update based on ui

This commit is contained in:
Joey Caparas
2017-08-09 15:26:16 -07:00
parent 2c41214734
commit 8f390b4580

View File

@ -21,7 +21,7 @@ localizationpriority: high
- Windows 10 Pro Education
- Windows Defender Advanced Threat Protection (Windows Defender ATP)
Windows Defender Security Center provides a centralized security operations experience for Windows as well as non-Windows platforms. You'll be able to see alerts from various supported operating systems (OS) in Windows Defender Security Center and better protect your organization's network. This experience leverages on a 3rd-party security products sensor data.
Windows Defender Security Center provides a centralized security operations experience for Windows as well as non-Windows platforms. You'll be able to see alerts from various supported operating systems (OS) in Windows Defender Security Center and better protect your organization's network. This experience leverages on a third-party security products sensor data.
### Supported non-Windows endpoints
Windows Defender Security Center supports the following non-Windows endpoints:
@ -29,28 +29,28 @@ Windows Defender Security Center supports the following non-Windows endpoints:
- Mac OS (DAN, ARE THERE SPECIFIC VERSIONS THAT WE SUPPORT?)
- Linux (DAN, ARE THERE SPECIFIC VERSIONS THAT WE SUPPORT?)
### Pre-requisites
The endpoints need to be running Bitdefender [ANY REQUIRED VERSION?]
## Onboard non-Windows endpoints
1. In Windows Defender Security Center portal, select the **Endpoint management** > **Non-Windows endpoint management**.
1. In Windows Defender Security Center portal, select **Endpoint management** > **Clients** > **Non-Windows endpoints**. Make sure the third-party solution is listed.
2. Make sure the 3rd-party solution is listed.
2. Toggle the Bitdefender switch button to turn on the third-party solution integration.
3. Toggle the switch button to turn on the 3rd party solution integration.[LOOKED AT SECURITYCENTER.WINDOWS.COM AND SAW THE TOGGLE - MIGHT CHANGE.]
3. Click **Generate access token** button and then **Copy**.
4. Click **Generate access token** button and then **Copy**.
5. Depending on the 3rd-party implementation you're using, the implementation might vary. Refer to the 3rd-party solution documentation for guidance on how to use the token.
4. Depending on the third-party implementation you're using, the implementation might vary. Refer to the third-party solution documentation for guidance on how to use the token.
>[!WARNING]
> The access token is only displayed once. Make sure you keep a copy of it in a safe place. If needed, regenerate the token close to the time you need to share it with the 3rd-party solution.
> The access token is only displayed once. Make sure you keep a copy of it in a safe place. If needed, regenerate the token close to the time you need to share it with the third-party solution.
## Offboard non-Windows endpoints
To effectively offboard the endpoints from the service, you'll need to disable the data push on the 3rd-party portal then switch the toggle to off in Windows Defender Security Center to block the data inbound flow.
To effectively offboard the endpoints from the service, you'll need to disable the data push on the third-party portal then switch the toggle to off in Windows Defender Security Center to block the data inbound flow.
1. Follow the 3rd party documentation to opt-out on the 3rd party service side.
1. Follow the third-party documentation to opt-out on the third-party service side.
2. In Windows Defender Security Center portal, select **Endpoint management**> **Non-Windows endpoint management**.
3. Toggle the switch button to turn off the 3rd party solution integration.
3. Toggle the switch button to turn off the third-party solution integration.