mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-22 22:03:46 +00:00
remove azure intune section
This commit is contained in:
@ -117,70 +117,8 @@ Configuration for onboarded machines: telemetry reporting frequency | ./Device/V
|
||||
>[!TIP]
|
||||
> After onboarding the endpoint, you can choose to run a detection test to verify that an endpoint is properly onboarded to the service. For more information, see [Run a detection test on a newly onboarded Windows Defender ATP endpoint](run-detection-test-windows-defender-advanced-threat-protection.md).
|
||||
|
||||
<!---
|
||||
### Using the Azure Intune Portal to deploy Windows Defender Advanced Threat Protection policies on Windows 10 1607 and higher
|
||||
|
||||
1. Open the Microsoft Intune configuration package .zip file (*WindowsDefenderATPOnboardingPackage.zip*) that you downloaded from the service onboarding wizard. You can also get the package from the [Windows Defender ATP portal](https://securitycenter.windows.com/):
|
||||
|
||||
a. Select **Endpoint management** > **Clients** on the **Navigation pane**.
|
||||
|
||||
b. Select **Mobile Device Management/Microsoft Intune** > **Download package** and save the .zip file.
|
||||
|
||||

|
||||
|
||||
2. Extract the contents of the .zip file to a shared, read-only location that can be accessed by the network administrators who will deploy the package. You should have a file named *WindowsDefenderATP.onboarding*.
|
||||
|
||||
3. Login to the [Microsoft Azure portal](https://portal.azure.com).
|
||||
|
||||
4. From the Intune blade, choose **Device configuration**.
|
||||
|
||||

|
||||
|
||||
5. Under **Manage**, choose **Profiles** and click **Create Profile**.
|
||||
|
||||

|
||||
|
||||
6. Type a name, description and choose **Windows 10 and later** as the Platform and **Custom** as the Profile type.
|
||||
|
||||

|
||||
|
||||
7. Click **Settings** > **Configure**.
|
||||
|
||||

|
||||
|
||||
8. Under Custom OMA-URI Settings, click **Add**.
|
||||
|
||||

|
||||
|
||||
9. Enter the following values, then click **OK**.
|
||||
|
||||

|
||||
|
||||
- **Name**: Type a name for the setting.
|
||||
- **Description**: Type a description for the setting.
|
||||
- **OMA-URI**: _./Device/Vendor/MSFT/WindowsAdvancedThreatProtection/Onboarding_
|
||||
- **Value**: Copy and paste the contents of the WindowsDefenderATP.onboarding file you downloaded.
|
||||
|
||||
10. Save the settings by clicking **OK**.
|
||||
|
||||
11. Click **Create**.
|
||||
|
||||

|
||||
|
||||
12. To deploy the Profile, click **Assignments**.
|
||||
|
||||

|
||||
|
||||
13. Search for and select the Group you want to apply the Configuration Profile to, then click **Select**.
|
||||
|
||||

|
||||
|
||||
14. Click **Save** to finish deploying the Configuration Profile.
|
||||
|
||||

|
||||
|
||||
|
||||
-->
|
||||
### Offboard and monitor endpoints
|
||||
|
||||
For security reasons, the package used to offboard endpoints will expire 30 days after the date it was downloaded. Expired offboarding packages sent to an endpoint will be rejected. When downloading an offboarding package you will be notified of the packages expiry date and it will also be included in the package name.
|
||||
|
Reference in New Issue
Block a user