mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-13 13:57:22 +00:00
Merge remote-tracking branch 'refs/remotes/origin/master' into rs2
This commit is contained in:
commit
8f6f97e34e
@ -84,7 +84,9 @@ For security reasons, the package used to offboard endpoints will expire 30 days
|
||||
|
||||
a. Click **Endpoint Management** on the **Navigation pane**.
|
||||
|
||||
b. Under **Endpoint offboarding** section, select **Group Policy**, click **Download package** and save the .zip file.
|
||||
b. Click the **Endpoint offboarding** section.
|
||||
|
||||
c. Select **Group Policy**, click **Download package** and save the .zip file.
|
||||
|
||||
2. Extract the contents of the .zip file to a shared, read-only location that can be accessed by the endpoints. You should have a file named *WindowsDefenderATPOffboardingScript_valid_until_YYYY-MM-DD.cmd*.
|
||||
|
||||
|
@ -108,7 +108,9 @@ For security reasons, the package used to offboard endpoints will expire 30 days
|
||||
|
||||
a. Click **Endpoint Management** on the **Navigation pane**.
|
||||
|
||||
b. Under **Endpoint offboarding** section, select **Mobile Device Management /Microsoft Intune**, click **Download package** and save the .zip file.
|
||||
b. Click the **Endpoint offboarding** section.
|
||||
|
||||
c. Select **Mobile Device Management /Microsoft Intune**, click **Download package** and save the .zip file.
|
||||
|
||||
2. Extract the contents of the .zip file to a shared, read-only location that can be accessed by the network administrators who will deploy the package. You should have a file named *WindowsDefenderATP_valid_until_YYYY-MM-DD.offboarding*.
|
||||
|
||||
|
@ -88,7 +88,9 @@ For security reasons, the package used to offboard endpoints will expire 30 days
|
||||
|
||||
a. Click **Endpoint Management** on the **Navigation pane**.
|
||||
|
||||
b. Under **Endpoint offboarding** section, select **System Center Configuration Manager System Center Configuration Manager 2012/2012 R2/1511/1602**, click **Download package**, and save the .zip file.
|
||||
b. Click the **Endpoint offboarding** section.
|
||||
|
||||
c. Select **System Center Configuration Manager System Center Configuration Manager 2012/2012 R2/1511/1602**, click **Download package**, and save the .zip file.
|
||||
|
||||
2. Extract the contents of the .zip file to a shared, read-only location that can be accessed by the network administrators who will deploy the package. You should have a file named *WindowsDefenderATPOffboardingScript_valid_until_YYYY-MM-DD.cmd*.
|
||||
|
||||
|
@ -78,7 +78,9 @@ For security reasons, the package used to offboard endpoints will expire 30 days
|
||||
|
||||
a. Click **Endpoint Management** on the **Navigation pane**.
|
||||
|
||||
b. Under **Endpoint offboarding** section, select **Group Policy**, click **Download package** and save the .zip file.
|
||||
b. Click the **Endpoint offboarding** section.
|
||||
|
||||
c. Select **Group Policy**, click **Download package** and save the .zip file.
|
||||
|
||||
2. Extract the contents of the .zip file to a shared, read-only location that can be accessed by the endpoints. You should have a file named *WindowsDefenderATPOffboardingScript_valid_until_YYYY-MM-DD.cmd*.
|
||||
|
||||
|
Binary file not shown.
Before Width: | Height: | Size: 49 KiB After Width: | Height: | Size: 38 KiB |
@ -229,22 +229,21 @@ If the verification fails and your environment is using a proxy to connect to th
|
||||
|
||||
**Solution**: If your endpoints are running a third-party antimalware client, the Windows Defender ATP agent needs the Windows Defender Early Launch Antimalware (ELAM) driver to be enabled. You must ensure that it's not disabled in system policy.
|
||||
|
||||
- Depending on the tool that you use to implement policies, you'll need to verify that the following Windows Defender policies are set to ```0``` or that the settings are cleared:
|
||||
- Depending on the tool that you use to implement policies, you'll need to verify that the following Windows Defender policies are cleared:
|
||||
|
||||
- ```DisableAntiSpyware```
|
||||
- ```DisableAntiVirus```
|
||||
- DisableAntiSpyware
|
||||
- DisableAntiVirus
|
||||
|
||||
For example, in Group Policy:
|
||||
For example, in Group Policy there should be no entries such as the following values:
|
||||
|
||||
```<Key Path="SOFTWARE\Policies\Microsoft\Windows Defender"><KeyValue Value="0" ValueKind="DWord" Name="DisableAntiSpyware"/></Key>
|
||||
```
|
||||
- ```<Key Path="SOFTWARE\Policies\Microsoft\Windows Defender"><KeyValue Value="0" ValueKind="DWord" Name="DisableAntiSpyware"/></Key>```
|
||||
- ```<Key Path="SOFTWARE\Policies\Microsoft\Windows Defender"><KeyValue Value="0" ValueKind="DWord" Name="DisableAntiSpyware"/></Key>```
|
||||
- After clearing the policy, run the onboarding steps again on the endpoint.
|
||||
|
||||
- You can also check the following registry key values to verify that the policy is disabled:
|
||||
|
||||
1. Open the registry ```key HKEY_LOCAL_MACHINE\ SOFTWARE\Policies\Microsoft\Windows Defender```.
|
||||
2. Find the value ```DisableAntiSpyware```.
|
||||
3. Ensure that the value is set to 0.
|
||||
1. Open the registry ```key HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender```.
|
||||
2. Ensure that the value ```DisableAntiSpyware``` is not present.
|
||||
|
||||

|
||||
|
||||
|
Loading…
x
Reference in New Issue
Block a user