This commit is contained in:
jcaparas 2018-03-19 11:08:57 -07:00
parent 22f4915fca
commit ad08827f04
7 changed files with 11 additions and 10 deletions

View File

@ -36,7 +36,7 @@ ms.date: 04/16/2018
## Onboard machines using Group Policy ## Onboard machines using Group Policy
1. Open the GP configuration package .zip file (*WindowsDefenderATPOnboardingPackage.zip*) that you downloaded from the service onboarding wizard. You can also get the package from the [Windows Defender ATP portal](https://securitycenter.windows.com/): 1. Open the GP configuration package .zip file (*WindowsDefenderATPOnboardingPackage.zip*) that you downloaded from the service onboarding wizard. You can also get the package from the [Windows Defender ATP portal](https://securitycenter.windows.com/):
a. In the navigation pane, select **Settings** > **Onboarding**. a. In the navigation pane, select **Settings** > **Machine management** > **Onboarding**.
b. Select Windows 10 as the operating system. b. Select Windows 10 as the operating system.

View File

@ -44,7 +44,7 @@ For more information on using Windows Defender ATP CSP see, [WindowsAdvancedThre
1. Open the Microsoft Intune configuration package .zip file (*WindowsDefenderATPOnboardingPackage.zip*) that you downloaded from the service onboarding wizard. You can also get the package from the [Windows Defender ATP portal](https://securitycenter.windows.com/): 1. Open the Microsoft Intune configuration package .zip file (*WindowsDefenderATPOnboardingPackage.zip*) that you downloaded from the service onboarding wizard. You can also get the package from the [Windows Defender ATP portal](https://securitycenter.windows.com/):
a. In the navigation pane, select **Settings** > **Onboarding**. a. In the navigation pane, select **Settings** > **Machine management** > **Onboarding**.
b. Select Windows 10 as the operating system. b. Select Windows 10 as the operating system.

View File

@ -34,7 +34,7 @@ You'll need to take the following steps to onboard non-Windows machines:
### Turn on third-party integration ### Turn on third-party integration
1. In the navigation pane, select **Settings** > **Onboarding**. Make sure the third-party solution is listed. 1. In the navigation pane, select **Settings** > **Machine management** > **Onboarding**. Make sure the third-party solution is listed.
2. Select Mac and Linux as the operating system. 2. Select Mac and Linux as the operating system.
@ -59,7 +59,7 @@ To effectively offboard the machine from the service, you'll need to disable the
1. Follow the third-party documentation to opt-out on the third-party service side. 1. Follow the third-party documentation to opt-out on the third-party service side.
2. In the navigation pane, select **Settings** > **Onboarding**. 2. In the navigation pane, select **Settings** > **Machine management** > **Onboarding**.
3. Turn off the third-party solution integration. 3. Turn off the third-party solution integration.

View File

@ -49,7 +49,7 @@ You can use existing System Center Configuration Manager functionality to create
1. Open the SCCM configuration package .zip file (*WindowsDefenderATPOnboardingPackage.zip*) that you downloaded from the service onboarding wizard. You can also get the package from the [Windows Defender ATP portal](https://securitycenter.windows.com/): 1. Open the SCCM configuration package .zip file (*WindowsDefenderATPOnboardingPackage.zip*) that you downloaded from the service onboarding wizard. You can also get the package from the [Windows Defender ATP portal](https://securitycenter.windows.com/):
a. In the navigation pane, select **Settings** > **Onboarding**. a. In the navigation pane, select **Settings** > **Machine management** > **Onboarding**.
b. Select Windows 10 as the operating system. b. Select Windows 10 as the operating system.

View File

@ -35,7 +35,7 @@ You can also manually onboard individual machines to Windows Defender ATP. You m
## Onboard machines ## Onboard machines
1. Open the GP configuration package .zip file (*WindowsDefenderATPOnboardingPackage.zip*) that you downloaded from the service onboarding wizard. You can also get the package from the [Windows Defender ATP portal](https://securitycenter.windows.com/): 1. Open the GP configuration package .zip file (*WindowsDefenderATPOnboardingPackage.zip*) that you downloaded from the service onboarding wizard. You can also get the package from the [Windows Defender ATP portal](https://securitycenter.windows.com/):
a. In the navigation pane, select **Settings** > **Onboarding**. a. In the navigation pane, select **Settings** > **Machine management** > **Onboarding**.
b. Select Windows 10 as the operating system. b. Select Windows 10 as the operating system.

View File

@ -40,7 +40,7 @@ You can onboard VDI machines using a single entry or multiple entries for each m
1. Open the VDI configuration package .zip file (*WindowsDefenderATPOnboardingPackage.zip*) that you downloaded from the service onboarding wizard. You can also get the package from the [Windows Defender ATP portal](https://securitycenter.windows.com/): 1. Open the VDI configuration package .zip file (*WindowsDefenderATPOnboardingPackage.zip*) that you downloaded from the service onboarding wizard. You can also get the package from the [Windows Defender ATP portal](https://securitycenter.windows.com/):
a. In the navigation pane, select **Settings** > **Onboarding**. a. In the navigation pane, select **Settings** > **Machine management** > **Onboarding**.
b. Select Windows 10 as the operating system. b. Select Windows 10 as the operating system.

View File

@ -18,7 +18,7 @@ ms.date: 04/16/2018
- Windows Server 2012 R2 - Windows Server 2012 R2
- Windows Server 2016 - Windows Server 2016
- Windows Server version 1803 - Windows Server, version 1803
- Windows Defender Advanced Threat Protection (Windows Defender ATP) - Windows Defender Advanced Threat Protection (Windows Defender ATP)
[!include[Prerelease information](prerelease.md)] [!include[Prerelease information](prerelease.md)]
@ -30,6 +30,7 @@ Windows Defender ATP extends support to also include the Windows Server operatin
Windows Defender ATP supports the onboarding of the following servers: Windows Defender ATP supports the onboarding of the following servers:
- Windows Server 2012 R2 - Windows Server 2012 R2
- Windows Server 2016 - Windows Server 2016
- Windows Server, version 1803
## Onboard Windows Server 2012 R2 and Windows Server 2016 ## Onboard Windows Server 2012 R2 and Windows Server 2016
@ -44,7 +45,7 @@ To onboard your servers to Windows Defender ATP, youll need to:
### Turn on Server monitoring from the Windows Defender Security Center portal ### Turn on Server monitoring from the Windows Defender Security Center portal
1. In the navigation pane, select **Settings** > **Onboarding**. 1. In the navigation pane, select **Settings** > **Machine management** > **Onboarding**.
2. Select Windows server 2012, 2012R2 and 2016 as the operating system. 2. Select Windows server 2012, 2012R2 and 2016 as the operating system.
@ -80,7 +81,7 @@ Once completed, you should see onboarded servers in the portal within an hour.
| winatp-gw-neu.microsoft.com | 443 | | winatp-gw-neu.microsoft.com | 443 |
| winatp-gw-weu.microsoft.com | 443 | | winatp-gw-weu.microsoft.com | 443 |
## Onboard Windows Server, version 1803 [NEED TO CHECK FINAL PRODUCT NAME FOR THIS SERVER] ## Onboard Windows Server, version 1803
Youll be able to onboard in the same method available for Windows 10 client endpoints. For more information, see [Configure client endpoints](configure-endpoints-windows-defender-advanced-threat-protection.md). Support for Windows Server, version 1803 provides deeper insight into activities happening on the server, coverage for kernel and memory attack detection, and enables response actions on Windows Server endpoint as well. Youll be able to onboard in the same method available for Windows 10 client endpoints. For more information, see [Configure client endpoints](configure-endpoints-windows-defender-advanced-threat-protection.md). Support for Windows Server, version 1803 provides deeper insight into activities happening on the server, coverage for kernel and memory attack detection, and enables response actions on Windows Server endpoint as well.
1. Install the latest Windows Server Insider build on an endpoint. For more information, see [Windows Server Insider Preview](https://www.microsoft.com/en-us/software-download/windowsinsiderpreviewserver). 1. Install the latest Windows Server Insider build on an endpoint. For more information, see [Windows Server Insider Preview](https://www.microsoft.com/en-us/software-download/windowsinsiderpreviewserver).