From 1d62c1306acb51ec71bc96ef1eebb8ae2744ae1b Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Thu, 2 Aug 2018 05:31:36 +0300 Subject: [PATCH 1/4] fix asc product name --- ...r-endpoints-windows-defender-advanced-threat-protection.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-atp/configure-server-endpoints-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/configure-server-endpoints-windows-defender-advanced-threat-protection.md index aaa349670c..65f05557c6 100644 --- a/windows/security/threat-protection/windows-defender-atp/configure-server-endpoints-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/configure-server-endpoints-windows-defender-advanced-threat-protection.md @@ -119,12 +119,12 @@ You’ll be able to onboard in the same method available for Windows 10 client m Windows Defender ATP integrates with Azure Security Center to provide a comprehensive server protection solution. With this integration Azure Security Center can leverage the power of Windows Defender ATP to provide improved threat detection for Windows Servers. The following capabilities are included in this integration: -- Automated onboarding - Windows Defender ATP sensor is automatically enabled on Windows Servers that are onboarded to ASC. For more information on onboarding to ASC, see [Onboarding to Azure Security Center Standard for enhanced security](https://docs.microsoft.com/en-us/azure/security-center/security-center-onboarding). +- Automated onboarding - Windows Defender ATP sensor is automatically enabled on Windows Servers that are onboarded to Azure Security Center. For more information on Azure Security Center onboarding, see [Onboarding to Azure Security Center Standard for enhanced security](https://docs.microsoft.com/en-us/azure/security-center/security-center-onboarding). >[!NOTE] > Automated onboarding is only applicable for Windows Server 2012 R2 and Windows Server 2016. -- Servers monitored by Azure Security Center will also be available in Windows Defender ATP - ASC seamlessly connects to the Windows Defender ATP tenant, providing a single view across clients and servers. In addition, Windows Defender ATP alerts will be available in the Azure Security Center console. +- Servers monitored by Azure Security Center will also be available in Windows Defender ATP - Azure Security Center seamlessly connects to the Windows Defender ATP tenant, providing a single view across clients and servers. In addition, Windows Defender ATP alerts will be available in the Azure Security Center console. - Server investigation - Azure Security Center customers can access the Windows Defender ATP portal to perform detailed investigation to uncover the scope of a potential breach >[!IMPORTANT] From c5fa60bfe6aacf86b33d6b8f8866e0fb372e4d4d Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Thu, 2 Aug 2018 05:33:17 +0300 Subject: [PATCH 2/4] typo --- ...rror-messages-windows-defender-advanced-threat-protection.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/windows-defender-atp/troubleshoot-onboarding-error-messages-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/troubleshoot-onboarding-error-messages-windows-defender-advanced-threat-protection.md index d17f45e798..eee538a7aa 100644 --- a/windows/security/threat-protection/windows-defender-atp/troubleshoot-onboarding-error-messages-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/troubleshoot-onboarding-error-messages-windows-defender-advanced-threat-protection.md @@ -73,7 +73,7 @@ You'll need to whitelist the `securitycenter.windows.com` and all sub-domains un ## Portal communication issues -If you encounter issues with accessing the portal, missing data, or restricted access to portions of the portal, you'll need to verify that the following urls are whitelisted and open for communciation. +If you encounter issues with accessing the portal, missing data, or restricted access to portions of the portal, you'll need to verify that the following URLs are whitelisted and open for communciation. - `*.blob.core.windows.net crl.microsoft.com` From bf84b01d2fe673be75d9c5d11d267a4336ce0bfe Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Thu, 2 Aug 2018 10:53:48 +0300 Subject: [PATCH 3/4] get --- ...ckage-sas-uri-windows-defender-advanced-threat-protection.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/windows-defender-atp/get-package-sas-uri-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-package-sas-uri-windows-defender-advanced-threat-protection.md index ade4afd10e..b000396208 100644 --- a/windows/security/threat-protection/windows-defender-atp/get-package-sas-uri-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/get-package-sas-uri-windows-defender-advanced-threat-protection.md @@ -28,7 +28,7 @@ Users need to have Security administrator or Global admin directory roles. ## HTTP request ``` -POST /testwdatppreview/machineactions/{id}/getPackageUri +GET /testwdatppreview/machineactions/{id}/getPackageUri ``` ## Request headers From 88c830c8b92fe2c6b3a45d730c22d40806854684 Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Thu, 2 Aug 2018 10:57:45 +0300 Subject: [PATCH 4/4] removed attachment extention names --- ...ile-uploads-windows-defender-advanced-threat-protection.md | 4 +--- 1 file changed, 1 insertion(+), 3 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-atp/manage-automation-file-uploads-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/manage-automation-file-uploads-windows-defender-advanced-threat-protection.md index e1ce6b8173..89eeee2c0e 100644 --- a/windows/security/threat-protection/windows-defender-atp/manage-automation-file-uploads-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/manage-automation-file-uploads-windows-defender-advanced-threat-protection.md @@ -41,9 +41,7 @@ For example, if you add *exe* and *bat* as file or attachment extension names, t 3. Configure the following extension names and separate extension names with a comma: - **File extension names** - Suspicious files except email attachments will be submitted for additional inspection - - **Attachment extension names** - Suspicious email attachments with these extension names will be submitted for additional inspection - - + ## Related topics - [Manage automation allowed/blocked lists](manage-automation-allowed-blocked-list-windows-defender-advanced-threat-protection.md)