the setup wizard, and network configuration. + +## Onboard +Learn how to make use of deployment rings, supported onboarding tools based on the type of endpoint, and configuring available capabilities. + + +## Scope + + +### In Scope The following guidance is in scope for this deployment guide: @@ -61,10 +67,17 @@ The following guidance is in scope for this deployment guide: - Attack surface reduction -## Out of scope +### Out of scope The following are out of scope of this deployment guide: - Configuration of third-party solutions that might integrate with Defender for Endpoint - Penetration testing in production environment + + +## See also +- [Phase 1: Prepare](prepare-deployment.md) +- [Phase 2: Set up](production-deployment.md) +- [Phase 3: Onboard](onboarding.md) +- [Plan deployment](deployment-strategy.md) \ No newline at end of file diff --git a/windows/security/threat-protection/microsoft-defender-atp/images/deployment-phases.png b/windows/security/threat-protection/microsoft-defender-atp/images/deployment-phases.png new file mode 100644 index 0000000000..0875ace467 Binary files /dev/null and b/windows/security/threat-protection/microsoft-defender-atp/images/deployment-phases.png differ