mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-16 02:43:43 +00:00
additional resources
This commit is contained in:
@ -158,6 +158,7 @@
|
||||
### [Prepare deployment](microsoft-defender-atp/prepare-deployment.md)
|
||||
### [Evaluate capabilities](microsoft-defender-atp/evaluation-lab.md)
|
||||
### [Production deployment](microsoft-defender-atp/production-deployment.md)
|
||||
### [Helpful resources](microsoft-defender-atp/helpful-resources.md)
|
||||
|
||||
|
||||
## [Get started]()
|
||||
|
@ -0,0 +1,60 @@
|
||||
---
|
||||
title: Helpful Microsoft Defender Advanced Threat Protection resources
|
||||
description: Access helpful resources such as links to blogs and other resources related to Microsoft Defender Advanced Threat Protection
|
||||
keywords: Microsoft Defender Security Center, product brief, brief, capabilities, licensing
|
||||
search.product: eADQiWindows 10XVcnh
|
||||
search.appverid: met150
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
ms.author: macapara
|
||||
author: mjcaparas
|
||||
ms.localizationpriority: medium
|
||||
manager: dansimp
|
||||
audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
---
|
||||
|
||||
# Helpful Microsoft Defender Advanced Threat Protection resources
|
||||
|
||||
**Applies to:**
|
||||
- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559)
|
||||
|
||||
Access helpful resources such as links to blogs and other resources related to Microsoft Defender Advanced Threat Protection.
|
||||
|
||||
## Endpoint protection platform
|
||||
- [Top scoring in industry
|
||||
tests](https://docs.microsoft.com/windows/security/threat-protection/intelligence/top-scoring-industry-antivirus-tests)
|
||||
|
||||
- [Inside out: Get to know the advanced technologies at the core of Microsoft
|
||||
Defender ATP next generation
|
||||
protection](https://www.microsoft.com/security/blog/2019/06/24/inside-out-get-to-know-the-advanced-technologies-at-the-core-of-microsoft-defender-atp-next-generation-protection/)
|
||||
|
||||
- [Protecting disconnected devices with Microsoft Defender
|
||||
ATP](https://techcommunity.microsoft.com/t5/Microsoft-Defender-ATP/Protecting-disconnected-devices-with-Microsoft-Defender-ATP/ba-p/500341)
|
||||
|
||||
- [Tamper protection in Microsoft Defender
|
||||
ATP](https://techcommunity.microsoft.com/t5/Microsoft-Defender-ATP/Tamper-protection-in-Microsoft-Defender-ATP/ba-p/389571)
|
||||
|
||||
## Endpoint Detection Response
|
||||
|
||||
- [Incident response at your fingertips with Microsoft Defender ATP live
|
||||
response](https://techcommunity.microsoft.com/t5/Microsoft-Defender-ATP/Incident-response-at-your-fingertips-with-Microsoft-Defender-ATP/ba-p/614894)
|
||||
|
||||
## Threat Vulnerability Management
|
||||
|
||||
- [MDATP Threat & Vulnerability Management now publicly
|
||||
available!](https://techcommunity.microsoft.com/t5/Microsoft-Defender-ATP/MDATP-Threat-amp-Vulnerability-Management-now-publicly-available/ba-p/460977)
|
||||
|
||||
## Operational
|
||||
|
||||
- [The Golden Hour remake - Defining metrics for a successful security
|
||||
operations](https://techcommunity.microsoft.com/t5/Microsoft-Defender-ATP/The-Golden-Hour-remake-Defining-metrics-for-a-successful/ba-p/782014)
|
||||
|
||||
- [Microsoft Defender ATP Evaluation lab is now available in public preview
|
||||
](https://techcommunity.microsoft.com/t5/Microsoft-Defender-ATP/Microsoft-Defender-ATP-Evaluation-lab-is-now-available-in-public/ba-p/770271)
|
||||
|
||||
- [How automation brings value to your security
|
||||
teams](https://techcommunity.microsoft.com/t5/Microsoft-Defender-ATP/How-automation-brings-value-to-your-security-teams/ba-p/729297)
|
@ -581,31 +581,26 @@ Protection in audit mode.
|
||||

|
||||
|
||||
2. Select **Controlled folder access**.
|
||||
|
||||

|
||||
|
||||
|
||||
3. Set the configuration to **Audit** and click **Next**.
|
||||
|
||||

|
||||
|
||||
4. Confirm the new Exploit Guard Policy by clicking on **Next**.
|
||||
|
||||

|
||||
|
||||
Confirm the new exploit guard policy by clicking on **Next**
|
||||
5. Once the policy is created click on **Close**.
|
||||
|
||||

|
||||

|
||||
|
||||
Once the policy is created click on **Close**
|
||||
6. Right-click on the newly created policy and choose **Deploy**.
|
||||
|
||||

|
||||

|
||||
|
||||
> A screenshot of a cell phone Description automatically generated
|
||||
7. Target the policy to the newly created Windows 10 collection and click **OK**.
|
||||
|
||||
> Right click on the newly created policy and choose **Deploy**
|
||||

|
||||
|
||||

|
||||
After completing this task, you now have successfully configured Controlled folder access in audit mode.
|
||||
|
||||
> A screenshot of a social images post Description automatically generated
|
||||
|
||||
> Target the policy to the newly created Windows 10 collection and choose
|
||||
> **OK**
|
||||
|
||||
After completing this task, you now have successfully configured Controlled
|
||||
folder access in audit mode.
|
||||
|
Reference in New Issue
Block a user