mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-23 06:13:41 +00:00
update portal URL to https://securitycenter.windows.com
This commit is contained in:
@ -21,7 +21,7 @@ You can use a Group Policy (GP) configuration package or an automated script to
|
|||||||
|
|
||||||
## Configure with System Center Configuration Manager (SCCM)
|
## Configure with System Center Configuration Manager (SCCM)
|
||||||
|
|
||||||
1. Open the SCCM configuration package .zip file (*WindowsATPOnboardingPackage_ConfigurationManager.zip*) that you downloaded from the service onboarding wizard. You can also get the package from the [Windows Defender ATP portal](https://seville.windows.com):
|
1. Open the SCCM configuration package .zip file (*WindowsATPOnboardingPackage_ConfigurationManager.zip*) that you downloaded from the service onboarding wizard. You can also get the package from the [Windows Defender ATP portal](https://securitycenter.windows.com/):
|
||||||
|
|
||||||
a. Click **Client onboarding** on the **Navigation pane**.
|
a. Click **Client onboarding** on the **Navigation pane**.
|
||||||
|
|
||||||
@ -41,7 +41,7 @@ Using the GP configuration package ensures your endpoints will be correctly conf
|
|||||||
|
|
||||||
> **Note** To use GP updates to deploy the package, you must be on Windows Server 2008 R2 or later. The endpoints must be running Windows 10 TAP.
|
> **Note** To use GP updates to deploy the package, you must be on Windows Server 2008 R2 or later. The endpoints must be running Windows 10 TAP.
|
||||||
|
|
||||||
1. Open the GP configuration package .zip file (*WindowsATPOnboardingPackage_GroupPolicy.zip*) that you downloaded from the service onboarding wizard. You can also get the package from the [Windows Defender ATP portal](https://seville.windows.com):
|
1. Open the GP configuration package .zip file (*WindowsATPOnboardingPackage_GroupPolicy.zip*) that you downloaded from the service onboarding wizard. You can also get the package from the [Windows Defender ATP portal](https://securitycenter.windows.com/):
|
||||||
|
|
||||||
a. Click **Client onboarding** on the **Navigation pane**.
|
a. Click **Client onboarding** on the **Navigation pane**.
|
||||||
|
|
||||||
|
@ -6,7 +6,6 @@ search.product: eADQiWindows 10XVcnh
|
|||||||
ms.prod: W10
|
ms.prod: W10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
author: DulceMV
|
|
||||||
---
|
---
|
||||||
|
|
||||||
# Windows Defender ATP data storage and privacy
|
# Windows Defender ATP data storage and privacy
|
||||||
|
@ -22,7 +22,7 @@ There are some minimum requirements for onboarding your network and endpoints.
|
|||||||
|
|
||||||
### Network and data storage and configuration requirements
|
### Network and data storage and configuration requirements
|
||||||
Your organization must use Azure Active Directory (AAD) to manage users. AAD is used during
|
Your organization must use Azure Active Directory (AAD) to manage users. AAD is used during
|
||||||
service onboarding to manage user-based access to the [Windows Defender ATP portal](https://seville.windows.com/).
|
service onboarding to manage user-based access to the [Windows Defender ATP portal](https://securitycenter.windows.com/).
|
||||||
|
|
||||||
<!--If you’d like help with using AAD to set up user access, contact the
|
<!--If you’d like help with using AAD to set up user access, contact the
|
||||||
[Windows Defender ATP Yammer group](https://www.yammer.com/wsscengineering/\#/threads/inGroup?type=in\_group&feedId=7108776&view=all)
|
[Windows Defender ATP Yammer group](https://www.yammer.com/wsscengineering/\#/threads/inGroup?type=in\_group&feedId=7108776&view=all)
|
||||||
|
@ -25,7 +25,7 @@ Monitoring can be done directly on the portal, or by using System Center Configu
|
|||||||
|
|
||||||
## Monitor with the portal
|
## Monitor with the portal
|
||||||
|
|
||||||
1. Go to the [Windows Defender ATP portal](https://seville.windows.com).
|
1. Go to the [Windows Defender ATP portal](https://securitycenter.windows.com/).
|
||||||
|
|
||||||
2. Click **Machines view**.
|
2. Click **Machines view**.
|
||||||
|
|
||||||
|
@ -20,7 +20,7 @@ author: DulceMV
|
|||||||
|
|
||||||
Enterprise security teams can use the portal to monitor and assist in responding to alerts of potential advanced persistent threat (APT) activity or data breaches.
|
Enterprise security teams can use the portal to monitor and assist in responding to alerts of potential advanced persistent threat (APT) activity or data breaches.
|
||||||
|
|
||||||
You can use the [Windows Defender ATP portal](https://seville.windows.com/) to:
|
You can use the [Windows Defender ATP portal](https://securitycenter.windows.com/) to:
|
||||||
- View, sort, and triage alerts from your endpoints
|
- View, sort, and triage alerts from your endpoints
|
||||||
- Search for more information on observed indicators such as files and IP Addresses
|
- Search for more information on observed indicators such as files and IP Addresses
|
||||||
- Change Windows Defender ATP settings, including time zone and alert suppression rules
|
- Change Windows Defender ATP settings, including time zone and alert suppression rules
|
||||||
|
@ -22,7 +22,7 @@ You have to assign users to the Windows ATP Service application in Azure Active
|
|||||||
|
|
||||||
**Manage user access to the Windows Defender ATP portal**:
|
**Manage user access to the Windows Defender ATP portal**:
|
||||||
|
|
||||||
1. When you first go to the [Windows Defender ATP portal](https://seville.windows.com/) and your directory does not
|
1. When you first go to the [Windows Defender ATP portal](https://securitycenter.windows.com/) and your directory does not
|
||||||
have users assigned to the Windows ATP Service application, you will
|
have users assigned to the Windows ATP Service application, you will
|
||||||
be directed to open the [Microsoft Azure Dashboard](https://portal.azure.com) to manage user access.
|
be directed to open the [Microsoft Azure Dashboard](https://portal.azure.com) to manage user access.
|
||||||
|
|
||||||
@ -105,7 +105,7 @@ You have to assign users to the Windows ATP Service application in Azure Active
|
|||||||
|
|
||||||
> **Note** You need to assign roles for every user in your organization that requires access to the Windows Defender ATP portal. You can assign roles at any time by going to the Azure Management Portal, clicking **Active Directory**, and then finding your directory in the list and following the steps above.
|
> **Note** You need to assign roles for every user in your organization that requires access to the Windows Defender ATP portal. You can assign roles at any time by going to the Azure Management Portal, clicking **Active Directory**, and then finding your directory in the list and following the steps above.
|
||||||
|
|
||||||
When you have finished assigning roles, return to the [Windows Defender ATP portal](https://seville.windows.com) and refresh the
|
When you have finished assigning roles, return to the [Windows Defender ATP portal](https://securitycenter.windows.com) and refresh the
|
||||||
page.
|
page.
|
||||||
|
|
||||||
Follow the steps in the onboarding wizard to complete the onboarding process.
|
Follow the steps in the onboarding wizard to complete the onboarding process.
|
||||||
|
@ -230,14 +230,14 @@ If you don't see any users in the [Azure Management Portal](https://manage.windo
|
|||||||
|
|
||||||
4. Select the type of user and enter their details. There might be multiple steps in the **Add user** dialog box depending on the type of user. When you're done, click **Complete**  or **OK**.
|
4. Select the type of user and enter their details. There might be multiple steps in the **Add user** dialog box depending on the type of user. When you're done, click **Complete**  or **OK**.
|
||||||
|
|
||||||
5. Continue to add users. They will now appear in the **Users** section of the **Windows ATP Service** application. You must assign the user a role before they can access the [Windows Defender ATP portal](https://seville.windows.com/).
|
5. Continue to add users. They will now appear in the **Users** section of the **Windows ATP Service** application. You must assign the user a role before they can access the [Windows Defender ATP portal](https://securitycenter.windows.com/).
|
||||||
|
|
||||||
## Manage access for all users in Azure Active Directory
|
## Manage access for all users in Azure Active Directory
|
||||||
If you remove access for all users to the Windows ATP Service application (by clicking Manage access), you will not see the application in the list of applications in your directory in the [Azure Management Portal](https://manage.windowsazure.com/).
|
If you remove access for all users to the Windows ATP Service application (by clicking Manage access), you will not see the application in the list of applications in your directory in the [Azure Management Portal](https://manage.windowsazure.com/).
|
||||||
|
|
||||||
Log in to the application in the Azure Management Portal again:
|
Log in to the application in the Azure Management Portal again:
|
||||||
|
|
||||||
1. Sign in to the [Windows Defender ATP portal](https://seville.windows.com/) with the user account you want to give access to.
|
1. Sign in to the [Windows Defender ATP portal](https://securitycenter.windows.com/) with the user account you want to give access to.
|
||||||
|
|
||||||
2. Confirm that you have signed in with the correct details, and click **Accept**.
|
2. Confirm that you have signed in with the correct details, and click **Accept**.
|
||||||
|
|
||||||
@ -246,7 +246,7 @@ Log in to the application in the Azure Management Portal again:
|
|||||||
|
|
||||||
## Review events and errors on endpoints with Event Viewer
|
## Review events and errors on endpoints with Event Viewer
|
||||||
|
|
||||||
You can review event IDs in the [Event Viewer](https://msdn.microsoft.com/en-US/library/aa745633(v=bts.10).aspx) on individual endpoints, or check the status of machines from the [Windows Defender ATP portal](https://seville.windows.com/).
|
You can review event IDs in the [Event Viewer](https://msdn.microsoft.com/en-US/library/aa745633(v=bts.10).aspx) on individual endpoints, or check the status of machines from the [Windows Defender ATP portal](https://securitycenter.windows.com/).
|
||||||
|
|
||||||
For example, if endpoints are not appearing in the **Machines view** list, you might need to look for event IDs on the endpoints.
|
For example, if endpoints are not appearing in the **Machines view** list, you might need to look for event IDs on the endpoints.
|
||||||
|
|
||||||
@ -485,4 +485,3 @@ See [Configure Windows Defender ATP endpoints](configure-endpoints-windows-defen
|
|||||||
- [Configure Windows Defender ATP endpoints](configure-endpoints-windows-defender-advanced-threat-protection.md)
|
- [Configure Windows Defender ATP endpoints](configure-endpoints-windows-defender-advanced-threat-protection.md)
|
||||||
- [Additional Windows Defender ATP configuration settings](additional-configuration-windows-defender-advanced-threat-protection.md)
|
- [Additional Windows Defender ATP configuration settings](additional-configuration-windows-defender-advanced-threat-protection.md)
|
||||||
- [Monitor the Windows Defender ATP onboarding](monitor-onboarding-windows-defender-advanced-threat-protection.md)
|
- [Monitor the Windows Defender ATP onboarding](monitor-onboarding-windows-defender-advanced-threat-protection.md)
|
||||||
|
|
||||||
|
@ -49,7 +49,7 @@ components:
|
|||||||
Endpoint investigation capabilities in this service let you drill down
|
Endpoint investigation capabilities in this service let you drill down
|
||||||
into security alerts and understand the scope and nature of a potential
|
into security alerts and understand the scope and nature of a potential
|
||||||
breach. You can submit files for deep analysis and receive the results
|
breach. You can submit files for deep analysis and receive the results
|
||||||
without leaving the [Windows Defender ATP portal](https://seville.windows.com).
|
without leaving the [Windows Defender ATP portal](https://securitycenter.windows.com).
|
||||||
|
|
||||||
Windows Defender ATP works with existing Windows security technologies
|
Windows Defender ATP works with existing Windows security technologies
|
||||||
on endpoints, such as Windows Defender, AppLocker, and Device Guard. It
|
on endpoints, such as Windows Defender, AppLocker, and Device Guard. It
|
||||||
|
Reference in New Issue
Block a user