mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-16 15:27:22 +00:00
Merge branch 'master' of https://cpubwin.visualstudio.com/_git/it-client into autopilot
This commit is contained in:
commit
9696e8abe2
@ -2672,6 +2672,7 @@ The following list shows the configuration service providers supported in Window
|
||||
| Configuration service provider | Windows Holographic edition | Windows Holographic for Business edition |
|
||||
|--------|--------|------------|
|
||||
| [AccountManagement CSP](accountmanagement-csp.md) |  | 4 |
|
||||
| [Accounts CSP](accounts-csp) |  | 
|
||||
| [AppLocker CSP](applocker-csp.md) |  |  |
|
||||
| [AssignedAccess CSP](assignedaccess-csp.md) |  | 4 |
|
||||
| [CertificateStore CSP](certificatestore-csp.md) |  | |
|
||||
|
@ -49,6 +49,7 @@ For details about Microsoft mobile device management protocols for Windows 10 s
|
||||
- [<a href="" id="kerberos"></a>Requirements to note for VPN certificates also used for Kerberos Authentication](#a-href%22%22-id%22kerberos%22arequirements-to-note-for-vpn-certificates-also-used-for-kerberos-authentication)
|
||||
- [<a href="" id="pushbuttonreset"></a>Device management agent for the push-button reset is not working](#a-href%22%22-id%22pushbuttonreset%22adevice-management-agent-for-the-push-button-reset-is-not-working)
|
||||
- [Change history in MDM documentation](#change-history-in-mdm-documentation)
|
||||
- [February 2019](#february-2019)
|
||||
- [January 2019](#january-2019)
|
||||
- [December 2018](#december-2018)
|
||||
- [September 2018](#september-2018)
|
||||
@ -1778,6 +1779,12 @@ The DM agent for [push-button reset](https://msdn.microsoft.com/windows/hardware
|
||||
|
||||
## Change history in MDM documentation
|
||||
|
||||
### February 2019
|
||||
|
||||
|New or updated topic | Description|
|
||||
|--- | ---|
|
||||
|[Policy CSP](policy-configuration-service-provider.md)|Updated supported policies for Holographic.|
|
||||
|
||||
### January 2019
|
||||
|
||||
|New or updated topic | Description|
|
||||
|
@ -7,7 +7,7 @@ ms.topic: article
|
||||
ms.prod: w10
|
||||
ms.technology: windows
|
||||
author: MariciaAlforque
|
||||
ms.date: 08/24/2018
|
||||
ms.date: 03/01/2019
|
||||
---
|
||||
|
||||
# Policy CSP
|
||||
@ -4992,9 +4992,11 @@ The following diagram shows the Policy configuration service provider in tree fo
|
||||
- [ApplicationManagement/AllowAppStoreAutoUpdate](#applicationmanagement-allowappstoreautoupdate)
|
||||
- [ApplicationManagement/AllowDeveloperUnlock](#applicationmanagement-allowdeveloperunlock)
|
||||
- [Authentication/AllowFastReconnect](#authentication-allowfastreconnect)
|
||||
- [Authentication/PreferredAadTenantDomainName](#authentication-preferredaadtenantdomainname)
|
||||
- [Bluetooth/AllowAdvertising](#bluetooth-allowadvertising)
|
||||
- [Bluetooth/AllowDiscoverableMode](#bluetooth-allowdiscoverablemode)
|
||||
- [Bluetooth/LocalDeviceName](#bluetooth-localdevicename)
|
||||
- [Bluetooth/LocalDeviceName](#bluetooth-localdevicename)
|
||||
- [Browser/AllowAutofill](#browser-allowautofill)
|
||||
- [Browser/AllowCookies](#browser-allowcookies)
|
||||
- [Browser/AllowDoNotTrack](#browser-allowdonottrack)
|
||||
- [Browser/AllowPasswordManager](#browser-allowpasswordmanager)
|
||||
@ -5002,8 +5004,9 @@ The following diagram shows the Policy configuration service provider in tree fo
|
||||
- [Browser/AllowSearchSuggestionsinAddressBar](#browser-allowsearchsuggestionsinaddressbar)
|
||||
- [Browser/AllowSmartScreen](#browser-allowsmartscreen)
|
||||
- [Connectivity/AllowBluetooth](#connectivity-allowbluetooth)
|
||||
- [Connectivity/AllowUSBConnection](#connectivity-allowusbconnection)
|
||||
- [DeviceLock/AllowIdleReturnWithoutPassword](#devicelock-allowidlereturnwithoutpassword)
|
||||
- [DeviceLock/AllowSimpleDevicePassword](#devicelock-allowsimpledevicepassword)
|
||||
- [DeviceLock/AllowSimpleDevicePassword](#devicelock-allowsimpledevicepassword)
|
||||
- [DeviceLock/AlphanumericDevicePasswordRequired](#devicelock-alphanumericdevicepasswordrequired)
|
||||
- [DeviceLock/DevicePasswordEnabled](#devicelock-devicepasswordenabled)
|
||||
- [DeviceLock/DevicePasswordHistory](#devicelock-devicepasswordhistory)
|
||||
@ -5012,22 +5015,71 @@ The following diagram shows the Policy configuration service provider in tree fo
|
||||
- [DeviceLock/MinDevicePasswordComplexCharacters](#devicelock-mindevicepasswordcomplexcharacters)
|
||||
- [DeviceLock/MinDevicePasswordLength](#devicelock-mindevicepasswordlength)
|
||||
- [Experience/AllowCortana](#experience-allowcortana)
|
||||
- [Experience/AllowManualMDMUnenrollment](#experience-allowmanualmdmunenrollment)
|
||||
- [Privacy/AllowInputPersonalization](#privacy-allowinputpersonalization)
|
||||
- [Search/AllowSearchToUseLocation](#search-allowsearchtouselocation)
|
||||
- [Security/RequireDeviceEncryption](#security-requiredeviceencryption)
|
||||
- [Settings/AllowDateTime](#settings-allowdatetime)
|
||||
- [Settings/AllowVPN](#settings-allowvpn)
|
||||
- [Settings/AllowVPN](#settings-allowvpn)
|
||||
- [Speech/AllowSpeechModelUpdate](#speech-allowspeechmodelupdate)
|
||||
- [System/AllowLocation](#system-allowlocation)
|
||||
- [System/AllowTelemetry](#system-allowtelemetry)
|
||||
- [Update/AllowAutoUpdate](#update-allowautoupdate)
|
||||
- [Update/AllowUpdateService](#update-allowupdateservice)
|
||||
- [Update/RequireDeferUpgrade](#update-requiredeferupgrade)
|
||||
- [Update/RequireUpdateApproval](#update-requireupdateapproval)
|
||||
- [Update/UpdateServiceUrl](#update-updateserviceurl)
|
||||
<!--EndHoloLens-->
|
||||
- [Update/RequireUpdateApproval](#update-requireupdateapproval)
|
||||
- [Update/ScheduledInstallDay](#update-scheduledinstallday)
|
||||
- [Update/ScheduledInstallTime](#update-scheduledinstalltime)
|
||||
- [Update/UpdateServiceUrl](#update-updateserviceurl)
|
||||
- [Wifi/AllowManualWiFiConfiguration](policy-csp-wifi#wifi-allowmanualwificonfiguration)
|
||||
|
||||
|
||||
## <a href="" id="hololenspolicies"></a>Policies supported by Windows Holographic
|
||||
|
||||
- [Accounts/AllowMicrosoftAccountConnection](#accounts-allowmicrosoftaccountconnection)
|
||||
- [ApplicationManagement/AllowAppStoreAutoUpdate](#applicationmanagement-allowappstoreautoupdate)
|
||||
- [ApplicationManagement/AllowDeveloperUnlock](#applicationmanagement-allowdeveloperunlock)
|
||||
- [ApplicationManagement/AllowAllTrustedApps](#applicationmanagement-allowalltrustedapps)
|
||||
- [Authentication/AllowFastReconnect](#authentication-allowfastreconnect)
|
||||
- [Bluetooth/AllowAdvertising](#bluetooth-allowadvertising)
|
||||
- [Bluetooth/AllowDiscoverableMode](#bluetooth-allowdiscoverablemode)
|
||||
- [Bluetooth/LocalDeviceName](#bluetooth-localdevicename)
|
||||
- [Browser/AllowDoNotTrack](#browser-allowdonottrack)
|
||||
- [Browser/AllowPasswordManager](#browser-allowpasswordmanager)
|
||||
- [Browser/AllowPopups](#browser-allowpopups)
|
||||
- [Browser/AllowSearchSuggestionsinAddressBar](#browser-allowsearchsuggestionsinaddressbar)
|
||||
- [Browser/AllowSmartScreen](#browser-allowsmartscreen)
|
||||
- [Browser/AllowCookies](#browser-allowcookies)
|
||||
- [Connectivity/AllowBluetooth](#connectivity-allowbluetooth)
|
||||
- [Connectivity/AllowUSBConnection](#connectivity-allowusbconnection)
|
||||
- [DeviceLock/AllowSimpleDevicePassword](#devicelock-allowsimpledevicepassword)
|
||||
- [DeviceLock/MaxDevicePasswordFailedAttempts](#devicelock-maxdevicepasswordfailedattempts)
|
||||
- [DeviceLock/MaxInactivityTimeDeviceLock](#devicelock-maxinactivitytimedevicelock)
|
||||
- [DeviceLock/MinDevicePasswordLength](#devicelock-mindevicepasswordlength)
|
||||
- [DeviceLock/DevicePasswordHistory](#devicelock-devicepasswordhistory)
|
||||
- [DeviceLock/AlphanumericDevicePasswordRequired](#devicelock-alphanumericdevicepasswordrequired)
|
||||
- [DeviceLock/MinDevicePasswordComplexCharacters](#devicelock-mindevicepasswordcomplexcharacters)
|
||||
- [DeviceLock/AllowIdleReturnWithoutPassword](#devicelock-allowidlereturnwithoutpassword)
|
||||
- [DeviceLock/DevicePasswordEnabled](#devicelock-devicepasswordenabled)
|
||||
- [Experience/AllowCortana](#experience-allowcortana)
|
||||
- [Privacy/AllowInputPersonalization](#privacy-allowinputpersonalization)
|
||||
- [Search/AllowSearchToUseLocation](#search-allowsearchtouselocation)
|
||||
- [Security/RequireDeviceEncryption](#security-requiredeviceencryption)
|
||||
- [Settings/AllowDateTime](#settings-allowdatetime)
|
||||
- [Settings/AllowVPN](#settings-allowvpn)
|
||||
- [Speech/AllowSpeechModelUpdate](#speech-allowspeechmodelupdate)
|
||||
- [System/AllowTelemetry](#system-allowtelemetry)
|
||||
- [System/AllowLocation](#system-allowlocation)
|
||||
- [Update/AllowAutoUpdate](#update-allowautoupdate)
|
||||
- [Update/AllowUpdateService](#update-allowupdateservice)
|
||||
- [Update/RequireUpdateApproval](#update-requireupdateapproval)
|
||||
- [Update/ScheduledInstallDay](#update-scheduledinstallday)
|
||||
- [Update/ScheduledInstallTime](#update-scheduledinstalltime)
|
||||
- [Update/UpdateServiceUrl](#update-updateserviceurl)
|
||||
- [Update/RequireDeferUpgrade](#update-requiredeferupgrade)
|
||||
- [Wifi/AllowManualWiFiConfiguration](policy-csp-wifi#wifi-allowmanualwificonfiguration)
|
||||
|
||||
<!--EndHoloLens-->
|
||||
|
||||
<!--StartEAS-->
|
||||
## <a href="" id="eas"></a>Policies that can be set using Exchange Active Sync (EAS)
|
||||
|
||||
|
@ -6,14 +6,14 @@ ms.prod: w10
|
||||
ms.mktglfcycl: explore
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
ms.localizationpriority: medium
|
||||
author: justinha
|
||||
ms.author: justinha
|
||||
manager: dansimp
|
||||
audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 02/26/2019
|
||||
ms.date: 03/04/2019
|
||||
ms.localizationpriority: medium
|
||||
---
|
||||
|
||||
# Limitations while using Windows Information Protection (WIP)
|
||||
@ -108,10 +108,17 @@ This table provides info about the most common problems you might encounter whil
|
||||
<li>SavedGames</li>
|
||||
</ul>
|
||||
</td>
|
||||
<td>WIP isn’t turned on for employees in your organization. Error code 0x807c0008 will result if WIP is deployed by using System Center Configuration Manager. </td>
|
||||
<td>WIP isn’t turned on for employees in your organization. Error code 0x807c0008 will result if WIP is deployed by using System Center Configuration Manager.</td>
|
||||
<td>Don’t set the <strong>MakeFolderAvailableOfflineDisabled</strong> option to <strong>False</strong> for any of the specified folders.<br><br>If you currently use redirected folders, we recommend that you migrate to a file synchronization solution that supports WIP, such as Work Folders or OneDrive for Business. Additionally, if you apply redirected folders after WIP is already in place, you might be unable to open your files offline. For more info about these potential access errors, see [Can't open files offline when you use Offline Files and Windows Information Protection](https://support.microsoft.com/help/3187045/can-t-open-files-offline-when-you-use-offline-files-and-windows-information-protection).
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>Only enlightened apps can be managed without device enrollment
|
||||
</td>
|
||||
<td>If a user enrolls a device for Mobile Application Management (MAM) without device enrollment, only enlightened apps will be managed. This is by design to prevent personal files from being unintenionally encrypted by unenlighted apps. Unenlighted apps that need to access work using MAM need to be re-compiled as LOB apps or managed by using MDM with device enrollment.</td>
|
||||
<td>If all apps need to be managed, enroll the device for MDM.
|
||||
</td>
|
||||
</tr>
|
||||
</table>
|
||||
|
||||
>[!NOTE]
|
||||
|
@ -9,7 +9,6 @@ ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
author: dansimp
|
||||
ms.localizationpriority: medium
|
||||
ms.date: 10/04/2018
|
||||
---
|
||||
|
||||
# Threat Protection
|
||||
@ -22,16 +21,15 @@ ms.date: 10/04/2018
|
||||
<td><center><a href="#ngp"><img src="images/NGP_icon.png"><br> <b>Next generation protection</b></a></center></td>
|
||||
<td><center><a href="#edr"><img src="images/EDR_icon.png"><br> <b>Endpoint detection and response</b></a></center></td>
|
||||
<td><center><a href="#ai"><img src="images/AR_icon.png"><br> <b>Automated investigation and remediation</b></a></center></td>
|
||||
<td><center><a href="#mte"><img src="images/MTE_icon.png"><br> <b>Microsoft Threat Experts</b></a></center></td>
|
||||
<td><center><a href="#ss"><img src="images/SS_icon.png"><br><b>Secure score</b></a></center></td>
|
||||
<td><center><img src="images/AH_icon.png"><a href="#ah"><br><b>Advanced hunting</b></a></center></td>
|
||||
<td><center><a href="#mte"><img src="images/MTE_icon.png"><br> <b>Microsoft Threat Experts</b></a></center></td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td colspan="7">
|
||||
<td colspan="6">
|
||||
<a href="#apis"><center><b>Management and APIs</a></b></center></td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td colspan="7"><a href="#mtp"><center><b>Microsoft Threat Protection</a></center></b></td>
|
||||
<td colspan="6"><a href="#mtp"><center><b>Microsoft Threat Protection</a></center></b></td>
|
||||
</tr>
|
||||
</table>
|
||||
<br>
|
||||
@ -73,6 +71,9 @@ Endpoint detection and response capabilities are put in place to detect, investi
|
||||
- [Forensic collection](windows-defender-atp/respond-machine-alerts-windows-defender-advanced-threat-protection.md#collect-investigation-package-from-machines)
|
||||
- [Threat intelligence](windows-defender-atp/threat-indicator-concepts-windows-defender-advanced-threat-protection.md)
|
||||
- [Advanced detonation and analysis service](windows-defender-atp/respond-file-alerts-windows-defender-advanced-threat-protection.md#deep-analysis)
|
||||
- [Advanced hunting](windows-defender-atp/overview-hunting-windows-defender-advanced-threat-protection.md)
|
||||
- [Custom detection](windows-defender-atp/overview-custom-detections.md)
|
||||
- [Realtime and historical hunting](windows-defender-atp/advanced-hunting-windows-defender-advanced-threat-protection.md)
|
||||
|
||||
<a name="ai"></a>
|
||||
|
||||
@ -84,16 +85,6 @@ In conjunction with being able to quickly respond to advanced attacks, Windows D
|
||||
- [Manage automated investigations](windows-defender-atp/manage-auto-investigation-windows-defender-advanced-threat-protection.md)
|
||||
- [Analyze automated investigation](windows-defender-atp/manage-auto-investigation-windows-defender-advanced-threat-protection.md#analyze-automated-investigations)
|
||||
|
||||
<a name="mte"></a>
|
||||
|
||||
**[Microsoft Threat Experts](windows-defender-atp/microsoft-threat-experts.md)**<br>
|
||||
Windows Defender ATP's new managed threat hunting service provides proactive hunting, prioritization and additional context and insights that further empower Security Operation Centers (SOCs) to identify and respond to threats quickly and accurately.
|
||||
|
||||
- [Targeted attack notification](windows-defender-atp/microsoft-threat-experts.md)
|
||||
- [Experts-on-demand](windows-defender-atp/microsoft-threat-experts.md)
|
||||
- [Configure your Microsoft Threat Protection managed hunting service](windows-defender-atp/configure-microsoft-threat-experts.md)
|
||||
|
||||
|
||||
<a name="ss"></a>
|
||||
|
||||
**[Secure score](windows-defender-atp/overview-secure-score-windows-defender-advanced-threat-protection.md)**<br>
|
||||
@ -103,13 +94,14 @@ Windows Defender ATP includes a secure score to help you dynamically assess the
|
||||
- [Secure score](windows-defender-atp/overview-secure-score-windows-defender-advanced-threat-protection.md)
|
||||
- [Threat analytics](windows-defender-atp/threat-analytics-dashboard-windows-defender-advanced-threat-protection.md)
|
||||
|
||||
<a name="ah"></a>
|
||||
<a name="mte"></a>
|
||||
|
||||
**[Advanced hunting](windows-defender-atp/overview-hunting-windows-defender-advanced-threat-protection.md)**<br>
|
||||
Create custom threat intelligence and use a powerful search and query tool to hunt for possible threats in your organization.
|
||||
**[Microsoft Threat Experts](windows-defender-atp/microsoft-threat-experts.md)**<br>
|
||||
Windows Defender ATP's new managed threat hunting service provides proactive hunting, prioritization and additional context and insights that further empower Security Operation Centers (SOCs) to identify and respond to threats quickly and accurately.
|
||||
|
||||
- [Custom detection](windows-defender-atp/overview-custom-detections.md)
|
||||
- [Realtime and historical hunting](windows-defender-atp/advanced-hunting-windows-defender-advanced-threat-protection.md)
|
||||
- [Targeted attack notification](windows-defender-atp/microsoft-threat-experts.md)
|
||||
- [Experts-on-demand](windows-defender-atp/microsoft-threat-experts.md)
|
||||
- [Configure your Microsoft Threat Protection managed hunting service](windows-defender-atp/configure-microsoft-threat-experts.md)
|
||||
|
||||
<a name="apis"></a>
|
||||
|
||||
|
Binary file not shown.
Before Width: | Height: | Size: 360 KiB |
@ -112,6 +112,4 @@ It is important to remember that Microsoft sees a wider and broader set of threa
|
||||
|
||||
The capabilities within [Windows Defender ATP](https://www.microsoft.com/en-us/windowsforbusiness?ocid=cx-docs-avreports) provide [additional layers of protection](https://cloudblogs.microsoft.com/microsoftsecure/2017/12/11/detonating-a-bad-rabbit-windows-defender-antivirus-and-layered-machine-learning-defenses?ocid=cx-docs-avreports) that are not factored into industry tests, and address some of the latest and most sophisticated threats. Isolating AV from the rest of Windows Defender ATP creates a partial picture of how our security stack operates in the real world. For example, attack surface reduction and endpoint detection & response capabilities can help prevent malware from getting onto devices in the first place. We have proven that [Windows Defender ATP components catch samples](https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RE2ouJA?ocid=cx-docs-avreports) that Windows Defender Antivirus missed in these industry tests, which is more representative of how effectively our security suite protects customers in the real world.
|
||||
|
||||
Using independent tests, customers can view one aspect of their security suite but can't assess the complete protection of all the security features. Microsoft is highly engaged in working with several independent testers to evolve security testing to focus on the end-to-end security stack. In the meantime, customers can evaluate Windows Defender Advanced Threat Protection in their own networks by signing up for a [90-day trial of Windows Defender ATP](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=cx-docs-avreports), or [enabling Preview features on existing tenants](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/preview-settings-windows-defender-advanced-threat-protection?ocid=cx-docs-avreports).
|
||||
|
||||

|
||||
Using independent tests, customers can view one aspect of their security suite but can't assess the complete protection of all the security features. Microsoft is highly engaged in working with several independent testers to evolve security testing to focus on the end-to-end security stack. In the meantime, customers can evaluate Windows Defender Advanced Threat Protection in their own networks by signing up for a [90-day trial of Windows Defender ATP](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=cx-docs-avreports), or [enabling Preview features on existing tenants](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/preview-settings-windows-defender-advanced-threat-protection?ocid=cx-docs-avreports).
|
@ -62,9 +62,14 @@ For more information about Intune device profiles, including how to create and c
|
||||
5. Expand the tree to **Windows components > Windows Defender Antivirus > MpEngine**.
|
||||
|
||||
1. Double-click the **Select cloud protection level** setting and set it to **Enabled**. Select the level of protection:
|
||||
1. Setting to **Default Windows Defender Antivirus blocking level** will provide strong detection without increasing the risk of detecting legitimate files.
|
||||
2. Setting to **High blocking level** will apply a strong level of detection. While unlikely, some legitimate files may be detected (although you will have the option to unblock or dispute that detection).
|
||||
|
||||
1. Setting to **Default Windows Defender Antivirus blocking level** provides strong detection without increasing the risk of detecting legitimate files.
|
||||
2. Setting to **High blocking level** applies a strong level of detection.
|
||||
3. **High + blocking level** applies additional protection measures.
|
||||
4. **Zero tolerance blocking level** blocks all unknown executables.
|
||||
|
||||
> [!WARNING]
|
||||
> While unlikely, setting this switch to **High** might cause some legitimate files to be detected (although you will have the option to unblock or dispute that detection). The **High +** setting might impact client performance. We recommend you set this to the default level (**Not configured**).
|
||||
|
||||
1. Click **OK**.
|
||||
|
||||
|
||||
|
@ -53,16 +53,15 @@ Windows Defender ATP uses the following combination of technology built into Win
|
||||
<td><center><a href="#ngp"><img src="images/ngp_icon.png"><br> <b>Next generation protection</b></a></center></td>
|
||||
<td><center><a href="#edr"><img src="images/edr_icon.png"><br> <b>Endpoint detection and response</b></a></center></td>
|
||||
<td><center><a href="#ai"><img src="images/AR_icon.png"><br> <b>Automated investigation and remediation</b></a></center></td>
|
||||
<td><center><a href="#mte"><img src="images/MTE_icon.png"><br> <b>Microsoft Threat Experts</b></a></center></td>
|
||||
<td><center><a href="#ss"><img src="images/SS_icon.png"><br><b>Secure score</b></a></center></td>
|
||||
<td><center><img src="images/AH_icon.png"><a href="#ah"><br><b>Advanced hunting</b></a></center></td>
|
||||
<td><center><a href="#mte"><img src="images/MTE_icon.png"><br> <b>Microsoft Threat Experts</b></a></center></td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td colspan="7">
|
||||
<td colspan="6">
|
||||
<a href="#apis"><center><b>Management and APIs</a></b></center></td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td colspan="7"><a href="#mtp"><center><b>Microsoft Threat Protection</a></center></b></td>
|
||||
<td colspan="6"><a href="#mtp"><center><b>Microsoft Threat Protection</a></center></b></td>
|
||||
</tr>
|
||||
</table>
|
||||
<br>
|
||||
@ -87,26 +86,22 @@ To further reinforce the security perimeter of your network, Windows Defender AT
|
||||
|
||||
**[Endpoint detection and response](overview-endpoint-detection-response.md)**<br>
|
||||
Endpoint detection and response capabilities are put in place to detect, investigate, and respond to advanced threats that may have made it past the first two security pillars.
|
||||
You can also do advanced hunting to create custom threat intelligence and use a powerful search and query tool to hunt for possible threats in your organization.
|
||||
|
||||
<a name="ai"></a>
|
||||
|
||||
**[Automated investigation and remediation](automated-investigations-windows-defender-advanced-threat-protection.md)**<br>
|
||||
In conjunction with being able to quickly respond to advanced attacks, Windows Defender ATP offers automatic investigation and remediation capabilities that help reduce the volume of alerts in minutes at scale.
|
||||
|
||||
<a name="mte"></a>
|
||||
|
||||
**[Microsoft Threat Experts](microsoft-threat-experts.md)**<br>
|
||||
Windows Defender ATP's new managed threat hunting service provides proactive hunting, prioritization, and additional context and insights that further empower Security operation centers (SOCs) to identify and respond to threats quickly and accurately.
|
||||
|
||||
<a name="ss"></a>
|
||||
|
||||
**[Secure score](overview-secure-score-windows-defender-advanced-threat-protection.md)**<br>
|
||||
Windows Defender ATP includes a secure score to help you dynamically assess the security state of your enterprise network, identify unprotected systems, and take recommended actions to improve the overall security of your organization.
|
||||
|
||||
<a name="ah"></a>
|
||||
<a name="mte"></a>
|
||||
|
||||
**[Advanced hunting](overview-hunting-windows-defender-advanced-threat-protection.md)**<br>
|
||||
Create custom threat intelligence and use a powerful search and query tool to hunt for possible threats in your organization.
|
||||
**[Microsoft Threat Experts](microsoft-threat-experts.md)**<br>
|
||||
Windows Defender ATP's new managed threat hunting service provides proactive hunting, prioritization, and additional context and insights that further empower Security operation centers (SOCs) to identify and respond to threats quickly and accurately.
|
||||
|
||||
<a name="apis"></a>
|
||||
|
||||
|
Loading…
x
Reference in New Issue
Block a user