mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-12 13:27:23 +00:00
Merging changes synced from https://github.com/MicrosoftDocs/windows-docs-pr (branch live)
This commit is contained in:
commit
a39398420d
@ -9,7 +9,7 @@ manager: laurawi
|
|||||||
ms.author: greglin
|
ms.author: greglin
|
||||||
audience: Admin
|
audience: Admin
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
ms.date: 06/20/2019
|
ms.date: 11/19/2019
|
||||||
ms.localizationpriority: Medium
|
ms.localizationpriority: Medium
|
||||||
---
|
---
|
||||||
|
|
||||||
@ -27,10 +27,10 @@ ms.localizationpriority: Medium
|
|||||||
|**Graphics**| Intel UHD Graphics 620 |
|
|**Graphics**| Intel UHD Graphics 620 |
|
||||||
|**Wireless**| Wi-Fi 5 (IEEE 802.11 a/b/g/n/ac compatible) Bluetooth Wireless 4.1 technology <br> Miracast display |
|
|**Wireless**| Wi-Fi 5 (IEEE 802.11 a/b/g/n/ac compatible) Bluetooth Wireless 4.1 technology <br> Miracast display |
|
||||||
|**Connections**| USB-A <br> Mini-DisplayPort 1.2 video output <br> RJ45 gigabit Ethernet (1000/100/10 BaseT) <br> HDMI video input (HDMI 2.0, HDCP 2.2 /1.4) <br> USB-C with DisplayPort input <br> Four USB-C (on display) |
|
|**Connections**| USB-A <br> Mini-DisplayPort 1.2 video output <br> RJ45 gigabit Ethernet (1000/100/10 BaseT) <br> HDMI video input (HDMI 2.0, HDCP 2.2 /1.4) <br> USB-C with DisplayPort input <br> Four USB-C (on display) |
|
||||||
|**Sensors**| Doppler occupancy sensor <br> Accelerometer <br> Gyroscope |
|
|**Sensors**| Doppler occupancy <sup>2</sup> <br> Accelerometer <br> Gyroscope |
|
||||||
|**Audio/Video**| Full-range, front facing 3-way stereo speakers <br> Full band 8-element MEMS microphone array <br> Microsoft Surface Hub 2 Camera, 4K, USB-C connection, 90-degree HFOV |
|
|**Audio/Video**| Full-range, front facing 3-way stereo speakers <br> Full band 8-element MEMS microphone array <br> Microsoft Surface Hub 2 Camera, 4K, USB-C connection, 90-degree HFOV |
|
||||||
|**Pen**| Microsoft Surface Hub 2 Pen (active) |
|
|**Pen**| Microsoft Surface Hub 2 Pen (active) |
|
||||||
|**Software**| Windows 10 <br> Microsoft Teams for Surface Hub <sup>2</sup> <br> Skype for Business <br> Microsoft Whiteboard <br> Microsoft Office (Mobile) <br> Microsoft Power BI <sup>2</sup> |
|
|**Software**| Windows 10 <br> Microsoft Teams for Surface Hub <sup>3</sup> <br> Skype for Business <br> Microsoft Whiteboard <br> Microsoft Office (Mobile) <br> Microsoft Power BI <sup>2</sup> |
|
||||||
|**Exterior**| Casing: Precision machined aluminum with mineral-composite resin <br> Color: Platinum <br> Physical Buttons: Power, Volume, Source |
|
|**Exterior**| Casing: Precision machined aluminum with mineral-composite resin <br> Color: Platinum <br> Physical Buttons: Power, Volume, Source |
|
||||||
|**What’s in the box**| One Surface Hub 2S <br> One Surface Hub 2 Pen <br> One Surface Hub 2 Camera <br> 2.5 m AC Power Cable <br> Quick Start Guide |
|
|**What’s in the box**| One Surface Hub 2S <br> One Surface Hub 2 Pen <br> One Surface Hub 2 Camera <br> 2.5 m AC Power Cable <br> Quick Start Guide |
|
||||||
|**Warranty**| 1-year limited hardware warranty |
|
|**Warranty**| 1-year limited hardware warranty |
|
||||||
@ -41,4 +41,5 @@ ms.localizationpriority: Medium
|
|||||||
|**Input Power, standby**| 5 W max |
|
|**Input Power, standby**| 5 W max |
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> <sup>1</sup> System software uses significant storage space. Available storage is subject to change based on system software updates and apps usage. 1 GB= 1 billion bytes. See Surface.com/Storage for more details. <br> <sup>2</sup> Software license required for some features. Sold separately.<br>
|
> <sup>1</sup> System software uses significant storage space. Available storage is subject to change based on system software updates and apps usage. 1 GB= 1 billion bytes. See Surface.com/Storage for more details. <br> <sup>2</sup> Doppler sensor not available in Hong Kong due to local federal government restrictions.
|
||||||
|
<br> <sup>3</sup> Software license required for some features. Sold separately.<br>
|
||||||
|
File diff suppressed because it is too large
Load Diff
Binary file not shown.
Before Width: | Height: | Size: 86 KiB After Width: | Height: | Size: 90 KiB |
@ -1940,6 +1940,7 @@ How do I turn if off? | The service can be stopped from the "Services" console o
|
|||||||
|New or updated topic | Description|
|
|New or updated topic | Description|
|
||||||
|--- | ---|
|
|--- | ---|
|
||||||
|[Policy CSP - DeliveryOptimization](policy-csp-deliveryoptimization.md)|Added option 5 in the supported values list for DeliveryOptimization/DOGroupIdSource.|
|
|[Policy CSP - DeliveryOptimization](policy-csp-deliveryoptimization.md)|Added option 5 in the supported values list for DeliveryOptimization/DOGroupIdSource.|
|
||||||
|
|[DiagnosticLog CSP](diagnosticlog-csp.md)|Added substantial updates to this CSP doc.|
|
||||||
|
|
||||||
### October 2019
|
### October 2019
|
||||||
|
|
||||||
|
@ -72,3 +72,4 @@ See how you can [improve your security configuration](https://docs.microsoft.com
|
|||||||
- [Software inventory](tvm-software-inventory.md)
|
- [Software inventory](tvm-software-inventory.md)
|
||||||
- [Weaknesses](tvm-weaknesses.md)
|
- [Weaknesses](tvm-weaknesses.md)
|
||||||
- [Scenarios](threat-and-vuln-mgt-scenarios.md)
|
- [Scenarios](threat-and-vuln-mgt-scenarios.md)
|
||||||
|
- [Configure data access for Threat & Vulnerability Management roles](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/user-roles#create-roles-and-assign-the-role-to-an-azure-active-directory-group)
|
||||||
|
@ -21,6 +21,8 @@ ms.topic: conceptual
|
|||||||
**Applies to:**
|
**Applies to:**
|
||||||
- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559)
|
- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559)
|
||||||
|
|
||||||
|
>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-portaloverview-abovefoldlink)
|
||||||
|
|
||||||
Effectively identifying, assessing, and remediating endpoint weaknesses is pivotal in running a healthy security program and reducing organizational risk. Threat & Vulnerability Management serves as an infrastructure for reducing organizational exposure, hardening endpoint surface area, and increasing organizational resilience.
|
Effectively identifying, assessing, and remediating endpoint weaknesses is pivotal in running a healthy security program and reducing organizational risk. Threat & Vulnerability Management serves as an infrastructure for reducing organizational exposure, hardening endpoint surface area, and increasing organizational resilience.
|
||||||
|
|
||||||
It helps organizations discover vulnerabilities and misconfigurations in real-time, based on sensors, without the need of agents or periodic scans. It prioritizes vulnerabilities based on the threat landscape, detections in your organization, sensitive information on vulnerable devices, and business context.
|
It helps organizations discover vulnerabilities and misconfigurations in real-time, based on sensors, without the need of agents or periodic scans. It prioritizes vulnerabilities based on the threat landscape, detections in your organization, sensitive information on vulnerable devices, and business context.
|
||||||
@ -66,3 +68,4 @@ Microsoft Defender ATP’s Threat & Vulnerability Management allows security adm
|
|||||||
- [Software inventory](tvm-software-inventory.md)
|
- [Software inventory](tvm-software-inventory.md)
|
||||||
- [Weaknesses](tvm-weaknesses.md)
|
- [Weaknesses](tvm-weaknesses.md)
|
||||||
- [Scenarios](threat-and-vuln-mgt-scenarios.md)
|
- [Scenarios](threat-and-vuln-mgt-scenarios.md)
|
||||||
|
- [Configure data access for Threat & Vulnerability Management roles](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/user-roles#create-roles-and-assign-the-role-to-an-azure-active-directory-group)
|
||||||
|
@ -21,6 +21,10 @@ ms.topic: article
|
|||||||
**Applies to:**
|
**Applies to:**
|
||||||
- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559)
|
- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559)
|
||||||
|
|
||||||
|
>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-portaloverview-abovefoldlink)
|
||||||
|
|
||||||
|
[!include[Prerelease information](prerelease.md)]
|
||||||
|
|
||||||
## Before you begin
|
## Before you begin
|
||||||
Ensure that your machines:
|
Ensure that your machines:
|
||||||
- Are onboarded to Microsoft Defender Advanced Threat Protection
|
- Are onboarded to Microsoft Defender Advanced Threat Protection
|
||||||
@ -189,3 +193,4 @@ ComputerName=any(ComputerName) by MachineId, AlertId
|
|||||||
- [Weaknesses](tvm-weaknesses.md)
|
- [Weaknesses](tvm-weaknesses.md)
|
||||||
- [Advanced hunting overview](overview-hunting.md)
|
- [Advanced hunting overview](overview-hunting.md)
|
||||||
- [All Advanced hunting tables](advanced-hunting-reference.md)
|
- [All Advanced hunting tables](advanced-hunting-reference.md)
|
||||||
|
- [Configure data access for Threat & Vulnerability Management roles](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/user-roles#create-roles-and-assign-the-role-to-an-azure-active-directory-group)
|
||||||
|
@ -77,3 +77,4 @@ See [Microsoft Defender ATP icons](https://docs.microsoft.com/windows/security/t
|
|||||||
- [Software inventory](tvm-software-inventory.md)
|
- [Software inventory](tvm-software-inventory.md)
|
||||||
- [Weaknesses](tvm-weaknesses.md)
|
- [Weaknesses](tvm-weaknesses.md)
|
||||||
- [Scenarios](threat-and-vuln-mgt-scenarios.md)
|
- [Scenarios](threat-and-vuln-mgt-scenarios.md)
|
||||||
|
- [Configure data access for Threat & Vulnerability Management roles](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/user-roles#create-roles-and-assign-the-role-to-an-azure-active-directory-group)
|
||||||
|
@ -46,3 +46,4 @@ Reduce the exposure score by addressing what needs to be remediated based on the
|
|||||||
- [Software inventory](tvm-software-inventory.md)
|
- [Software inventory](tvm-software-inventory.md)
|
||||||
- [Weaknesses](tvm-weaknesses.md)
|
- [Weaknesses](tvm-weaknesses.md)
|
||||||
- [Scenarios](threat-and-vuln-mgt-scenarios.md)
|
- [Scenarios](threat-and-vuln-mgt-scenarios.md)
|
||||||
|
- [Configure data access for Threat & Vulnerability Management roles](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/user-roles#create-roles-and-assign-the-role-to-an-azure-active-directory-group)
|
||||||
|
@ -21,6 +21,8 @@ ms.date: 04/11/2019
|
|||||||
**Applies to:**
|
**Applies to:**
|
||||||
- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559)
|
- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559)
|
||||||
|
|
||||||
|
>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-portaloverview-abovefoldlink)
|
||||||
|
|
||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
>To use this capability, enable your Microsoft Intune connections. Navigate to **Settings** > **General** > **Advanced features**. Scroll down and look for **Microsoft Intune connection**. By default, the toggle is turned off. Turn your **Microsoft Intune connection** toggle on.
|
>To use this capability, enable your Microsoft Intune connections. Navigate to **Settings** > **General** > **Advanced features**. Scroll down and look for **Microsoft Intune connection**. By default, the toggle is turned off. Turn your **Microsoft Intune connection** toggle on.
|
||||||
|
|
||||||
@ -113,5 +115,6 @@ The exception impact shows on both the Security recommendations page column and
|
|||||||
- [Software inventory](tvm-software-inventory.md)
|
- [Software inventory](tvm-software-inventory.md)
|
||||||
- [Weaknesses](tvm-weaknesses.md)
|
- [Weaknesses](tvm-weaknesses.md)
|
||||||
- [Scenarios](threat-and-vuln-mgt-scenarios.md)
|
- [Scenarios](threat-and-vuln-mgt-scenarios.md)
|
||||||
|
- [Configure data access for Threat & Vulnerability Management roles](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/user-roles#create-roles-and-assign-the-role-to-an-azure-active-directory-group)
|
||||||
|
|
||||||
|
|
||||||
|
@ -21,6 +21,10 @@ ms.date: 04/11/2019
|
|||||||
**Applies to:**
|
**Applies to:**
|
||||||
- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559)
|
- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559)
|
||||||
|
|
||||||
|
>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-portaloverview-abovefoldlink)
|
||||||
|
|
||||||
|
[!include[Prerelease information](prerelease.md)]
|
||||||
|
|
||||||
The cybersecurity weaknesses identified in your organization are mapped to actionable security recommendations and prioritized by their impact on the security recommendation list. Prioritized recommendation helps shorten the mean time to mitigate or remediate vulnerabilities and drive compliance.
|
The cybersecurity weaknesses identified in your organization are mapped to actionable security recommendations and prioritized by their impact on the security recommendation list. Prioritized recommendation helps shorten the mean time to mitigate or remediate vulnerabilities and drive compliance.
|
||||||
|
|
||||||
Each security recommendation includes an actionable remediation recommendation which can be pushed into the IT task queue through a built-in integration with Microsoft Intune and Microsoft System Center Configuration Manager (SCCM). It is also dynamic in the sense that when the threat landscape changes, the recommendation also changes as it continuously collect information from your environment.
|
Each security recommendation includes an actionable remediation recommendation which can be pushed into the IT task queue through a built-in integration with Microsoft Intune and Microsoft System Center Configuration Manager (SCCM). It is also dynamic in the sense that when the threat landscape changes, the recommendation also changes as it continuously collect information from your environment.
|
||||||
@ -88,3 +92,4 @@ You can report a false positive when you see any vague, inaccurate, incomplete,
|
|||||||
- [Software inventory](tvm-software-inventory.md)
|
- [Software inventory](tvm-software-inventory.md)
|
||||||
- [Weaknesses](tvm-weaknesses.md)
|
- [Weaknesses](tvm-weaknesses.md)
|
||||||
- [Scenarios](threat-and-vuln-mgt-scenarios.md)
|
- [Scenarios](threat-and-vuln-mgt-scenarios.md)
|
||||||
|
- [Configure data access for Threat & Vulnerability Management roles](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/user-roles#create-roles-and-assign-the-role-to-an-azure-active-directory-group)
|
||||||
|
@ -21,6 +21,10 @@ ms.date: 04/11/2019
|
|||||||
**Applies to:**
|
**Applies to:**
|
||||||
- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559)
|
- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559)
|
||||||
|
|
||||||
|
>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-portaloverview-abovefoldlink)
|
||||||
|
|
||||||
|
[!include[Prerelease information](prerelease.md)]
|
||||||
|
|
||||||
Microsoft Defender ATP Threat & Vulnerability management's discovery capability shows in the **Software inventory** page. The software inventory includes the name of the product or vendor, the latest version it is in, and the number of weaknesses and vulnerabilities detected with it.
|
Microsoft Defender ATP Threat & Vulnerability management's discovery capability shows in the **Software inventory** page. The software inventory includes the name of the product or vendor, the latest version it is in, and the number of weaknesses and vulnerabilities detected with it.
|
||||||
|
|
||||||
## Navigate through your software inventory
|
## Navigate through your software inventory
|
||||||
@ -66,3 +70,4 @@ You can report a false positive when you see any vague, inaccurate version, inco
|
|||||||
- [Remediation and exception](tvm-remediation.md)
|
- [Remediation and exception](tvm-remediation.md)
|
||||||
- [Weaknesses](tvm-weaknesses.md)
|
- [Weaknesses](tvm-weaknesses.md)
|
||||||
- [Scenarios](threat-and-vuln-mgt-scenarios.md)
|
- [Scenarios](threat-and-vuln-mgt-scenarios.md)
|
||||||
|
- [Configure data access for Threat & Vulnerability Management roles](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/user-roles#create-roles-and-assign-the-role-to-an-azure-active-directory-group)
|
||||||
|
@ -19,7 +19,9 @@ ms.date: 10/31/2019
|
|||||||
---
|
---
|
||||||
# Weaknesses
|
# Weaknesses
|
||||||
**Applies to:**
|
**Applies to:**
|
||||||
- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559
|
- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559)
|
||||||
|
|
||||||
|
>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-portaloverview-abovefoldlink)
|
||||||
|
|
||||||
[!include[Prerelease information](prerelease.md)]
|
[!include[Prerelease information](prerelease.md)]
|
||||||
|
|
||||||
@ -33,7 +35,7 @@ The **Weaknesses** page lists down the vulnerabilities found in the infected sof
|
|||||||
>- RS5 customers | [KB 4516077](https://support.microsoft.com/help/4516077/windows-10-update-kb4516077)
|
>- RS5 customers | [KB 4516077](https://support.microsoft.com/help/4516077/windows-10-update-kb4516077)
|
||||||
>- RS4 customers | [KB 4516045](https://support.microsoft.com/help/4516045/windows-10-update-kb4516045)
|
>- RS4 customers | [KB 4516045](https://support.microsoft.com/help/4516045/windows-10-update-kb4516045)
|
||||||
>- RS3 customers | [KB 4516071](https://support.microsoft.com/help/4516071/windows-10-update-kb4516071)
|
>- RS3 customers | [KB 4516071](https://support.microsoft.com/help/4516071/windows-10-update-kb4516071)
|
||||||
><P>Downloading the above-mentioned security updates will be mandatory starting Patch Tuesday, October 8, 2019.
|
|
||||||
|
|
||||||
## Navigate through your organization's weaknesses page
|
## Navigate through your organization's weaknesses page
|
||||||
You can access the list of vulnerabilities in a few places in the portal:
|
You can access the list of vulnerabilities in a few places in the portal:
|
||||||
@ -129,3 +131,4 @@ You can report a false positive when you see any vague, inaccurate, missing, or
|
|||||||
- [Remediation and exception](tvm-remediation.md)
|
- [Remediation and exception](tvm-remediation.md)
|
||||||
- [Software inventory](tvm-software-inventory.md)
|
- [Software inventory](tvm-software-inventory.md)
|
||||||
- [Scenarios](threat-and-vuln-mgt-scenarios.md)
|
- [Scenarios](threat-and-vuln-mgt-scenarios.md)
|
||||||
|
- [Configure data access for Threat & Vulnerability Management roles](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/user-roles#create-roles-and-assign-the-role-to-an-azure-active-directory-group)
|
||||||
|
Loading…
x
Reference in New Issue
Block a user