mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-17 19:33:37 +00:00
update image to reflect machine list
This commit is contained in:
@ -62,7 +62,7 @@ The tile shows you a list of user accounts with the most active alerts. The tota
|
|||||||
|
|
||||||

|

|
||||||
|
|
||||||
Click the user account to see details about the user account. For more information see [Investigate a user entity in Windows Defender Advanced Threat Protection]
|
Click the user account to see details about the user account. For more information see [Investigate a user account](investigate-user-windows-defender-advanced-threat-protection.md).
|
||||||
|
|
||||||
## Machines with active malware detections
|
## Machines with active malware detections
|
||||||
The **Machines with active malware detections** tile will only appear if your endpoints are using Windows Defender.
|
The **Machines with active malware detections** tile will only appear if your endpoints are using Windows Defender.
|
||||||
|
Binary file not shown.
Before Width: | Height: | Size: 34 KiB After Width: | Height: | Size: 38 KiB |
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: View and organize the Windows Defender ATP machines view
|
title: View and organize the Windows Defender ATP machines list
|
||||||
description: Learn about the available features that you can use from the Machines view such as sorting, filtering, and exporting the machine list which can enhance investigations.
|
description: Learn about the available features that you can use from the Machines list such as sorting, filtering, and exporting the machine list which can enhance investigations.
|
||||||
keywords: sort, filter, export, csv, machine name, domain, last seen, internal IP, health state, active alerts, active malware detections, threat category, review alerts, network, connection, malware, type, password stealer, ransomware, exploit, threat, general malware, unwanted software
|
keywords: sort, filter, export, csv, machine name, domain, last seen, internal IP, health state, active alerts, active malware detections, threat category, review alerts, network, connection, malware, type, password stealer, ransomware, exploit, threat, general malware, unwanted software
|
||||||
search.product: eADQiWindows 10XVcnh
|
search.product: eADQiWindows 10XVcnh
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
|
@ -130,7 +130,7 @@ For prevalent files in the organization, a warning is shown before an action is
|
|||||||
1. Select the file you want to remove from the blocked list. You can select a file from any of the following views or use the Search box:
|
1. Select the file you want to remove from the blocked list. You can select a file from any of the following views or use the Search box:
|
||||||
|
|
||||||
– **Alerts** - Click the file links from the Description or Details in the Alert timeline
|
– **Alerts** - Click the file links from the Description or Details in the Alert timeline
|
||||||
– **Machines view** - Click the file links in the Description or Details columns in the Observed on machine section
|
– **Machines list** - Click the file links in the Description or Details columns in the Observed on machine section
|
||||||
– **Search box** - Select File from the drop–down menu and enter the file name
|
– **Search box** - Select File from the drop–down menu and enter the file name
|
||||||
|
|
||||||
2. Open the **Actions** menu and select **Remove file from blocked list**.
|
2. Open the **Actions** menu and select **Remove file from blocked list**.
|
||||||
@ -175,7 +175,7 @@ When the sample is collected, Windows Defender ATP runs the file in is a secure
|
|||||||
|
|
||||||
1. Select the file that you want to submit for deep analysis. You can select or search a file from any of the following views:
|
1. Select the file that you want to submit for deep analysis. You can select or search a file from any of the following views:
|
||||||
– Alerts - click the file links from the **Description** or **Details** in the Alert timeline
|
– Alerts - click the file links from the **Description** or **Details** in the Alert timeline
|
||||||
– **Machines View** - click the file links from the **Description** or **Details** in the **Machine in organization** section
|
– **Machines list** - click the file links from the **Description** or **Details** in the **Machine in organization** section
|
||||||
– Search box - select **File** from the drop–down menu and enter the file name
|
– Search box - select **File** from the drop–down menu and enter the file name
|
||||||
2. In the **Deep analysis** section of the file view, click **Submit**.
|
2. In the **Deep analysis** section of the file view, click **Submit**.
|
||||||
|
|
||||||
|
Reference in New Issue
Block a user