From ed2617a3fe2c5e42f7a523a501965b0aa60ef2ec Mon Sep 17 00:00:00 2001 From: jaimeo Date: Thu, 18 Feb 2021 10:51:13 -0700 Subject: [PATCH 1/5] adjust applies to to mention relevant Server editions --- windows/deployment/update/windows-update-resources.md | 10 +++++++++- 1 file changed, 9 insertions(+), 1 deletion(-) diff --git a/windows/deployment/update/windows-update-resources.md b/windows/deployment/update/windows-update-resources.md index 49b83d23f1..848cc5616f 100644 --- a/windows/deployment/update/windows-update-resources.md +++ b/windows/deployment/update/windows-update-resources.md @@ -16,7 +16,15 @@ author: jaimeo # Windows Update - additional resources -> Applies to: Windows 10 +**Applies to**: + +- Windows 10 +- Windows Server 2016 +- Windows Server 2019 + +> [!NOTE] +> Windows Server 2016 supports policies available in Windows 10, version 1607. Windows Server 2019 supports policies available in Windows 10, version 1809. + The following resources provide additional information about using Windows Update. From 5a1035f9cf3e6b7d009624ba0e580d5f26a0414c Mon Sep 17 00:00:00 2001 From: jaimeo Date: Mon, 1 Mar 2021 09:36:59 -0700 Subject: [PATCH 2/5] removed old ms.date --- windows/deployment/update/windows-update-resources.md | 1 - 1 file changed, 1 deletion(-) diff --git a/windows/deployment/update/windows-update-resources.md b/windows/deployment/update/windows-update-resources.md index 848cc5616f..af52395048 100644 --- a/windows/deployment/update/windows-update-resources.md +++ b/windows/deployment/update/windows-update-resources.md @@ -6,7 +6,6 @@ ms.mktglfcycl: audience: itpro ms.localizationpriority: medium ms.audience: itpro -ms.date: 09/18/2018 ms.reviewer: manager: laurawi ms.topic: article From 746c689f2c5eaed9b293af52cdaf6dc7952e2b40 Mon Sep 17 00:00:00 2001 From: Daniel Simpson Date: Fri, 5 Mar 2021 12:02:05 -0800 Subject: [PATCH 3/5] alt text update --- .../mandatory-user-profile.md | 11 +++++------ .../mdm/diagnose-mdm-failures-in-windows-10.md | 18 ++++++------------ 2 files changed, 11 insertions(+), 18 deletions(-) diff --git a/windows/client-management/mandatory-user-profile.md b/windows/client-management/mandatory-user-profile.md index b1ce6d51a9..4da406434c 100644 --- a/windows/client-management/mandatory-user-profile.md +++ b/windows/client-management/mandatory-user-profile.md @@ -16,7 +16,6 @@ ms.topic: article # Create mandatory user profiles **Applies to** - - Windows 10 A mandatory user profile is a roaming user profile that has been pre-configured by an administrator to specify settings for users. Settings commonly defined in a mandatory profile include (but are not limited to): icons that appear on the desktop, desktop backgrounds, user preferences in Control Panel, printer selections, and more. Configuration changes made during a user's session that are normally saved to a roaming user profile are not saved when a mandatory user profile is assigned. @@ -76,7 +75,7 @@ First, you create a default user profile with the customizations that you want, > [!TIP] > If you receive an error message that says "Sysprep was not able to validate your Windows installation", open %WINDIR%\\System32\\Sysprep\\Panther\\setupact.log and look for an entry like the following: > - > ![Microsoft Bing Translator package](images/sysprep-error.png) + > ![Microsoft Bing Translator package error](images/sysprep-error.png) > > Use the [Remove-AppxProvisionedPackage](https://docs.microsoft.com/powershell/module/dism/remove-appxprovisionedpackage?view=win10-ps) and [Remove-AppxPackage -AllUsers](https://docs.microsoft.com/powershell/module/appx/remove-appxpackage?view=win10-ps) cmdlet in Windows PowerShell to uninstall the app that is listed in the log. @@ -89,11 +88,11 @@ Starting in Windows 10 version (2004) Open the Settings app and click on Advance 1. In **User Profiles**, click **Default Profile**, and then click **Copy To**. - ![Example of UI](images/copy-to.png) + ![Example of User Profiles UI](images/copy-to.png) 1. In **Copy To**, under **Permitted to use**, click **Change**. - ![Example of UI](images/copy-to-change.png) + ![Example of Copy To UI](images/copy-to-change.png) 1. In **Select User or Group**, in the **Enter the object name to select** field, type `everyone` or the group of users that the profile will be assigned to, click **Check Names**, and then click **OK**. @@ -101,13 +100,13 @@ Starting in Windows 10 version (2004) Open the Settings app and click on Advance - If the device is joined to the domain and you are signed in with an account that has permissions to write to a shared folder on the network, you can enter the shared folder path. - ![Example of UI](images/copy-to-path.png) + ![Example of Copy profile to](images/copy-to-path.png) - If the device is not joined to the domain, you can save the profile locally and then copy it to the shared folder location. - Optionally, you can check the **Mandatory profile** checkbox. This step is not required but will set permissions that are more restrictive and we recommend doing so. - ![Example of UI](images/copy-to-path.png) + ![Example of Copy To UI with UNC path](images/copy-to-path.png) 1. Click **OK** to copy the default user profile. diff --git a/windows/client-management/mdm/diagnose-mdm-failures-in-windows-10.md b/windows/client-management/mdm/diagnose-mdm-failures-in-windows-10.md index 4f20ca31cd..8909e59d0c 100644 --- a/windows/client-management/mdm/diagnose-mdm-failures-in-windows-10.md +++ b/windows/client-management/mdm/diagnose-mdm-failures-in-windows-10.md @@ -23,10 +23,10 @@ To help diagnose enrollment or device management issues in Windows 10 devices m ![Access work or school page in Settings](images/diagnose-mdm-failures15.png) 1. At the bottom of the **Settings** page, click **Create report**. - ![Access work or school page in Settings](images/diagnose-mdm-failures16.png) + ![Access work or school page and then Create report](images/diagnose-mdm-failures16.png) 1. A window opens that shows the path to the log files. Click **Export**. - ![Access work or school page in Settings](images/diagnose-mdm-failures17.png) + ![Access work or school log files](images/diagnose-mdm-failures17.png) 1. In File Explorer, navigate to c:\Users\Public\Documents\MDMDiagnostics to see the report. @@ -294,21 +294,21 @@ For best results, ensure that the PC or VM on which you are viewing logs matches 3. Navigate to the etl file that you got from the device and then open the file. 4. Click **Yes** when prompted to save it to the new log format. - ![prompt](images/diagnose-mdm-failures10.png) + ![event viewer prompt](images/diagnose-mdm-failures10.png) ![diagnose mdm failures](images/diagnose-mdm-failures11.png) 5. The new view contains traces from the channel. Click on **Filter Current Log** from the **Actions** menu. - ![event viewer](images/diagnose-mdm-failures12.png) + ![event viewer actions](images/diagnose-mdm-failures12.png) 6. Add a filter to Event sources by selecting **DeviceManagement-EnterpriseDiagnostics-Provider** and click **OK**. - ![event filter](images/diagnose-mdm-failures13.png) + ![event filter for Device Management](images/diagnose-mdm-failures13.png) 7. Now you are ready to start reviewing the logs. - ![event viewer](images/diagnose-mdm-failures14.png) + ![event viewer review logs](images/diagnose-mdm-failures14.png) ## Collect device state data @@ -336,9 +336,3 @@ Here's an example of how to collect current MDM device state data using the [Dia ```   - - - - - - From 3a6d2224d975a7a1a3e0e7a8efd256973e26344e Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Fri, 5 Mar 2021 12:19:38 -0800 Subject: [PATCH 4/5] add mssps --- .../images/esentire-logo.png | Bin 0 -> 3193 bytes .../images/onevinn-logo.png | Bin 0 -> 5346 bytes .../images/quorum-logo.png | Bin 0 -> 3188 bytes .../microsoft-defender-atp/mssp-list.md | 3 +++ 4 files changed, 3 insertions(+) create mode 100644 windows/security/threat-protection/microsoft-defender-atp/images/esentire-logo.png create mode 100644 windows/security/threat-protection/microsoft-defender-atp/images/onevinn-logo.png create mode 100644 windows/security/threat-protection/microsoft-defender-atp/images/quorum-logo.png diff --git a/windows/security/threat-protection/microsoft-defender-atp/images/esentire-logo.png b/windows/security/threat-protection/microsoft-defender-atp/images/esentire-logo.png new file mode 100644 index 0000000000000000000000000000000000000000..0e0c4f181e634571526953469073eb5dbf8d74e4 GIT binary patch literal 3193 zcmc&%`8yO|7oSx2eQRX0uV2bk(qvzHn(m7Bd5fznNno03a&=Upr-PBe%&+vIUvLjoE&mJ}V@_MsUBN003|U&2Jjq z3CmwE*z-elM}E=UPIKD06q?)juvcEWuviJ2Ef4*Hq-c7Zwzzf1x{9Zrmi?D&xAqm! zw_~BRoWk&1XW;kF7z-A8aw(edJEW=gVpS=l299jTP~l*@LRVmYBdvLv&w^lvD*HFY zI`rw@p?>TXj@F+?J{as5XGu4NDt}jsq5FjDZ!bA;MMHwO7_}pOa0w!9s%FV!)k@?W zTI-huNQdViOil^^-5kS5j+{kE<^Ri|6MMa1J5`?cE5PZ^!c%GtQd*S@1JLh}ba7D3 z>dk1CTmaSm@hLZ8g71-APha)ik_hsID;42j`G;&3;xk3+1nKu1~$v zM_gH6th+6Ey6JK}KO<5j;lVtFcNxYCXq`<&-ZfJW^ocox`>?Q0c~M%wr0F!~M7$XD zr3!}Doqf%{UG?5f^r@nJKuC^T_gO4;aDhAh>8i|O)M14<2hop2DDV8_jo~*_784Wu z-S^pr{u{@|ou2mKp6H0Jh_}zI*(7O)aTG;TRA6*PAD#={XXWRb$O?3E4hvD!V&YMt zMmm;=|&wkjrMGEFQ2q%I8v2R#^xm&E+P}&P~)fgT@S?V2qS#%C{DztWVzPZIBAf z&(Zb9Lwbi*{lv)UHwF5yp8Bkdhtv1o+G|dwI8>@GH^8FM*_9ow(jz1Bx%p?6+te$Q z9|~_w!`DV=0uIychG2E=uZ^wIc$W*u7n^H0u+S1P#sGro!3Cb%%WI9w3%>Z+Y_NZ8 z=D>7s#fEC*sP6<9$(z*3fWC!<90sOIXc?QMQmw%~T;z46|04{auJ+)v+TdlKs~v=b z^;9dE|DWO8=*{nRPb(-nuLe1WPZltaB>SmS*dB$3k9L+-^Lw` z{(0{DV+P#)_so1Y{Uil{a8n zTGN-ya0m+XlKr7lZ)|lxeDC|-XplOGIB%PsOJ6BEy*BwdE9>pxX8Oqw(*TXG93s!* zNP08|>G1cHIPImX+UaREd>vXGcBhwuN_d*{{R_oe#@W=$P>fD8iK?pZZ9s(N+cgGhn z_mwmw+6OIk$cpN3x=nfcSLI}rK&~KOj;pJf!y~sdlD~t0ocPRBEO0s> z|B6;oa1uqEIg|S_=qdz~3O*z98@1w9E{V#>_2|OYY>L7{5K_VG=i9-XHl9try~gtJ z;Wxz6E@d<@po+PK85av%!D0D{iatTE?7bL_Y)b3_~Uz)ztYxy zyk~wuAAqZsT6~b9-cHjxFfwzq`FAJo(e)>^{Vy2)BEMl11A*pTj(5f!h{pEze1z3X zLP=7?gcof1YuUDTx=O*=^6H65spkVng-N2XtCNLLrWwPExD9Secpon3pwLb=0xFb} z)5Un>JnxfS@4o~ZeyeUMltiCMeSd^`JQg7)*4Vw-18i;%1pQ;?Gty!9u#1by0(-=Q{V^Y#HaMYO-01{PE!9;UscPIvKoo>E*!7#Op_5x6*^E3ZJ%pLh;abhUzLPk`v`iH zSvBN}kycVsRuDXLcRZ`|T;5<@qn*~LYg8{`0!g)XP6KbuI=ahomL_Fm=Q3{%h9c%? znmN3@%Gu*%|LpQTz$vI^ap_K$7Ry9M$HlmLdxP*kYRa{b$L!Eil1E2I+}ym;&!ofD zp%xFD{(e2>jqmDN0@^o5)cIFt<0GOplaSuCTY3h_sWxl{F8 z`oXp=cpudEUngv@uS({***7U3VflYDzdGHn8u z1J3CkQC+OTp`S%WSt&=Ic7;m!kih=7o7@4`l>9T|3>Y~H@RUcD)y*u z63V1IfQPG34ss>g-w8B^4Dd=0((L%t&rQ|56r0UJ>)w4SPB|%_h8hTGM8{vSr=VK%qjTLXMt)HR{ zOe~tH_Q@cC#qX4o7wUq7XM5t)O*-z_<_JAYSYDMZCJ?+VN54Aky+i_qb?Fd0bJaXY zBg#T4sMO$-kF3e7r~XQvSFLmmJk2jN4|G{wJ$9i^xVyNTsPQ@QzjN}`37T} z`tC!S0xrJWdABNvet zhLpX#q>ZTRN&q1h%#HC}9Aq_^ue(%s=RA3P^8lT~dyU$M1hHjU5Ql7_u;HF{UZ=6H zZEZ|X@{5nOaEZcfpyB_RyT-01?@l$WumzduMfVr{dO@iV5*#7{f9UUP6 literal 0 HcmV?d00001 diff --git a/windows/security/threat-protection/microsoft-defender-atp/images/onevinn-logo.png b/windows/security/threat-protection/microsoft-defender-atp/images/onevinn-logo.png new file mode 100644 index 0000000000000000000000000000000000000000..4740d091446dc64188d8b139259a2bf090697727 GIT binary patch literal 5346 zcmV<86dmh{P)=*7V00009a7bBm000&x z000&x0ZCFM@Bjb+2XskIMF-^r1r!MbsmDt!000z$NklYiu0Xb;p1A-kE(b z$>sZ@C-tUfy)4O*Wm#5Kx3-a>iQ}M1>hzJINt1qQfgt_fq90lmEsB0>ivrH8DT1U$ zA{nk?>tR`ntfxgultf8*KuItRL^uTTIHIf!SyzKvx)`-|397CZQC5nGL=dI{a`vy=;*sOJ zIQ;`m{OiBr_V#%v>Tw`Ity+Ql-d`f5!o78y+~K1*SK2%xT-Q5px_lw-ebm|`&T-IL z3r5G$x9{LyZNonL0U{Ac)>NZbEJro1MlD%{tgJx9q6npCji};~qcz%buuq@Cxzq|d zyYRwe2ovba3UC}SH8{3+qHX)r6Rz{W3h#4Wut8fnoWWt7D{Y8F?;{s4L~U4yx#4M# zsAO`A=ov)u$Qe(QJ9v0%sCj&0;OZ$}HIHwF9}%tZeRLf3@CZ)JWt@&K?9*p4wrs-O zyb-l{AuG**d-92y4#!0g43c~2Al6&^ za0Uj7{{4a_M{C^SVeFHq(YaipqGugidjt&)V(ohu>(?LPj;DP(I}b7YbD8iasY z6qzbRl$Rq)l88vyBSgDk<0DO0H z9^9T=2&K@Wu=k{Pr`9?_URil75oM*Q^=mO!uRzw;Ad)4>NZ7L$DZEfmKG^AwkKx|w z$GO&lbG`+)`=%Gk_N!OU#y)l&=arW*>S_ZGk_JYOtSrae`TV^uv}Iu*KZVO&f5wY{J^NAN$l9$YdX%p!`Lr z?+jp{ZbrRQ6{z(DMviJ+imI!<=Y;6-anjx0xVLVB6OiRdh1$3dbIT@F;}T>f>RAbV zbWRbIzd#5?G>VEukY%OF`dTuv820`{z9Shrm%~1JlF+W_5rz@i+!h!)A`*sh=sxNB z$(evAVj&RKRfJxC2~}B+FwI9l5z}%!A{<67XdvvOs1pFAxexiIfAp|lK!F+Zz zM8c0xkk*jPq5Jx9hlc}G@3)>Dq(m)RfLy%DpBt>Tx1PG)7g#vwx0{?iL?VG&v(g(b zeL#rU~*yVn;fknokpi80#R$8oB~V}k%;?~p+Qe% zVPf8Lf`bqU(?Gfv7c4P60|GA`yQwG+ePVD!mzqfSjoB zF<3heI+LZS>^Khi4Z8>+WFkWT@=3M|jAPj{_=C_~(fTCNDj7AaV zDPKdIwk)p?KtOqtk057zB~5If>iQ+p1 zu_&_M=Z-I}(S3Jt+B(oyfc*`$*YwD_*^ArJ2IMdB_b9>H7*Iv8Gso|w#if(YRMx1h2n!lczAS<+-u04--m$Pr4R7BrxiH{x8nk`Mp;*u6YDihc47ZqH4xY3lN2$l7XTNfIIvF!CKc z3JJ7K7CknG+ux7V-igzC4flFCdOU!+O9(`HImR;^y~JXGm>J6v0+CE$tZl+R;hj`p zYYJCGdIGoOI{H>0PV;$0sti$5f{4c<9P+x_Y8P#J(Plj|f*u+|4~=-yXFGsKeL{d? zU~Jvwt>psVq&zd^;KkY0s+FjwRp|b^0fguAQVHp_mrl5SXDWX`{Uj9{wrY2(Y$+&L zTna=@73S_2k!EoH2MU-masXti6m!ROIIUOFT{nU`QPX7v)Y9gWAOwWMn7ej*o@fzz zPtR!GnlKEE^=naEH$xEV>)C`-s8uTn?cRwDg^JR5VP=a8^IOZqyI(-9U+ZNIXTF!V ze;5k6XaS*De-~9%QM4|(Ghgv31ZvSj!k>QyxpXlYK00yC29!cnlw-cQ19RiL!0H7a zgjp%a6-r?~{S@Kf{~WS$iPyC5Ngzl{L{$am&gTj3*oG_(AO-&r%&0>!2`LeU&Ka&l zcJDqfDxAs8&GwT*cnjQ$3d|kb2)*=K&vg!BSHeRuJLEt<#2&}owiO~_tbGS?FSUAw z97Svg{HY;?w-tUtJ;n>q5#IScs;n>Qg#OR)|d#%}gn(@%C0 zoDEA7`DS`jK_Z4)*67VK&u;dHvVbE2ABWi`2PVVq#?wzB8|ug{UrO%i2e=(wUcrUq z&MZOsMXZQL5w+E*4eJQM^jXy6g@HD@dlbw*IWX1#tfB(>(q}PNtsr-%8Rt?fPR}hE z8b)U__ug3w{E;@uXU<7NJ(H#8|x0i!#sR?ZM^_Irl+?La2oe$eL>OrVY6LcX4j_q5JxA2L{o@!?+`( zke=}N{pYOwW?7Fgov*7Fh3$lf0>kvIBO3K?1y)*uNR=TgDv&i*$m(ijSt&%qUf^_= z-TOI9&ZH$p!iY#1SyhQzx!mg$olbl0vqs0zkna^^7R$(h5LCua_0M!dD@g@1*=g%BU9j-39Q z*7_5V{kYe))(@?`EWAElulxUhn695jPd_N`UEQ^2VqyZ@wvkezU6*V&i{rSMra>ec zB^(YTrNpunFx-N!cc(>QFZG;e$?{!@l(=>4%hjcoP99kzm7y^}MiiCzX|z*tShuTN_7@ z9HFDVoy(|rS(ZR^@FpbNWar^ddE?>TkmCaIDSI5p>FS35a1}^sMvm5+k>O!}@aCIzc63l%Uq?ej z1MO|?3=Iw9*beW+Vx0Z(L;mbr-{kzcX8!9(Kcc*%0)WxcQL>hWb{vi!Il}PJFkkxe z>vVQ@@}K|yADlRToSbbV@nW8b4jkYMuf2w4S^V$Me~x8Y)HT%eg)e>)r4+ebj^^fO ze(>g-q|<4>`oRQn%df0o?5#WEui_#hjib# z!TxvNWoct02lwyi@O$s!*f!g?Z>O%Io|f|$XlZF-@18wu-m;lcC`4ahAN${VmsekX z71J~s8XDqaOACE{eWX$;qR}Wgn$giw%utAI)?$2ooV$1LlF4LP+Stgd)vM|0zQNVj zD>R=y%icY|q_(D(v9U4I=`7V)8Pk%~p?=6lTK1|Dn3#7-#+4AgGzWdkTqrAMF=CjTG-QWBzogE!)dS(-~b+z>L z^l;+%afXM7i6;`=?!8UR`3q>*W!?Jq?0oS>2JQ~f(&9Z=nAo+}Y;=7Gv9U&vE?NF$V75<;eT* zvvb#rw6tb4p%7S@oimV<_(< z9NWg3wzEKMjq6VR|4`R6|B_M)DHU34YU}FQvULlg`@Euc>({e!(@C&NVk9gy89Q>sYpI8B#skpz){>m-h}H z;$lk+$z+nIr=Fs!x;oIsVzE$MatwndOO}vGCK(zWuWukdo~EO%or@PP@YbHaY~S%bk#Lx?u`z~+hgq|xiLz9Rty{NJ zmP#>j_b&hQv!5|AFu>|Ht69^uhHyAMIjKJ?gb;}7b~FRz7MC2QSlYOh9WT7VTYLBN z-l0QWy>^w58KSqh7sqj^uC3+8-MhKf)15y7+%uMl$sa*YO*M_n8tLllqO-l7pZxg8 zy#3Z&7>0pu+a!}ozV+>I)3~gW+PYe{@7TfKU;Kh=SFa+4VA=BJENyJON5?`&)cag9 zrNcB0re8GP;e})Fzb|S2*noH|DmhY0s%vWa>KlK^(9jU4PMo0i(q**PNTsN+ujgxj z{6}ox{v3OL@kWf>`*8~Jdq$Ck7I^H#G+B+i3Fi=Xv#1I zL}D@Gi3E{o)H^PJyfLlnQ%Xr9kw6IXk$LcOA#^@!cl_8p;b#E=0IVj)hIeQlO*1cM z5N+gJMdi`lg#csQU;qFj@yF;)?uc*G7MVg!%n(dV^o-mbB096_>Hq+k%fwL6`eEK? zex&u?Wg$`r1Fn`Qu;*%=Euom479EPQ4p_ijsTXBCY}`d)+Uo8HZ;TsYB9Cc{W%hlcaW3{Ml z2DysUcW8&`I$*}2W~$=MHIA%(H{%b8qt~OsrSu1EtTn&94e_RlIrTa{QkxqttpOGs zHB#T^-!DPWfaSx!u%W!or_$4$J)0w2PMhIw_Jk>fUu2C(rm58<7@c zh#8N*SQ(^2yCPD?Nv}!l>Pn|us3+`XzP72oj1!7{+tlGG6k<;S(j}qsjtqdDfQrsv z3X%yq;}%H6HF~cIwCYz6DC}URJ7%ph$G&(JT2fX;2Vf@=KNdVs+IZb;ur)KAu!0#| zf}XRq_ar4{t0p2c1y(lGSd`mY%Ktduau!D~> z%qSEcBfG(G|FV+x!t-8iXqrK;A|JfWeB0jh*8C*}aGc{z1M}pa%x9v{`ie%Oa08W# zf}SM832Mr=iSNSh!(#Gaos+KK8PffgN8IAZREsauCz&)B$~Eh{+VG_yK#aL_>TdFt znvI9FQ`LAcg1A>Hu4p1KtXWN8D8HQ-dz0(zz5qaeln6ie@`fxq)r}{yrY_)Gh0l6zeL$<_H)K5$*pKv__joBTd9*3u z+1P`u7rUC)Tbpb!gdS7i#TQMyPPD0mkgi;U$*VFg@faaIvz@K-jdJG?seFb5(bm>+ zU7Qdd{yTpGH^S*#I^NAUw$)SOwk!nufdFvXWvjqjrfkS4n=)J=ElHoP1~`?v21ZUK zgl(lkp&v@6?{*PuU8Z;R1*UCZ0313jk=ycXdwa|g0o;V2lAy6Zm#5YeMa#MLX$GDr z*(lx*>lli^m#7H(oap_@o1SQSc~98lsn1S6U*LV&%ao)=KZ}jv!D=a^>A#=m>=eEF zkYH+^286-&hXc2LI#72rpIJItsm!%d?P4EsE-WDFni9lRPZRkQTtScSsbKb9rtcN* z;Hl%yQb^`!eIV`c)Pn)2HUi^J>^VXSh%K9Qj89o!$VhSW)Q1)Ur_6hCbA;B`THZmc{r^1`G6vX=ZD}rxMT6!y7 zFK#1#THhNS7;|Stuk%~Zw95Vw0Az0(cJ{k{M{PYgYL#C{VllG(G=MYXfL&c%8(YvX z#GKEr<<-m(rg`0$9K-tS{6dFQGk=VX#%@rsriYu4O;x8I7Lv02{IM%9_Ye7-7+ffbv8UhP}FJ`vJJu#_t8kWgRvm{lY63r$ijKaGwpn1*@h8C9bF|@x{fSNYn(9i$)zO_lKa! zvTvu0$9Q)zR6DV~MtYGBpk=ew5CQ_^mCMrsZoWKp{(T@}_99sswMH2(Z3Pw*x+T*Y z0U?b^_!m#-KiC&`d%s;M>xNXsfyEvIY-s`^}ucgeAX*J@S!Uq=g z?C_ly0~HeVB|nHFztXQXUy0(~?X53ObfL~Mbo0pOI7~|W5AK_X2x%nBR6hb!qqq*g z*fX;!;M<0geh8CQJy)sQcg?xp+0M}FjaK}J#vQlDaA6wTt&`9rGIxMRyYBDgRor_+ z2BDR;1&hv2%_J*<5std!K01nj+rG4)mo_~hbxe~dL=YfVeIq&a`*()06Yh;n&T>ScG=7CF#63;r-*aWZ5ipJVZJ$m!653i`N&-?@NkBf|I zRhV2KY?f%ck&|B?!mc$)~2H#<9vg%ZthhP>r8>^>H^+O@y>m^z&s(wqZF;Ga_PIp;-3;s;nbaRf3chjCzS;^N;q((Hd71E~B&Y4)70oEfrht#AnFaI8CXBM~78(wjEIisP zNVF??(u;nQno(TVP8TM>^zffm`3N*oALmnh&(%*WjD@=EJssXLD21Es` zZGU5YY~MNIs}b)QNRh7Un)*@OcwI+^Yboomp;d}of)b{4+xm{(!7O+PjR-^WlpTC3 z%zdpJhRQNJ7#mYz*yoSo1%@|E{65RbdFaY>RjU>Hyx@r4?SUrSG=X$7@ytVfF5&03 z5Sv{8{#(!2RnV^R3DzEkd+&mpNtXW<=VHYo6=}5Fb&B%T)lf?4@;PG6VJCIdRHhll zxf=up1PHNQ$J_7plP7VRc?@ZFi-g`Qw~_8~dCwWK)mU9;2kI=xndVpdkVBHktJIts_)NWN;^j0`d(` zvGwW^7?ATg+s-ikW9e9DJa!Rp|5X%(-F;P|hC qxt;&#FSJ60TZh@1wUj)2A|e?tiHO>{-%tB7089|(hE@75vHt^n3GH+M literal 0 HcmV?d00001 diff --git a/windows/security/threat-protection/microsoft-defender-atp/mssp-list.md b/windows/security/threat-protection/microsoft-defender-atp/mssp-list.md index ca77be9029..d318d49479 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/mssp-list.md +++ b/windows/security/threat-protection/microsoft-defender-atp/mssp-list.md @@ -38,7 +38,10 @@ Logo |Partner name | Description ![Image of CSIS Managed Detection & Response logo](images/csis-logo.png)| [CSIS Managed Detection & Response](https://go.microsoft.com/fwlink/?linkid=2091005) | 24/7 monitoring and analysis of security alerts giving companies actionable insights into what, when and how security incidents have taken place ![Image of Dell Technologies Advanced Threat Protection logo](images/dell-logo.png)| [Dell Technologies Advanced Threat Protection](https://go.microsoft.com/fwlink/?linkid=2091004) | Professional monitoring service for malicious behavior and anomalies with 24/7 capability ![Image of DXC-Managed Endpoint Threat Detection and Response logo](images/dxc-logo.png)| [DXC-Managed Endpoint Threat Detection and Response](https://go.microsoft.com/fwlink/?linkid=2090395) | Identify endpoint threats that evade traditional security defenses and contain them in hours or minutes, not days +![Image of eSentire log](images/esentire-logo.png) | [eSentire Managed Detection and Response](https://go.microsoft.com/fwlink/?linkid=2154970) | 24x7 threat investigations and response via Microsoft Defender for Endpoint. ![Image of NTT Security logo](images/ntt-logo.png)| [NTT Security](https://go.microsoft.com/fwlink/?linkid=2095320) | NTT's EDR Service provides 24/7 security monitoring & response across your endpoint and network +![Image of OneVinn logo](images/onevinn-logo.png) | [Onevinn MDR](https://go.microsoft.com/fwlink/?linkid=2155203)| 24/7 Managed Detection and Response built on Microsoft Defender and Azure Sentinel, enriched with Onevinn's threat intelligence. +![Image of Quorum Cyber logo](images/quorum-logo.png) | [Quorum Cyber](https://go.microsoft.com/fwlink/?linkid=2155202)| A cutting-edge Threat Hunting & Security Engineering service. ![Image of Red Canary logo](images/redcanary-logo.png)| [Red Canary](https://go.microsoft.com/fwlink/?linkid=2103852) | Red Canary is a security operations partner for modern teams, MDR deployed in minutes ![Image of SecureWorks Managed Detection and Response Powered by Red Cloak logo](images/secureworks-logo.png)| [SecureWorks Managed Detection and Response Powered by Red Cloak](https://go.microsoft.com/fwlink/?linkid=2133634) | Secureworks combines threat intelligence and 20+ years of experience into SaaS and managed security solutions ![Image of sepagoSOC logo](images/sepago-logo.png)| [sepagoSOC](https://go.microsoft.com/fwlink/?linkid=2090491) | Ensure holistic security through sophisticated automated workflows in your zero trust environment From 4a0325f9b3e3d2899db5082c6ea66cf8d8696a31 Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Fri, 5 Mar 2021 13:05:01 -0800 Subject: [PATCH 5/5] add RSS feed URL --- .../microsoft-defender-atp/api-release-notes.md | 8 ++++++++ 1 file changed, 8 insertions(+) diff --git a/windows/security/threat-protection/microsoft-defender-atp/api-release-notes.md b/windows/security/threat-protection/microsoft-defender-atp/api-release-notes.md index 3c666c381b..bc10aad249 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/api-release-notes.md +++ b/windows/security/threat-protection/microsoft-defender-atp/api-release-notes.md @@ -25,6 +25,14 @@ ms.technology: mde The following information lists the updates made to the Microsoft Defender for Endpoint APIs and the dates they were made. + +> [!TIP] +> RSS feed: Get notified when this page is updated by copying and pasting the following URL into your feed reader: +>``` +>https://docs.microsoft.com/api/search/rss?search=%22Release+notes+for+updates+made+to+the+Microsoft+Defender+for+Endpoint+set+of+APIs%22&locale=en-us&facet=&%24filter=scopes%2Fany%28t%3A+t+eq+%27Windows+10%27%29 +>``` + + ### 10.02.2021