From af13a6cf74d4091e748bc00f3faf9f92a59d802a Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Tue, 10 May 2016 13:40:05 +1000 Subject: [PATCH] update portal URL to https://securitycenter.windows.com --- ...ows-defender-advanced-threat-protection.md | 8 ++-- ...ows-defender-advanced-threat-protection.md | 1 - ...ows-defender-advanced-threat-protection.md | 2 +- ...ows-defender-advanced-threat-protection.md | 4 +- ...ows-defender-advanced-threat-protection.md | 2 +- ...ows-defender-advanced-threat-protection.md | 4 +- ...ows-defender-advanced-threat-protection.md | 43 +++++++++---------- ...ows-defender-advanced-threat-protection.md | 4 +- 8 files changed, 33 insertions(+), 35 deletions(-) diff --git a/windows/keep-secure/configure-endpoints-windows-defender-advanced-threat-protection.md b/windows/keep-secure/configure-endpoints-windows-defender-advanced-threat-protection.md index 332166ff68..4f5cf021ce 100644 --- a/windows/keep-secure/configure-endpoints-windows-defender-advanced-threat-protection.md +++ b/windows/keep-secure/configure-endpoints-windows-defender-advanced-threat-protection.md @@ -21,15 +21,15 @@ You can use a Group Policy (GP) configuration package or an automated script to ## Configure with System Center Configuration Manager (SCCM) -1. Open the SCCM configuration package .zip file (*WindowsATPOnboardingPackage_ConfigurationManager.zip*) that you downloaded from the service onboarding wizard. You can also get the package from the [Windows Defender ATP portal](https://seville.windows.com): +1. Open the SCCM configuration package .zip file (*WindowsATPOnboardingPackage_ConfigurationManager.zip*) that you downloaded from the service onboarding wizard. You can also get the package from the [Windows Defender ATP portal](https://securitycenter.windows.com/): a. Click **Client onboarding** on the **Navigation pane**. - b. Select **SCCM**, click **Download package**, and save the .zip file. + b. Select **SCCM**, click **Download package**, and save the .zip file. 2. Copy the .zip file to a shared, read-only location that can be accessed by the network administrators who will deploy the package. -3. Import the configuration package by following the steps in the [How to Create Packages and Programs in Configuration Manager](https://technet.microsoft.com/en-us/library/gg682112.aspx#BKMK_Import) topic. +3. Import the configuration package by following the steps in the [How to Create Packages and Programs in Configuration Manager](https://technet.microsoft.com/en-us/library/gg682112.aspx#BKMK_Import) topic. 4. Deploy the package by following the steps in the [How to Deploy Packages and Programs in Configuration Manager](https://technet.microsoft.com/en-us/library/gg682178.aspx) topic. @@ -41,7 +41,7 @@ Using the GP configuration package ensures your endpoints will be correctly conf > **Note**   To use GP updates to deploy the package, you must be on Windows Server 2008 R2 or later. The endpoints must be running Windows 10 TAP. -1. Open the GP configuration package .zip file (*WindowsATPOnboardingPackage_GroupPolicy.zip*) that you downloaded from the service onboarding wizard. You can also get the package from the [Windows Defender ATP portal](https://seville.windows.com): +1. Open the GP configuration package .zip file (*WindowsATPOnboardingPackage_GroupPolicy.zip*) that you downloaded from the service onboarding wizard. You can also get the package from the [Windows Defender ATP portal](https://securitycenter.windows.com/): a. Click **Client onboarding** on the **Navigation pane**. diff --git a/windows/keep-secure/data-storage-privacy-windows-defender-advanced-threat-protection.md b/windows/keep-secure/data-storage-privacy-windows-defender-advanced-threat-protection.md index c97bdab3d6..37d117a5d1 100644 --- a/windows/keep-secure/data-storage-privacy-windows-defender-advanced-threat-protection.md +++ b/windows/keep-secure/data-storage-privacy-windows-defender-advanced-threat-protection.md @@ -6,7 +6,6 @@ search.product: eADQiWindows 10XVcnh ms.prod: W10 ms.mktglfcycl: deploy ms.sitesec: library -author: DulceMV --- # Windows Defender ATP data storage and privacy diff --git a/windows/keep-secure/minimum-requirements-windows-defender-advanced-threat-protection.md b/windows/keep-secure/minimum-requirements-windows-defender-advanced-threat-protection.md index bfd6beddb3..45afdb8c1b 100644 --- a/windows/keep-secure/minimum-requirements-windows-defender-advanced-threat-protection.md +++ b/windows/keep-secure/minimum-requirements-windows-defender-advanced-threat-protection.md @@ -22,7 +22,7 @@ There are some minimum requirements for onboarding your network and endpoints. ### Network and data storage and configuration requirements Your organization must use Azure Active Directory (AAD) to manage users. AAD is used during -service onboarding to manage user-based access to the [Windows Defender ATP portal](https://seville.windows.com/). +service onboarding to manage user-based access to the [Windows Defender ATP portal](https://securitycenter.windows.com/).