mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-18 20:03:40 +00:00
Fixed half-formed notes & tips, added image borders
This commit is contained in:
@ -72,11 +72,13 @@ needs.<br>
|
|||||||
|
|
||||||
2. Open **Groups > New Group**.
|
2. Open **Groups > New Group**.
|
||||||
|
|
||||||

|
> [!div class="mx-imgBorder"]
|
||||||
|
> 
|
||||||
|
|
||||||
3. Enter details and create a new group.
|
3. Enter details and create a new group.
|
||||||
|
|
||||||

|
> [!div class="mx-imgBorder"]
|
||||||
|
> 
|
||||||
|
|
||||||
4. Add your test user or device.
|
4. Add your test user or device.
|
||||||
|
|
||||||
@ -86,7 +88,8 @@ needs.<br>
|
|||||||
|
|
||||||
7. Find your test user or device and select it.
|
7. Find your test user or device and select it.
|
||||||
|
|
||||||

|
> [!div class="mx-imgBorder"]
|
||||||
|
> 
|
||||||
|
|
||||||
8. Your testing group now has a member to test.
|
8. Your testing group now has a member to test.
|
||||||
|
|
||||||
@ -116,11 +119,12 @@ different types of Endpoint security policies.
|
|||||||
|
|
||||||

|

|
||||||
|
|
||||||
>[!NOTE]
|
> [!NOTE]
|
||||||
>In this instance, this has been auto populated as Microsoft Defender ATP has already been integrated with Intune. For more information on the integration, see [Enable Microsoft Defender ATP in Intune](https://docs.microsoft.com/mem/intune/protect/advanced-threat-protection-configure#to-enable-microsoft-defender-atp). <br> The following image is an example of what you'll see when Microsoft Defender ATP is NOT integrated with Intune: <br> 
|
> In this instance, this has been auto populated as Microsoft Defender ATP has already been integrated with Intune. For more information on the integration, see [Enable Microsoft Defender ATP in Intune](https://docs.microsoft.com/mem/intune/protect/advanced-threat-protection-configure#to-enable-microsoft-defender-atp).
|
||||||
|
>
|
||||||
|
> The following image is an example of what you'll see when Microsoft Defender ATP is NOT integrated with Intune:
|
||||||
|
>
|
||||||
|
> 
|
||||||
|
|
||||||
6. Add scope tags if necessary, then select **Next**.
|
6. Add scope tags if necessary, then select **Next**.
|
||||||
|
|
||||||
@ -144,36 +148,43 @@ different types of Endpoint security policies.
|
|||||||
|
|
||||||
2. Navigate to **Endpoint security > Antivirus > Create Policy**.
|
2. Navigate to **Endpoint security > Antivirus > Create Policy**.
|
||||||
|
|
||||||

|
> [!div class="mx-imgBorder"]
|
||||||
|
> 
|
||||||
|
|
||||||
3. Select **Platform - Windows 10 and Later - Windows and Profile – Microsoft
|
3. Select **Platform - Windows 10 and Later - Windows and Profile – Microsoft
|
||||||
Defender Antivirus > Create**.
|
Defender Antivirus > Create**.
|
||||||
|
|
||||||
4. Enter name and description, then select **Next**.
|
4. Enter name and description, then select **Next**.
|
||||||
|
|
||||||

|
> [!div class="mx-imgBorder"]
|
||||||
|
> 
|
||||||
|
|
||||||
5. In the **Configuration settings page**: Set the configurations you require for
|
5. In the **Configuration settings page**: Set the configurations you require for
|
||||||
Microsoft Defender Antivirus (Cloud Protection, Exclusions, Real-Time
|
Microsoft Defender Antivirus (Cloud Protection, Exclusions, Real-Time
|
||||||
Protection, and Remediation).
|
Protection, and Remediation).
|
||||||
|
|
||||||

|
> [!div class="mx-imgBorder"]
|
||||||
|
> 
|
||||||
|
|
||||||
6. Add scope tags if necessary, then select **Next**.
|
6. Add scope tags if necessary, then select **Next**.
|
||||||
|
|
||||||

|
> [!div class="mx-imgBorder"]
|
||||||
|
> 
|
||||||
|
|
||||||
7. Select groups to include, assign to your test group, then select **Next**.
|
7. Select groups to include, assign to your test group, then select **Next**.
|
||||||
|
|
||||||

|
> [!div class="mx-imgBorder"]
|
||||||
|
> 
|
||||||
|
|
||||||
8. Review and create, then select **Create**.
|
8. Review and create, then select **Create**.
|
||||||
|
|
||||||

|
> [!div class="mx-imgBorder"]
|
||||||
|
> 
|
||||||
|
|
||||||
9. You'll see the configuration policy you created.
|
9. You'll see the configuration policy you created.
|
||||||
|
|
||||||

|
> [!div class="mx-imgBorder"]
|
||||||
|
> 
|
||||||
|
|
||||||
### Attack Surface Reduction – Attack surface reduction rules
|
### Attack Surface Reduction – Attack surface reduction rules
|
||||||
|
|
||||||
@ -186,37 +197,44 @@ different types of Endpoint security policies.
|
|||||||
4. Select **Platform - Windows 10 and Later – Profile - Attack surface reduction
|
4. Select **Platform - Windows 10 and Later – Profile - Attack surface reduction
|
||||||
rules > Create**.
|
rules > Create**.
|
||||||
|
|
||||||

|
> [!div class="mx-imgBorder"]
|
||||||
|
> 
|
||||||
|
|
||||||
5. Enter a name and description, then select **Next**.
|
5. Enter a name and description, then select **Next**.
|
||||||
|
|
||||||

|
> [!div class="mx-imgBorder"]
|
||||||
|
> 
|
||||||
|
|
||||||
6. In the **Configuration settings page**: Set the configurations you require for
|
6. In the **Configuration settings page**: Set the configurations you require for
|
||||||
Attack surface reduction rules, then select **Next**.
|
Attack surface reduction rules, then select **Next**.
|
||||||
|
|
||||||
>[!NOTE]
|
> [!NOTE]
|
||||||
>We will be configuring all of the Attack surface reduction rules to Audit.
|
> We will be configuring all of the Attack surface reduction rules to Audit.
|
||||||
|
>
|
||||||
|
> For more information, see [Attack surface reduction rules](attack-surface-reduction.md).
|
||||||
|
|
||||||
For more information, see [Attack surface reduction rules](attack-surface-reduction.md).
|
> [!div class="mx-imgBorder"]
|
||||||
|
> 
|
||||||

|
|
||||||
|
|
||||||
7. Add Scope Tags as required, then select **Next**.
|
7. Add Scope Tags as required, then select **Next**.
|
||||||
|
|
||||||

|
> [!div class="mx-imgBorder"]
|
||||||
|
> 
|
||||||
|
|
||||||
8. Select groups to include and assign to test group, then select **Next**.
|
8. Select groups to include and assign to test group, then select **Next**.
|
||||||
|
|
||||||

|
> [!div class="mx-imgBorder"]
|
||||||
|
> 
|
||||||
|
|
||||||
9. Review the details, then select **Create**.
|
9. Review the details, then select **Create**.
|
||||||
|
|
||||||

|
> [!div class="mx-imgBorder"]
|
||||||
|
> 
|
||||||
|
|
||||||
10. View the policy.
|
10. View the policy.
|
||||||
|
|
||||||

|
> [!div class="mx-imgBorder"]
|
||||||
|
> 
|
||||||
|
|
||||||
### Attack Surface Reduction – Web Protection
|
### Attack Surface Reduction – Web Protection
|
||||||
|
|
||||||
@ -228,37 +246,44 @@ different types of Endpoint security policies.
|
|||||||
|
|
||||||
4. Select **Windows 10 and Later – Web protection > Create**.
|
4. Select **Windows 10 and Later – Web protection > Create**.
|
||||||
|
|
||||||

|
> [!div class="mx-imgBorder"]
|
||||||
|
> 
|
||||||
|
|
||||||
5. Enter a name and description, then select **Next**.
|
5. Enter a name and description, then select **Next**.
|
||||||
|
|
||||||

|
> [!div class="mx-imgBorder"]
|
||||||
|
> 
|
||||||
|
|
||||||
6. In the **Configuration settings page**: Set the configurations you require for
|
6. In the **Configuration settings page**: Set the configurations you require for
|
||||||
Web Protection, then select **Next**.
|
Web Protection, then select **Next**.
|
||||||
|
|
||||||
>[!NOTE]
|
> [!NOTE]
|
||||||
>We are configuring Web Protection to Block.
|
> We are configuring Web Protection to Block.
|
||||||
|
>
|
||||||
|
> For more information, see [Web Protection](web-protection-overview.md).
|
||||||
|
|
||||||
For more information, see [Web Protection](web-protection-overview.md).
|
> [!div class="mx-imgBorder"]
|
||||||
|
> 
|
||||||

|
|
||||||
|
|
||||||
7. Add **Scope Tags as required > Next**.
|
7. Add **Scope Tags as required > Next**.
|
||||||
|
|
||||||

|
> [!div class="mx-imgBorder"]
|
||||||
|
> 
|
||||||
|
|
||||||
8. Select **Assign to test group > Next**.
|
8. Select **Assign to test group > Next**.
|
||||||
|
|
||||||

|
> [!div class="mx-imgBorder"]
|
||||||
|
> 
|
||||||
|
|
||||||
9. Select **Review and Create > Create**.
|
9. Select **Review and Create > Create**.
|
||||||
|
|
||||||

|
> [!div class="mx-imgBorder"]
|
||||||
|
> 
|
||||||
|
|
||||||
10. View the policy.
|
10. View the policy.
|
||||||
|
|
||||||

|
> [!div class="mx-imgBorder"]
|
||||||
|
> 
|
||||||
|
|
||||||
## Validate configuration settings
|
## Validate configuration settings
|
||||||
|
|
||||||
@ -275,26 +300,31 @@ To confirm that the configuration policy has been applied to your test device, f
|
|||||||
1. Open the MEM portal and navigate to the relevant policy as shown in the
|
1. Open the MEM portal and navigate to the relevant policy as shown in the
|
||||||
steps above. The following example shows the next generation protection settings.
|
steps above. The following example shows the next generation protection settings.
|
||||||
|
|
||||||

|
> [!div class="mx-imgBorder"]
|
||||||
|
> 
|
||||||
|
|
||||||
2. Select the **Configuration Policy** to view the policy status.
|
2. Select the **Configuration Policy** to view the policy status.
|
||||||
|
|
||||||

|
> [!div class="mx-imgBorder"]
|
||||||
|
> 
|
||||||
|
|
||||||
3. Select **Device Status** to see the status.
|
3. Select **Device Status** to see the status.
|
||||||
|
|
||||||

|
> [!div class="mx-imgBorder"]
|
||||||
|
> 
|
||||||
|
|
||||||
4. Select **User Status** to see the status.
|
4. Select **User Status** to see the status.
|
||||||
|
|
||||||

|
> [!div class="mx-imgBorder"]
|
||||||
|
> 
|
||||||
|
|
||||||
5. Select **Per-setting status** to see the status.
|
5. Select **Per-setting status** to see the status.
|
||||||
|
|
||||||
>[!TIP]
|
>[!TIP]
|
||||||
>This view is very useful to identify any settings that conflict with another policy.
|
>This view is very useful to identify any settings that conflict with another policy.
|
||||||
|
|
||||||

|
> [!div class="mx-imgBorder"]
|
||||||
|
> 
|
||||||
|
|
||||||
### Endpoint detection and response
|
### Endpoint detection and response
|
||||||
|
|
||||||
@ -302,33 +332,38 @@ To confirm that the configuration policy has been applied to your test device, f
|
|||||||
1. Before applying the configuration, the Microsoft Defender ATP
|
1. Before applying the configuration, the Microsoft Defender ATP
|
||||||
Protection service should not be started.
|
Protection service should not be started.
|
||||||
|
|
||||||

|
> [!div class="mx-imgBorder"]
|
||||||
|
> 
|
||||||
|
|
||||||
2. After the configuration has been applied, the Microsoft Defender ATP
|
2. After the configuration has been applied, the Microsoft Defender ATP
|
||||||
Protection Service should be started.
|
Protection Service should be started.
|
||||||
|
|
||||||

|
> [!div class="mx-imgBorder"]
|
||||||
|
> 
|
||||||
|
|
||||||
3. After the services are running on the device, the device appears in Microsoft
|
3. After the services are running on the device, the device appears in Microsoft
|
||||||
Defender Security Center.
|
Defender Security Center.
|
||||||
|
|
||||||

|
> [!div class="mx-imgBorder"]
|
||||||
|
> 
|
||||||
|
|
||||||
### Next-generation protection
|
### Next-generation protection
|
||||||
|
|
||||||
1. Before applying the policy on a test device, you should be able to manually
|
1. Before applying the policy on a test device, you should be able to manually
|
||||||
manage the settings as shown below.
|
manage the settings as shown below.
|
||||||
|
|
||||||

|
> [!div class="mx-imgBorder"]
|
||||||
|
> 
|
||||||
|
|
||||||
2. After the policy has been applied, you should not be able to manually manage
|
2. After the policy has been applied, you should not be able to manually manage
|
||||||
the settings.
|
the settings.
|
||||||
|
|
||||||
>[!NOTE]
|
> [!NOTE]
|
||||||
> In the following image **Turn on cloud-delivered protection** and
|
> In the following image **Turn on cloud-delivered protection** and
|
||||||
**Turn on real-time protection** are being shown as managed.
|
> **Turn on real-time protection** are being shown as managed.
|
||||||
|
|
||||||

|
> [!div class="mx-imgBorder"]
|
||||||
|
> 
|
||||||
|
|
||||||
### Attack Surface Reduction – Attack surface reduction rules
|
### Attack Surface Reduction – Attack surface reduction rules
|
||||||
|
|
||||||
@ -337,11 +372,11 @@ To confirm that the configuration policy has been applied to your test device, f
|
|||||||
|
|
||||||
2. This should respond with the following lines with no content:
|
2. This should respond with the following lines with no content:
|
||||||
|
|
||||||
AttackSurfaceReductionOnlyExclusions:
|
> AttackSurfaceReductionOnlyExclusions:
|
||||||
|
>
|
||||||
AttackSurfaceReductionRules_Actions:
|
> AttackSurfaceReductionRules_Actions:
|
||||||
|
>
|
||||||
AttackSurfaceReductionRules_Ids:
|
> AttackSurfaceReductionRules_Ids:
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
|
Reference in New Issue
Block a user