mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-13 05:47:23 +00:00
Merge branch 'master' of https://github.com/MicrosoftDocs/windows-docs-pr into adjustappliesto
This commit is contained in:
commit
bfc10eda6d
@ -289,7 +289,7 @@ The following table show the mapping of information to the AppLocker publisher r
|
|||||||
Here is an example AppLocker publisher rule:
|
Here is an example AppLocker publisher rule:
|
||||||
|
|
||||||
``` syntax
|
``` syntax
|
||||||
FilePublisherCondition PublisherName="CN=Microsoft Corporation, O=Microsoft Corporation, L=Redmond, S=Washington, C=US" ProductName="Microsoft.Reader" BinaryName="*">
|
<FilePublisherCondition PublisherName="CN=Microsoft Corporation, O=Microsoft Corporation, L=Redmond, S=Washington, C=US" ProductName="Microsoft.Reader" BinaryName="*">
|
||||||
<BinaryVersionRange LowSection="*" HighSection="*" />
|
<BinaryVersionRange LowSection="*" HighSection="*" />
|
||||||
</FilePublisherCondition>
|
</FilePublisherCondition>
|
||||||
```
|
```
|
||||||
@ -299,7 +299,7 @@ You can get the publisher name and product name of apps using a web API.
|
|||||||
**To find publisher and product name for Microsoft apps in Microsoft Store for Business**
|
**To find publisher and product name for Microsoft apps in Microsoft Store for Business**
|
||||||
|
|
||||||
1. Go to the Microsoft Store for Business website, and find your app. For example, Microsoft OneNote.
|
1. Go to the Microsoft Store for Business website, and find your app. For example, Microsoft OneNote.
|
||||||
2. Copy the ID value from the app URL. For example, Microsoft OneNote's ID URL is https:<span><\span>//www.microsoft.com/store/apps/onenote/9wzdncrfhvjl, and you'd copy the ID value, **9wzdncrfhvjl**.
|
2. Copy the ID value from the app URL. For example, Microsoft OneNote's ID URL is https://www.microsoft.com/store/apps/onenote/9wzdncrfhvjl, and you'd copy the ID value, **9wzdncrfhvjl**.
|
||||||
3. In your browser, run the Store for Business portal web API, to return a JavaScript Object Notation (JSON) file that includes the publisher and product name values.
|
3. In your browser, run the Store for Business portal web API, to return a JavaScript Object Notation (JSON) file that includes the publisher and product name values.
|
||||||
|
|
||||||
<table>
|
<table>
|
||||||
@ -313,14 +313,11 @@ You can get the publisher name and product name of apps using a web API.
|
|||||||
</thead>
|
</thead>
|
||||||
<tbody>
|
<tbody>
|
||||||
<tr class="odd">
|
<tr class="odd">
|
||||||
<td><p>https://bspmts.mp.microsoft.com/v1/public/catalog/Retail/Products/{app ID}/applockerdata</p></td>
|
<td><p><code>https://bspmts.mp.microsoft.com/v1/public/catalog/Retail/Products/{app ID}/applockerdata</code></p></td>
|
||||||
</tr>
|
</tr>
|
||||||
</tbody>
|
</tbody>
|
||||||
</table>
|
</table>
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
~~~
|
|
||||||
Here is the example for Microsoft OneNote:
|
Here is the example for Microsoft OneNote:
|
||||||
|
|
||||||
Request
|
Request
|
||||||
@ -339,7 +336,6 @@ Result
|
|||||||
"publisherCertificateName": "CN=Microsoft Corporation, O=Microsoft Corporation, L=Redmond, S=Washington, C=US"
|
"publisherCertificateName": "CN=Microsoft Corporation, O=Microsoft Corporation, L=Redmond, S=Washington, C=US"
|
||||||
}
|
}
|
||||||
```
|
```
|
||||||
~~~
|
|
||||||
|
|
||||||
<table>
|
<table>
|
||||||
<colgroup>
|
<colgroup>
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Alter Windows 10 Start and taskbar via mobile device management
|
title: Alter Windows 10 Start and taskbar via mobile device management
|
||||||
description: In Windows 10, you can use a mobile device management (MDM) policy to deploy a customized Start and tasbkar layout to users.
|
description: In Windows 10, you can use a mobile device management (MDM) policy to deploy a customized Start and taskbar layout to users.
|
||||||
ms.assetid: F487850D-8950-41FB-9B06-64240127C1E4
|
ms.assetid: F487850D-8950-41FB-9B06-64240127C1E4
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
@ -51,6 +51,9 @@ Two features enable Start layout control:
|
|||||||
|
|
||||||
- In Microsoft Intune, you select the Start layout XML file and add it to a device configuration profile.
|
- In Microsoft Intune, you select the Start layout XML file and add it to a device configuration profile.
|
||||||
|
|
||||||
|
>[!NOTE]
|
||||||
|
>Please do not include XML Prologs like \<?xml version="1.0" encoding="utf-8"?\> in the Start layout XML file. The settings may not be reflected correctly.
|
||||||
|
|
||||||
## <a href="" id="bkmk-domaingpodeployment"></a>Create a policy for your customized Start layout
|
## <a href="" id="bkmk-domaingpodeployment"></a>Create a policy for your customized Start layout
|
||||||
|
|
||||||
|
|
||||||
|
@ -49,29 +49,30 @@ The following resources provide additional information about using Windows Updat
|
|||||||
``` console
|
``` console
|
||||||
cmd
|
cmd
|
||||||
```
|
```
|
||||||
2. Stop the BITS service and the Windows Update service. To do this, type the following commands at a command prompt. Press ENTER after you type each command.
|
2. Stop the **BITS service**, the **Windows Update service** and the **Cryptographic service**. To do this, type the following commands at a command prompt. Press ENTER after you type each command.
|
||||||
``` console
|
``` console
|
||||||
net stop bits
|
net stop bits
|
||||||
net stop wuauserv
|
net stop wuauserv
|
||||||
|
net stop cryptsvc
|
||||||
```
|
```
|
||||||
3. Delete the qmgr\*.dat files. To do this, type the following command at a command prompt, and then press ENTER:
|
3. Delete the **qmgr\*.dat** files. To do this, type the following command at a command prompt, and then press ENTER:
|
||||||
``` console
|
``` console
|
||||||
Del "%ALLUSERSPROFILE%\Application Data\Microsoft\Network\Downloader\qmgr*.dat"
|
Del "%ALLUSERSPROFILE%\Application Data\Microsoft\Network\Downloader\qmgr*.dat"
|
||||||
```
|
```
|
||||||
4. If this is your first attempt at resolving your Windows Update issues by using the steps in this article, go to step 5 without carrying out the steps in step 4. The steps in step 4 should only be performed at this point in the troubleshooting if you cannot resolve your Windows Update issues after following all steps but step 4. The steps in step 4 are also performed by the "Aggressive" mode of the Fix it Solution above.
|
4. If this is your first attempt at resolving your Windows Update issues by using the steps in this article, go to step 5 without carrying out the steps in step 4. The steps in step 4 should only be performed at this point in the troubleshooting if you cannot resolve your Windows Update issues after following all steps but step 4. The steps in step 4 are also performed by the "Aggressive" mode of the Fix it Solution above.
|
||||||
1. Rename the following folders to *.BAK:
|
1. Rename the following folders to *.BAK:
|
||||||
``` console
|
``` console
|
||||||
%systemroot%\SoftwareDistribution\DataStore
|
%Systemroot%\SoftwareDistribution\DataStore
|
||||||
%systemroot%\SoftwareDistribution\Download
|
%Systemroot%\SoftwareDistribution\Download
|
||||||
%systemroot%\system32\catroot2
|
%Systemroot%\System32\catroot2
|
||||||
```
|
```
|
||||||
To do this, type the following commands at a command prompt. Press ENTER after you type each command.
|
To do this, type the following commands at a command prompt. Press ENTER after you type each command.
|
||||||
``` console
|
``` console
|
||||||
Ren %systemroot%\SoftwareDistribution\DataStore *.bak
|
Ren %Systemroot%\SoftwareDistribution\DataStore DataStore.bak
|
||||||
Ren %systemroot%\SoftwareDistribution\Download *.bak
|
Ren %Systemroot%\SoftwareDistribution\Download Download.bak
|
||||||
Ren %systemroot%\system32\catroot2 *.bak
|
Ren %Systemroot%\System32\catroot2 catroot2.bak
|
||||||
```
|
```
|
||||||
2. Reset the BITS service and the Windows Update service to the default security descriptor. To do this, type the following commands at a command prompt. Press ENTER after you type each command.
|
2. Reset the **BITS service** and the **Windows Update service** to the default security descriptor. To do this, type the following commands at a command prompt. Press ENTER after you type each command.
|
||||||
``` console
|
``` console
|
||||||
sc.exe sdset bits D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCLCSWLOCRRC;;;AU)(A;;CCLCSWRPWPDTLOCRRC;;;PU)
|
sc.exe sdset bits D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCLCSWLOCRRC;;;AU)(A;;CCLCSWRPWPDTLOCRRC;;;PU)
|
||||||
sc.exe sdset wuauserv D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCLCSWLOCRRC;;;AU)(A;;CCLCSWRPWPDTLOCRRC;;;PU)
|
sc.exe sdset wuauserv D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCLCSWLOCRRC;;;AU)(A;;CCLCSWRPWPDTLOCRRC;;;PU)
|
||||||
@ -80,7 +81,7 @@ The following resources provide additional information about using Windows Updat
|
|||||||
``` console
|
``` console
|
||||||
cd /d %windir%\system32
|
cd /d %windir%\system32
|
||||||
```
|
```
|
||||||
6. Reregister the BITS files and the Windows Update files. To do this, type the following commands at a command prompt. Press ENTER after you type each command.
|
6. Reregister the **BITS** files and the **Windows Update** files. To do this, type the following commands at a command prompt. Press ENTER after you type each command.
|
||||||
|
|
||||||
``` console
|
``` console
|
||||||
regsvr32.exe atl.dll
|
regsvr32.exe atl.dll
|
||||||
@ -121,7 +122,7 @@ The following resources provide additional information about using Windows Updat
|
|||||||
regsvr32.exe wuwebv.dll
|
regsvr32.exe wuwebv.dll
|
||||||
```
|
```
|
||||||
|
|
||||||
7. Reset Winsock. To do this, type the following command at a command prompt, and then press ENTER:
|
7. Reset **Winsock**. To do this, type the following command at a command prompt, and then press ENTER:
|
||||||
``` console
|
``` console
|
||||||
netsh winsock reset
|
netsh winsock reset
|
||||||
```
|
```
|
||||||
@ -129,13 +130,13 @@ The following resources provide additional information about using Windows Updat
|
|||||||
``` console
|
``` console
|
||||||
proxycfg.exe -d
|
proxycfg.exe -d
|
||||||
```
|
```
|
||||||
9. Restart the BITS service and the Windows Update service. To do this, type the following commands at a command prompt. Press ENTER after you type each command.
|
9. Restart the **BITS service**, the **Windows Update service** and the **Cryptographic service**. To do this, type the following commands at a command prompt. Press ENTER after you type each command.
|
||||||
``` console
|
``` console
|
||||||
net start bits
|
net start bits
|
||||||
|
|
||||||
net start wuauserv
|
net start wuauserv
|
||||||
|
net start cryptsvc
|
||||||
```
|
```
|
||||||
10. If you are running Windows Vista or Windows Server 2008, clear the BITS queue. To do this, type the following command at a command prompt, and then press ENTER:
|
10. If you are running Windows Vista or Windows Server 2008, clear the **BITS** queue. To do this, type the following command at a command prompt, and then press ENTER:
|
||||||
``` console
|
``` console
|
||||||
bitsadmin.exe /reset /allusers
|
bitsadmin.exe /reset /allusers
|
||||||
```
|
```
|
||||||
|
@ -85,6 +85,7 @@ The following methodology was used to derive these network endpoints:
|
|||||||
|Microsoft forward link redirection service (FWLink)|The following endpoint is used by the Microsoft forward link redirection service (FWLink) to redirect permanent web links to their actual, sometimes transitory, URL. FWlinks are similar to URL shorteners, just longer. If you disable this endpoint, Windows Defender won't be able to update its malware definitions; links from Windows and other Microsoft products to the Web won't work; and PowerShell updateable Help won't update. To disable the traffic, instead disable the traffic that's getting forwarded.|HTTP|go.microsoft.com|
|
|Microsoft forward link redirection service (FWLink)|The following endpoint is used by the Microsoft forward link redirection service (FWLink) to redirect permanent web links to their actual, sometimes transitory, URL. FWlinks are similar to URL shorteners, just longer. If you disable this endpoint, Windows Defender won't be able to update its malware definitions; links from Windows and other Microsoft products to the Web won't work; and PowerShell updateable Help won't update. To disable the traffic, instead disable the traffic that's getting forwarded.|HTTP|go.microsoft.com|
|
||||||
|Microsoft Store|||[Learn how to turn off traffic to all of the following endpoint(s).](manage-connections-from-windows-operating-system-components-to-microsoft-services.md#26-microsoft-store)|
|
|Microsoft Store|||[Learn how to turn off traffic to all of the following endpoint(s).](manage-connections-from-windows-operating-system-components-to-microsoft-services.md#26-microsoft-store)|
|
||||||
||The following endpoint is used to download image files that are called when applications run (Microsoft Store or Inbox MSN Apps). If you turn off traffic for these endpoints, the image files won't be downloaded, and apps cannot be installed or updated from the Microsoft Store. Additionally, the Microsoft Store won't be able to revoke malicious apps and users will still be able to open them.|HTTPS|img-prod-cms-rt-microsoft-com.akamaized.net|
|
||The following endpoint is used to download image files that are called when applications run (Microsoft Store or Inbox MSN Apps). If you turn off traffic for these endpoints, the image files won't be downloaded, and apps cannot be installed or updated from the Microsoft Store. Additionally, the Microsoft Store won't be able to revoke malicious apps and users will still be able to open them.|HTTPS|img-prod-cms-rt-microsoft-com.akamaized.net|
|
||||||
|
||The following endpoint is needed to load the content in the Microsoft Store app.|HTTPS|livetileedge.dsx.mp.microsoft.com|
|
||||||
||The following endpoint is used for the Windows Push Notification Services (WNS). WNS enables third-party developers to send toast, tile, badge, and raw updates from their own cloud service. This provides a mechanism to deliver new updates to your users in a power-efficient and dependable way. If you turn off traffic for this endpoint, push notifications will no longer work, including MDM device management, mail synchronization, settings synchronization.|TLSv1.2/HTTPS|*.wns.windows.com|
|
||The following endpoint is used for the Windows Push Notification Services (WNS). WNS enables third-party developers to send toast, tile, badge, and raw updates from their own cloud service. This provides a mechanism to deliver new updates to your users in a power-efficient and dependable way. If you turn off traffic for this endpoint, push notifications will no longer work, including MDM device management, mail synchronization, settings synchronization.|TLSv1.2/HTTPS|*.wns.windows.com|
|
||||||
||The following endpoints are used to revoke licenses for malicious apps in the Microsoft Store. To turn off traffic for this endpoint, either uninstall the app or disable the Microsoft Store. If you disable the Microsoft Store, other Microsoft Store apps cannot be installed or updated. Additionally, the Microsoft Store won't be able to revoke malicious apps and users will still be able to open them|TLSv1.2/HTTPS/HTTP|storecatalogrevocation.storequality.microsoft.com|
|
||The following endpoints are used to revoke licenses for malicious apps in the Microsoft Store. To turn off traffic for this endpoint, either uninstall the app or disable the Microsoft Store. If you disable the Microsoft Store, other Microsoft Store apps cannot be installed or updated. Additionally, the Microsoft Store won't be able to revoke malicious apps and users will still be able to open them|TLSv1.2/HTTPS/HTTP|storecatalogrevocation.storequality.microsoft.com|
|
||||||
||The following endpoint is used to get Microsoft Store analytics.|HTTPS|manage.devcenter.microsoft.com|
|
||The following endpoint is used to get Microsoft Store analytics.|HTTPS|manage.devcenter.microsoft.com|
|
||||||
|
@ -42,9 +42,9 @@ As the depth and breadth of protections provided by Windows Defender Credential
|
|||||||
### Saved Windows Credentials Protected
|
### Saved Windows Credentials Protected
|
||||||
|
|
||||||
Starting with Windows 10, version 1511, domain credentials that are stored with Credential Manager are protected with Windows Defender Credential Guard. Credential Manager allows you to store three types of credentials: Windows credentials, certificate-based credentials, and generic credentials. Generic credentials such as user names and passwords that you use to log on to websites are not protected since the applications require your cleartext password. If the application does not need a copy of the password, they can save domain credentials as Windows credentials that are protected. Windows credentials are used to connect to other computers on a network. The following considerations apply to the Windows Defender Credential Guard protections for Credential Manager:
|
Starting with Windows 10, version 1511, domain credentials that are stored with Credential Manager are protected with Windows Defender Credential Guard. Credential Manager allows you to store three types of credentials: Windows credentials, certificate-based credentials, and generic credentials. Generic credentials such as user names and passwords that you use to log on to websites are not protected since the applications require your cleartext password. If the application does not need a copy of the password, they can save domain credentials as Windows credentials that are protected. Windows credentials are used to connect to other computers on a network. The following considerations apply to the Windows Defender Credential Guard protections for Credential Manager:
|
||||||
- Windows credentials saved by Remote Desktop Client cannot be sent to a remote host. Attempts to use saved Windows credentials fail, displaying the error message "Logon attempt failed."
|
* Windows credentials saved by Remote Desktop Client cannot be sent to a remote host. Attempts to use saved Windows credentials fail, displaying the error message "Logon attempt failed."
|
||||||
- Applications that extract Windows credentials fail.
|
* Applications that extract Windows credentials fail.
|
||||||
- When credentials are backed up from a PC that has Windows Defender Credential Guard enabled, the Windows credentials cannot be restored. If you need to back up your credentials, you must do this before you enable Windows Defender Credential Guard. Otherwise, you cannot restore those credentials.
|
* When credentials are backed up from a PC that has Windows Defender Credential Guard enabled, the Windows credentials cannot be restored. If you need to back up your credentials, you must do this before you enable Windows Defender Credential Guard. Otherwise, you cannot restore those credentials.
|
||||||
|
|
||||||
## Clearing TPM Considerations
|
## Clearing TPM Considerations
|
||||||
Virtualization-based Security (VBS) uses the TPM to protect its key. So when the TPM is cleared then the TPM protected key used to encrypt VBS secrets is lost.
|
Virtualization-based Security (VBS) uses the TPM to protect its key. So when the TPM is cleared then the TPM protected key used to encrypt VBS secrets is lost.
|
||||||
|
@ -82,6 +82,9 @@ Microsoft recommends that BitLocker Device Encryption be enabled on any systems
|
|||||||
|
|
||||||
Administrators can manage domain-joined devices that have BitLocker Device Encryption enabled through Microsoft BitLocker Administration and Monitoring (MBAM). In this case, BitLocker Device Encryption automatically makes additional BitLocker options available. No conversion or encryption is required, and MBAM can manage the full BitLocker policy set if any configuration changes are required.
|
Administrators can manage domain-joined devices that have BitLocker Device Encryption enabled through Microsoft BitLocker Administration and Monitoring (MBAM). In this case, BitLocker Device Encryption automatically makes additional BitLocker options available. No conversion or encryption is required, and MBAM can manage the full BitLocker policy set if any configuration changes are required.
|
||||||
|
|
||||||
|
> [!NOTE]
|
||||||
|
> BitLocker Device Encryption uses the XTS-AES 128-bit encryption method. In case you need to use a different encryption method and/or cipher strength, the device must be configured and decrypted (if already encrypted) first. After that, different BitLocker settings can be applied.
|
||||||
|
|
||||||
## Used Disk Space Only encryption
|
## Used Disk Space Only encryption
|
||||||
|
|
||||||
BitLocker in earlier Windows versions could take a long time to encrypt a drive, because it encrypted every byte on the volume (including parts that did not have data). That is still the most secure way to encrypt a drive, especially if a drive has previously contained confidential data that has since been moved or deleted. In that case, traces of the confidential data could remain on portions of the drive marked as unused.
|
BitLocker in earlier Windows versions could take a long time to encrypt a drive, because it encrypted every byte on the volume (including parts that did not have data). That is still the most secure way to encrypt a drive, especially if a drive has previously contained confidential data that has since been moved or deleted. In that case, traces of the confidential data could remain on portions of the drive marked as unused.
|
||||||
|
@ -56,12 +56,12 @@ The following table summarizes what happens with Microsoft Defender Antivirus wh
|
|||||||
|
|
||||||
If you are using Windows Server, version 1803 or newer, or Windows Server 2019, you can set Microsoft Defender Antivirus to passive mode by setting the following registry key:
|
If you are using Windows Server, version 1803 or newer, or Windows Server 2019, you can set Microsoft Defender Antivirus to passive mode by setting the following registry key:
|
||||||
- Path: `HKLM\SOFTWARE\Policies\Microsoft\Windows Advanced Threat Protection`
|
- Path: `HKLM\SOFTWARE\Policies\Microsoft\Windows Advanced Threat Protection`
|
||||||
- Name: `ForceDefenderPassiveMode`
|
- Name: `ForcePassiveMode`
|
||||||
- Type: `REG_DWORD`
|
- Type: `REG_DWORD`
|
||||||
- Value: `1`
|
- Value: `1`
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> The `ForceDefenderPassiveMode` registry key is not supported on Windows Server 2016.
|
> The `ForcePassiveMode` registry key is not supported on Windows Server 2016.
|
||||||
|
|
||||||
(<a id="fn2">2</a>) On Windows Server 2016, Microsoft Defender Antivirus does not enter passive mode automatically when you install a non-Microsoft antivirus product. In addition, Microsoft Defender Antivirus is not supported in passive mode. In those cases, [disable/uninstall Microsoft Defender Antivirus manually](microsoft-defender-antivirus-on-windows-server-2016.md#are-you-using-windows-server-2016) to prevent problems caused by having multiple antivirus products installed on a server.
|
(<a id="fn2">2</a>) On Windows Server 2016, Microsoft Defender Antivirus does not enter passive mode automatically when you install a non-Microsoft antivirus product. In addition, Microsoft Defender Antivirus is not supported in passive mode. In those cases, [disable/uninstall Microsoft Defender Antivirus manually](microsoft-defender-antivirus-on-windows-server-2016.md#are-you-using-windows-server-2016) to prevent problems caused by having multiple antivirus products installed on a server.
|
||||||
|
|
||||||
|
@ -177,7 +177,7 @@ If you are using a non-Microsoft antivirus product as your primary antivirus sol
|
|||||||
|
|
||||||
If you are using Windows Server, version 1803 or Windows Server 2019, you can set Microsoft Defender Antivirus to passive mode by setting the following registry key:
|
If you are using Windows Server, version 1803 or Windows Server 2019, you can set Microsoft Defender Antivirus to passive mode by setting the following registry key:
|
||||||
- Path: `HKLM\SOFTWARE\Policies\Microsoft\Windows Advanced Threat Protection`
|
- Path: `HKLM\SOFTWARE\Policies\Microsoft\Windows Advanced Threat Protection`
|
||||||
- Name: `ForceDefenderPassiveMode`
|
- Name: `ForcePassiveMode`
|
||||||
- Type: `REG_DWORD`
|
- Type: `REG_DWORD`
|
||||||
- Value: `1`
|
- Value: `1`
|
||||||
|
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: Configure advanced features in Microsoft Defender ATP
|
title: Configure advanced features in Microsoft Defender for Endpoint
|
||||||
description: Turn on advanced features such as block file in Microsoft Defender Advanced Threat Protection.
|
description: Turn on advanced features such as block file in Microsoft Defender for Endpoint.
|
||||||
keywords: advanced features, settings, block file, automated investigation, auto-resolve, skype, azure atp, office 365, azure information protection, intune
|
keywords: advanced features, settings, block file, automated investigation, auto-resolve, skype, microsoft defender for identity, office 365, azure information protection, intune
|
||||||
search.product: eADQiWindows 10XVcnh
|
search.product: eADQiWindows 10XVcnh
|
||||||
search.appverid: met150
|
search.appverid: met150
|
||||||
ms.prod: m365-security
|
ms.prod: m365-security
|
||||||
@ -61,10 +61,10 @@ Enabling this feature allows you to run unsigned scripts in a live response sess
|
|||||||
|
|
||||||
## Autoresolve remediated alerts
|
## Autoresolve remediated alerts
|
||||||
|
|
||||||
For tenants created on or after Windows 10, version 1809 the automated investigation and remediation capability is configured by default to resolve alerts where the automated analysis result status is "No threats found" or "Remediated". If you don't want to have alerts auto-resolved, you'll need to manually turn off the feature.
|
For tenants created on or after Windows 10, version 1809, the automated investigation and remediation capability is configured by default to resolve alerts where the automated analysis result status is "No threats found" or "Remediated". If you don't want to have alerts auto-resolved, you'll need to manually turn off the feature.
|
||||||
|
|
||||||
> [!TIP]
|
> [!TIP]
|
||||||
>For tenants created prior that version, you'll need to manually turn this feature on from the [Advanced features](https://securitycenter.windows.com/preferences2/integration) page.
|
> For tenants created prior to that version, you'll need to manually turn this feature on from the [Advanced features](https://securitycenter.windows.com/preferences2/integration) page.
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
>
|
>
|
||||||
@ -136,7 +136,7 @@ When you turn this feature on, you'll be able to incorporate data from Office 36
|
|||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> You'll need to have the appropriate license to enable this feature.
|
> You'll need to have the appropriate license to enable this feature.
|
||||||
|
|
||||||
To receive contextual device integration in Office 365 Threat Intelligence, you'll need to enable the Defender for Endpoint settings in the Security & Compliance dashboard. For more information, see [Office 365 Threat Intelligence overview](https://support.office.com/en-us/article/Office-365-Threat-Intelligence-overview-32405DA5-BEE1-4A4B-82E5-8399DF94C512).
|
To receive contextual device integration in Office 365 Threat Intelligence, you'll need to enable the Defender for Endpoint settings in the Security & Compliance dashboard. For more information, see [Threat investigation and response](https://docs.microsoft.com/microsoft-365/security/office-365-security/office-365-ti).
|
||||||
|
|
||||||
## Microsoft Threat Experts
|
## Microsoft Threat Experts
|
||||||
|
|
||||||
@ -150,7 +150,7 @@ Out of the two Microsoft Threat Expert components, targeted attack notification
|
|||||||
Enabling this setting forwards Defender for Endpoint signals to Microsoft Cloud App Security to provide deeper visibility into cloud application usage. Forwarded data is stored and processed in the same location as your Cloud App Security data.
|
Enabling this setting forwards Defender for Endpoint signals to Microsoft Cloud App Security to provide deeper visibility into cloud application usage. Forwarded data is stored and processed in the same location as your Cloud App Security data.
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
>This feature will be available with an E5 license for [Enterprise Mobility + Security](https://www.microsoft.com/cloud-platform/enterprise-mobility-security) on devices running Windows 10, version 1709 (OS Build 16299.1085 with [KB4493441](https://support.microsoft.com/help/4493441)), Windows 10, version 1803 (OS Build 17134.704 with [KB4493464](https://support.microsoft.com/help/4493464)), Windows 10, version 1809 (OS Build 17763.379 with [KB4489899](https://support.microsoft.com/help/4489899)) or later Windows 10 versions.
|
> This feature will be available with an E5 license for [Enterprise Mobility + Security](https://www.microsoft.com/cloud-platform/enterprise-mobility-security) on devices running Windows 10, version 1709 (OS Build 16299.1085 with [KB4493441](https://support.microsoft.com/help/4493441)), Windows 10, version 1803 (OS Build 17134.704 with [KB4493464](https://support.microsoft.com/help/4493464)), Windows 10, version 1809 (OS Build 17763.379 with [KB4489899](https://support.microsoft.com/help/4489899)), or later Windows 10 versions.
|
||||||
|
|
||||||
## Azure Information Protection
|
## Azure Information Protection
|
||||||
|
|
||||||
@ -158,13 +158,13 @@ Turning on this setting allows signals to be forwarded to Azure Information Prot
|
|||||||
|
|
||||||
## Microsoft Secure Score
|
## Microsoft Secure Score
|
||||||
|
|
||||||
Forwards Microsoft Defender ATP signals to Microsoft Secure Score in the Microsoft 365 security center. Turning on this feature gives Microsoft Secure Score visibility into the devices security posture. Forwarded data is stored and processed in the same location as the your Microsoft Secure Score data.
|
Forwards Microsoft Defender for Endpoint signals to Microsoft Secure Score in the Microsoft 365 security center. Turning on this feature gives Microsoft Secure Score visibility into the device's security posture. Forwarded data is stored and processed in the same location as your Microsoft Secure Score data.
|
||||||
|
|
||||||
### Enable the Microsoft Defender ATP integration from the Azure ATP portal
|
### Enable the Microsoft Defender for Endpoint integration from the Microsoft Defender for Identity portal
|
||||||
|
|
||||||
To receive contextual device integration in Azure ATP, you'll also need to enable the feature in the Azure ATP portal.
|
To receive contextual device integration in Microsoft Defender for Identity, you'll also need to enable the feature in the Microsoft Defender for Identity portal.
|
||||||
|
|
||||||
1. Log in to the [Azure portal](https://portal.atp.azure.com/) with a Global Administrator or Security Administrator role.
|
1. Log in to the [Microsoft Defender for Identity portal](https://portal.atp.azure.com/) with a Global Administrator or Security Administrator role.
|
||||||
|
|
||||||
2. Click **Create your instance**.
|
2. Click **Create your instance**.
|
||||||
|
|
||||||
@ -207,4 +207,3 @@ After configuring the [Security policy violation indicators](https://docs.micros
|
|||||||
|
|
||||||
- [Update data retention settings](data-retention-settings.md)
|
- [Update data retention settings](data-retention-settings.md)
|
||||||
- [Configure alert notifications](configure-email-notifications.md)
|
- [Configure alert notifications](configure-email-notifications.md)
|
||||||
|
|
||||||
|
@ -37,14 +37,12 @@ ms.technology: mde
|
|||||||
|
|
||||||
Ensure that you have Defender for Endpoint deployed in your environment with devices enrolled, and not just on a laboratory set-up.
|
Ensure that you have Defender for Endpoint deployed in your environment with devices enrolled, and not just on a laboratory set-up.
|
||||||
|
|
||||||
Defender for Endpoint customers need to apply for the Microsoft Threat Experts managed threat hunting service to get proactive Targeted Attack Notifications and to collaborate with experts on demand. Experts on Demand is an add-on service. Targeted Attack Notifications are always included after you have been accepted into Microsoft Threat Experts managed threat hunting service.
|
If you're a Defender for Endpoint customer, you need to apply for Microsoft Threat Experts - Targeted Attack Notifications to get special insights and analysis to help identify the most critical threats, so you can respond to them quickly. Contact your account team or Microsoft representative to subscribe to Microsoft Threat Experts - Experts on Demand to consult with our threat experts on relevant detections and adversaries.
|
||||||
|
|
||||||
If you are not enrolled yet and would like to experience its benefits, go to **Settings** > **General** > **Advanced features** > **Microsoft Threat Experts** to apply. Once accepted, you will get the benefits of Targeted Attack Notifications, and start a 90-day trial of Experts on Demand. Contact your Microsoft representative to get a full Experts on-Demand subscription.
|
## Apply for Microsoft Threat Experts - Targeted Attack Notifications service
|
||||||
|
If you're already a Defender for Endpoint customer, you can apply through the Microsoft Defender Security Center.
|
||||||
|
|
||||||
## Register to Microsoft Threat Experts managed threat hunting service
|
1. From the navigation pane, go to **Settings > General > Advanced features > Microsoft Threat Experts - Targeted Attack Notifications**.
|
||||||
If you're already a Defender for Endpoint customer, you can apply through the Microsoft Defender for Endpoint portal.
|
|
||||||
|
|
||||||
1. From the navigation pane, go to **Settings > General > Advanced features > Microsoft Threat Experts**.
|
|
||||||
|
|
||||||
2. Click **Apply**.
|
2. Click **Apply**.
|
||||||
|
|
||||||
@ -58,11 +56,14 @@ If you're already a Defender for Endpoint customer, you can apply through the Mi
|
|||||||
|
|
||||||

|

|
||||||
|
|
||||||
6. From the navigation pane, go to **Settings** > **General** > **Advanced features** to turn the **Threat Experts** toggle on. Click **Save preferences**.
|
When accepted, you will receive a welcome email and you will see the **Apply** button change to a toggle that is “on”. In case you want to take yourself out of the Targeted Attack Notifications service, slide the toggle “off” and click **Save preferences** at the bottom of the page.
|
||||||
|
|
||||||
## Receive targeted attack notification from Microsoft Threat Experts
|
## Where you'll see the targeted attack notifications from Microsoft Threat Experts
|
||||||
You can receive targeted attack notification from Microsoft Threat Experts through the following medium:
|
You can receive targeted attack notification from Microsoft Threat Experts through the following medium:
|
||||||
|
- The Defender for Endpoint portal's **Incidents** page
|
||||||
- The Defender for Endpoint portal's **Alerts** dashboard
|
- The Defender for Endpoint portal's **Alerts** dashboard
|
||||||
|
- OData alerting [API](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/get-alerts) and [REST API](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/pull-alerts-using-rest-api)
|
||||||
|
- [DeviceAlertEvents](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-devicealertevents-table) table in Advanced hunting
|
||||||
- Your email, if you choose to configure it
|
- Your email, if you choose to configure it
|
||||||
|
|
||||||
To receive targeted attack notifications through email, create an email notification rule.
|
To receive targeted attack notifications through email, create an email notification rule.
|
||||||
@ -77,13 +78,15 @@ You'll start receiving targeted attack notification from Microsoft Threat Expert
|
|||||||
|
|
||||||
2. From the dashboard, select the same alert topic that you got from the email, to view the details.
|
2. From the dashboard, select the same alert topic that you got from the email, to view the details.
|
||||||
|
|
||||||
|
## Subscribe to Microsoft Threat Experts - Experts on Demand
|
||||||
|
If you're already a Defender for Endpoint customer, you can contact your Microsoft representative to subscribe to Microsoft Threat Experts - Experts on Demand.
|
||||||
|
|
||||||
## Consult a Microsoft threat expert about suspicious cybersecurity activities in your organization
|
## Consult a Microsoft threat expert about suspicious cybersecurity activities in your organization
|
||||||
You can partner with Microsoft Threat Experts who can be engaged directly from within the Microsoft Defender Security Center for timely and accurate response. Experts provide insights to better understand complex threats, targeted attack notifications that you get, or if you need more information about the alerts, a potentially compromised device, or a threat intelligence context that you see on your portal dashboard.
|
You can partner with Microsoft Threat Experts who can be engaged directly from within the Microsoft Defender Security Center for timely and accurate response. Experts provide insights to better understand complex threats, targeted attack notifications that you get, or if you need more information about the alerts, a potentially compromised device, or a threat intelligence context that you see on your portal dashboard.
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> - Alert inquiries related to your organization's customized threat intelligence data are currently not supported. Consult your security operations or incident response team for details.
|
> - Alert inquiries related to your organization's customized threat intelligence data are currently not supported. Consult your security operations or incident response team for details.
|
||||||
> - You will need to have the "Manage security settings" permission in the Security Center portal to be able to submit a "Consult a threat expert" inquiry.
|
> - You need to have the **Manage security settings** permission in the Security Center portal to be able to submit a "Consult a threat expert" inquiry.
|
||||||
|
|
||||||
1. Navigate to the portal page with the relevant information that you'd like to investigate, for example, the **Incident** page. Ensure that the page for the relevant alert or device is in view before you send an investigation request.
|
1. Navigate to the portal page with the relevant information that you'd like to investigate, for example, the **Incident** page. Ensure that the page for the relevant alert or device is in view before you send an investigation request.
|
||||||
|
|
||||||
@ -106,7 +109,7 @@ You can partner with Microsoft Threat Experts who can be engaged directly from w
|
|||||||
4. Enter the email address that you'd like to use to correspond with Microsoft Threat Experts.
|
4. Enter the email address that you'd like to use to correspond with Microsoft Threat Experts.
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> Customers with Premier Support subscription mapped to their Office 365 license can track the status of their Experts on Demand cases through Microsoft Services Hub.
|
> If you would like to track the status of your Experts on Demand cases through Microsoft Services Hub, reach out to your Technical Account Manager.
|
||||||
|
|
||||||
Watch this video for a quick overview of the Microsoft Services Hub.
|
Watch this video for a quick overview of the Microsoft Services Hub.
|
||||||
|
|
||||||
@ -114,7 +117,7 @@ Watch this video for a quick overview of the Microsoft Services Hub.
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
## Sample investigation topics that you can consult with Microsoft Threat Experts
|
## Sample investigation topics that you can consult with Microsoft Threat Experts - Experts on Demand
|
||||||
|
|
||||||
**Alert information**
|
**Alert information**
|
||||||
- We see a new type of alert for a living-off-the-land binary: [AlertID]. Can you tell us something more about this alert and how we can investigate further?
|
- We see a new type of alert for a living-off-the-land binary: [AlertID]. Can you tell us something more about this alert and how we can investigate further?
|
||||||
|
@ -33,7 +33,7 @@ ms.technology: mde
|
|||||||
Controlled folder access helps protect your valuable data from malicious apps and threats, such as ransomware. Controlled folder access protects your data by checking apps against a list of known, trusted apps. Supported on Windows Server 2019 and Windows 10 clients, controlled folder access can be turned on using the Windows Security App, Microsoft Endpoint Configuration Manager, or Intune (for managed devices).
|
Controlled folder access helps protect your valuable data from malicious apps and threats, such as ransomware. Controlled folder access protects your data by checking apps against a list of known, trusted apps. Supported on Windows Server 2019 and Windows 10 clients, controlled folder access can be turned on using the Windows Security App, Microsoft Endpoint Configuration Manager, or Intune (for managed devices).
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> Scripting engines are not trusted and you cannot allow them access to controlled protected folders. For example, PowerShell is not trusted by controlled folder access, even if you add it as an application you trust or allow with [certificate and file indicators](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/indicator-certificates).
|
> Scripting engines are not trusted and you cannot allow them access to controlled protected folders. For example, PowerShell is not trusted by controlled folder access, even if you allow with [certificate and file indicators](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/indicator-certificates).
|
||||||
|
|
||||||
Controlled folder access works best with [Microsoft Defender for Endpoint](../microsoft-defender-atp/microsoft-defender-advanced-threat-protection.md), which gives you detailed reporting into controlled folder access events and blocks as part of the usual [alert investigation scenarios](../microsoft-defender-atp/investigate-alerts.md).
|
Controlled folder access works best with [Microsoft Defender for Endpoint](../microsoft-defender-atp/microsoft-defender-advanced-threat-protection.md), which gives you detailed reporting into controlled folder access events and blocks as part of the usual [alert investigation scenarios](../microsoft-defender-atp/investigate-alerts.md).
|
||||||
|
|
||||||
|
@ -93,6 +93,10 @@ When saved, a new custom detection rule immediately runs and checks for matches
|
|||||||
- **Every 3 hours**—runs every 3 hours, checking data from the past 6 hours
|
- **Every 3 hours**—runs every 3 hours, checking data from the past 6 hours
|
||||||
- **Every hour**—runs hourly, checking data from the past 2 hours
|
- **Every hour**—runs hourly, checking data from the past 2 hours
|
||||||
|
|
||||||
|
> [!IMPORTANT]
|
||||||
|
>When changing a query that is already scheduled as a Custom Detection, it's next immediate execution will have a lookback window of 30 days, exactly as if a new query was being created.
|
||||||
|
>Changes to a large number of queries, and with time filters higher than the default lookback durantion for the selected frequency, might have an impact in the overall quota consumption of Advanced Hunting and resulting in exhausting the daily quota.
|
||||||
|
|
||||||
> [!TIP]
|
> [!TIP]
|
||||||
> Match the time filters in your query with the lookback duration. Results outside of the lookback duration are ignored.
|
> Match the time filters in your query with the lookback duration. Results outside of the lookback duration are ignored.
|
||||||
|
|
||||||
|
@ -157,6 +157,9 @@ Use the [./Vendor/MSFT/Policy/Config/Defender/GuardedFoldersAllowedApplications]
|
|||||||
|
|
||||||
Microsoft Defender for Endpoint certificate and file indicators can allow signed executable files to access protected folders. For implementation details, see [Create indicators based on certificates](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/indicator-certificates).
|
Microsoft Defender for Endpoint certificate and file indicators can allow signed executable files to access protected folders. For implementation details, see [Create indicators based on certificates](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/indicator-certificates).
|
||||||
|
|
||||||
|
> [!Note]
|
||||||
|
> This does no apply to scripting engines, including Powershell
|
||||||
|
|
||||||
## Customize the notification
|
## Customize the notification
|
||||||
|
|
||||||
For more information about customizing the notification when a rule is triggered and blocks an app or file, see [Configure alert notifications in Microsoft Defender for Endpoint](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/configure-email-notifications).
|
For more information about customizing the notification when a rule is triggered and blocks an app or file, see [Configure alert notifications in Microsoft Defender for Endpoint](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/configure-email-notifications).
|
||||||
|
@ -20,7 +20,7 @@ ms.collection:
|
|||||||
- m365initiative-defender-endpoint
|
- m365initiative-defender-endpoint
|
||||||
- m365solution-scenario
|
- m365solution-scenario
|
||||||
- m365scenario-fpfn
|
- m365scenario-fpfn
|
||||||
ms.topic: conceptual
|
ms.topic: how-to
|
||||||
ms.reviewer: ramarom, evaldm, isco, mabraitm, chriggs, yonghree, jcedola
|
ms.reviewer: ramarom, evaldm, isco, mabraitm, chriggs, yonghree, jcedola
|
||||||
ms.custom: FPFN
|
ms.custom: FPFN
|
||||||
---
|
---
|
||||||
|
@ -114,9 +114,9 @@ For more information on Azure AD tokens, see the [Azure AD tutorial](https://doc
|
|||||||
|
|
||||||
### Use PowerShell
|
### Use PowerShell
|
||||||
|
|
||||||
```
|
```powershell
|
||||||
# That code gets the App Context Token and save it to a file named "Latest-token.txt" under the current directory
|
# This script acquires the App Context Token and stores it in the variable $token for later use in the script.
|
||||||
# Paste below your Tenant ID, App ID and App Secret (App key).
|
# Paste your Tenant ID, App ID, and App Secret (App key) into the indicated quotes below.
|
||||||
|
|
||||||
$tenantId = '' ### Paste your tenant ID here
|
$tenantId = '' ### Paste your tenant ID here
|
||||||
$appId = '' ### Paste your Application ID here
|
$appId = '' ### Paste your Application ID here
|
||||||
@ -132,8 +132,6 @@ $authBody = [Ordered] @{
|
|||||||
}
|
}
|
||||||
$authResponse = Invoke-RestMethod -Method Post -Uri $oAuthUri -Body $authBody -ErrorAction Stop
|
$authResponse = Invoke-RestMethod -Method Post -Uri $oAuthUri -Body $authBody -ErrorAction Stop
|
||||||
$token = $authResponse.access_token
|
$token = $authResponse.access_token
|
||||||
Out-File -FilePath "./Latest-token.txt" -InputObject $token
|
|
||||||
return $token
|
|
||||||
```
|
```
|
||||||
|
|
||||||
### Use C#:
|
### Use C#:
|
||||||
|
Binary file not shown.
Before Width: | Height: | Size: 10 KiB After Width: | Height: | Size: 12 KiB |
Binary file not shown.
Before Width: | Height: | Size: 30 KiB After Width: | Height: | Size: 125 KiB |
Binary file not shown.
Before Width: | Height: | Size: 43 KiB After Width: | Height: | Size: 136 KiB |
@ -20,7 +20,7 @@ ms.collection:
|
|||||||
- m365solution-scenario
|
- m365solution-scenario
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
ms.custom: migrationguides
|
ms.custom: migrationguides
|
||||||
ms.date: 02/11/2021
|
ms.date: 02/18/2021
|
||||||
ms.reviewer: jesquive, chventou, jonix, chriggs, owtho
|
ms.reviewer: jesquive, chventou, jonix, chriggs, owtho
|
||||||
---
|
---
|
||||||
|
|
||||||
@ -115,7 +115,7 @@ The [DisableAntiSpyware](https://docs.microsoft.com/windows-hardware/customize/d
|
|||||||
Because your organization is still using McAfee, you must set Microsoft Defender Antivirus to passive mode. That way, McAfee and Microsoft Defender Antivirus can run side by side until you have finished onboarding to Microsoft Defender for Endpoint.
|
Because your organization is still using McAfee, you must set Microsoft Defender Antivirus to passive mode. That way, McAfee and Microsoft Defender Antivirus can run side by side until you have finished onboarding to Microsoft Defender for Endpoint.
|
||||||
|
|
||||||
1. Open Registry Editor, and then navigate to <br/>
|
1. Open Registry Editor, and then navigate to <br/>
|
||||||
`Computer\HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Windows Advanced Threat Protection`.
|
`Computer\HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Advanced Threat Protection`.
|
||||||
|
|
||||||
2. Edit (or create) a DWORD entry called **ForceDefenderPassiveMode**, and specify the following settings:
|
2. Edit (or create) a DWORD entry called **ForceDefenderPassiveMode**, and specify the following settings:
|
||||||
|
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Microsoft Threat Experts
|
title: Microsoft Threat Experts
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
description: Microsoft Threat Experts provides an additional layer of expertise to Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP).
|
description: Microsoft Threat Experts provides an additional layer of expertise to Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP).
|
||||||
keywords: managed threat hunting service, managed threat hunting, managed detection and response (MDR) service, MTE, Microsoft Threat Experts
|
keywords: managed threat hunting service, managed threat hunting, managed detection and response (MDR) service, MTE, Microsoft Threat Experts, MTE-TAN, targeted attack notification, Targeted Attack Notification
|
||||||
search.product: Windows 10
|
search.product: Windows 10
|
||||||
search.appverid: met150
|
search.appverid: met150
|
||||||
ms.prod: m365-security
|
ms.prod: m365-security
|
||||||
@ -32,25 +32,22 @@ ms.technology: mde
|
|||||||
> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink)
|
> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink)
|
||||||
|
|
||||||
|
|
||||||
Microsoft Threat Experts is a managed threat hunting service that provides Security Operation Centers (SOCs) with expert level monitoring and analysis to help them ensure that critical threats in their unique environments don’t get missed.
|
Microsoft Threat Experts is a managed threat hunting service that provides your Security Operation Centers (SOCs) with expert level monitoring and analysis to help them ensure that critical threats in your unique environments don’t get missed.
|
||||||
|
|
||||||
This new capability provides expert-driven insights and data through targeted attack notification and access to experts on demand.
|
|
||||||
|
|
||||||
Watch this video for a quick overview of Microsoft Threat Experts.
|
|
||||||
|
|
||||||
>[!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RE4qZ0B]
|
|
||||||
|
|
||||||
|
This managed threat hunting service provides expert-driven insights and data through these two capabilities: targeted attack notification and access to experts on demand.
|
||||||
|
|
||||||
## Before you begin
|
## Before you begin
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> Discuss the eligibility requirements with your Microsoft Technical Service provider and account team before you apply to the managed threat hunting service.
|
> Discuss the eligibility requirements with your Microsoft Technical Service provider and account team before you apply to the managed threat hunting service.
|
||||||
|
|
||||||
Microsoft Defender for Endpoint customers need to apply for the Microsoft Threat Experts managed threat hunting service to get proactive Targeted Attack Notifications and to collaborate with experts on demand. Experts on Demand is an add-on service. Targeted Attack Notifications are always included after you have been accepted into Microsoft Threat Experts managed threat hunting service.
|
If you're a Microsoft Defender for Endpoint customer, you need to apply for Microsoft Threat Experts - Targeted Attack Notifications to get special insights and analysis that help identify the most critical threats so you can respond to them quickly. Contact your account team or Microsoft representative to subscribe to Microsoft Threat Experts - Experts on Demand to consult with our threat experts on relevant detections and adversaries.
|
||||||
|
|
||||||
If you are not enrolled yet and would like to experience its benefits, go to **Settings** > **General** > **Advanced features** > **Microsoft Threat Experts** to apply. Once accepted, you will get the benefits of Targeted Attack Notifications, and start a 90-day trial of Experts on Demand. Contact your Microsoft representative to get a full Experts on-Demand subscription. See [Configure Microsoft Threat Experts capabilities](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/configure-microsoft-threat-experts#before-you-begin) for details.
|
To enroll to Microsoft Threat Experts - Targeted Attack Notifications benefits, go to **Settings** > **General** > **Advanced features** > **Microsoft Threat Experts - Targeted Attack Notifications** to apply. Once accepted, you will get the benefits of Targeted Attack Notifications.
|
||||||
|
|
||||||
|
See [Configure Microsoft Threat Experts capabilities](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/configure-microsoft-threat-experts#before-you-begin) for details.
|
||||||
|
|
||||||
## Targeted attack notification
|
## Targeted attack notification
|
||||||
Microsoft Threat Experts provides proactive hunting for the most important threats to your network, including human adversary intrusions, hands-on-keyboard attacks, or advanced attacks like cyberespionage. The managed hunting service includes:
|
Microsoft Threat Experts provides proactive hunting for the most important threats to your network, including human adversary intrusions, hands-on-keyboard attacks, or advanced attacks like cyberespionage. These notifications shows up as a new alert. The managed hunting service includes:
|
||||||
- Threat monitoring and analysis, reducing dwell time and risk to the business
|
- Threat monitoring and analysis, reducing dwell time and risk to the business
|
||||||
- Hunter-trained artificial intelligence to discover and prioritize both known and unknown attacks
|
- Hunter-trained artificial intelligence to discover and prioritize both known and unknown attacks
|
||||||
- Identifying the most important risks, helping SOCs maximize time and energy
|
- Identifying the most important risks, helping SOCs maximize time and energy
|
||||||
@ -58,11 +55,9 @@ Microsoft Threat Experts provides proactive hunting for the most important threa
|
|||||||
|
|
||||||
## Collaborate with experts, on demand
|
## Collaborate with experts, on demand
|
||||||
Customers can engage our security experts directly from within Microsoft Defender Security Center for timely and accurate response. Experts provide insights needed to better understand the complex threats affecting your organization, from alert inquiries, potentially compromised devices, root cause of a suspicious network connection, to additional threat intelligence regarding ongoing advanced persistent threat campaigns. With this capability, you can:
|
Customers can engage our security experts directly from within Microsoft Defender Security Center for timely and accurate response. Experts provide insights needed to better understand the complex threats affecting your organization, from alert inquiries, potentially compromised devices, root cause of a suspicious network connection, to additional threat intelligence regarding ongoing advanced persistent threat campaigns. With this capability, you can:
|
||||||
|
|
||||||
- Get additional clarification on alerts including root cause or scope of the incident
|
- Get additional clarification on alerts including root cause or scope of the incident
|
||||||
- Gain clarity into suspicious device behavior and next steps if faced with an advanced attacker
|
- Gain clarity into suspicious device behavior and next steps if faced with an advanced attacker
|
||||||
- Determine risk and protection regarding threat actors, campaigns, or emerging attacker techniques
|
- Determine risk and protection regarding threat actors, campaigns, or emerging attacker techniques
|
||||||
- Seamlessly transition to Microsoft Incident Response (IR) or other third-party Incident Response services when necessary
|
|
||||||
|
|
||||||
The option to **Consult a threat expert** is available in several places in the portal so you can engage with experts in the context of your investigation:
|
The option to **Consult a threat expert** is available in several places in the portal so you can engage with experts in the context of your investigation:
|
||||||
|
|
||||||
@ -79,7 +74,7 @@ The option to **Consult a threat expert** is available in several places in the
|
|||||||

|

|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> Customers with Premier Support subscription mapped to their Office 365 license can track the status of their Experts on Demand cases through Microsoft Services Hub.
|
> If you would like to track the status of your Experts on Demand cases through Microsoft Services Hub, reach out to your Technical Account Manager.
|
||||||
|
|
||||||
Watch this video for a quick overview of the Microsoft Services Hub.
|
Watch this video for a quick overview of the Microsoft Services Hub.
|
||||||
|
|
||||||
|
@ -19,7 +19,7 @@ ms.collection:
|
|||||||
- m365solution-migratetomdatp
|
- m365solution-migratetomdatp
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
ms.custom: migrationguides
|
ms.custom: migrationguides
|
||||||
ms.date: 02/11/2021
|
ms.date: 02/18/2021
|
||||||
ms.reviewer: jesquive, chventou, jonix, chriggs, owtho
|
ms.reviewer: jesquive, chventou, jonix, chriggs, owtho
|
||||||
---
|
---
|
||||||
|
|
||||||
@ -100,7 +100,7 @@ The [DisableAntiSpyware](https://docs.microsoft.com/windows-hardware/customize/d
|
|||||||
Because your organization is still using your existing endpoint protection solution, you must set Microsoft Defender Antivirus to passive mode. That way, your existing solution and Microsoft Defender Antivirus can run side by side until you have finished onboarding to Microsoft Defender for Endpoint.
|
Because your organization is still using your existing endpoint protection solution, you must set Microsoft Defender Antivirus to passive mode. That way, your existing solution and Microsoft Defender Antivirus can run side by side until you have finished onboarding to Microsoft Defender for Endpoint.
|
||||||
|
|
||||||
1. Open Registry Editor, and then navigate to <br/>
|
1. Open Registry Editor, and then navigate to <br/>
|
||||||
`Computer\HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Windows Advanced Threat Protection`.
|
`Computer\HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Advanced Threat Protection`.
|
||||||
2. Edit (or create) a DWORD entry called **ForceDefenderPassiveMode**, and specify the following settings:
|
2. Edit (or create) a DWORD entry called **ForceDefenderPassiveMode**, and specify the following settings:
|
||||||
- Set the DWORD's value to **1**.
|
- Set the DWORD's value to **1**.
|
||||||
- Under **Base**, select **Hexadecimal**.
|
- Under **Base**, select **Hexadecimal**.
|
||||||
|
@ -18,7 +18,7 @@ ms.collection:
|
|||||||
- M365-security-compliance
|
- M365-security-compliance
|
||||||
- m365solution-symantecmigrate
|
- m365solution-symantecmigrate
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
ms.date: 02/11/2021
|
ms.date: 02/18/2021
|
||||||
ms.custom: migrationguides
|
ms.custom: migrationguides
|
||||||
ms.reviewer: depicker, yongrhee, chriggs
|
ms.reviewer: depicker, yongrhee, chriggs
|
||||||
---
|
---
|
||||||
@ -89,7 +89,7 @@ Now that you're moving from Symantec to Microsoft Defender for Endpoint, you'll
|
|||||||
Because your organization is still using Symantec, you must set Microsoft Defender Antivirus to passive mode. That way, Symantec and Microsoft Defender Antivirus can run side by side until you have finished onboarding to Microsoft Defender for Endpoint.
|
Because your organization is still using Symantec, you must set Microsoft Defender Antivirus to passive mode. That way, Symantec and Microsoft Defender Antivirus can run side by side until you have finished onboarding to Microsoft Defender for Endpoint.
|
||||||
|
|
||||||
1. Open Registry Editor, and then navigate to <br/>
|
1. Open Registry Editor, and then navigate to <br/>
|
||||||
`Computer\HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Windows Advanced Threat Protection`.
|
`Computer\HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Advanced Threat Protection`.
|
||||||
2. Edit (or create) a DWORD entry called **ForceDefenderPassiveMode**, and specify the following settings:
|
2. Edit (or create) a DWORD entry called **ForceDefenderPassiveMode**, and specify the following settings:
|
||||||
- Set the DWORD's value to **1**.
|
- Set the DWORD's value to **1**.
|
||||||
- Under **Base**, select **Hexadecimal**.
|
- Under **Base**, select **Hexadecimal**.
|
||||||
|
@ -22,6 +22,14 @@ Microsoft is committed to optimizing the security of its products and services.
|
|||||||
|
|
||||||
The product releases below are currently certified against the cited Protection Profile, as listed on the [Common Criteria Portal](https://www.commoncriteriaportal.org/products/). The Security Target describes the product edition(s) in scope, the security functionality in the product, and the assurance measures from the Protection Profile used as part of the evaluation. The Administrative Guide provides guidance on configuring the product to match the evaluated configuration. The Certification Report or Validation Report documents the results of the evaluation by the validation team, with the Assurance Activity Report providing details on the evaluator's actions.
|
The product releases below are currently certified against the cited Protection Profile, as listed on the [Common Criteria Portal](https://www.commoncriteriaportal.org/products/). The Security Target describes the product edition(s) in scope, the security functionality in the product, and the assurance measures from the Protection Profile used as part of the evaluation. The Administrative Guide provides guidance on configuring the product to match the evaluated configuration. The Certification Report or Validation Report documents the results of the evaluation by the validation team, with the Assurance Activity Report providing details on the evaluator's actions.
|
||||||
|
|
||||||
|
### Microsoft Windows Server, Windows 10 version 1909 (November 2019 Update), Microsoft Windows Server 2019 (version 1809) Hyper-V
|
||||||
|
Certified against the Protection Profile for Virtualization, including the Extended Package for Server Virtualization.
|
||||||
|
|
||||||
|
- [Security Target](https://download.microsoft.com/download/5/f/6/5f6efbb4-88a0-4161-953d-de07450b7107/Windows%20+%20Windows%20Server%201909,%20Windows%20Server%202019%20Hyper-V%20Security%20Target.pdf)
|
||||||
|
- [Administrative Guide](https://download.microsoft.com/download/7/5/0/750db292-f3d3-48c9-9557-aa64237a0e22/Virtualization%201909%20Administrative%20Guide.pdf)
|
||||||
|
- [Validation Report](https://download.microsoft.com/download/4/7/6/476ca991-631d-4943-aa89-b0cd4f448d14/Windows%20+%20Windows%20Server%201909,%20Windows%20Server%202019%20Hyper-V%20Validation%20Report.pdf)
|
||||||
|
- [Assurance Activities Report](https://download.microsoft.com/download/3/b/4/3b4818d8-62a1-4b8d-8cb4-9b3256564355/Windows%20+%20Windows%20Server%201909,%20Windows%20Server%202019%20Hyper-V%20Assurance%20Activity%20Report.pdf)
|
||||||
|
|
||||||
### Microsoft Windows 10 and Windows Server (November 2019 Update, version 1909)
|
### Microsoft Windows 10 and Windows Server (November 2019 Update, version 1909)
|
||||||
Certified against the Protection Profile for General Purpose Operating Systems, including the Extended Package for Wireless Local Area Network Clients and the Module for Virtual Private Network Clients.
|
Certified against the Protection Profile for General Purpose Operating Systems, including the Extended Package for Wireless Local Area Network Clients and the Module for Virtual Private Network Clients.
|
||||||
|
|
||||||
|
Loading…
x
Reference in New Issue
Block a user