mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-18 00:07:23 +00:00
Merge pull request #4764 from MicrosoftDocs/master
Publish 2/16/2021 10:30 AM PT
This commit is contained in:
commit
96f835797a
@ -11,7 +11,7 @@ ms.prod: edge
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.date: 01/17/2020
|
ms.date: 02/16/2021
|
||||||
---
|
---
|
||||||
|
|
||||||
# Deploy Microsoft Edge Legacy kiosk mode
|
# Deploy Microsoft Edge Legacy kiosk mode
|
||||||
@ -22,7 +22,7 @@ ms.date: 01/17/2020
|
|||||||
> Professional, Enterprise, and Education
|
> Professional, Enterprise, and Education
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> You've reached the documentation for Microsoft Edge Legacy (version 45 and earlier.) To see the documentation for Microsoft Edge version 77 or later, go to the [Microsoft Edge documentation landing page](https://docs.microsoft.com/DeployEdge/). For information about kiosk mode in the new version of Microsoft Edge, see [Microsoft Edge kiosk mode](https://docs.microsoft.com/DeployEdge/microsoft-edge-kiosk-mode).
|
> You've reached the documentation for Microsoft Edge Legacy (version 45 and earlier.) To see the documentation for Microsoft Edge version 77 or later, go to the [Microsoft Edge documentation landing page](https://docs.microsoft.com/DeployEdge/). For information about kiosk mode in the new version of Microsoft Edge, see [Microsoft Edge kiosk mode](https://docs.microsoft.com/DeployEdge/microsoft-edge-configure-kiosk-mode).
|
||||||
|
|
||||||
In the Windows 10 October 2018 Update, we added the capability to use Microsoft Edge Legacy as a kiosk using assigned access. With assigned access, you create a tailored browsing experience locking down a Windows 10 device to only run as a single-app or multi-app kiosk. Assigned access restricts a local standard user account so that it only has access to one or more Windows app, such as Microsoft Edge Legacy in kiosk mode.
|
In the Windows 10 October 2018 Update, we added the capability to use Microsoft Edge Legacy as a kiosk using assigned access. With assigned access, you create a tailored browsing experience locking down a Windows 10 device to only run as a single-app or multi-app kiosk. Assigned access restricts a local standard user account so that it only has access to one or more Windows app, such as Microsoft Edge Legacy in kiosk mode.
|
||||||
|
|
||||||
|
@ -351,6 +351,7 @@
|
|||||||
|
|
||||||
#### [Devices list]()
|
#### [Devices list]()
|
||||||
##### [View and organize the Devices list](microsoft-defender-atp/machines-view-overview.md)
|
##### [View and organize the Devices list](microsoft-defender-atp/machines-view-overview.md)
|
||||||
|
##### [Techniques in device timeline](microsoft-defender-atp/techniques-device-timeline.md)
|
||||||
##### [Device timeline event flags](microsoft-defender-atp/device-timeline-event-flag.md)
|
##### [Device timeline event flags](microsoft-defender-atp/device-timeline-event-flag.md)
|
||||||
##### [Manage device group and tags](microsoft-defender-atp/machine-tags.md)
|
##### [Manage device group and tags](microsoft-defender-atp/machine-tags.md)
|
||||||
|
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: Onboard Windows servers to the Microsoft Defender ATP service
|
title: Onboard Windows servers to the Microsoft Defender for Endpoint service
|
||||||
description: Onboard Windows servers so that they can send sensor data to the Microsoft Defender ATP sensor.
|
description: Onboard Windows servers so that they can send sensor data to the Microsoft Defender for Endpoint sensor.
|
||||||
keywords: onboard server, server, 2012r2, 2016, 2019, server onboarding, device management, configure Windows ATP servers, onboard Microsoft Defender Advanced Threat Protection servers
|
keywords: onboard server, server, 2012r2, 2016, 2019, server onboarding, device management, configure Windows ATP servers, onboard Microsoft Defender Advanced Threat Protection servers, onboard Microsoft Defender for Endpoint servers
|
||||||
search.product: eADQiWindows 10XVcnh
|
search.product: eADQiWindows 10XVcnh
|
||||||
search.appverid: met150
|
search.appverid: met150
|
||||||
ms.prod: m365-security
|
ms.prod: m365-security
|
||||||
@ -118,7 +118,7 @@ If your servers need to use a proxy to communicate with Defender for Endpoint, u
|
|||||||
|
|
||||||
- [Configure Windows to use a proxy server for all connections](configure-proxy-internet.md)
|
- [Configure Windows to use a proxy server for all connections](configure-proxy-internet.md)
|
||||||
|
|
||||||
If a proxy or firewall is in use, please ensure that servers can access all of the Microsoft Defender ATP service URLs directly and without SSL interception. For more information, see [enable access to Defender for Endpoint service URLs](configure-proxy-internet.md#enable-access-to-microsoft-defender-for-endpoint-service-urls-in-the-proxy-server). Use of SSL interception will prevent the system from communicating with the Defender for Endpoint service.
|
If a proxy or firewall is in use, please ensure that servers can access all of the Microsoft Defender for Endpoint service URLs directly and without SSL interception. For more information, see [enable access to Defender for Endpoint service URLs](configure-proxy-internet.md#enable-access-to-microsoft-defender-for-endpoint-service-urls-in-the-proxy-server). Use of SSL interception will prevent the system from communicating with the Defender for Endpoint service.
|
||||||
|
|
||||||
Once completed, you should see onboarded Windows servers in the portal within an hour.
|
Once completed, you should see onboarded Windows servers in the portal within an hour.
|
||||||
|
|
||||||
@ -161,7 +161,7 @@ You can onboard Windows Server (SAC) version 1803, Windows Server 2019, or Windo
|
|||||||
|
|
||||||
Support for Windows Server provides deeper insight into server activities, coverage for kernel and memory attack detection, and enables response actions.
|
Support for Windows Server provides deeper insight into server activities, coverage for kernel and memory attack detection, and enables response actions.
|
||||||
|
|
||||||
1. Configure Defender for Endpoint onboarding settings on the Windows server. For more information, see [Onboard Windows 10 devices](configure-endpoints.md).
|
1. Configure Defender for Endpoint onboarding settings on the Windows server using the same tools and methods for Windows 10 devices. For more information, see [Onboard Windows 10 devices](configure-endpoints.md).
|
||||||
|
|
||||||
2. If you're running a third-party antimalware solution, you'll need to apply the following Microsoft Defender AV passive mode settings. Verify that it was configured correctly:
|
2. If you're running a third-party antimalware solution, you'll need to apply the following Microsoft Defender AV passive mode settings. Verify that it was configured correctly:
|
||||||
|
|
||||||
|
@ -58,7 +58,7 @@ Customer type | Portal URL
|
|||||||
:---|:---
|
:---|:---
|
||||||
GCC | https://gcc.securitycenter.microsoft.us
|
GCC | https://gcc.securitycenter.microsoft.us
|
||||||
GCC High | https://securitycenter.microsoft.us
|
GCC High | https://securitycenter.microsoft.us
|
||||||
DoD (PREVIEW) | Rolling out
|
DoD (PREVIEW) | https://securitycenter.microsoft.us
|
||||||
|
|
||||||
<br>
|
<br>
|
||||||
|
|
||||||
@ -69,22 +69,22 @@ The following OS versions are supported:
|
|||||||
|
|
||||||
OS version | GCC | GCC High | DoD (PREVIEW)
|
OS version | GCC | GCC High | DoD (PREVIEW)
|
||||||
:---|:---|:---|:---
|
:---|:---|:---|:---
|
||||||
Windows 10, version 20H2 (with [KB4586853](https://support.microsoft.com/help/4586853)) |  |  |  Rolling out
|
Windows 10, version 20H2 (with [KB4586853](https://support.microsoft.com/help/4586853)) |  |  | 
|
||||||
Windows 10, version 2004 (with [KB4586853](https://support.microsoft.com/help/4586853)) |  |  |  Rolling out
|
Windows 10, version 2004 (with [KB4586853](https://support.microsoft.com/help/4586853)) |  |  | 
|
||||||
Windows 10, version 1909 (with [KB4586819](https://support.microsoft.com/help/4586819)) |  |  |  Rolling out
|
Windows 10, version 1909 (with [KB4586819](https://support.microsoft.com/help/4586819)) |  |  | 
|
||||||
Windows 10, version 1903 (with [KB4586819](https://support.microsoft.com/help/4586819)) |  |  |  Rolling out
|
Windows 10, version 1903 (with [KB4586819](https://support.microsoft.com/help/4586819)) |  |  | 
|
||||||
Windows 10, version 1809 (with [KB4586839](https://support.microsoft.com/help/4586839)) |  |  |  Rolling out
|
Windows 10, version 1809 (with [KB4586839](https://support.microsoft.com/help/4586839)) |  |  | 
|
||||||
Windows 10, version 1803 (with [KB4598245](https://support.microsoft.com/help/4598245)) |  |  |  Rolling out
|
Windows 10, version 1803 (with [KB4598245](https://support.microsoft.com/help/4598245)) |  |  | 
|
||||||
Windows 10, version 1709 | <br>Note: Won't be supported |  With [KB4499147](https://support.microsoft.com/help/4499147)<br>Note: [Deprecated](https://docs.microsoft.com/lifecycle/announcements/revised-end-of-service-windows-10-1709), please upgrade | <br>Note: Won't be supported
|
Windows 10, version 1709 | <br>Note: Won't be supported |  With [KB4499147](https://support.microsoft.com/help/4499147)<br>Note: [Deprecated](https://docs.microsoft.com/lifecycle/announcements/revised-end-of-service-windows-10-1709), please upgrade | <br>Note: Won't be supported
|
||||||
Windows 10, version 1703 and earlier | <br>Note: Won't be supported | <br>Note: Won't be supported | <br>Note: Won't be supported
|
Windows 10, version 1703 and earlier | <br>Note: Won't be supported | <br>Note: Won't be supported | <br>Note: Won't be supported
|
||||||
Windows Server 2019 (with [KB4586839](https://support.microsoft.com/help/4586839)) |  |  |  Rolling out
|
Windows Server 2019 (with [KB4586839](https://support.microsoft.com/help/4586839)) |  |  | 
|
||||||
Windows Server 2016 |  |  Rolling out |  Rolling out
|
Windows Server 2016 |  |  | 
|
||||||
Windows Server 2012 R2 |  |  Rolling out |  Rolling out
|
Windows Server 2012 R2 |  |  | 
|
||||||
Windows Server 2008 R2 SP1 |  |  Rolling out |  Rolling out
|
Windows Server 2008 R2 SP1 |  |  | 
|
||||||
Windows 8.1 Enterprise |  |  Rolling out |  Rolling out
|
Windows 8.1 Enterprise |  |  | 
|
||||||
Windows 8 Pro |  |  Rolling out |  Rolling out
|
Windows 8 Pro |  |  | 
|
||||||
Windows 7 SP1 Enterprise |  |  Rolling out |  Rolling out
|
Windows 7 SP1 Enterprise |  |  | 
|
||||||
Windows 7 SP1 Pro |  |  Rolling out |  Rolling out
|
Windows 7 SP1 Pro |  |  | 
|
||||||
Linux |  In development |  In development |  In development
|
Linux |  In development |  In development |  In development
|
||||||
macOS |  In development |  In development |  In development
|
macOS |  In development |  In development |  In development
|
||||||
Android |  On engineering backlog |  On engineering backlog |  On engineering backlog
|
Android |  On engineering backlog |  On engineering backlog |  On engineering backlog
|
||||||
@ -137,16 +137,16 @@ These are the known gaps as of February 2021:
|
|||||||
|
|
||||||
Feature name | GCC | GCC High | DoD (PREVIEW)
|
Feature name | GCC | GCC High | DoD (PREVIEW)
|
||||||
:---|:---|:---|:---
|
:---|:---|:---|:---
|
||||||
Automated investigation and remediation: Live response |  |  Rolling out |  Rolling out
|
Automated investigation and remediation: Live response |  |  | 
|
||||||
Automated investigation and remediation: Response to Office 365 alerts |  On engineering backlog |  On engineering backlog |  On engineering backlog
|
Automated investigation and remediation: Response to Office 365 alerts |  On engineering backlog |  On engineering backlog |  On engineering backlog
|
||||||
Email notifications |  Rolling out |  Rolling out |  Rolling out
|
Email notifications |  Rolling out |  Rolling out |  Rolling out
|
||||||
Evaluation lab |  |  Rolling out |  Rolling out
|
Evaluation lab |  |  | 
|
||||||
Management and APIs: Device health and compliance report |  |  Rolling out |  Rolling out
|
Management and APIs: Device health and compliance report |  |  Rolling out |  Rolling out
|
||||||
Management and APIs: Integration with third-party products |  In development |  In development |  In development
|
Management and APIs: Integration with third-party products |  In development |  In development |  In development
|
||||||
Management and APIs: Streaming API |  |  In development |  In development
|
Management and APIs: Streaming API |  |  In development |  In development
|
||||||
Management and APIs: Threat protection report |  |  Rolling out |  Rolling out
|
Management and APIs: Threat protection report |  |  | 
|
||||||
Threat & vulnerability management |  |  Rolling out |  Rolling out
|
Threat & vulnerability management |  |  | 
|
||||||
Threat analytics |  |  Rolling out |  Rolling out
|
Threat analytics |  |  | 
|
||||||
Web content filtering |  In development |  In development |  In development
|
Web content filtering |  In development |  In development |  In development
|
||||||
Integrations: Azure Sentinel |  |  In development |  In development
|
Integrations: Azure Sentinel |  |  In development |  In development
|
||||||
Integrations: Microsoft Cloud App Security |  On engineering backlog |  On engineering backlog |  On engineering backlog
|
Integrations: Microsoft Cloud App Security |  On engineering backlog |  On engineering backlog |  On engineering backlog
|
||||||
@ -156,5 +156,5 @@ Integrations: Microsoft Defender for Office 365 |  On engineering backlog |  On engineering backlog |  On engineering backlog
|
Integrations: Microsoft Endpoint DLP |  On engineering backlog |  On engineering backlog |  On engineering backlog
|
||||||
Integrations: Microsoft Intune |  |  In development |  In development
|
Integrations: Microsoft Intune |  |  In development |  In development
|
||||||
Integrations: Microsoft Power Automate & Azure Logic Apps |  |  In development |  In development
|
Integrations: Microsoft Power Automate & Azure Logic Apps |  |  In development |  In development
|
||||||
Integrations: Skype for Business / Teams |  |  Rolling out |  Rolling out
|
Integrations: Skype for Business / Teams |  |  | 
|
||||||
Microsoft Threat Experts |  On engineering backlog |  On engineering backlog |  On engineering backlog
|
Microsoft Threat Experts |  On engineering backlog |  On engineering backlog |  On engineering backlog
|
||||||
|
Binary file not shown.
After Width: | Height: | Size: 6.4 KiB |
Binary file not shown.
After Width: | Height: | Size: 129 KiB |
Binary file not shown.
After Width: | Height: | Size: 107 KiB |
Binary file not shown.
After Width: | Height: | Size: 38 KiB |
Binary file not shown.
After Width: | Height: | Size: 70 KiB |
Binary file not shown.
After Width: | Height: | Size: 73 KiB |
@ -35,6 +35,13 @@ ms.technology: mde
|
|||||||
|
|
||||||
Follow the corresponding instructions depending on your preferred deployment method.
|
Follow the corresponding instructions depending on your preferred deployment method.
|
||||||
|
|
||||||
|
>[!NOTE]
|
||||||
|
> The status of a device will be switched to [Inactive](fix-unhealthy-sensors.md#inactive-devices) 7 days after offboarding. <br>
|
||||||
|
> Offboarded devices' data (such as Timeline, Alerts, Vulnerabilities, etc.) will remain in the portal until the configured [retention period](data-storage-privacy.md#how-long-will-microsoft-store-my-data-what-is-microsofts-data-retention-policy) expires. <br>
|
||||||
|
> The device's profile (without data) will remain in the [Devices List](machines-view-overview.md) for no longer than 180 days.
|
||||||
|
> In addition, devices that are not active in the last 30 days are not factored in on the data that reflects your organization's threat and vulnerability management [exposure score](tvm-exposure-score.md) and Microsoft Secure Score for Devices. <br>
|
||||||
|
> To view only active devices, you can filter by [health state](machines-view-overview.md#health-state), [device tags](machine-tags.md) or [machine groups](machine-groups.md).
|
||||||
|
|
||||||
## Offboard Windows 10 devices
|
## Offboard Windows 10 devices
|
||||||
- [Offboard devices using a local script](configure-endpoints-script.md#offboard-devices-using-a-local-script)
|
- [Offboard devices using a local script](configure-endpoints-script.md#offboard-devices-using-a-local-script)
|
||||||
- [Offboard devices using Group Policy](configure-endpoints-gp.md#offboard-devices-using-group-policy)
|
- [Offboard devices using Group Policy](configure-endpoints-gp.md#offboard-devices-using-group-policy)
|
||||||
@ -46,7 +53,3 @@ Follow the corresponding instructions depending on your preferred deployment met
|
|||||||
## Offboard non-Windows devices
|
## Offboard non-Windows devices
|
||||||
- [Offboard non-Windows devices](configure-endpoints-non-windows.md#offboard-non-windows-devices)
|
- [Offboard non-Windows devices](configure-endpoints-non-windows.md#offboard-non-windows-devices)
|
||||||
|
|
||||||
>[!NOTE]
|
|
||||||
> Offboarded devices will remain in the portal until [retention period](data-storage-privacy.md#how-long-will-microsoft-store-my-data-what-is-microsofts-data-retention-policy) for the device's data expires. The status will be switched to ['Inactive'](fix-unhealthy-sensors.md#inactive-devices) 7 days after offboarding. <br>
|
|
||||||
> In addition, [Devices that are not active in the last 30 days are not factored in on the data that reflects your organization's threat and vulnerability management exposure score and Microsoft Secure Score for Devices.](tvm-dashboard-insights.md) <br>
|
|
||||||
> To view only active devices, you can filter by [health state](machines-view-overview.md#health-state) or by [device tags](machine-tags.md) and [groups](machine-groups.md) etc.
|
|
||||||
|
@ -0,0 +1,98 @@
|
|||||||
|
---
|
||||||
|
title: Techniques in the device timeline
|
||||||
|
description: Understanding the device timeline in Microsoft Defender for Endpoint
|
||||||
|
keywords: device timeline, endpoint, MITRE, MITRE ATT&CK, techniques, tactics
|
||||||
|
search.product: eADQiWindows 10XVcnh
|
||||||
|
search.appverid: met150
|
||||||
|
ms.prod: m365-security
|
||||||
|
ms.mktglfcycl: deploy
|
||||||
|
ms.sitesec: library
|
||||||
|
ms.pagetype: security
|
||||||
|
ms.author: maccruz
|
||||||
|
author: schmurky
|
||||||
|
ms.localizationpriority: medium
|
||||||
|
manager: dansimp
|
||||||
|
audience: ITPro
|
||||||
|
ms.collection: M365-security-compliance
|
||||||
|
ms.topic: article
|
||||||
|
ms.technology: mde
|
||||||
|
---
|
||||||
|
|
||||||
|
# Techniques in the device timeline
|
||||||
|
|
||||||
|
|
||||||
|
**Applies to:**
|
||||||
|
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631)
|
||||||
|
|
||||||
|
|
||||||
|
You can gain more insight in an investigation by analyzing the events that happened on a specific device. First, select the device of interest from the [Devices list](machines-view-overview.md). On the device page, you can select the **Timeline** tab to view all the events that occurred on the device.
|
||||||
|
|
||||||
|
## Understand techniques in the timeline
|
||||||
|
|
||||||
|
>[!IMPORTANT]
|
||||||
|
>Some information relates to a prereleased product feature in public preview which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
|
||||||
|
|
||||||
|
In Microsoft Defender for Endpoint, **Techniques** are an additional data type in the event timeline. Techniques provide more insight on activities associated with [MITRE ATT&CK](https://attack.mitre.org/) techniques or sub-techniques.
|
||||||
|
|
||||||
|
This feature simplifies the investigation experience by helping analysts understand the activities that were observed on a device. Analysts can then decide to investigate further.
|
||||||
|
|
||||||
|
For public preview, Techniques are available by default and shown together with events when a device's timeline is viewed.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
Techniques are highlighted in bold text and appear with a blue icon on the left. The corresponding MITRE ATT&CK ID and technique name also appear as tags under Additional information.
|
||||||
|
|
||||||
|
Search and Export options are also available for Techniques.
|
||||||
|
|
||||||
|
## Investigate using the side pane
|
||||||
|
|
||||||
|
Select a Technique to open its corresponding side pane. Here you can see additional information and insights like related ATT&CK techniques, tactics, and descriptions.
|
||||||
|
|
||||||
|
Select the specific *Attack technique* to open the related ATT&CK technique page where you can find more information about it.
|
||||||
|
|
||||||
|
You can copy an entity's details when you see a blue icon on the right. For instance, to copy a related file's SHA1, select the blue page icon.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
You can do the same for command lines.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
|
||||||
|
## Investigate related events
|
||||||
|
|
||||||
|
To use [advanced hunting](advanced-hunting-overview.md) to find events related to the selected Technique, select **Hunt for related events**. This leads to the advanced hunting page with a query to find events related to the Technique.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
>[!NOTE]
|
||||||
|
>Querying using the **Hunt for related events** button from a Technique side pane displays all the events related to the identified technique but does not include the Technique itself in the query results.
|
||||||
|
|
||||||
|
|
||||||
|
## Customize your device timeline
|
||||||
|
|
||||||
|
On the upper right-hand side of the device timeline, you can choose a date range to limit the number of events and techniques in the timeline.
|
||||||
|
|
||||||
|
You can customize which columns to expose. You can also filter for flagged events by data type or by event group.
|
||||||
|
|
||||||
|
### Choose columns to expose
|
||||||
|
You can choose which columns to expose in the timeline by selecting the **Choose columns** button.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
From there you can select which information set to include.
|
||||||
|
|
||||||
|
### Filter to view techniques or events only
|
||||||
|
|
||||||
|
To view only either events or techniques, select **Filters** from the device timeline and choose your preferred Data type to view.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
## See also
|
||||||
|
- [View and organize the Devices list](machines-view-overview.md)
|
||||||
|
- [Microsoft Defender for Endpoint device timeline event flags](device-timeline-event-flag.md)
|
||||||
|
|
||||||
|
|
||||||
|
|
@ -24,9 +24,12 @@ ms.technology: mde
|
|||||||
|
|
||||||
|
|
||||||
**Applies to:**
|
**Applies to:**
|
||||||
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/?linkid=2154037)
|
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631)
|
||||||
|
- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)
|
||||||
|
|
||||||
|
|
||||||
|
> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-pullalerts-abovefoldlink)
|
||||||
|
|
||||||
The threat protection report provides high-level information about alerts generated in your organization. The report includes trending information showing the detection sources, categories, severities, statuses, classifications, and determinations of alerts across time.
|
The threat protection report provides high-level information about alerts generated in your organization. The report includes trending information showing the detection sources, categories, severities, statuses, classifications, and determinations of alerts across time.
|
||||||
|
|
||||||
The dashboard is structured into two sections:
|
The dashboard is structured into two sections:
|
||||||
|
@ -21,10 +21,12 @@ ms.technology: mde
|
|||||||
|
|
||||||
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
|
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
|
||||||
|
|
||||||
|
**Applies to:**
|
||||||
|
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631)
|
||||||
|
- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)
|
||||||
|
|
||||||
**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/?linkid=2154037)
|
> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink)
|
||||||
|
|
||||||
- Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink)
|
|
||||||
|
|
||||||
[!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)]
|
[!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)]
|
||||||
|
|
||||||
|
@ -22,15 +22,16 @@ ms.technology: mde
|
|||||||
|
|
||||||
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
|
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
|
||||||
|
|
||||||
|
|
||||||
**Applies to:**
|
**Applies to:**
|
||||||
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/?linkid=2154037)
|
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631)
|
||||||
|
- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
>Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-settings-abovefoldlink)
|
>Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-settings-abovefoldlink)
|
||||||
|
|
||||||
Use the **Time zone** menu  to configure the time zone and view license information.
|
Use the **Time zone** menu  to configure the time zone and view license information.
|
||||||
|
|
||||||
## Time zone settings
|
## Time zone settings
|
||||||
The aspect of time is important in the assessment and analysis of perceived and actual cyberattacks.
|
The aspect of time is important in the assessment and analysis of perceived and actual cyberattacks.
|
||||||
@ -41,7 +42,7 @@ Microsoft Defender for Endpoint can display either Coordinated Universal Time (U
|
|||||||
|
|
||||||
Your current time zone setting is shown in the Microsoft Defender for Endpoint menu. You can change the displayed time zone in the **Time zone** menu.
|
Your current time zone setting is shown in the Microsoft Defender for Endpoint menu. You can change the displayed time zone in the **Time zone** menu.
|
||||||
|
|
||||||
.
|
.
|
||||||
|
|
||||||
### UTC time zone
|
### UTC time zone
|
||||||
Microsoft Defender for Endpoint uses UTC time by default.
|
Microsoft Defender for Endpoint uses UTC time by default.
|
||||||
@ -60,7 +61,7 @@ The Microsoft Defender for Endpoint time zone is set by default to UTC.
|
|||||||
Setting the time zone also changes the times for all Microsoft Defender for Endpoint views.
|
Setting the time zone also changes the times for all Microsoft Defender for Endpoint views.
|
||||||
To set the time zone:
|
To set the time zone:
|
||||||
|
|
||||||
1. Click the **Time zone** menu .
|
1. Click the **Time zone** menu .
|
||||||
2. Select the **Timezone UTC** indicator.
|
2. Select the **Timezone UTC** indicator.
|
||||||
3. Select **Timezone UTC** or your local time zone, for example -7:00.
|
3. Select **Timezone UTC** or your local time zone, for example -7:00.
|
||||||
|
|
||||||
|
@ -24,8 +24,11 @@ ms.technology: mde
|
|||||||
|
|
||||||
|
|
||||||
**Applies to:**
|
**Applies to:**
|
||||||
|
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631)
|
||||||
|
- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)
|
||||||
|
|
||||||
|
> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-pullalerts-abovefoldlink)
|
||||||
|
|
||||||
* [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/?linkid=2154037)
|
|
||||||
|
|
||||||
When you use [attack surface reduction rules](attack-surface-reduction.md) you may run into issues, such as:
|
When you use [attack surface reduction rules](attack-surface-reduction.md) you may run into issues, such as:
|
||||||
|
|
||||||
|
@ -22,7 +22,11 @@ ms.technology: mde
|
|||||||
|
|
||||||
|
|
||||||
**Applies to:**
|
**Applies to:**
|
||||||
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/?linkid=2154037)
|
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631)
|
||||||
|
- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)
|
||||||
|
|
||||||
|
> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-pullalerts-abovefoldlink)
|
||||||
|
|
||||||
|
|
||||||
When contacting support, you may be asked to provide the output package of the Microsoft Defender for Endpoint Client Analyzer tool.
|
When contacting support, you may be asked to provide the output package of the Microsoft Defender for Endpoint Client Analyzer tool.
|
||||||
|
|
||||||
@ -42,12 +46,12 @@ This topic provides instructions on how to run the tool via Live Response.
|
|||||||
|
|
||||||
4. Select **Choose file**.
|
4. Select **Choose file**.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
5. Select the downloaded file named MDELiveAnalyzer.ps1 and then click on **Confirm**
|
5. Select the downloaded file named MDELiveAnalyzer.ps1 and then click on **Confirm**
|
||||||
|
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
|
|
||||||
6. While still in the LiveResponse session, use the commands below to run the analyzer and collect the result file:
|
6. While still in the LiveResponse session, use the commands below to run the analyzer and collect the result file:
|
||||||
|
@ -23,8 +23,11 @@ ms.technology: mde
|
|||||||
|
|
||||||
|
|
||||||
**Applies to:**
|
**Applies to:**
|
||||||
|
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631)
|
||||||
|
- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)
|
||||||
|
|
||||||
|
> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-pullalerts-abovefoldlink)
|
||||||
|
|
||||||
* [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/?linkid=2154037)
|
|
||||||
|
|
||||||
When you create a set of exploit protection mitigations (known as a configuration), you might find that the configuration export and import process does not remove all unwanted mitigations.
|
When you create a set of exploit protection mitigations (known as a configuration), you might find that the configuration export and import process does not remove all unwanted mitigations.
|
||||||
|
|
||||||
|
@ -22,11 +22,11 @@ ms.technology: mde
|
|||||||
|
|
||||||
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
|
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
**Applies to:**
|
**Applies to:**
|
||||||
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/?linkid=2154037)
|
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631)
|
||||||
|
- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)
|
||||||
|
|
||||||
|
> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-pullalerts-abovefoldlink)
|
||||||
|
|
||||||
This page provides detailed steps to troubleshoot live response issues.
|
This page provides detailed steps to troubleshoot live response issues.
|
||||||
|
|
||||||
|
@ -22,6 +22,12 @@ ms.technology: mde
|
|||||||
|
|
||||||
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
|
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
|
||||||
|
|
||||||
|
**Applies to:**
|
||||||
|
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631)
|
||||||
|
- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)
|
||||||
|
|
||||||
|
> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-pullalerts-abovefoldlink)
|
||||||
|
|
||||||
|
|
||||||
This section addresses issues that might arise as you use the Microsoft Defender Advanced Threat service.
|
This section addresses issues that might arise as you use the Microsoft Defender Advanced Threat service.
|
||||||
|
|
||||||
|
@ -23,9 +23,11 @@ ms.technology: mde
|
|||||||
|
|
||||||
|
|
||||||
**Applies to:**
|
**Applies to:**
|
||||||
|
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631)
|
||||||
|
- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)
|
||||||
|
|
||||||
|
> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-pullalerts-abovefoldlink)
|
||||||
|
|
||||||
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/?linkid=2154037)
|
|
||||||
- IT administrators
|
|
||||||
|
|
||||||
When you use [Network protection](network-protection.md) you may encounter issues, such as:
|
When you use [Network protection](network-protection.md) you may encounter issues, such as:
|
||||||
|
|
||||||
|
@ -22,15 +22,12 @@ ms.technology: mde
|
|||||||
|
|
||||||
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
|
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
|
||||||
|
|
||||||
|
**Applies to:**
|
||||||
**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/?linkid=2154037)
|
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631)
|
||||||
|
- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)
|
||||||
- Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink)
|
|
||||||
|
|
||||||
|
|
||||||
>Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-troublshootonboarding-abovefoldlink)
|
>Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-troublshootonboarding-abovefoldlink)
|
||||||
|
|
||||||
|
|
||||||
This page provides detailed steps to troubleshoot issues that might occur when setting up your Microsoft Defender for Endpoint service.
|
This page provides detailed steps to troubleshoot issues that might occur when setting up your Microsoft Defender for Endpoint service.
|
||||||
|
|
||||||
If you receive an error message, Microsoft Defender Security Center will provide a detailed explanation on what the issue is and relevant links will be supplied.
|
If you receive an error message, Microsoft Defender Security Center will provide a detailed explanation on what the issue is and relevant links will be supplied.
|
||||||
|
@ -28,6 +28,9 @@ ms.technology: mde
|
|||||||
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/?linkid=2154037)
|
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/?linkid=2154037)
|
||||||
- Windows Server 2012 R2
|
- Windows Server 2012 R2
|
||||||
- Windows Server 2016
|
- Windows Server 2016
|
||||||
|
- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)
|
||||||
|
|
||||||
|
> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-pullalerts-abovefoldlink)
|
||||||
|
|
||||||
You might need to troubleshoot the Microsoft Defender for Endpoint onboarding process if you encounter issues.
|
You might need to troubleshoot the Microsoft Defender for Endpoint onboarding process if you encounter issues.
|
||||||
This page provides detailed steps to troubleshoot onboarding issues that might occur when deploying with one of the deployment tools and common errors that might occur on the devices.
|
This page provides detailed steps to troubleshoot onboarding issues that might occur when deploying with one of the deployment tools and common errors that might occur on the devices.
|
||||||
@ -330,121 +333,122 @@ The steps below provide guidance for the following scenario:
|
|||||||
|
|
||||||
1. Create an application in Microsoft Endpoint Configuration Manager.
|
1. Create an application in Microsoft Endpoint Configuration Manager.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
2. Select **Manually specify the application information**.
|
2. Select **Manually specify the application information**.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
3. Specify information about the application, then select **Next**.
|
3. Specify information about the application, then select **Next**.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
4. Specify information about the software center, then select **Next**.
|
4. Specify information about the software center, then select **Next**.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
5. In **Deployment types** select **Add**.
|
5. In **Deployment types** select **Add**.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
6. Select **Manually specify the deployment type information**, then select **Next**.
|
6. Select **Manually specify the deployment type information**, then select **Next**.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
7. Specify information about the deployment type, then select **Next**.
|
7. Specify information about the deployment type, then select **Next**.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
8. In **Content** > **Installation program** specify the command: `net start sense`.
|
8. In **Content** > **Installation program** specify the command: `net start sense`.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
9. In **Detection method**, select **Configure rules to detect the presence of this deployment type**, then select **Add Clause**.
|
9. In **Detection method**, select **Configure rules to detect the presence of this deployment type**, then select **Add Clause**.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
10. Specify the following detection rule details, then select **OK**:
|
10. Specify the following detection rule details, then select **OK**:
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
11. In **Detection method** select **Next**.
|
11. In **Detection method** select **Next**.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
12. In **User Experience**, specify the following information, then select **Next**:
|
12. In **User Experience**, specify the following information, then select **Next**:
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
13. In **Requirements**, select **Next**.
|
13. In **Requirements**, select **Next**.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
14. In **Dependencies**, select **Next**.
|
14. In **Dependencies**, select **Next**.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
15. In **Summary**, select **Next**.
|
15. In **Summary**, select **Next**.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
16. In **Completion**, select **Close**.
|
16. In **Completion**, select **Close**.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
17. In **Deployment types**, select **Next**.
|
17. In **Deployment types**, select **Next**.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
18. In **Summary**, select **Next**.
|
18. In **Summary**, select **Next**.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
The status is then displayed:
|
The status is then displayed:
|
||||||

|

|
||||||
|
|
||||||
19. In **Completion**, select **Close**.
|
19. In **Completion**, select **Close**.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
20. You can now deploy the application by right-clicking the app and selecting **Deploy**.
|
20. You can now deploy the application by right-clicking the app and selecting **Deploy**.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
21. In **General** select **Automatically distribute content for dependencies** and **Browse**.
|
21. In **General** select **Automatically distribute content for dependencies** and **Browse**.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
22. In **Content** select **Next**.
|
22. In **Content** select **Next**.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
23. In **Deployment settings**, select **Next**.
|
23. In **Deployment settings**, select **Next**.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
24. In **Scheduling** select **As soon as possible after the available time**, then select **Next**.
|
24. In **Scheduling** select **As soon as possible after the available time**, then select **Next**.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
25. In **User experience**, select **Commit changes at deadline or during a maintenance window (requires restarts)**, then select **Next**.
|
25. In **User experience**, select **Commit changes at deadline or during a maintenance window (requires restarts)**, then select **Next**.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
26. In **Alerts** select **Next**.
|
26. In **Alerts** select **Next**.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
27. In **Summary**, select **Next**.
|
27. In **Summary**, select **Next**.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
The status is then displayed
|
The status is then displayed
|
||||||

|

|
||||||
|
|
||||||
28. In **Completion**, select **Close**.
|
28. In **Completion**, select **Close**.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
|
|
||||||
## Related topics
|
## Related topics
|
||||||
|
|
||||||
|
@ -24,10 +24,11 @@ ms.technology: mde
|
|||||||
|
|
||||||
|
|
||||||
**Applies to:**
|
**Applies to:**
|
||||||
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/?linkid=2154037)
|
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631)
|
||||||
|
- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)
|
||||||
|
|
||||||
|
|
||||||
|
> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-pullalerts-abovefoldlink)
|
||||||
|
|
||||||
You might need to troubleshoot issues while pulling detections in your SIEM tools.
|
You might need to troubleshoot issues while pulling detections in your SIEM tools.
|
||||||
|
|
||||||
|
@ -28,8 +28,9 @@ ms.technology: mde
|
|||||||
|
|
||||||
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/?linkid=2154037)
|
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/?linkid=2154037)
|
||||||
- [Threat and vulnerability management](next-gen-threat-and-vuln-mgt.md)
|
- [Threat and vulnerability management](next-gen-threat-and-vuln-mgt.md)
|
||||||
|
- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)
|
||||||
|
|
||||||
>Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-portaloverview-abovefoldlink)
|
> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-portaloverview-abovefoldlink)
|
||||||
|
|
||||||
[!include[Prerelease information](../../includes/prerelease.md)]
|
[!include[Prerelease information](../../includes/prerelease.md)]
|
||||||
|
|
||||||
|
@ -27,8 +27,9 @@ ms.technology: mde
|
|||||||
|
|
||||||
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/?linkid=2154037)
|
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/?linkid=2154037)
|
||||||
- [Threat and vulnerability management](next-gen-threat-and-vuln-mgt.md)
|
- [Threat and vulnerability management](next-gen-threat-and-vuln-mgt.md)
|
||||||
|
- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)
|
||||||
|
|
||||||
>Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-portaloverview-abovefoldlink)
|
> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-portaloverview-abovefoldlink)
|
||||||
|
|
||||||
Threat and vulnerability management is a component of Defender for Endpoint, and provides both security administrators and security operations teams with unique value, including:
|
Threat and vulnerability management is a component of Defender for Endpoint, and provides both security administrators and security operations teams with unique value, including:
|
||||||
|
|
||||||
|
@ -27,6 +27,7 @@ ms.technology: mde
|
|||||||
|
|
||||||
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/?linkid=2154037)
|
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/?linkid=2154037)
|
||||||
- [Threat and vulnerability management](next-gen-threat-and-vuln-mgt.md)
|
- [Threat and vulnerability management](next-gen-threat-and-vuln-mgt.md)
|
||||||
|
- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)
|
||||||
|
|
||||||
>Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-portaloverview-abovefoldlink)
|
>Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-portaloverview-abovefoldlink)
|
||||||
|
|
||||||
|
@ -27,6 +27,8 @@ ms.technology: mde
|
|||||||
|
|
||||||
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/?linkid=2154037)
|
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/?linkid=2154037)
|
||||||
- [Threat and vulnerability management](next-gen-threat-and-vuln-mgt.md)
|
- [Threat and vulnerability management](next-gen-threat-and-vuln-mgt.md)
|
||||||
|
- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)
|
||||||
|
|
||||||
|
|
||||||
>Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-portaloverview-abovefoldlink)
|
>Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-portaloverview-abovefoldlink)
|
||||||
|
|
||||||
|
@ -27,6 +27,7 @@ ms.technology: mde
|
|||||||
|
|
||||||
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/?linkid=2154037)
|
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/?linkid=2154037)
|
||||||
- [Threat and vulnerability management](next-gen-threat-and-vuln-mgt.md)
|
- [Threat and vulnerability management](next-gen-threat-and-vuln-mgt.md)
|
||||||
|
- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)
|
||||||
|
|
||||||
>Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-portaloverview-abovefoldlink)
|
>Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-portaloverview-abovefoldlink)
|
||||||
|
|
||||||
|
@ -28,6 +28,7 @@ ms.technology: mde
|
|||||||
|
|
||||||
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/?linkid=2154037)
|
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/?linkid=2154037)
|
||||||
- [Threat and vulnerability management](next-gen-threat-and-vuln-mgt.md)
|
- [Threat and vulnerability management](next-gen-threat-and-vuln-mgt.md)
|
||||||
|
- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)
|
||||||
|
|
||||||
>Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-portaloverview-abovefoldlink)
|
>Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-portaloverview-abovefoldlink)
|
||||||
|
|
||||||
|
@ -27,6 +27,10 @@ ms.technology: mde
|
|||||||
|
|
||||||
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/?linkid=2154037)
|
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/?linkid=2154037)
|
||||||
- [Threat and vulnerability management](next-gen-threat-and-vuln-mgt.md)
|
- [Threat and vulnerability management](next-gen-threat-and-vuln-mgt.md)
|
||||||
|
- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)
|
||||||
|
|
||||||
|
> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-pullalerts-abovefoldlink)
|
||||||
|
|
||||||
|
|
||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
> Configuration score is now part of threat and vulnerability management as Microsoft Secure Score for Devices.
|
> Configuration score is now part of threat and vulnerability management as Microsoft Secure Score for Devices.
|
||||||
|
@ -26,6 +26,7 @@ ms.technology: mde
|
|||||||
|
|
||||||
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/?linkid=2154037)
|
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/?linkid=2154037)
|
||||||
- [Threat and vulnerability management](next-gen-threat-and-vuln-mgt.md)
|
- [Threat and vulnerability management](next-gen-threat-and-vuln-mgt.md)
|
||||||
|
- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)
|
||||||
|
|
||||||
>Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-portaloverview-abovefoldlink)
|
>Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-portaloverview-abovefoldlink)
|
||||||
|
|
||||||
|
@ -26,6 +26,7 @@ ms.technology: mde
|
|||||||
**Applies to:**
|
**Applies to:**
|
||||||
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/?linkid=2154037)
|
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/?linkid=2154037)
|
||||||
- [Threat and vulnerability management](next-gen-threat-and-vuln-mgt.md)
|
- [Threat and vulnerability management](next-gen-threat-and-vuln-mgt.md)
|
||||||
|
- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)
|
||||||
|
|
||||||
>Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-portaloverview-abovefoldlink)
|
>Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-portaloverview-abovefoldlink)
|
||||||
|
|
||||||
|
@ -27,6 +27,7 @@ ms.technology: mde
|
|||||||
|
|
||||||
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/?linkid=2154037)
|
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/?linkid=2154037)
|
||||||
- [Threat and vulnerability management](next-gen-threat-and-vuln-mgt.md)
|
- [Threat and vulnerability management](next-gen-threat-and-vuln-mgt.md)
|
||||||
|
- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)
|
||||||
|
|
||||||
>Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-portaloverview-abovefoldlink)
|
>Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-portaloverview-abovefoldlink)
|
||||||
|
|
||||||
|
@ -26,6 +26,7 @@ ms.technology: mde
|
|||||||
**Applies to:**
|
**Applies to:**
|
||||||
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/?linkid=2154037)
|
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/?linkid=2154037)
|
||||||
- [Threat and vulnerability management](next-gen-threat-and-vuln-mgt.md)
|
- [Threat and vulnerability management](next-gen-threat-and-vuln-mgt.md)
|
||||||
|
- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)
|
||||||
|
|
||||||
>Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-portaloverview-abovefoldlink)
|
>Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-portaloverview-abovefoldlink)
|
||||||
|
|
||||||
|
@ -27,6 +27,7 @@ ms.technology: mde
|
|||||||
|
|
||||||
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/?linkid=2154037)
|
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/?linkid=2154037)
|
||||||
- [Threat and vulnerability management](next-gen-threat-and-vuln-mgt.md)
|
- [Threat and vulnerability management](next-gen-threat-and-vuln-mgt.md)
|
||||||
|
- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)
|
||||||
|
|
||||||
>Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-portaloverview-abovefoldlink)
|
>Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-portaloverview-abovefoldlink)
|
||||||
|
|
||||||
|
@ -28,6 +28,7 @@ ms.technology: mde
|
|||||||
|
|
||||||
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/?linkid=2154037)
|
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/?linkid=2154037)
|
||||||
- [Threat and vulnerability management](next-gen-threat-and-vuln-mgt.md)
|
- [Threat and vulnerability management](next-gen-threat-and-vuln-mgt.md)
|
||||||
|
- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)
|
||||||
|
|
||||||
>Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-portaloverview-abovefoldlink)
|
>Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-portaloverview-abovefoldlink)
|
||||||
|
|
||||||
|
@ -26,6 +26,7 @@ ms.technology: mde
|
|||||||
**Applies to:**
|
**Applies to:**
|
||||||
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/?linkid=2154037)
|
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/?linkid=2154037)
|
||||||
- [Threat and vulnerability management](next-gen-threat-and-vuln-mgt.md)
|
- [Threat and vulnerability management](next-gen-threat-and-vuln-mgt.md)
|
||||||
|
- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)
|
||||||
|
|
||||||
>Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-portaloverview-abovefoldlink)
|
>Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-portaloverview-abovefoldlink)
|
||||||
|
|
||||||
|
@ -28,6 +28,7 @@ ms.technology: mde
|
|||||||
|
|
||||||
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/?linkid=2154037)
|
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/?linkid=2154037)
|
||||||
- [Threat and vulnerability management](next-gen-threat-and-vuln-mgt.md)
|
- [Threat and vulnerability management](next-gen-threat-and-vuln-mgt.md)
|
||||||
|
- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)
|
||||||
|
|
||||||
>Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-portaloverview-abovefoldlink)
|
>Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-portaloverview-abovefoldlink)
|
||||||
|
|
||||||
|
@ -21,8 +21,9 @@ ms.technology: mde
|
|||||||
|
|
||||||
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
|
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
|
||||||
|
|
||||||
|
**Applies to:**
|
||||||
**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/?linkid=2154037)
|
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/?linkid=2154037)
|
||||||
|
- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)
|
||||||
|
|
||||||
- Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink)
|
- Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink)
|
||||||
|
|
||||||
|
@ -21,10 +21,12 @@ ms.technology: mde
|
|||||||
|
|
||||||
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
|
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
|
||||||
|
|
||||||
|
**Applies to:**
|
||||||
|
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/?linkid=2154037)
|
||||||
|
- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)
|
||||||
|
|
||||||
**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/?linkid=2154037)
|
> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink)
|
||||||
|
|
||||||
- Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink)
|
|
||||||
|
|
||||||
[!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)]
|
[!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)]
|
||||||
|
|
||||||
|
@ -21,10 +21,11 @@ ms.technology: mde
|
|||||||
|
|
||||||
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
|
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
|
||||||
|
|
||||||
|
**Applies to:**
|
||||||
|
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/?linkid=2154037)
|
||||||
|
- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)
|
||||||
|
|
||||||
**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/?linkid=2154037)
|
> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink)
|
||||||
|
|
||||||
- Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink)
|
|
||||||
|
|
||||||
[!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)]
|
[!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)]
|
||||||
|
|
||||||
|
@ -24,8 +24,9 @@ ms.technology: mde
|
|||||||
|
|
||||||
|
|
||||||
**Applies to:**
|
**Applies to:**
|
||||||
|
|
||||||
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/?linkid=2154037)
|
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/?linkid=2154037)
|
||||||
|
- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)
|
||||||
|
|
||||||
|
|
||||||
>Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-usewdatp-abovefoldlink)
|
>Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-usewdatp-abovefoldlink)
|
||||||
|
|
||||||
|
@ -22,9 +22,9 @@ ms.technology: mde
|
|||||||
|
|
||||||
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
|
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
|
||||||
|
|
||||||
|
|
||||||
**Applies to:**
|
**Applies to:**
|
||||||
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/?linkid=2154037)
|
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/?linkid=2154037)
|
||||||
|
- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)
|
||||||
|
|
||||||
>Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-roles-abovefoldlink)
|
>Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-roles-abovefoldlink)
|
||||||
|
|
||||||
|
@ -21,10 +21,11 @@ ms.technology: mde
|
|||||||
|
|
||||||
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
|
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
|
||||||
|
|
||||||
|
**Applies to:**
|
||||||
|
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/?linkid=2154037)
|
||||||
|
- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)
|
||||||
|
|
||||||
**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/?linkid=2154037)
|
> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink)
|
||||||
|
|
||||||
- Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink)
|
|
||||||
|
|
||||||
[!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)]
|
[!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)]
|
||||||
|
|
||||||
|
@ -25,7 +25,9 @@ ms.technology: mde
|
|||||||
|
|
||||||
**Applies to:**
|
**Applies to:**
|
||||||
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/?linkid=2154037)
|
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/?linkid=2154037)
|
||||||
|
- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)
|
||||||
|
|
||||||
|
> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-pullalerts-abovefoldlink)
|
||||||
|
|
||||||
The **Incidents queue** shows a collection of incidents that were flagged from devices in your network. It helps you sort through incidents to prioritize and create an informed cybersecurity response decision.
|
The **Incidents queue** shows a collection of incidents that were flagged from devices in your network. It helps you sort through incidents to prioritize and create an informed cybersecurity response decision.
|
||||||
|
|
||||||
|
@ -22,9 +22,11 @@ ms.technology: mde
|
|||||||
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
|
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
|
||||||
|
|
||||||
|
|
||||||
**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/?linkid=2154037)
|
**Applies to:**
|
||||||
|
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/?linkid=2154037)
|
||||||
|
- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)
|
||||||
|
|
||||||
- Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink)
|
> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-pullalerts-abovefoldlink)
|
||||||
|
|
||||||
[!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)]
|
[!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)]
|
||||||
|
|
||||||
|
@ -22,6 +22,10 @@ ms.technology: mde
|
|||||||
|
|
||||||
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
|
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
|
||||||
|
|
||||||
|
**Applies to:**
|
||||||
|
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631)
|
||||||
|
- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)
|
||||||
|
|
||||||
> [!IMPORTANT]
|
> [!IMPORTANT]
|
||||||
> **Web content filtering is currently in public preview**<br>
|
> **Web content filtering is currently in public preview**<br>
|
||||||
> This preview version is provided without a service level agreement, and it's not recommended for production workloads. Certain features might not be supported or might have constrained capabilities.
|
> This preview version is provided without a service level agreement, and it's not recommended for production workloads. Certain features might not be supported or might have constrained capabilities.
|
||||||
|
@ -22,6 +22,10 @@ ms.technology: mde
|
|||||||
|
|
||||||
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
|
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
|
||||||
|
|
||||||
|
**Applies to:**
|
||||||
|
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631)
|
||||||
|
- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)
|
||||||
|
|
||||||
>Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-main-abovefoldlink&rtc=1)
|
>Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-main-abovefoldlink&rtc=1)
|
||||||
|
|
||||||
Web protection lets you monitor your organization’s web browsing security through reports under **Reports > Web protection** in the Microsoft Defender Security Center. The report contains cards that provide web threat detection statistics.
|
Web protection lets you monitor your organization’s web browsing security through reports under **Reports > Web protection** in the Microsoft Defender Security Center. The report contains cards that provide web threat detection statistics.
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: Web protection
|
title: Web protection
|
||||||
description: Learn about web protection in Microsoft Defender ATP and how it can protect your organization
|
description: Learn about the web protection in Microsoft Defender ATP and how it can protect your organization
|
||||||
keywords: web protection, web threat protection, web browsing, security, phishing, malware, exploit, websites, network protection, Edge, Internet Explorer, Chrome, Firefox, web browser, malicious websites
|
keywords: web protection, web threat protection, web browsing, security, phishing, malware, exploit, websites, network protection, Edge, Internet Explorer, Chrome, Firefox, web browser, malicious websites
|
||||||
search.product: eADQiWindows 10XVcnh
|
search.product: eADQiWindows 10XVcnh
|
||||||
search.appverid: met150
|
search.appverid: met150
|
||||||
ms.prod: m365-security
|
ms.prod: m365-security
|
||||||
@ -22,6 +22,10 @@ ms.technology: mde
|
|||||||
|
|
||||||
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
|
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
|
||||||
|
|
||||||
|
**Applies to:**
|
||||||
|
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631)
|
||||||
|
- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)
|
||||||
|
|
||||||
|
|
||||||
>Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-main-abovefoldlink&rtc=1)
|
>Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-main-abovefoldlink&rtc=1)
|
||||||
|
|
||||||
|
@ -22,6 +22,9 @@ ms.technology: mde
|
|||||||
|
|
||||||
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
|
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
|
||||||
|
|
||||||
|
**Applies to:**
|
||||||
|
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631)
|
||||||
|
- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)
|
||||||
|
|
||||||
>Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-main-abovefoldlink&rtc=1)
|
>Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-main-abovefoldlink&rtc=1)
|
||||||
|
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: Protect your organization against web threats
|
title: Protect your organization against web threats
|
||||||
description: Learn about web protection in Microsoft Defender ATP and how it can protect your organization
|
description: Learn about web protection in Microsoft Defender ATP and how it can protect your organization.
|
||||||
keywords: web protection, web threat protection, web browsing, security, phishing, malware, exploit, websites, network protection, Edge, Internet Explorer, Chrome, Firefox, web browser
|
keywords: web protection, web threat protection, web browsing, security, phishing, malware, exploit, websites, network protection, Edge, Internet Explorer, Chrome, Firefox, web browser
|
||||||
search.product: eADQiWindows 10XVcnh
|
search.product: eADQiWindows 10XVcnh
|
||||||
search.appverid: met150
|
search.appverid: met150
|
||||||
ms.prod: m365-security
|
ms.prod: m365-security
|
||||||
@ -22,6 +22,9 @@ ms.technology: mde
|
|||||||
|
|
||||||
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
|
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
|
||||||
|
|
||||||
|
**Applies to:**
|
||||||
|
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631)
|
||||||
|
- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)
|
||||||
|
|
||||||
>Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-main-abovefoldlink&rtc=1)
|
>Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-main-abovefoldlink&rtc=1)
|
||||||
|
|
||||||
|
@ -26,8 +26,10 @@ ms.technology: mde
|
|||||||
|
|
||||||
|
|
||||||
**Applies to:**
|
**Applies to:**
|
||||||
|
|
||||||
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/?linkid=2154037)
|
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/?linkid=2154037)
|
||||||
|
- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)
|
||||||
|
|
||||||
|
> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-pullalerts-abovefoldlink)
|
||||||
|
|
||||||
The following features are generally available (GA) in the latest release of Microsoft Defender for Endpoint as well as security features in Windows 10 and Windows Server.
|
The following features are generally available (GA) in the latest release of Microsoft Defender for Endpoint as well as security features in Windows 10 and Windows Server.
|
||||||
|
|
||||||
|
Loading…
x
Reference in New Issue
Block a user