mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-18 16:27:22 +00:00
Merge pull request #4303 from MicrosoftDocs/master
Publish 11/24/2020, 3:30 PM
This commit is contained in:
commit
a59c56c820
@ -2728,6 +2728,7 @@ The following list shows the CSPs supported in HoloLens devices:
|
|||||||
| [DiagnosticLog CSP](diagnosticlog-csp.md) |  |  |  |
|
| [DiagnosticLog CSP](diagnosticlog-csp.md) |  |  |  |
|
||||||
| [DMAcc CSP](dmacc-csp.md) |  |  |  |
|
| [DMAcc CSP](dmacc-csp.md) |  |  |  |
|
||||||
| [DMClient CSP](dmclient-csp.md) |  |  |  |
|
| [DMClient CSP](dmclient-csp.md) |  |  |  |
|
||||||
|
| [EnrollmentStatusTracking CSP](enrollmentstatustracking-csp.md) |  |  |  <sup>10</sup> |
|
||||||
| [EnterpriseModernAppManagement CSP](enterprisemodernappmanagement-csp.md) |  |  |  |
|
| [EnterpriseModernAppManagement CSP](enterprisemodernappmanagement-csp.md) |  |  |  |
|
||||||
| [NetworkProxy CSP](networkproxy-csp.md) |  |  |  |
|
| [NetworkProxy CSP](networkproxy-csp.md) |  |  |  |
|
||||||
| [NetworkQoSPolicy CSP](networkqospolicy-csp.md) |  |  |  <sup>8</sup>|
|
| [NetworkQoSPolicy CSP](networkqospolicy-csp.md) |  |  |  <sup>8</sup>|
|
||||||
@ -2737,6 +2738,7 @@ The following list shows the CSPs supported in HoloLens devices:
|
|||||||
| [RemoteFind CSP](remotefind-csp.md) |  |  <sup>4</sup> |  |
|
| [RemoteFind CSP](remotefind-csp.md) |  |  <sup>4</sup> |  |
|
||||||
| [RemoteWipe CSP](remotewipe-csp.md) |  |  <sup>4</sup> |  |
|
| [RemoteWipe CSP](remotewipe-csp.md) |  |  <sup>4</sup> |  |
|
||||||
| [RootCATrustedCertificates CSP](rootcacertificates-csp.md) |  |  |  |
|
| [RootCATrustedCertificates CSP](rootcacertificates-csp.md) |  |  |  |
|
||||||
|
| [TenantLockdown CSP](tenantlockdown-csp.md) |  |  |  <sup>10</sup> |
|
||||||
| [Update CSP](update-csp.md) |  |  |  |
|
| [Update CSP](update-csp.md) |  |  |  |
|
||||||
| [VPNv2 CSP](vpnv2-csp.md) |  |  |  |
|
| [VPNv2 CSP](vpnv2-csp.md) |  |  |  |
|
||||||
| [WiFi CSP](wifi-csp.md) |  |  |  |
|
| [WiFi CSP](wifi-csp.md) |  |  |  |
|
||||||
@ -2745,7 +2747,9 @@ The following list shows the CSPs supported in HoloLens devices:
|
|||||||
|
|
||||||
## <a href="" id="surfacehubcspsupport"></a>CSPs supported in Microsoft Surface Hub
|
## <a href="" id="surfacehubcspsupport"></a>CSPs supported in Microsoft Surface Hub
|
||||||
|
|
||||||
- [Accounts CSP](accounts-csp.md)<sup>9</sup> **Note:** Support in Surface Hub is limited to **Domain\ComputerName**.
|
- [Accounts CSP](accounts-csp.md)<sup>9</sup>
|
||||||
|
> [!NOTE]
|
||||||
|
> Support in Surface Hub is limited to **Domain\ComputerName**.
|
||||||
- [AccountManagement CSP](accountmanagement-csp.md)
|
- [AccountManagement CSP](accountmanagement-csp.md)
|
||||||
- [APPLICATION CSP](application-csp.md)
|
- [APPLICATION CSP](application-csp.md)
|
||||||
- [CertificateStore CSP](certificatestore-csp.md)
|
- [CertificateStore CSP](certificatestore-csp.md)
|
||||||
@ -2813,3 +2817,4 @@ The following list shows the CSPs supported in HoloLens devices:
|
|||||||
- 7 - Added in Windows 10, version 1909.
|
- 7 - Added in Windows 10, version 1909.
|
||||||
- 8 - Added in Windows 10, version 2004.
|
- 8 - Added in Windows 10, version 2004.
|
||||||
- 9 - Added in Windows 10 Team 2020 Update
|
- 9 - Added in Windows 10 Team 2020 Update
|
||||||
|
- 10 - Added in [Windows Holographic, version 20H2](https://docs.microsoft.com/hololens/hololens-release-notes#windows-holographic-version-20h2)
|
||||||
|
@ -152,7 +152,7 @@ You can onboard Windows Server (SAC) version 1803, Windows Server 2019, or Windo
|
|||||||
> - The Onboarding package for Windows Server 2019 through Microsoft Endpoint Configuration Manager currently ships a script. For more information on how to deploy scripts in Configuration Manager, see [Packages and programs in Configuration Manager](https://docs.microsoft.com/configmgr/apps/deploy-use/packages-and-programs).
|
> - The Onboarding package for Windows Server 2019 through Microsoft Endpoint Configuration Manager currently ships a script. For more information on how to deploy scripts in Configuration Manager, see [Packages and programs in Configuration Manager](https://docs.microsoft.com/configmgr/apps/deploy-use/packages-and-programs).
|
||||||
> - A local script is suitable for a proof of concept but should not be used for production deployment. For a production deployment, we recommend using Group Policy, Microsoft Endpoint Configuration Manager, or Intune.
|
> - A local script is suitable for a proof of concept but should not be used for production deployment. For a production deployment, we recommend using Group Policy, Microsoft Endpoint Configuration Manager, or Intune.
|
||||||
|
|
||||||
Support for Windows Server, provide deeper insight into activities happening on the Windows server, coverage for kernel and memory attack detection, and enables response actions on Windows Server endpoint as well.
|
Support for Windows Server provides deeper insight into server activities, coverage for kernel and memory attack detection, and enables response actions.
|
||||||
|
|
||||||
1. Configure Defender for Endpoint onboarding settings on the Windows server. For more information, see [Onboard Windows 10 devices](configure-endpoints.md).
|
1. Configure Defender for Endpoint onboarding settings on the Windows server. For more information, see [Onboard Windows 10 devices](configure-endpoints.md).
|
||||||
|
|
||||||
|
@ -27,25 +27,50 @@ ms.topic: article
|
|||||||
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631)
|
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631)
|
||||||
|
|
||||||
|
|
||||||
There are three phases in deploying Defender for Endpoint:
|
|
||||||
|
|
||||||
|Phase | Description |
|
Microsoft Defender for Endpoint has the capabilities to effectively protect your enterprise from cyber threats.
|
||||||
|:-------|:-----|
|
|
||||||
| <br>[Phase 1: Prepare](prepare-deployment.md)| Learn about what you need to consider when deploying Defender for Endpoint: <br><br>- Stakeholders and sign-off <br> - Environment considerations <br>- Access <br> - Adoption order
|
Learn how to deploy Microsoft Defender for Endpoint so that your enterprise can take advantage of preventative protection, post-breach detection, automated investigation, and response.
|
||||||
|  <br>[Phase 2: Setup](production-deployment.md)| Take the initial steps to access Microsoft Defender Security Center. You'll be guided on:<br><br>- Validating the licensing <br> - Completing the setup wizard within the portal<br>- Network configuration|
|
|
||||||
|  <br>[Phase 3: Onboard](onboarding.md) | Onboard devices to the service so the Microsoft Defender ATP service can get sensor data from them.
|
|
||||||
|
|
||||||
|
|
||||||
|
This solution provides guidance on the three phases of deployment. Each section corresponds to a separate article in this solution.
|
||||||
|
|
||||||
The deployment guide will guide you through the recommended path in deploying Defender for Endpoint.
|

|
||||||
|
|
||||||
If you're unfamiliar with the general deployment planning steps, check out the [Plan deployment](deployment-strategy.md) topic to get a high-level overview of the general deployment steps and methods.
|
Regardless of the environment architecture and method of deployment you choose outlined in the [Plan deployment](deployment-strategy.md) guidance, this guide is going to support you in onboarding endpoints.
|
||||||
|
|
||||||
|
|
||||||
|
## Prepare
|
||||||
|
Learn about what you need to consider when deploying Defender for Endpoint such as stakeholder approvals, environment considerations, access permissions, and adoption order of capabilities.
|
||||||
|
|
||||||
## In Scope
|
## Setup
|
||||||
|
Get guidance on the initial steps you need to take so that you can access the portal such as validating licensing, completing the setup wizard, and network configuration.
|
||||||
|
|
||||||
The following is in scope for this deployment guide:
|
## Onboard
|
||||||
|
Learn how to make use of deployment rings, supported onboarding tools based on the type of endpoint, and configuring available capabilities.
|
||||||
|
|
||||||
|
|
||||||
|
## Key capabilities
|
||||||
|
|
||||||
|
This solution provides the following key capabilities:
|
||||||
|
|
||||||
|
Capability | Description
|
||||||
|
:---|:---
|
||||||
|
Eliminate risks and reduce your attack surface| Use attack surface reduction to minimize the areas where your organization could be vulnerable to threats.
|
||||||
|
Block sophisticated threats and malware | Defend against never-before-seen polymorphic and metamorphic malware and fileless and file-based threats with next-generation protection.
|
||||||
|
Remediation at scale with automation | Automatically investigate alerts and remediate complex threats in minutes. Apply best practices and intelligent decision-making algorithms to determine whether a threat is active and what action to take.
|
||||||
|
Discover vulnerabilities and misconfigurations in real time | Bring security and IT together with Microsoft Threat & Vulnerability Management to quickly discover, prioritize, and remediate vulnerabilities and misconfigurations.
|
||||||
|
Get expert-level threat monitoring and analysis | Empower your security operations centers with Microsoft Threat Experts. Get deep knowledge, advanced threat monitoring, analysis, and support to identify critical threats in your unique environment.
|
||||||
|
Detect and respond to advanced attacks with behavioral monitoring | Spot attacks and zero-day exploits using advanced behavioral analytics and machine learning.
|
||||||
|
Cross-platform support | Microsoft Defender for Endpoint provides security for non-Windows platforms including Mac, Linux servers, and Android.
|
||||||
|
Evaluate capabilities | Fully evaluate our capabilities with a few simple clicks in the Microsoft Defender for Endpoint evaluation lab.
|
||||||
|
Streamline and integrate via APIs | Integrate Microsoft Defender for Endpoint with your security solutions and streamline and automate security workflows with rich APIs.
|
||||||
|
Simplify endpoint security management | Use a single pane of glass for all endpoint security actions, such as endpoint configuration, deployment, and management with Microsoft Endpoint Manager.
|
||||||
|
|
||||||
|
|
||||||
|
## Scope
|
||||||
|
|
||||||
|
### In scope
|
||||||
|
|
||||||
- Use of Microsoft Endpoint Configuration Manager and Microsoft Endpoint Manager to onboard endpoints into the service and configure capabilities
|
- Use of Microsoft Endpoint Configuration Manager and Microsoft Endpoint Manager to onboard endpoints into the service and configure capabilities
|
||||||
|
|
||||||
@ -59,10 +84,19 @@ The following is in scope for this deployment guide:
|
|||||||
- Attack surface reduction
|
- Attack surface reduction
|
||||||
|
|
||||||
|
|
||||||
## Out of scope
|
### Out of scope
|
||||||
|
|
||||||
The following are out of scope of this deployment guide:
|
The following are out of scope of this deployment guide:
|
||||||
|
|
||||||
- Configuration of third-party solutions that might integrate with Defender for Endpoint
|
- Configuration of third-party solutions that might integrate with Defender for Endpoint
|
||||||
|
|
||||||
- Penetration testing in production environment
|
- Penetration testing in production environment
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
## See also
|
||||||
|
- [Phase 1: Prepare](prepare-deployment.md)
|
||||||
|
- [Phase 2: Set up](production-deployment.md)
|
||||||
|
- [Phase 3: Onboard](onboarding.md)
|
||||||
|
- [Plan deployment](deployment-strategy.md)
|
@ -25,15 +25,14 @@ ms.topic: article
|
|||||||
|
|
||||||
>Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-secopsdashboard-abovefoldlink)
|
>Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-secopsdashboard-abovefoldlink)
|
||||||
|
|
||||||
Depending on the requirements of your environment, we've put together material to help guide you through the various options you can adopt to deploy Defender for Endpoint.
|
|
||||||
|
|
||||||
These are the general steps you need to take to deploy Defender for Endpoint:
|
Plan your Microsoft Defender for Endpoint deployment so that you can maximize the security capabilities within the suite and better protect your enterprise from cyber threats.
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
- Identify architecture
|
This solution provides guidance on how to identify your environment architecture, select the type of deployment tool that best fits your needs, and guidance on how to configure capabilities.
|
||||||
- Select deployment method
|
|
||||||
- Configure capabilities
|
|
||||||
|

|
||||||
|
|
||||||
|
|
||||||
## Step 1: Identify architecture
|
## Step 1: Identify architecture
|
||||||
@ -43,7 +42,7 @@ Depending on your environment, some tools are better suited for certain architec
|
|||||||
|
|
||||||
Use the following material to select the appropriate Defender for Endpoint architecture that best suites your organization.
|
Use the following material to select the appropriate Defender for Endpoint architecture that best suites your organization.
|
||||||
|
|
||||||
|**Item**|**Description**|
|
| Item | Description |
|
||||||
|:-----|:-----|
|
|:-----|:-----|
|
||||||
|[](https://github.com/MicrosoftDocs/windows-itpro-docs/raw/public/windows/security/threat-protection/microsoft-defender-atp/downloads/mdatp-deployment-strategy.pdf)<br/> [PDF](https://github.com/MicrosoftDocs/windows-itpro-docs/raw/public/windows/security/threat-protection/microsoft-defender-atp/downloads/mdatp-deployment-strategy.pdf) \| [Visio](https://github.com/MicrosoftDocs/windows-itpro-docs/raw/public/windows/security/threat-protection/microsoft-defender-atp/downloads/mdatp-deployment-strategy.vsdx) | The architectural material helps you plan your deployment for the following architectures: <ul><li> Cloud-native </li><li> Co-management </li><li> On-premise</li><li>Evaluation and local onboarding</li>
|
|[](https://github.com/MicrosoftDocs/windows-itpro-docs/raw/public/windows/security/threat-protection/microsoft-defender-atp/downloads/mdatp-deployment-strategy.pdf)<br/> [PDF](https://github.com/MicrosoftDocs/windows-itpro-docs/raw/public/windows/security/threat-protection/microsoft-defender-atp/downloads/mdatp-deployment-strategy.pdf) \| [Visio](https://github.com/MicrosoftDocs/windows-itpro-docs/raw/public/windows/security/threat-protection/microsoft-defender-atp/downloads/mdatp-deployment-strategy.vsdx) | The architectural material helps you plan your deployment for the following architectures: <ul><li> Cloud-native </li><li> Co-management </li><li> On-premise</li><li>Evaluation and local onboarding</li>
|
||||||
|
|
||||||
|
Binary file not shown.
After Width: | Height: | Size: 20 KiB |
Binary file not shown.
After Width: | Height: | Size: 30 KiB |
@ -31,19 +31,26 @@ Want to experience Defender for Endpoint? [Sign up for a free trial.](https://ww
|
|||||||
## Before you begin:
|
## Before you begin:
|
||||||
|
|
||||||
1. Create an [event hub](https://docs.microsoft.com/azure/event-hubs/) in your tenant.
|
1. Create an [event hub](https://docs.microsoft.com/azure/event-hubs/) in your tenant.
|
||||||
2. Log in to your [Azure tenant](https://ms.portal.azure.com/), go to **Subscriptions > Your subscription > Resource Providers > Register to **Microsoft.insights****.
|
|
||||||
|
2. Log in to your [Azure tenant](https://ms.portal.azure.com/), go to **Subscriptions > Your subscription > Resource Providers > Register to **Microsoft.insights**.
|
||||||
|
|
||||||
## Enable raw data streaming:
|
## Enable raw data streaming:
|
||||||
|
|
||||||
1. Log in to [Microsoft Defender Security Center](https://securitycenter.windows.com) with a Global Admin user.
|
1. Log in to [Microsoft Defender Security Center](https://securitycenter.windows.com) with a Global Admin user.
|
||||||
2. Go to [Data export settings page](https://securitycenter.windows.com/interoperability/dataexport) on Microsoft Defender Security Center.
|
|
||||||
3. Click on **Add data export settings**.
|
|
||||||
4. Choose a name for your new settings.
|
|
||||||
5. Choose **Forward events to Azure Event Hubs**.
|
|
||||||
6. Type your **Event Hubs name** and your **Event Hubs resource ID**.
|
|
||||||
In order to get your **Event Hubs resource ID**, go to your Azure Event Hubs namespace page on [Azure](https://ms.portal.azure.com/) > properties tab > copy the text under **Resource ID**:
|
|
||||||
|
|
||||||

|
2. Go to [Data export settings page](https://securitycenter.windows.com/interoperability/dataexport) on Microsoft Defender Security Center.
|
||||||
|
|
||||||
|
3. Click on **Add data export settings**.
|
||||||
|
|
||||||
|
4. Choose a name for your new settings.
|
||||||
|
|
||||||
|
5. Choose **Forward events to Azure Event Hubs**.
|
||||||
|
|
||||||
|
6. Type your **Event Hubs name** and your **Event Hubs resource ID**.
|
||||||
|
|
||||||
|
In order to get your **Event Hubs resource ID**, go to your Azure Event Hubs namespace page on [Azure](https://ms.portal.azure.com/) > properties tab > copy the text under **Resource ID**:
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
7. Choose the events you want to stream and click **Save**.
|
7. Choose the events you want to stream and click **Save**.
|
||||||
|
|
||||||
@ -64,8 +71,11 @@ Want to experience Defender for Endpoint? [Sign up for a free trial.](https://ww
|
|||||||
```
|
```
|
||||||
|
|
||||||
- Each event hub message in Azure Event Hubs contains list of records.
|
- Each event hub message in Azure Event Hubs contains list of records.
|
||||||
|
|
||||||
- Each record contains the event name, the time Microsoft Defender ATP received the event, the tenant it belongs (you will only get events from your tenant), and the event in JSON format in a property called "**properties**".
|
- Each record contains the event name, the time Microsoft Defender ATP received the event, the tenant it belongs (you will only get events from your tenant), and the event in JSON format in a property called "**properties**".
|
||||||
|
|
||||||
- For more information about the schema of Microsoft Defender for Endpoint events, see [Advanced Hunting overview](advanced-hunting-overview.md).
|
- For more information about the schema of Microsoft Defender for Endpoint events, see [Advanced Hunting overview](advanced-hunting-overview.md).
|
||||||
|
|
||||||
- In Advanced Hunting, the **DeviceInfo** table has a column named **MachineGroup** which contains the group of the device. Here every event will be decorated with this column as well. See [Device Groups](machine-groups.md) for more information.
|
- In Advanced Hunting, the **DeviceInfo** table has a column named **MachineGroup** which contains the group of the device. Here every event will be decorated with this column as well. See [Device Groups](machine-groups.md) for more information.
|
||||||
|
|
||||||
## Data types mapping:
|
## Data types mapping:
|
||||||
@ -73,21 +83,22 @@ Want to experience Defender for Endpoint? [Sign up for a free trial.](https://ww
|
|||||||
To get the data types for event properties do the following:
|
To get the data types for event properties do the following:
|
||||||
|
|
||||||
1. Log in to [Microsoft Defender Security Center](https://securitycenter.windows.com) and go to [Advanced Hunting page](https://securitycenter.windows.com/hunting-package).
|
1. Log in to [Microsoft Defender Security Center](https://securitycenter.windows.com) and go to [Advanced Hunting page](https://securitycenter.windows.com/hunting-package).
|
||||||
|
|
||||||
2. Run the following query to get the data types mapping for each event:
|
2. Run the following query to get the data types mapping for each event:
|
||||||
|
|
||||||
```
|
```
|
||||||
{EventType}
|
{EventType}
|
||||||
| getschema
|
| getschema
|
||||||
| project ColumnName, ColumnType
|
| project ColumnName, ColumnType
|
||||||
|
```
|
||||||
```
|
|
||||||
|
|
||||||
- Here is an example for Device Info event:
|
- Here is an example for Device Info event:
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
## Related topics
|
## Related topics
|
||||||
- [Overview of Advanced Hunting](advanced-hunting-overview.md)
|
- [Overview of Advanced Hunting](advanced-hunting-overview.md)
|
||||||
- [Microsoft Defender for Endpoint streaming API](raw-data-export.md)
|
- [Microsoft Defender for Endpoint streaming API](raw-data-export.md)
|
||||||
- [Stream Microsoft Defender for Endpoint events to your Azure storage account](raw-data-export-storage.md)
|
- [Stream Microsoft Defender for Endpoint events to your Azure storage account](raw-data-export-storage.md)
|
||||||
- [Azure Event Hubs documentation](https://docs.microsoft.com/azure/event-hubs/)
|
- [Azure Event Hubs documentation](https://docs.microsoft.com/azure/event-hubs/)
|
||||||
|
- [Troubleshoot connectivity issues - Azure Event Hubs](https://docs.microsoft.com/azure/event-hubs/troubleshooting-guide)
|
||||||
|
@ -31,19 +31,24 @@ Want to experience Defender for Endpoint? [Sign up for a free trial.](https://ww
|
|||||||
## Before you begin:
|
## Before you begin:
|
||||||
|
|
||||||
1. Create a [Storage account](https://docs.microsoft.com/azure/storage/common/storage-account-overview) in your tenant.
|
1. Create a [Storage account](https://docs.microsoft.com/azure/storage/common/storage-account-overview) in your tenant.
|
||||||
|
|
||||||
2. Log in to your [Azure tenant](https://ms.portal.azure.com/), go to **Subscriptions > Your subscription > Resource Providers > Register to Microsoft.insights**.
|
2. Log in to your [Azure tenant](https://ms.portal.azure.com/), go to **Subscriptions > Your subscription > Resource Providers > Register to Microsoft.insights**.
|
||||||
3. Go to **Settings > Advanced Features > Preview features** and turn Preview features **On**.
|
|
||||||
|
|
||||||
## Enable raw data streaming:
|
## Enable raw data streaming:
|
||||||
|
|
||||||
1. Log in to [Microsoft Defender for Endpoint portal](https://securitycenter.windows.com) with Global Admin user.
|
1. Log in to [Microsoft Defender for Endpoint portal](https://securitycenter.windows.com) with Global Admin user.
|
||||||
2. Go to [Data export settings page](https://securitycenter.windows.com/interoperability/dataexport) on Microsoft Defender Security Center.
|
|
||||||
3. Click on **Add data export settings**.
|
|
||||||
4. Choose a name for your new settings.
|
|
||||||
5. Choose **Forward events to Azure Storage**.
|
|
||||||
6. Type your **Storage Account Resource Id**. In order to get your **Storage Account Resource Id**, go to your Storage account page on [Azure portal](https://ms.portal.azure.com/) > properties tab > copy the text under **Storage account resource ID**:
|
|
||||||
|
|
||||||

|
2. Go to [Data export settings page](https://securitycenter.windows.com/interoperability/dataexport) on Microsoft Defender Security Center.
|
||||||
|
|
||||||
|
3. Click on **Add data export settings**.
|
||||||
|
|
||||||
|
4. Choose a name for your new settings.
|
||||||
|
|
||||||
|
5. Choose **Forward events to Azure Storage**.
|
||||||
|
|
||||||
|
6. Type your **Storage Account Resource ID**. In order to get your **Storage Account Resource ID**, go to your Storage account page on [Azure portal](https://ms.portal.azure.com/) > properties tab > copy the text under **Storage account resource ID**:
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
7. Choose the events you want to stream and click **Save**.
|
7. Choose the events you want to stream and click **Save**.
|
||||||
|
|
||||||
@ -51,22 +56,25 @@ Want to experience Defender for Endpoint? [Sign up for a free trial.](https://ww
|
|||||||
|
|
||||||
- A blob container will be created for each event type:
|
- A blob container will be created for each event type:
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
- The schema of each row in a blob is the following JSON:
|
- The schema of each row in a blob is the following JSON:
|
||||||
|
|
||||||
```
|
```
|
||||||
{
|
{
|
||||||
"time": "<The time WDATP received the event>"
|
"time": "<The time WDATP received the event>"
|
||||||
"tenantId": "<Your tenant ID>"
|
"tenantId": "<Your tenant ID>"
|
||||||
"category": "<The Advanced Hunting table name with 'AdvancedHunting-' prefix>"
|
"category": "<The Advanced Hunting table name with 'AdvancedHunting-' prefix>"
|
||||||
"properties": { <WDATP Advanced Hunting event as Json> }
|
"properties": { <WDATP Advanced Hunting event as Json> }
|
||||||
}
|
}
|
||||||
```
|
```
|
||||||
|
|
||||||
- Each blob contains multiple rows.
|
- Each blob contains multiple rows.
|
||||||
|
|
||||||
- Each row contains the event name, the time Defender for Endpoint received the event, the tenant it belongs (you will only get events from your tenant), and the event in JSON format in a property called "properties".
|
- Each row contains the event name, the time Defender for Endpoint received the event, the tenant it belongs (you will only get events from your tenant), and the event in JSON format in a property called "properties".
|
||||||
|
|
||||||
- For more information about the schema of Microsoft Defender for Endpoint events, see [Advanced Hunting overview](advanced-hunting-overview.md).
|
- For more information about the schema of Microsoft Defender for Endpoint events, see [Advanced Hunting overview](advanced-hunting-overview.md).
|
||||||
|
|
||||||
- In Advanced Hunting, the **DeviceInfo** table has a column named **MachineGroup** which contains the group of the device. Here every event will be decorated with this column as well. See [Device Groups](machine-groups.md) for more information.
|
- In Advanced Hunting, the **DeviceInfo** table has a column named **MachineGroup** which contains the group of the device. Here every event will be decorated with this column as well. See [Device Groups](machine-groups.md) for more information.
|
||||||
|
|
||||||
## Data types mapping:
|
## Data types mapping:
|
||||||
@ -74,18 +82,18 @@ Want to experience Defender for Endpoint? [Sign up for a free trial.](https://ww
|
|||||||
In order to get the data types for our events properties do the following:
|
In order to get the data types for our events properties do the following:
|
||||||
|
|
||||||
1. Log in to [Microsoft Defender Security Center](https://securitycenter.windows.com) and go to [Advanced Hunting page](https://securitycenter.windows.com/hunting-package).
|
1. Log in to [Microsoft Defender Security Center](https://securitycenter.windows.com) and go to [Advanced Hunting page](https://securitycenter.windows.com/hunting-package).
|
||||||
|
|
||||||
2. Run the following query to get the data types mapping for each event:
|
2. Run the following query to get the data types mapping for each event:
|
||||||
|
|
||||||
```
|
```
|
||||||
{EventType}
|
{EventType}
|
||||||
| getschema
|
| getschema
|
||||||
| project ColumnName, ColumnType
|
| project ColumnName, ColumnType
|
||||||
|
```
|
||||||
```
|
|
||||||
|
|
||||||
- Here is an example for Device Info event:
|
- Here is an example for Device Info event:
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
## Related topics
|
## Related topics
|
||||||
- [Overview of Advanced Hunting](advanced-hunting-overview.md)
|
- [Overview of Advanced Hunting](advanced-hunting-overview.md)
|
||||||
|
Loading…
x
Reference in New Issue
Block a user