diff --git a/windows/security/threat-protection/TOC.md b/windows/security/threat-protection/TOC.md index d61eb7e32c..a0cee44011 100644 --- a/windows/security/threat-protection/TOC.md +++ b/windows/security/threat-protection/TOC.md @@ -158,6 +158,7 @@ ### [Prepare deployment](microsoft-defender-atp/prepare-deployment.md) ### [Evaluate capabilities](microsoft-defender-atp/evaluation-lab.md) ### [Production deployment](microsoft-defender-atp/production-deployment.md) +### [Helpful resources](microsoft-defender-atp/helpful-resources.md) ## [Get started]() diff --git a/windows/security/threat-protection/microsoft-defender-atp/helpful-resources.md b/windows/security/threat-protection/microsoft-defender-atp/helpful-resources.md new file mode 100644 index 0000000000..97c61a3fba --- /dev/null +++ b/windows/security/threat-protection/microsoft-defender-atp/helpful-resources.md @@ -0,0 +1,60 @@ +--- +title: Helpful Microsoft Defender Advanced Threat Protection resources +description: Access helpful resources such as links to blogs and other resources related to Microsoft Defender Advanced Threat Protection +keywords: Microsoft Defender Security Center, product brief, brief, capabilities, licensing +search.product: eADQiWindows 10XVcnh +search.appverid: met150 +ms.prod: w10 +ms.mktglfcycl: deploy +ms.sitesec: library +ms.pagetype: security +ms.author: macapara +author: mjcaparas +ms.localizationpriority: medium +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual +--- + +# Helpful Microsoft Defender Advanced Threat Protection resources + +**Applies to:** +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) + +Access helpful resources such as links to blogs and other resources related to Microsoft Defender Advanced Threat Protection. + +## Endpoint protection platform +- [Top scoring in industry + tests](https://docs.microsoft.com/windows/security/threat-protection/intelligence/top-scoring-industry-antivirus-tests) + +- [Inside out: Get to know the advanced technologies at the core of Microsoft + Defender ATP next generation + protection](https://www.microsoft.com/security/blog/2019/06/24/inside-out-get-to-know-the-advanced-technologies-at-the-core-of-microsoft-defender-atp-next-generation-protection/) + +- [Protecting disconnected devices with Microsoft Defender + ATP](https://techcommunity.microsoft.com/t5/Microsoft-Defender-ATP/Protecting-disconnected-devices-with-Microsoft-Defender-ATP/ba-p/500341) + +- [Tamper protection in Microsoft Defender + ATP](https://techcommunity.microsoft.com/t5/Microsoft-Defender-ATP/Tamper-protection-in-Microsoft-Defender-ATP/ba-p/389571) + +## Endpoint Detection Response + +- [Incident response at your fingertips with Microsoft Defender ATP live + response](https://techcommunity.microsoft.com/t5/Microsoft-Defender-ATP/Incident-response-at-your-fingertips-with-Microsoft-Defender-ATP/ba-p/614894) + +## Threat Vulnerability Management + +- [MDATP Threat & Vulnerability Management now publicly + available!](https://techcommunity.microsoft.com/t5/Microsoft-Defender-ATP/MDATP-Threat-amp-Vulnerability-Management-now-publicly-available/ba-p/460977) + +## Operational + +- [The Golden Hour remake - Defining metrics for a successful security + operations](https://techcommunity.microsoft.com/t5/Microsoft-Defender-ATP/The-Golden-Hour-remake-Defining-metrics-for-a-successful/ba-p/782014) + +- [Microsoft Defender ATP Evaluation lab is now available in public preview + ](https://techcommunity.microsoft.com/t5/Microsoft-Defender-ATP/Microsoft-Defender-ATP-Evaluation-lab-is-now-available-in-public/ba-p/770271) + +- [How automation brings value to your security + teams](https://techcommunity.microsoft.com/t5/Microsoft-Defender-ATP/How-automation-brings-value-to-your-security-teams/ba-p/729297) \ No newline at end of file diff --git a/windows/security/threat-protection/microsoft-defender-atp/production-deployment.md b/windows/security/threat-protection/microsoft-defender-atp/production-deployment.md index 0d98ba7700..1afb2bb4d9 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/production-deployment.md +++ b/windows/security/threat-protection/microsoft-defender-atp/production-deployment.md @@ -581,31 +581,26 @@ Protection in audit mode. ![A screenshot System Center Configuration Manager](images/728c10ef26042bbdbcd270b6343f1a8a.png) 2. Select **Controlled folder access**. - - ![A screenshot System Center Configuration Manager](images/a8b934dab2dbba289cf64fe30e0e8aa4.png) - + 3. Set the configuration to **Audit** and click **Next**. + ![A screenshot System Center Configuration Manager](images/a8b934dab2dbba289cf64fe30e0e8aa4.png) + +4. Confirm the new Exploit Guard Policy by clicking on **Next**. + ![A screenshot System Center Configuration Manager](images/0a6536f2c4024c08709cac8fcf800060.png) - Confirm the new exploit guard policy by clicking on **Next** +5. Once the policy is created click on **Close**. -![A screenshot of a cell phone Description automatically generated](images/95d23a07c2c8bc79176788f28cef7557.png) + ![A screenshot System Center Configuration Manager](images/95d23a07c2c8bc79176788f28cef7557.png) - Once the policy is created click on **Close** +6. Right-click on the newly created policy and choose **Deploy**. -![](images/8999dd697e3b495c04eb911f8b68a1ef.png) + ![A screenshot System Center Configuration Manager](images/8999dd697e3b495c04eb911f8b68a1ef.png) -> A screenshot of a cell phone Description automatically generated +7. Target the policy to the newly created Windows 10 collection and click **OK**. -> Right click on the newly created policy and choose **Deploy** + ![A screenshot System Center Configuration Manager](images/0ccfe3e803be4b56c668b220b51da7f7.png) -![](images/0ccfe3e803be4b56c668b220b51da7f7.png) +After completing this task, you now have successfully configured Controlled folder access in audit mode. -> A screenshot of a social images post Description automatically generated - -> Target the policy to the newly created Windows 10 collection and choose -> **OK** - -After completing this task, you now have successfully configured Controlled -folder access in audit mode.