mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-13 05:47:23 +00:00
commit
9ae7a539fd
@ -28,6 +28,8 @@ ms.topic: article
|
|||||||
|
|
||||||
Conditional Access is a capability that helps you better protect your users and enterprise information by making sure that only secure devices have access to applications.
|
Conditional Access is a capability that helps you better protect your users and enterprise information by making sure that only secure devices have access to applications.
|
||||||
|
|
||||||
|
> [!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RE4byD1]
|
||||||
|
|
||||||
With Conditional Access, you can control access to enterprise information based on the risk level of a device. This helps keep trusted users on trusted devices using trusted applications.
|
With Conditional Access, you can control access to enterprise information based on the risk level of a device. This helps keep trusted users on trusted devices using trusted applications.
|
||||||
|
|
||||||
You can define security conditions under which devices and applications can run and access information from your network by enforcing policies to stop applications from running until a device returns to a compliant state.
|
You can define security conditions under which devices and applications can run and access information from your network by enforcing policies to stop applications from running until a device returns to a compliant state.
|
||||||
|
@ -25,6 +25,8 @@ ms.topic: conceptual
|
|||||||
|
|
||||||
Microsoft Defender Advanced Threat Protection is a platform designed to help enterprise networks prevent, detect, investigate, and respond to advanced threats.
|
Microsoft Defender Advanced Threat Protection is a platform designed to help enterprise networks prevent, detect, investigate, and respond to advanced threats.
|
||||||
|
|
||||||
|
> [!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RE4obJq]
|
||||||
|
|
||||||
Microsoft Defender ATP uses the following combination of technology built into Windows 10 and Microsoft's robust cloud service:
|
Microsoft Defender ATP uses the following combination of technology built into Windows 10 and Microsoft's robust cloud service:
|
||||||
|
|
||||||
- **Endpoint behavioral sensors**: Embedded in Windows 10, these sensors
|
- **Endpoint behavioral sensors**: Embedded in Windows 10, these sensors
|
||||||
|
@ -35,6 +35,8 @@ In general, to onboard devices to the service:
|
|||||||
- Use the appropriate management tool and deployment method for your devices
|
- Use the appropriate management tool and deployment method for your devices
|
||||||
- Run a detection test to verify that the devices are properly onboarded and reporting to the service
|
- Run a detection test to verify that the devices are properly onboarded and reporting to the service
|
||||||
|
|
||||||
|
>[!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RE4bGqr]
|
||||||
|
|
||||||
## In this section
|
## In this section
|
||||||
Topic | Description
|
Topic | Description
|
||||||
:---|:---
|
:---|:---
|
||||||
|
@ -28,6 +28,8 @@ ms.topic: article
|
|||||||
|
|
||||||
Using role-based access control (RBAC), you can create roles and groups within your security operations team to grant appropriate access to the portal. Based on the roles and groups you create, you have fine-grained control over what users with access to the portal can see and do.
|
Using role-based access control (RBAC), you can create roles and groups within your security operations team to grant appropriate access to the portal. Based on the roles and groups you create, you have fine-grained control over what users with access to the portal can see and do.
|
||||||
|
|
||||||
|
> [!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RE4bJ2a]
|
||||||
|
|
||||||
Large geo-distributed security operations teams typically adopt a tier-based model to assign and authorize access to security portals. Typical tiers include the following three levels:
|
Large geo-distributed security operations teams typically adopt a tier-based model to assign and authorize access to security portals. Typical tiers include the following three levels:
|
||||||
|
|
||||||
Tier | Description
|
Tier | Description
|
||||||
|
@ -209,6 +209,8 @@ Results of deep analysis are matched against threat intelligence and any matches
|
|||||||
|
|
||||||
Use the deep analysis feature to investigate the details of any file, usually during an investigation of an alert or for any other reason where you suspect malicious behavior. This feature is available within the **Deep analysis** tab, on the file's profile page.
|
Use the deep analysis feature to investigate the details of any file, usually during an investigation of an alert or for any other reason where you suspect malicious behavior. This feature is available within the **Deep analysis** tab, on the file's profile page.
|
||||||
|
|
||||||
|
>[!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RE4bGqr]
|
||||||
|
|
||||||
**Submit for deep analysis** is enabled when the file is available in the Microsoft Defender ATP backend sample collection, or if it was observed on a Windows 10 machine that supports submitting to deep analysis.
|
**Submit for deep analysis** is enabled when the file is available in the Microsoft Defender ATP backend sample collection, or if it was observed on a Windows 10 machine that supports submitting to deep analysis.
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
|
Loading…
x
Reference in New Issue
Block a user