=-wu0xl+0?qBH^y50!`8>$a-*FP#t}{o1{^(8|Sce|Lk6X%{&JjO4WVfB9Y^G
z&OQCz-=SBACML)`%6zQ=8j||Hop{S3XYXL)+X@Eus04MPgOI$b4918WZAtqaHz$?HsxL)VwhNz}A*GX
zbWLXxPI8B*1XA#vCz!*Z*N^7gdfcEFP&S^|LDxd|fv%}%9|B{BrQmP=sAxX~@S=+^
zJ#@5Rx5-xpCK_0HS3!~)W6=TX;5b=p_G!Vr+zoG)
zq@16{9bnuak@KSr?$C#6_i@hdZ+Dub4`WO^Q)+m}K{(pR`!OP|1w?i9a+!9DIxwnxcUZmUSy>~%@q
zjuw`$Hed@?n5?T7$Zq{gJierGEF<)=%F{I<>|{pFydhzwJz=s^ypm1c3*y_p0A!DD
zqdKYNVrv`MSne}@N2QrJk+WNdxDc^Wf1++7I240&g=78z6Pc<{9};`^N{>rE2*a=x
zLh{Lv$G#qy77Iu<7P>qXV-IdZ{%zQ#jd6kV+iOCJtxY1(4xB?@XrR*7w}VeYdx7!v
z3xR~259F}TxuW_5FAcXi64y9kyMj&1qN36iK=bF=im{j>N%RZBCw243E(gS;ip4Iz
z@?(Kdl~8+*m=&ukJ@Ra%e)D0#;&~rh;Fl)FJ{@`t3X0c5
zUsfZPC}`_-CUezpG~xU$(Ct@hA!CSJzu(psd`B!5xTL$i;Vdy%ayaQ&=z`-ZkE8g^
zBI1_|mC1!tpfJ-&sU~v?(Ii%Qi&toadMkL4v;5$O!T~YHH?1*S?+%IH50a|cdl=?8
z{@Hys@nn9Ky)~AVb#3EEbBRbOQxCc=)_s-pO{ScbWAE;x33}H!b|Zla14q)vPZriE
zDloE{6;6ZrU08IvddTVzCZ$!P!)a1Yfo8v--3#6pYj}{`d(ChRUE#P$!cvQD99vXQ
zj_nf8-(T5rFPC}e0JCVs2(w1*jNAdR|M!NN`Ilys&=)Vqx9wAf1;1;XyNjNut!Tj5
z-^<(WL|bGBJwSf`SeRq{wdnZ+R45R*ZZ%zkqzs+p27V$=FJQAoL7hU{xw2E$QPB7Um_G&irg2nn%pVFIX%+6
zqqFgE_wFWZCZnea);nXWD3r5qtg@ed0!Q!M@z}J;51YDf?T!Fm{`gj6R+y)l|Q{nE><*VE^|+d`giy_5_Qx|#`IDn;GmEE(63uDTTPO*}cY~fOU}@n|xM}qy6&nU#M05yyk5PXgYFSEy_w_IP+VS+A~=P$iXHP5A(wkFL%GerI-hd
zc(VQ6f-W&X2>v8#T6*!~TJMjT&pj`-{4#SQb7S3uS|I1lZsKnFj`bJzx@b=#?_^IW
z`*IGzj4J#s$dY%t;3lSAtp6X(dk2y3F?9`ZlU4$-B8P@@y%CM6LeHDdTg?afzR+JG
z7Tt@+U4~SHD_3=AzsWsEP|aO740nj`j;3b#gO?1J*a+%UxZ|t^H|ozyhQvM0QGe47
zXp~ZV5DH6b)wJl%Vh$#dx>`Xm%%kT`fyIHCFC<;l_a
z5wd%Kv^JGKqMxmw{S^GxUt(B80dg{k9}RKaIx^U4hddHf>z>(YY=u-^YPFkq)W&3d
z8jeVZ}XoIi86F!
zW9JqCQ<47WWs93%rf!PY=iQ;BQpA37VhUa0TTb9V)Ax~2fqdQgK=?z-!-*PF0gzn9=1Lr?pe7>xr5^B6P6`_+vo|^9eevlai
z>(yfJ){C-Kn@!6OrB8iN+5GB#b$eL04=LWDyJR}DH0w<<8bb|+PprfQh+?A6(Kp}4
z3C46cfFg`X_bog_)VTI$o)_P{PS~YLqM4
zcyUN17ONmSz;y23)Vv061oSa`6$;^=Y`T@DmL7M{Y8Ld3Y9^Yi#;4wfzCV1+
zzdSozOH<=~uk(+RXB~j&XGy`rt|(#iL~(b4=;6=5Jq^BfBHALL%Axo16p#thNVUAJ
z&SD|+1*1pIRLro41ygA$KY>BInfc^Ix;2Wb9dZZOR|1)#?KM{nG%i$wV6hk#6${Wu
zt>3K9^>rD-zi4qLN^WiSwv!>E$6EMiueHqYNv^7r#}V~yrv8d%xjvL9qOg=rPK8s?
zFPoY9zop(Xt|8z{aJZP#w@RE5+n9i(8(@9Ct<_4vE^sVi%X&F0miC1Rv4#9TpED{3
zf@aQg!WKik?Rr=ky)Ac(Y#3)Nz=27xVwamM#Qm>uEC9|QFb$H!my1oC*i()7$IQ=(
zgmbt(r>jw`
z=5^lL8n+*80kWoUWWWCV;%@rG9G6Ag)1(?t{N=YwLC@dFHUraN#gxPjyMTB8b7dqo
z)6@Ux!rmU6wv)P3eB(RxRV=LozrFQtaOY|kXV?*mVIW=kxA*`;WOWzBL0gaB`eDug
zG)n)kMtT3`Nz~q!ON{}}?cJ5sn!49E{io^Dq;C(@4!c5u)%QO0H%#8uiP_LyMDTgwmA3A1yM+<=gMr|LY*
z1k8o+Bo#7U0u_R^np0KAS+(pV`)gN-T7WcHeiUZ&h(}2QgP#95Fg28aqz*yrun0QJ
z*f8;_JJArJN)G_}$u5Rq%22nY%C_=gN5$0sfM-5?H#?4q(Ug>nxnqr&2T$%+K58g|
zOi#^-u-VlXcg-aBdz-MXc4SByD+(Kk5BcRe9J<7$Ev~bYd$4ujJ(49Xf0>B3Loh9`)Ko%u0!FFPiolV-cBIt2^o7?@uQSM%Px)>;a5ngD_Y
zlJw&)1SrBMC
zSu8fi*!C!vJyPy%lP6O(F~HK~4(Ufb39Fs%iAUG_-6pfWwtotybPfey=HVcbUuH1u
zF0g3bgG>YD=)}Xw`gePYGvCXtMC$-DwR#7Tob82@lObH0i?M@TwGUv?3yHhN`CiA&
zpqo1ko@P`=AGhCh@B21!j1cB3|>V<>CF8^UR%8Vr{H=i;KUGG7i~GDg}5e9Xr#0
z=>1GHJIXYeI0xi{QG%yVfi_pbAvo%!aKuU01%J*APM2iZD-@
zCPpN9aH5Fa^%%Rk9hh1A)Ut7L$#DEgcseev&R|rK`p((gqurpPr#5fJ?G-9AQHkrH
zNcl3Go2=sVxm>sQr&jd__0)CxVyP8Hm#)a!%RlksD#UK}jTg*Al`qL(Mcx~1JKe|j
z0$1N3+5-vW#(aLBJS>?W^>I7YSA9pN=(6|B#7^RDe^SAW4M(VQ|3gsZ3~g@l>Iuj0
zUTIu^v%aam*4xA(ZVCMx{j!oz)uAKwn-e}Y!q_LI`!nX#;f3$7+z`pQiq4R(QU*O-
zV&2P(_5H2d;oUcWseAa|ZvY!w{rctK^g624cWjR`2K2f6ua)n+I$$dSK1tMibLAr0
zJA{tw_ZiR>MPAM4_mL$d{W;8q3dcdEuXRsO-hJ3SbWr&KMQ$3kL!e_UlP*=Y3rxz&
zre(}v55A)*!A)Klk2-3gBS#qD3?O5Q4;#eg23OX*Gg~^MD)!4?WNs@-A=DKV#7lji
zPf4j;Cnvtyncmta#W!jtaMyi=&k%|3MrR5=9vNNf_b{JOm=28(kDonx)&@(s(gV2?
z0q2{y;Brx>p%az_%@EZhe82gdg)cK+%jt20sm{bDGrgS+$2@jG2-WCv#wWBav0XbE
z6CdjKEcdqIB<(H7VL*PrUeZF@kL5IMqGG{-F&5qaNbrPt0Vok}j;-uk*-!LPNHcnu
zmrq3e`7+CPC?R_C2O_R1*>@Sd9#RrtPK1O92vNLY;O2end`Jbl?{nUv@8
zVuCU?s%wLiOPQ9W*jUBK38toNMljRSgJG0fl{x`BqlXTCK68X-xN=PeU$!~Tlk*``
z6Mm1oFa>>{?D2A68XZkBuB2wnVXu+dP*cAMr)m{yn$BeB4$kRLZ52`Y2-IySn>Op^
zuF_A8Z@9S(>TQ^%5z!el%r;QJ4ROM*L^@JyIRZ%4N;^BzUWRDdITKG2O$pxwGF!Jz
z+#Mt?I%+hQ-7?AV42|F_ZXSpOszg4RgH6U`+8S!w>GQvK#HI|jmlWiBJ_wCl5td->
zHpx%EdC$X>8vo86fQvZas6?Pq|F}-a^)zm(2w&GbJi9xsGu%UHL2sa$7
zZd5gbni-Uu3bJIIDI;$alhOqFFW}n!Ek@PWlAY@*%DZsR+0b0*kt;CK^=&*OCa$vHAR@(lH1Mvfse_P96OxqX4pX)!EzxmwSOP_JHffNm=
zJCE}x&H3EY57Wx$A63>0j6xV3N^M_p1f}%>=s5dY8QBP!U6Fi>cvoG-uQobd!9!8*`o;CgygnFd(20w8f
zkJFCWI>Uwe{1n4V(IK*%95=ygevK!c)jImBm#{J-b%9{f$
zh3PSF$dtmQhbQ(tH(fSPHt%<3=1rc_^RrEr5L0!`5gg@_P#;$o
zjzDUyxU&N~JBOpRf7fO@EvhDPoVDrcav5C6e9(UK%tTs}sD8mlQwe+4Jdu*cj#xBBX}>~-nqm#m=tO5KwzDMghwH#}bRsi@ox4LAr~rTjjISDgvmdoqTkF(y-)&4$apje0TH?
zY_ZD=mgGY>Rg#rTOtrN-vW>Oy6XMn%bYq}$K>rBq2;|a%fm6i6ciVb$$i(2BR?%*a
znF80HBZ=xTObUjRqzH^m#)3ihy^r$}S3fzgt|3IkMGVbV}3+S0w&e?ld=0q0J2#
z9}(>;*;PjKgN`|*F^`vl3wOwQGQN)Jx=X!Tgr?vSIvvGQZWp%qm{*N-(
z>875~jY35PaPRuNF6-mD@mZ2)hRKf%^QWn6K;M4XXx+VsstjEE(qy%ah~y^u-`)kf
zw(-AF(e;0Ts`TjjLIjtv;;&zDx#8*!o>k;DJRWsSxzkpFGJ(i?NAatV72G_k?M&2)S#PSTiGf>vJGELIH`teUMo^&+&9)=YCQtWL$FA{J0iX9g3o7>SWnZP&5%^
zVIHmG7feVsWvP`9_dHEXQMJ&phntr#QR~AL&()1y)%9}at)njL1fM6&BCKg4S;aFx
ze=p$j>8x_DB~}l0iO~T`s_B7LY!qS)^9u<*O~E~RB^UXSa3^gA@8=babVyB`wSJ4A
zG@p4=$5eWVb1NYpf#;|_3~8C`9D4si*r1Y)WE;OCrI2dzdL!|J3v3tX#`+S!Ma3N*
zP-X0}P=Y>5&tXJ%3oahQf|T!&TI@*$3+YJ{Jdy?5p5rvWpRD9sYd4xDZ;Xj}D?6ooSTljrL&4Gv7mQZkE475W
zispTP%R4M=FU#Mu<_%8@;kEpiS;XE@){IhH#R%y!i)R>KZhbs8WqM0&_a%=!;*tDm
zNn%Tqw)}ZZi>#mro?R7tT}lQ!8yAzJ-gKfdbo?j5U-`K{Pid9X7iy(@wYTXsc?u%;
zkqJU_^)&YeMYV*0myLkj!ENjA!pqFjs}p}z7#p4u7jxlgoB*eYtZHlTi1CGhZUMVp
zc#5bI;`-c_me0GW*zA;ZpL&GSIS^v>7GgU
z*Z2PlT?+P7LOYG`asRS@Pt`2`t7JgfaF55ae7Y>sVkRqPVZFki`v-Hz*ZqV`4IDux
zD&%Cc{k+*OdUUHO$AU_Ejs`OE$qH=VmcG9-OE65cR4+*^`h+MLpKwFo;Td~ZeUHo5
zO0UT`7ZC6Gx)4ku;M0J5G#nG&>lKyiN9iDUR~L2D@)QpZ
zXzuK1q;T`T@QWmd+bRN60x2WFO-R-NK8gIhpsc4;qaB;NUZA1;AuOV6!O@tZd5rch
z9Ch$;s|s#_e;?5f*=xEDupbj-SYLgYj1?s~&M>pbhT40mVc~-R38!(2O~p&C%Xhqn
zU)5>bd~%T((e3rvb^hm^PJX&(1ZFx&JqRrg3v_fafA?Xyi)yyH={%`&1A5HSGabgXKP1OGktQO5vCiS-ika5<&bUQ5oSqgV=dqN&a5XG?yKC?vyZu;gjK^Srch*#QtYUu7*b=&hhsZ!o)BE4j?P?hTXh*L>d<$coqGXlU@iN^Ob{tih{l&3^PZ1U5qr$^)!)5-F!#JcIc5NYYc|cW`TGRXd
za#nHJ0KL7iCfKqU--+)0YD^7HXFs`w0jT@}o*m%7I>Loh9
zj%kF6SiCp*9$N;z))CfnM3J>Lp+haSQBOgkfpWk_rVewZ%$n+eM>8{Q;O(5ple<>37unmL1&~HvjEodC$uyQJrNtOp%UphiNh;hW_rM(KEBZjK
z--57aOCABZoD1XD5)yeDV|h
z$X>;mO%~6t{~emtnCz3jlc>ra)e6k7)C`T@R;Doqz|?-w^`Tp4ijV8Eu4%P=gJv(i
z({zGWH^0NFL4HpfOOk&7Rd=5VM*0tX6WRVXP6PsShJ?@$_mrNy(Z><-TH;Ra`(6=yvK|wE)Zxug`D2tr!BjuIGFmn
z`VN(G@iAtDml`EANBLM3!|q(vvg*d@t$BcJ$fPCmxBF<__IKG_N^6{a*wkZ9c9Lr?
zM~j;&D|7+WQd#A!5tL04ElM@;>>aB)h8k(x4etnGTr8GnaXs53o-?TjqLSdBE3E?>a8N
z0#cqe>vv7*E?l%l*B*elonrL1gQg#W$aFOkkQ;VOf1pw!jFJ+38}$6=t(cX;-=IwQ
zQJA3HFaI`N>A$%+p{jrbCnPq^O;9PC`ZU+jqsaF%cc6eQHf~r$v_$aV8yyk&yt0JV
z^u{6<7niwAv;;z3+P9I2Xb&p6ieI=FX9Q5Xd(rcxpK9C-jY?MU@>7Y2-R35?rCj*a
z>D_XZa+iMv*~Q#gK%W2Y{&;6X58&yL<~r|orZXDY*In_S*qY)7PoxFHU7uSW(rR2VCU}R(Kq+2?KCkfMUBDw3lx!ZSI?f0FVGPILM
z5Q6k0R^6tP_Kt5eScVSrX6GRoZoIjuYo0zJ|Fy&CJe9Ma@gx{Ao&9Wby^Mch>3HaC
z5b_t`)?tfPRgM7Ry6vHlaol^->5IoxrE?Z6&$@sA
z=&qQ&+gEo!VpD}AULj`8sD(RV9=NJc6yZ#aQygg{xajyw0JfCuiI*j1CX=V8Kkt6h?Ifpx
zSxB1-B{eSh_w6)aQMHHsS}*nJiG;^9G(7=&m<@luJ3j_pr~a0bs9IcFpC9=J9^F&b
z^8$CNj+eOX^^K=AI6tup5xoYd<_rM~N@&&P#XSy!ah-Ax!Pgz;yyXk-5Y+%w`tlEL
ze=g?uduorkW_!ZrB*pQ0C%Vp_KC>0WOPnb3UYcIuvF
z$KuI6J+O8b)%MLyUd1K5T;2JpDQ>VoJ#3v&Fss1Z-EqrM`uACN(oc=$QD~CK4u^I8E0#b|R0x@&g+37(~I&$DqE4l>oI#F#b@4)u+t!C}Lf?FMiuX0HrFu$2nO!^8mt-TtnU8bHj)dCFU)qAqzmM(c_?R)Z@>wk<
zPD-Ig#3-SjqiG1MhkxWtN8d7=%-Ct6XYOaykH_-s_q>tC;$A>ejkO=G>dfDv=ikmx
zxy;i~n{-C?ZFJ)OzH2*EGW+~)!PVr({l3#kUCSDFPHSl^H+QIH3ScIE@%7!8HysE~
zw>$5)lPGfK{4cD6rW|VziB}$L?X5A-Kd*j6t%SV!DwZ`sx$SFazE{U-BZo3S>zQe8
z#e(DY0%6q6ZeQxI9v}2E|7Xv^oOVLye9uGzFc_BC6!&`rH@FlVPDSyb5f(UcVk%dRfn4S{;2{{JbDIdHBySh~
zn+AZ3|9$E!ZhN<|@J}Ynq$!jOaDA31#~KOl&mNsyb?w=%q9*3TV)hkQ-LxTq)LQ{n
z&@*LHZR&bcAb-o*8J%cADMc&%WKqbd-6hf~8Lcd(_(G3xQ(z+fg8UBvN+_YM@;c+G
zMtMhH^M4j$R;gJ$4HW?~h6Il0B_>3F!MbJ1>%-2M|7heWnHnG0&>@&~@L%0u=~?U@
zKQ0l{iV9K+ZvPI@!ir$22Q3U0G?%a*auv~L
zvZZdGA1mgEBGws&l!xiqlmxAUDW9MBBDQ^wH^x-%YNH*$VH=ql)u6VkGiK(GP^lCk
zwTrwg@KsADZ9f}g73IpR*d_p?Q*Tl1NIlM$MCeFD)*@{>fVz+q#Fya`1Hc5gw%E}E
zNj}jQI{Arxoy^tR)y70US`;1zHh{|kQY0p=l<8BLRDSu7ec{Sw-D`H0)6<{nie8l2
zjGgRzT^%WBC(R9kl44VF!mA4qAbGk_yfq!?S{?RX#O}aKf5jh4OUA&m754xcC`HZw
zZRPp+t9()zI7$zr+Hg=DVNC>5wx)*#7p^~4-BQJ`0L|K?TW8__P~^d)1o>ak)kDBO
z{w;bw!jOM_tPp*}_P!4UKf%gFM;W~#a*#t~*QtLBB~(D%q5oOLRIINK=W&8&hJ!AM
ze*DQ1w||J=Tx=p*1eI8x583dWLLDj%o`6m!4_2>bQYVbOL*o{=gJzPqU}m7`>A=1j
zw{uOmWbnM&z~25D`M{%ZM-Dot;q9W<)kWCLn=Vw|1^p8el(5;8
z#s0fYmXVt}!Yivo6UW)sbXc5zB5_ZA#xX*wWMe)gx|>FWW`{Nn{MpwC=-c>bUm{%D
zn&d9O$Z-_cOWFC}{aS$dQGAZbv>e^`SA%`XC4E|C^4yP!$&%x`v7bF4WIt}ZkQeN}
z{@!Z9cVa*yaF}?e4XBM8Pw7PF*86<3>^PGWRe*6k_{#_EU_0dV>{Hb#$jOB}pQ_=?
zDwdT9cOU+ObDIr^l%T(aD)E%NsWF}68fnP4sDF5qk;daJ!FgA@!W%myj5`c8*h-55N`$sCHPFRnkVsTzgdzOnP$)9_#-hyoZnmk)I6vj
z$0C}f4|{0HPZUF1rH}Z7K_Fk@(n_{jt_+K*A;7LByM-of!!s1rFjxX+G@dOSn64?%%Nm@(_q4)T?>|eFRk{_
z2ri3_n2XTEf*~-2(%dX)KsIq!0$K?I>EsGvo=}U5J2!2Oi-%rd6;>=_cLls>OzRcHt%t<6j$!lTc@oLCtVn{?yFMZ;Na9S6_D+
z1!=r)27xXJAX+WyHZa0UkCzzNuzUa~8{cwyvVXSVoS@XJ+N>FJqR5BNlLo!G2*VBB
zYw+lkYbzklX*U(%Aok
zOA9GL|G!#j|89g>!@p#sa|pt~;y)h~XGH%J25Z6NZ&fQyI3gXIMiDLX@cc2;Io
zN5E@xeo%ID_I}&~VO9fn>jumtn_@oHlvP$E6d0-`^Qy?yStV^;b#AmlMY9=6A)d~=
zzV3?nWfWJjW0-{klo*j8zDN0~n2<{rK+_KRF~tyw)IAWnKA61gwWBWL%#eRWMY(sd
z^|UdClWkG^z2EZMs*HbrE94l59f3Pam)tMd&`L6`D!s>{aKtBlHJDBdGa%8`^v`;&
zqH?swFPYU;9T86mY+Uc8bhm!nTw4kd1S-JL(yPZsy$p`kmB#8Fv}=B$A<+h|8=Mmx
zAhAUwS8|j5U33`0_`+Cm2l{c1eNBt5NJ{N~;Tp4>T)O-U?dKFF3>5M;uMELOy}U$S
zX;&yIx*}cS#nobS4-IB6spsz)d7OLAfAkN^UyBNkXQBL?cK2TiXT8d$Gy4*+-j{Ma
z6>ZWiB&9hAWVr+Y>V$Xht7<~?Mi|h}DB<+>TObuJ3?J=o<8w#S=J&&twsu`6=U;dI
zp=yKI*4r)tiWbOr;Wv*}k>3zRy)M{11kRO~)XNnu&i*qm+?0i;VfA1C|4(9}+&a>h
zodD9L|6(VHS2O&C<|EWc1kF78N{4N{g9!;?o-m+_^piGk%cRx;?d;vKmF+_N5;QVm
zS2KiU`Ok8l&9IFxa(^|N*IqXJ#|dg)Dm4HN@QmS2$eY9fvr~5sOMz#g^Ji>NSDf<1
F{1ZTYZh8O!
literal 0
HcmV?d00001
From 33cb1fc48603821b47e28278503420c57e3ea3df Mon Sep 17 00:00:00 2001
From: illfated
Date: Fri, 19 Apr 2019 16:00:19 +0200
Subject: [PATCH 07/12] Windows/Privacy: change formatting code to text
Asterisks need to be escaped in Github source text pages to avoid being
treated as formatting code for italics. Here is an initial attempt to
resolve the unwanted formatting by escaping the asterisks by preceding
the asterisks with a backslash character.
Extra detail: typo correction, "micorosoft" => microsoft
Closes #3304
---
...-endpoints-1809-non-enterprise-editions.md | 88 +++++++++----------
1 file changed, 44 insertions(+), 44 deletions(-)
diff --git a/windows/privacy/windows-endpoints-1809-non-enterprise-editions.md b/windows/privacy/windows-endpoints-1809-non-enterprise-editions.md
index 370860330f..b6be3b5acd 100644
--- a/windows/privacy/windows-endpoints-1809-non-enterprise-editions.md
+++ b/windows/privacy/windows-endpoints-1809-non-enterprise-editions.md
@@ -40,52 +40,52 @@ We used the following methodology to derive these network endpoints:
| **Destination** | **Protocol** | **Description** |
| --- | --- | --- |
-|*.aria.microsoft.com* | HTTPS | Office Telemetry
-|*.dl.delivery.mp.microsoft.com* | HTTP | Enables connections to Windows Update.
-|*.download.windowsupdate.com* | HTTP | Used to download operating system patches and updates.
-|*.g.akamai.net | HTTPS | Used to check for updates to maps that have been downloaded for offline use.
-|*.msn.com* |TLSv1.2/HTTPS | Windows Spotlight related traffic
-|*.Skype.com | HTTP/HTTPS | Skype related traffic
-|*.smartscreen.microsoft.com* | HTTPS | Windows Defender Smartscreen related traffic
-|*.telecommand.telemetry.microsoft.com* | HTTPS | Used by Windows Error Reporting.
-|*cdn.onenote.net* | HTTP | OneNote related traffic
-|*displaycatalog.mp.microsoft.com* | HTTPS | Used to communicate with Microsoft Store.
-|*emdl.ws.microsoft.com* | HTTP | Windows Update related traffic
-|*geo-prod.do.dsp.mp.microsoft.com* |TLSv1.2/HTTPS | Enables connections to Windows Update.
-|*hwcdn.net* | HTTP | Used by the Highwinds Content Delivery Network to perform Windows updates.
-|*img-prod-cms-rt-microsoft-com.akamaized.net* | HTTPS | Used to download image files that are called when applications run (Microsoft Store or Inbox MSN Apps).
-|*maps.windows.com* | HTTPS | Related to Maps application.
-|*msedge.net* | HTTPS | Used by OfficeHub to get the metadata of Office apps.
-|*nexusrules.officeapps.live.com* | HTTPS | Office Telemetry
-|*photos.microsoft.com* | HTTPS | Photos App related traffic
-|*prod.do.dsp.mp.microsoft.com* |TLSv1.2/HTTPS | Used for Windows Update downloads of apps and OS updates.
-|*wac.phicdn.net* | HTTP | Windows Update related traffic
-|*windowsupdate.com* | HTTP | Windows Update related traffic
-|*wns.windows.com* | HTTPS, TLSv1.2 | Used for the Windows Push Notification Services (WNS).
-|*wpc.v0cdn.net* | | Windows Telemetry related traffic
+|\*.aria.microsoft.com\* | HTTPS | Office Telemetry
+|\*.dl.delivery.mp.microsoft.com\* | HTTP | Enables connections to Windows Update.
+|\*.download.windowsupdate.com\* | HTTP | Used to download operating system patches and updates.
+|\*.g.akamai.net | HTTPS | Used to check for updates to maps that have been downloaded for offline use.
+|\*.msn.com\* |TLSv1.2/HTTPS | Windows Spotlight related traffic
+|\*.Skype.com | HTTP/HTTPS | Skype related traffic
+|\*.smartscreen.microsoft.com\* | HTTPS | Windows Defender Smartscreen related traffic
+|\*.telecommand.telemetry.microsoft.com\* | HTTPS | Used by Windows Error Reporting.
+|\*cdn.onenote.net* | HTTP | OneNote related traffic
+|\*displaycatalog.mp.microsoft.com\* | HTTPS | Used to communicate with Microsoft Store.
+|\*emdl.ws.microsoft.com\* | HTTP | Windows Update related traffic
+|\*geo-prod.do.dsp.mp.microsoft.com\* |TLSv1.2/HTTPS | Enables connections to Windows Update.
+|\*hwcdn.net* | HTTP | Used by the Highwinds Content Delivery Network to perform Windows updates.
+|\*img-prod-cms-rt-microsoft-com.akamaized.net* | HTTPS | Used to download image files that are called when applications run (Microsoft Store or Inbox MSN Apps).
+|\*maps.windows.com\* | HTTPS | Related to Maps application.
+|\*msedge.net* | HTTPS | Used by OfficeHub to get the metadata of Office apps.
+|\*nexusrules.officeapps.live.com\* | HTTPS | Office Telemetry
+|\*photos.microsoft.com\* | HTTPS | Photos App related traffic
+|\*prod.do.dsp.mp.microsoft.com\* |TLSv1.2/HTTPS | Used for Windows Update downloads of apps and OS updates.
+|\*wac.phicdn.net* | HTTP | Windows Update related traffic
+|\*windowsupdate.com\* | HTTP | Windows Update related traffic
+|\*wns.windows.com\* | HTTPS, TLSv1.2 | Used for the Windows Push Notification Services (WNS).
+|\*wpc.v0cdn.net* | | Windows Telemetry related traffic
|auth.gfx.ms/16.000.27934.1/OldConvergedLogin_PCore.js | | MSA related
|evoke-windowsservices-tas.msedge* | HTTPS | The following endpoint is used by the Photos app to download configuration files, and to connect to the Office 365 portal's shared infrastructure, including Office Online. To turn off traffic for this endpoint, either uninstall the Photos app or disable the Microsoft Store. If you disable the Microsoft store, other Store apps cannot be installed or updated. Additionally, the Microsoft Store won't be able to revoke malicious Store apps and users will still be able to open them.
-|fe2.update.microsoft.com* |TLSv1.2/HTTPS | Enables connections to Windows Update, Microsoft Update, and the online services of Microsoft Store.
-|fe3.*.mp.microsoft.com.* |TLSv1.2/HTTPS | Enables connections to Windows Update, Microsoft Update, and the online services of Microsoft Store.
+|fe2.update.microsoft.com\* |TLSv1.2/HTTPS | Enables connections to Windows Update, Microsoft Update, and the online services of Microsoft Store.
+|fe3.\*.mp.microsoft.com.\* |TLSv1.2/HTTPS | Enables connections to Windows Update, Microsoft Update, and the online services of Microsoft Store.
|fs.microsoft.com | | Font Streaming (in ENT traffic)
-|g.live.com* | HTTPS | Used by OneDrive
+|g.live.com\* | HTTPS | Used by OneDrive
|iriscoremetadataprod.blob.core.windows.net | HTTPS | Windows Telemetry
-|mscrl.micorosoft.com | | Certificate Revocation List related traffic.
-|ocsp.digicert.com* | HTTP | CRL and OCSP checks to the issuing certificate authorities.
+|mscrl.microsoft.com | | Certificate Revocation List related traffic.
+|ocsp.digicert.com\* | HTTP | CRL and OCSP checks to the issuing certificate authorities.
|officeclient.microsoft.com | HTTPS | Office related traffic.
|oneclient.sfx.ms* | HTTPS | Used by OneDrive for Business to download and verify app updates.
-|purchase.mp.microsoft.com* | HTTPS | Used to communicate with Microsoft Store.
-|query.prod.cms.rt.microsoft.com* | HTTPS | Used to retrieve Windows Spotlight metadata.
-|ris.api.iris.microsoft.com* |TLSv1.2/HTTPS | Used to retrieve Windows Spotlight metadata.
+|purchase.mp.microsoft.com\* | HTTPS | Used to communicate with Microsoft Store.
+|query.prod.cms.rt.microsoft.com\* | HTTPS | Used to retrieve Windows Spotlight metadata.
+|ris.api.iris.microsoft.com\* |TLSv1.2/HTTPS | Used to retrieve Windows Spotlight metadata.
|ris-prod-atm.trafficmanager.net | HTTPS | Azure traffic manager
-|settings.data.microsoft.com* | HTTPS | Used for Windows apps to dynamically update their configuration.
-|settings-win.data.microsoft.com* | HTTPS | Used for Windows apps to dynamically update their configuration.
-|sls.update.microsoft.com* |TLSv1.2/HTTPS | Enables connections to Windows Update.
-|store*.dsx.mp.microsoft.com* | HTTPS | Used to communicate with Microsoft Store.
-|storecatalogrevocation.storequality.microsoft.com* | HTTPS | Used to revoke licenses for malicious apps on the Microsoft Store.
-|store-images.s-microsoft.com* | HTTP | Used to get images that are used for Microsoft Store suggestions.
-|tile-service.weather.microsoft.com* | HTTP | Used to download updates to the Weather app Live Tile.
-|tsfe.trafficshaping.dsp.mp.microsoft.com* |TLSv1.2 | Used for content regulation.
+|settings.data.microsoft.com\* | HTTPS | Used for Windows apps to dynamically update their configuration.
+|settings-win.data.microsoft.com\* | HTTPS | Used for Windows apps to dynamically update their configuration.
+|sls.update.microsoft.com\* |TLSv1.2/HTTPS | Enables connections to Windows Update.
+|store*.dsx.mp.microsoft.com\* | HTTPS | Used to communicate with Microsoft Store.
+|storecatalogrevocation.storequality.microsoft.com\* | HTTPS | Used to revoke licenses for malicious apps on the Microsoft Store.
+|store-images.s-microsoft.com\* | HTTP | Used to get images that are used for Microsoft Store suggestions.
+|tile-service.weather.microsoft.com\* | HTTP | Used to download updates to the Weather app Live Tile.
+|tsfe.trafficshaping.dsp.mp.microsoft.com\* |TLSv1.2 | Used for content regulation.
|v10.events.data.microsoft.com | HTTPS | Diagnostic Data
|wdcp.microsoft.* |TLSv1.2 | Used for Windows Defender when Cloud-based Protection is enabled.
|wd-prod-cp-us-west-1-fe.westus.cloudapp.azure.com | HTTPS | Windows Defender related traffic.
@@ -111,7 +111,7 @@ We used the following methodology to derive these network endpoints:
| ipv4.login.msa.akadns6.net | HTTPS | Used for Microsoft accounts to sign in. |
| location-inference-westus.cloudapp.net | HTTPS | Used for location data. |
| modern.watson.data.microsoft.com.akadns.net | HTTPS | Used by Windows Error Reporting. |
-| ocsp.digicert.com* | HTTP | CRL and OCSP checks to the issuing certificate authorities. |
+| ocsp.digicert.com\* | HTTP | CRL and OCSP checks to the issuing certificate authorities. |
| ris.api.iris.microsoft.com.akadns.net | HTTPS | Used to retrieve Windows Spotlight metadata. |
| tile-service.weather.microsoft.com/* | HTTP | Used to download updates to the Weather app Live Tile. |
| tsfe.trafficshaping.dsp.mp.microsoft.com | HTTPS | Used for content regulation. |
@@ -127,10 +127,10 @@ We used the following methodology to derive these network endpoints:
| *.g.akamaiedge.net | HTTPS | Used to check for updates to maps that have been downloaded for offline use. |
| *.s-msedge.net | HTTPS | Used by OfficeHub to get the metadata of Office apps. |
| *.telecommand.telemetry.microsoft.com.akadns.net | HTTPS | Used by Windows Error Reporting. |
-| *.tlu.dl.delivery.mp.microsoft.com* | HTTP | Enables connections to Windows Update. |
-| *.windowsupdate.com* | HTTP | Enables connections to Windows Update. |
+| *.tlu.dl.delivery.mp.microsoft.com\* | HTTP | Enables connections to Windows Update. |
+| *.windowsupdate.com\* | HTTP | Enables connections to Windows Update. |
| *geo-prod.do.dsp.mp.microsoft.com | HTTPS | Enables connections to Windows Update. |
-| au.download.windowsupdate.com* | HTTP | Enables connections to Windows Update. |
+| au.download.windowsupdate.com\* | HTTP | Enables connections to Windows Update. |
| cdn.onenote.net/livetile/* | HTTPS | Used for OneNote Live Tile. |
| client-office365-tas.msedge.net/* | HTTPS | Used to connect to the Office 365 portal’s shared infrastructure, including Office Online. |
| config.edge.skype.com/* | HTTPS | Used to retrieve Skype configuration values. |
@@ -151,7 +151,7 @@ We used the following methodology to derive these network endpoints:
| maps.windows.com/windows-app-web-link | HTTPS | Link to Maps application |
| modern.watson.data.microsoft.com.akadns.net | HTTPS | Used by Windows Error Reporting. |
| ocos-office365-s2s.msedge.net/* | HTTPS | Used to connect to the Office 365 portal's shared infrastructure. |
-| ocsp.digicert.com* | HTTP | CRL and OCSP checks to the issuing certificate authorities. |
+| ocsp.digicert.com\* | HTTP | CRL and OCSP checks to the issuing certificate authorities. |
| oneclient.sfx.ms/* | HTTPS | Used by OneDrive for Business to download and verify app updates. |
| settings-win.data.microsoft.com/settings/* | HTTPS | Used as a way for apps to dynamically update their configuration. |
| sls.update.microsoft.com/* | HTTPS | Enables connections to Windows Update. |
From 1159f22a0d8aba1cbb33044e1706728627b9a5b9 Mon Sep 17 00:00:00 2001
From: ImranHabib <47118050+joinimran@users.noreply.github.com>
Date: Fri, 19 Apr 2019 22:08:32 +0500
Subject: [PATCH 08/12] Spelling update
There was hypen in semicolon which has been removed.
---
windows/client-management/mdm/vpnv2-csp.md | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/windows/client-management/mdm/vpnv2-csp.md b/windows/client-management/mdm/vpnv2-csp.md
index de1463fa2b..3d8006f882 100644
--- a/windows/client-management/mdm/vpnv2-csp.md
+++ b/windows/client-management/mdm/vpnv2-csp.md
@@ -401,7 +401,7 @@ Value type is chr. Supported operations include Get, Add, Replace, and Delete.
Nodes under the PluginProfile are required when using a Microsoft Store based VPN plugin.
**VPNv2/***ProfileName***/PluginProfile/ServerUrlList**
-Required for plug-in profiles. semi-colon separated list of servers in URL, hostname, or IP format.
+Required for plug-in profiles. semicolon separated list of servers in URL, hostname, or IP format.
Value type is chr. Supported operations include Get, Add, Replace, and Delete.
From c96e4a6aae583758f9ea1ef87c9bbf8eb6d66112 Mon Sep 17 00:00:00 2001
From: Joey Caparas
Date: Fri, 19 Apr 2019 16:20:22 -0700
Subject: [PATCH 09/12] update topic with links
---
windows/security/threat-protection/TOC.md | 1 +
.../windows-defender-atp/TOC.md | 1 +
.../onboard-offline-machines.md | 55 ++++++++-----------
3 files changed, 24 insertions(+), 33 deletions(-)
diff --git a/windows/security/threat-protection/TOC.md b/windows/security/threat-protection/TOC.md
index 3feed9a1fa..e65fbfe36a 100644
--- a/windows/security/threat-protection/TOC.md
+++ b/windows/security/threat-protection/TOC.md
@@ -228,6 +228,7 @@
####### [Onboard non-persistent virtual desktop infrastructure (VDI) machines](windows-defender-atp/configure-endpoints-vdi-windows-defender-advanced-threat-protection.md)
###### [Onboard servers](windows-defender-atp/configure-server-endpoints-windows-defender-advanced-threat-protection.md)
###### [Onboard non-Windows machines](windows-defender-atp/configure-endpoints-non-windows-windows-defender-advanced-threat-protection.md)
+###### [Onboard machines without Internet access](windows-defender-atp/onboard-offline-machines.md)
###### [Run a detection test on a newly onboarded machine](windows-defender-atp/run-detection-test-windows-defender-advanced-threat-protection.md)
###### [Run simulated attacks on machines](windows-defender-atp/attack-simulations-windows-defender-advanced-threat-protection.md)
###### [Configure proxy and Internet connectivity settings](windows-defender-atp/configure-proxy-internet-windows-defender-advanced-threat-protection.md)
diff --git a/windows/security/threat-protection/windows-defender-atp/TOC.md b/windows/security/threat-protection/windows-defender-atp/TOC.md
index 3a56abbd31..bf7a2585b8 100644
--- a/windows/security/threat-protection/windows-defender-atp/TOC.md
+++ b/windows/security/threat-protection/windows-defender-atp/TOC.md
@@ -227,6 +227,7 @@
###### [Onboard non-persistent virtual desktop infrastructure (VDI) machines](configure-endpoints-vdi-windows-defender-advanced-threat-protection.md)
##### [Onboard servers](configure-server-endpoints-windows-defender-advanced-threat-protection.md)
##### [Onboard non-Windows machines](configure-endpoints-non-windows-windows-defender-advanced-threat-protection.md)
+##### [Onboard machines without Internet access](onboard-offline-machines.md)
##### [Run a detection test on a newly onboarded machine](run-detection-test-windows-defender-advanced-threat-protection.md)
##### [Run simulated attacks on machines](attack-simulations-windows-defender-advanced-threat-protection.md)
##### [Configure proxy and Internet connectivity settings](configure-proxy-internet-windows-defender-advanced-threat-protection.md)
diff --git a/windows/security/threat-protection/windows-defender-atp/onboard-offline-machines.md b/windows/security/threat-protection/windows-defender-atp/onboard-offline-machines.md
index b6f6a6cfa8..bb3ca24f03 100644
--- a/windows/security/threat-protection/windows-defender-atp/onboard-offline-machines.md
+++ b/windows/security/threat-protection/windows-defender-atp/onboard-offline-machines.md
@@ -17,49 +17,38 @@ ms.collection: M365-security-compliance
ms.topic: article
---
-# Onboard machines without internet access the Windows Defender ATP service
+# Onboard machines without Internet access to Windows Defender ATP
**Applies to:**
- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559)
+To onboard machines without Internet access, you'll need to take the following general steps:
-- *On-Premise Machines:*
+## On-premise machines
- - Setup OMS Gateway Server to act as proxy / hub
+- Setup Azure Log Analytics (formerly known as OMS Gateway) to act as proxy or hub:
+ - [Azure Log Analytics Agent](https://docs.microsoft.com/azure/azure-monitor/platform/gateway#download-the-log-analytics-gateway)
+ - [Install and configure Microsoft Monitoring Agent (MMA)](configure-server-endpoints-windows-defender-advanced-threat-protection#install-and-configure-microsoft-monitoring-agent-mma-to-report-sensor-data-to-windows-defender-atp) point to Microsoft Defender ATP Workspace key & ID
- - OMS Gateway Agent
+- Offline machines in the same network of Azure Log Analytics
+ - Configure MMA to point to:
+ - Azure Log Analytics IP as a proxy
+ - Microsoft Defender ATP workspace key & ID
- - MMA (Microsoft Monitoring Agent) point to MDATP Workspace key & ID
+## Azure virtual machines
+- Configure and enable [Azure Log Analytics workspace](https://docs.microsoft.com/azure/azure-monitor/platform/gateway)
- - Offline Machines in the Same Network of OMS Gateway
+ - Setup Azure Log Analytics (formerly known as OMS Gateway) to act as proxy or hub:
+ - [Azure Log Analytics Agent](https://docs.microsoft.com/azure/azure-monitor/platform/gateway#download-the-log-analytics-gateway)
+ - [Install and configure Microsoft Monitoring Agent (MMA)](configure-server-endpoints-windows-defender-advanced-threat-protection#install-and-configure-microsoft-monitoring-agent-mma-to-report-sensor-data-to-windows-defender-atp) point to Microsoft Defender ATP Workspace key & ID
+ - Offline Azure VMs in the same network of OMS Gateway
+ - Configure Azure Log Analytics IP as a proxy
+ - Azure Log Analytics Workspace Key & ID
- - MMA point to
+ - Azure Security Center (ASC)
+ - [Security Policy \> Log Analytics Workspace](https://docs.microsoft.com/azure/security-center/security-center-wdatp#enable-windows-defender-atp-integration)
+ - [Threat Detection \> Allow Windows Defender ATP to access my data](https://docs.microsoft.com/azure/security-center/security-center-wdatp#enable-windows-defender-atp-integration)
- - OMS Gateway IP as a proxy
-
- - MDATP Workspace Key & ID
-
-- *Azure VMs Machines:*
-
- - Configure and Enable Azure Log Analytics Workspace
-
- - Setup OMS Gateway Server to act as a proxy / hub
-
- - OMS Gateway Agent
-
- - MMA (Microsoft Monitoring Agent) point to Log Analytics Workspace
- Key & ID
-
- - Offline Azure VMs in the same network of OMS Gateway
-
- - OMS Gateway IP as a proxy
-
- - Log Analytics Workspace Key & ID
-
- - Azure Security Center (ASC)
-
- - Security Policy \> Log Analytics Workspace
-
- - Threat Detection \> Allow Windows Defender ATP to access my data
\ No newline at end of file
+ For more information, see [Working with security policies](https://docs.microsoft.com/azure/security-center/tutorial-security-policy).
\ No newline at end of file
From 77e38a31db7f02c8cb9a3d028af55a1052212484 Mon Sep 17 00:00:00 2001
From: Joey Caparas
Date: Fri, 19 Apr 2019 16:29:01 -0700
Subject: [PATCH 10/12] Update onboard-offline-machines.md
---
.../windows-defender-atp/onboard-offline-machines.md | 6 +++---
1 file changed, 3 insertions(+), 3 deletions(-)
diff --git a/windows/security/threat-protection/windows-defender-atp/onboard-offline-machines.md b/windows/security/threat-protection/windows-defender-atp/onboard-offline-machines.md
index bb3ca24f03..fa757a9964 100644
--- a/windows/security/threat-protection/windows-defender-atp/onboard-offline-machines.md
+++ b/windows/security/threat-protection/windows-defender-atp/onboard-offline-machines.md
@@ -1,7 +1,7 @@
---
-title: Onboard machines without internet access to the Windows on Windows Defender ATP service
-description: Onboard machines without internet access so that they can send sensor data to the Windows Defender ATP sensor
-keywords: onboard, servers, vm, on-premise, oms gateway, log analytics,
+title: Onboard machines without Internet access to Windows Defender ATP
+description: Onboard machines without Internet access so that they can send sensor data to the Windows Defender ATP sensor
+keywords: onboard, servers, vm, on-premise, oms gateway, log analytics, azure log analytics, mma
search.product: eADQiWindows 10XVcnh
search.appverid: met150
ms.prod: w10
From 4069f16ca288464e663b67b7cb81d2830482bbd6 Mon Sep 17 00:00:00 2001
From: Liza Poggemeyer
Date: Fri, 19 Apr 2019 16:32:32 -0700
Subject: [PATCH 11/12] Corrected casing and punctuation
---
windows/client-management/mdm/vpnv2-csp.md | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/windows/client-management/mdm/vpnv2-csp.md b/windows/client-management/mdm/vpnv2-csp.md
index 3d8006f882..2d985ec8b6 100644
--- a/windows/client-management/mdm/vpnv2-csp.md
+++ b/windows/client-management/mdm/vpnv2-csp.md
@@ -401,7 +401,7 @@ Value type is chr. Supported operations include Get, Add, Replace, and Delete.
Nodes under the PluginProfile are required when using a Microsoft Store based VPN plugin.
**VPNv2/***ProfileName***/PluginProfile/ServerUrlList**
-Required for plug-in profiles. semicolon separated list of servers in URL, hostname, or IP format.
+Required for plug-in profiles. Semicolon-separated list of servers in URL, hostname, or IP format.
Value type is chr. Supported operations include Get, Add, Replace, and Delete.
From 6b6115bbf7292077bdd75050c84ba47c391d8349 Mon Sep 17 00:00:00 2001
From: Joey Caparas
Date: Fri, 19 Apr 2019 16:44:25 -0700
Subject: [PATCH 12/12] fix broken link
---
.../windows-defender-atp/onboard-offline-machines.md | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/windows/security/threat-protection/windows-defender-atp/onboard-offline-machines.md b/windows/security/threat-protection/windows-defender-atp/onboard-offline-machines.md
index fa757a9964..0cda2cfeab 100644
--- a/windows/security/threat-protection/windows-defender-atp/onboard-offline-machines.md
+++ b/windows/security/threat-protection/windows-defender-atp/onboard-offline-machines.md
@@ -30,7 +30,7 @@ To onboard machines without Internet access, you'll need to take the following g
- Setup Azure Log Analytics (formerly known as OMS Gateway) to act as proxy or hub:
- [Azure Log Analytics Agent](https://docs.microsoft.com/azure/azure-monitor/platform/gateway#download-the-log-analytics-gateway)
- - [Install and configure Microsoft Monitoring Agent (MMA)](configure-server-endpoints-windows-defender-advanced-threat-protection#install-and-configure-microsoft-monitoring-agent-mma-to-report-sensor-data-to-windows-defender-atp) point to Microsoft Defender ATP Workspace key & ID
+ - [Install and configure Microsoft Monitoring Agent (MMA)](configure-server-endpoints-windows-defender-advanced-threat-protection.md#install-and-configure-microsoft-monitoring-agent-mma-to-report-sensor-data-to-windows-defender-atp) point to Microsoft Defender ATP Workspace key & ID
- Offline machines in the same network of Azure Log Analytics
- Configure MMA to point to:
@@ -42,7 +42,7 @@ To onboard machines without Internet access, you'll need to take the following g
- Setup Azure Log Analytics (formerly known as OMS Gateway) to act as proxy or hub:
- [Azure Log Analytics Agent](https://docs.microsoft.com/azure/azure-monitor/platform/gateway#download-the-log-analytics-gateway)
- - [Install and configure Microsoft Monitoring Agent (MMA)](configure-server-endpoints-windows-defender-advanced-threat-protection#install-and-configure-microsoft-monitoring-agent-mma-to-report-sensor-data-to-windows-defender-atp) point to Microsoft Defender ATP Workspace key & ID
+ - [Install and configure Microsoft Monitoring Agent (MMA)](configure-server-endpoints-windows-defender-advanced-threat-protection.md#install-and-configure-microsoft-monitoring-agent-mma-to-report-sensor-data-to-windows-defender-atp) point to Microsoft Defender ATP Workspace key & ID
- Offline Azure VMs in the same network of OMS Gateway
- Configure Azure Log Analytics IP as a proxy
- Azure Log Analytics Workspace Key & ID