mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-19 00:37:22 +00:00
update images fix acrolinx
This commit is contained in:
parent
e969850bbc
commit
c37e5f35aa
Binary file not shown.
Before Width: | Height: | Size: 182 KiB After Width: | Height: | Size: 200 KiB |
Binary file not shown.
Before Width: | Height: | Size: 199 KiB After Width: | Height: | Size: 213 KiB |
@ -23,11 +23,11 @@ ms.topic: article
|
|||||||
- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559)
|
- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559)
|
||||||
|
|
||||||
|
|
||||||
In this section we will be using Microsoft Endpoint Manager (MEM) to deploy
|
In this section, we will be using Microsoft Endpoint Manager (MEM) to deploy
|
||||||
Microsoft Defender ATP to your endpoints.
|
Microsoft Defender ATP to your endpoints.
|
||||||
|
|
||||||
For more information about MEM, check out the following:
|
For more information about MEM, check out these resources:
|
||||||
- [Microsoft Entpoint Manager page](https://docs.microsoft.com/en-us/mem/)
|
- [Microsoft Endpoint Manager page](https://docs.microsoft.com/en-us/mem/)
|
||||||
- [Blog post on convergence of Intune and ConfigMgr](https://www.microsoft.com/microsoft-365/blog/2019/11/04/use-the-power-of-cloud-intelligence-to-simplify-and-accelerate-it-and-the-move-to-a-modern-workplace/)
|
- [Blog post on convergence of Intune and ConfigMgr](https://www.microsoft.com/microsoft-365/blog/2019/11/04/use-the-power-of-cloud-intelligence-to-simplify-and-accelerate-it-and-the-move-to-a-modern-workplace/)
|
||||||
- [Introduction video on MEM](https://www.microsoft.com/microsoft-365/blog/2019/11/04/use-the-power-of-cloud-intelligence-to-simplify-and-accelerate-it-and-the-move-to-a-modern-workplace)
|
- [Introduction video on MEM](https://www.microsoft.com/microsoft-365/blog/2019/11/04/use-the-power-of-cloud-intelligence-to-simplify-and-accelerate-it-and-the-move-to-a-modern-workplace)
|
||||||
|
|
||||||
@ -36,11 +36,11 @@ This process is a multi-step process, you'll need to:
|
|||||||
|
|
||||||
- Identify target devices or users
|
- Identify target devices or users
|
||||||
|
|
||||||
- Create an AAD group (User or Device)
|
- Create an Azure Active Directory group (User or Device)
|
||||||
|
|
||||||
- Create a Configuration Profile
|
- Create a Configuration Profile
|
||||||
|
|
||||||
- In MEM we'll guide you in creating a separate policy for each feature
|
- In MEM, we'll guide you in creating a separate policy for each feature
|
||||||
|
|
||||||
## Resources
|
## Resources
|
||||||
|
|
||||||
@ -54,7 +54,7 @@ Here are the links you'll need for the rest of the process:
|
|||||||
- [Intune Security baselines](https://docs.microsoft.com/en-us/mem/intune/protect/security-baseline-settings-defender-atp#microsoft-defender)
|
- [Intune Security baselines](https://docs.microsoft.com/en-us/mem/intune/protect/security-baseline-settings-defender-atp#microsoft-defender)
|
||||||
|
|
||||||
## Identify target devices or users
|
## Identify target devices or users
|
||||||
In this section we will create a test group to assign your configurations on.
|
In this section, we will create a test group to assign your configurations on.
|
||||||
|
|
||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
>Intune uses Azure Active Directory (Azure AD) groups to manage devices and
|
>Intune uses Azure Active Directory (Azure AD) groups to manage devices and
|
||||||
@ -81,7 +81,7 @@ needs.<br>
|
|||||||
|
|
||||||
5. From the **Groups > All groups** pane, open your new group.
|
5. From the **Groups > All groups** pane, open your new group.
|
||||||
|
|
||||||
6. Click on **Members > Add members**.
|
6. Select **Members > Add members**.
|
||||||
|
|
||||||
7. Find your test user or device and select it.
|
7. Find your test user or device and select it.
|
||||||
|
|
||||||
@ -93,7 +93,7 @@ needs.<br>
|
|||||||
In the following section, you'll create a number of configuration policies.
|
In the following section, you'll create a number of configuration policies.
|
||||||
First is a configuration policy to select which groups of users or devices will
|
First is a configuration policy to select which groups of users or devices will
|
||||||
be onboarded to Microsoft Defender ATP. Then you will continue by creating several
|
be onboarded to Microsoft Defender ATP. Then you will continue by creating several
|
||||||
different types of Endpoint Security policies.
|
different types of Endpoint security policies.
|
||||||
|
|
||||||
### Endpoint detection and response
|
### Endpoint detection and response
|
||||||
|
|
||||||
@ -107,31 +107,31 @@ different types of Endpoint Security policies.
|
|||||||
3. Under **Platform, select Windows 10 and Later, Profile - Endpoint detection
|
3. Under **Platform, select Windows 10 and Later, Profile - Endpoint detection
|
||||||
and response > Create**.
|
and response > Create**.
|
||||||
|
|
||||||
4. Enter name and description, then click **Next**.
|
4. Enter a name and description, then select **Next**.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
5. Select settings as required, then click **Next**.
|
5. Select settings as required, then select **Next**.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
>In this instance, this has been auto populated as Microsoft Defender ATP has already been integrated with Intune. For more information on the integration, see [Enable Microsoft Defender ATP in Intune](https://docs.microsoft.com/mem/intune/protect/advanced-threat-protection#enable-microsoft-defender-atp-in-intune). <br>
|
>In this instance, this has been auto populated as Microsoft Defender ATP has already been integrated with Intune. For more information on the integration, see [Enable Microsoft Defender ATP in Intune](https://docs.microsoft.com/mem/intune/protect/advanced-threat-protection#enable-microsoft-defender-atp-in-intune). <br>
|
||||||
>If you have not integrated Microsoft Defender ATP h and Intune, complete [these
|
>If you have not integrated Microsoft Defender ATP and Intune, complete [these
|
||||||
steps](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-mdm#onboard-machines-using-microsoft-intune)
|
steps](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-mdm#onboard-machines-using-microsoft-intune)
|
||||||
to create and upload an onboarding blob.
|
to create and upload an onboarding blob.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
6. Add scope tags if required, then click **Next**.
|
6. Add scope tags if required, then select **Next**.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
7. Add test group by clicking on **Select groups to include** and choose your group, then click **Next**.
|
7. Add test group by clicking on **Select groups to include** and choose your group, then select **Next**.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
8. Review and accept, then click **Create**.
|
8. Review and accept, then select **Create**.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
@ -150,29 +150,29 @@ different types of Endpoint Security policies.
|
|||||||
3. Select **Platform - Windows 10 and Later - Windows and Profile – Microsoft
|
3. Select **Platform - Windows 10 and Later - Windows and Profile – Microsoft
|
||||||
Defender Antivirus > Create**.
|
Defender Antivirus > Create**.
|
||||||
|
|
||||||
4. Enter name and description, then click **Next**.
|
4. Enter name and description, then select **Next**.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
5. In the Configuration settings page: Set the configurations you require for
|
5. In the **Configuration settings page**: Set the configurations you require for
|
||||||
Microsoft Defender Antivirus (Cloud Protection, Exclusions, Real Time
|
Microsoft Defender Antivirus (Cloud Protection, Exclusions, Real-Time
|
||||||
Protection, and Remediation).
|
Protection, and Remediation).
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
6. Add scope tags if required, then click **Next**.
|
6. Add scope tags if required, then select **Next**.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
7. Select groups to include, assign to your test group > Next
|
7. Select groups to include, assign to your test group, then select **Next**.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
8. Review and create, then click **Create**.
|
8. Review and create, then select **Create**.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
9. You can see the configuration policy you created as per below
|
9. You'll see the configuration policy you created.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
@ -182,22 +182,22 @@ different types of Endpoint Security policies.
|
|||||||
|
|
||||||
2. Navigate to **Endpoint security > Attack surface reduction**.
|
2. Navigate to **Endpoint security > Attack surface reduction**.
|
||||||
|
|
||||||
3. Click on **Create Policy**.
|
3. Select **Create Policy**.
|
||||||
|
|
||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
>We will be setting these as Audit.
|
>We will be setting these as Audit.
|
||||||
|
|
||||||
5. Select **Platform - Windows 10 and Later – Profile - Attack surface reduction
|
4. Select **Platform - Windows 10 and Later – Profile - Attack surface reduction
|
||||||
rules > Create**.
|
rules > Create**.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
6. Enter a name and description, then click **Next**.
|
5. Enter a name and description, then select **Next**.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
7. In the Configuration settings page: Set the configurations you require for
|
6. In the **Configuration settings page**: Set the configurations you require for
|
||||||
Attack surface reduction rules, then click **Next**.
|
Attack surface reduction rules, then select **Next**.
|
||||||
|
|
||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
>We will be configuring all of the Attack surface reduction rules to Audit.
|
>We will be configuring all of the Attack surface reduction rules to Audit.
|
||||||
@ -206,19 +206,19 @@ different types of Endpoint Security policies.
|
|||||||
|
|
||||||

|

|
||||||
|
|
||||||
8. Add Scope Tags as required, then click **Next**.
|
7. Add Scope Tags as required, then select **Next**.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
9. Select groups to include and assign to test group, then click **Next**.
|
8. Select groups to include and assign to test group, then select **Next**.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
10. Review the details, then click **Create**.
|
9. Review the details, then select **Create**.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
11. View the policy.
|
10. View the policy.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
@ -228,18 +228,18 @@ different types of Endpoint Security policies.
|
|||||||
|
|
||||||
2. Navigate to **Endpoint security > Attack surface reduction**.
|
2. Navigate to **Endpoint security > Attack surface reduction**.
|
||||||
|
|
||||||
3. Click on **Create Policy**.
|
3. Select **Create Policy**.
|
||||||
|
|
||||||
4. Select **Windows 10 and Later – Web protection > Create**.
|
4. Select **Windows 10 and Later – Web protection > Create**.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
5. Enter name and description, then click **Next**.
|
5. Enter a name and description, then select **Next**.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
6. In the Configuration settings page: Set the configurations you require for
|
6. In the **Configuration settings page**: Set the configurations you require for
|
||||||
Web Protection, then click **Next**.
|
Web Protection, then select **Next**.
|
||||||
|
|
||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
>We are configuring Web Protection to Block.
|
>We are configuring Web Protection to Block.
|
||||||
@ -270,38 +270,37 @@ different types of Endpoint Security policies.
|
|||||||
### Confirm Policies have applied
|
### Confirm Policies have applied
|
||||||
|
|
||||||
|
|
||||||
Once the Configuration policy has been assigned it will take some time to apply.
|
Once the Configuration policy has been assigned, it will take some time to apply.
|
||||||
|
|
||||||
For information on timing, see [Intune configuration information](https://docs.microsoft.com/mem/intune/configuration/device-profile-troubleshoot#how-long-does-it-take-for-devices-to-get-a-policy-profile-or-app-after-they-are-assigned).
|
For information on timing, see [Intune configuration information](https://docs.microsoft.com/mem/intune/configuration/device-profile-troubleshoot#how-long-does-it-take-for-devices-to-get-a-policy-profile-or-app-after-they-are-assigned).
|
||||||
|
|
||||||
To confirm that the configuration policy has been applied to your test device
|
To confirm that the configuration policy has been applied to your test device, follow the following process for each configuration policy.
|
||||||
follow the following process for each configuration policy.
|
|
||||||
|
|
||||||
1. Open the MEM portal and navigate to the relevant policy as shown in the
|
1. Open the MEM portal and navigate to the relevant policy as shown in the
|
||||||
steps above. The following example shows the next generation protection settings.
|
steps above. The following example shows the next generation protection settings.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
2. Click on the **Configuration Policy** to view the policy status.
|
2. Select the **Configuration Policy** to view the policy status.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
3. Click on **Device Status** to see the status.
|
3. Select **Device Status** to see the status.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
4. Click on **User Status** to see the status.
|
4. Select **User Status** to see the status.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
5. Click on **Per-setting status** to see the status.
|
5. Select **Per-setting status** to see the status.
|
||||||
|
|
||||||
>[!TIP]
|
>[!TIP]
|
||||||
>This view is very useful to identify any settings that conflict with another policy.
|
>This view is very useful to identify any settings that conflict with another policy.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
### Endpoint Detection and Response
|
### Endpoint detection and response
|
||||||
|
|
||||||
|
|
||||||
1. Before applying the configuration, the Microsoft Defender ATP
|
1. Before applying the configuration, the Microsoft Defender ATP
|
||||||
@ -314,7 +313,7 @@ follow the following process for each configuration policy.
|
|||||||
|
|
||||||

|

|
||||||
|
|
||||||
3. After the services is running on the device, the device appears in Microsoft
|
3. After the services are running on the device, the device appears in Microsoft
|
||||||
Defender Security Center.
|
Defender Security Center.
|
||||||
|
|
||||||

|

|
||||||
@ -342,11 +341,11 @@ follow the following process for each configuration policy.
|
|||||||
|
|
||||||
2. This should respond with the following lines with no content
|
2. This should respond with the following lines with no content
|
||||||
|
|
||||||
1. AttackSurfaceReductionOnlyExclusions :
|
1. AttackSurfaceReductionOnlyExclusions:
|
||||||
|
|
||||||
2. AttackSurfaceReductionRules_Actions :
|
2. AttackSurfaceReductionRules_Actions:
|
||||||
|
|
||||||
3. AttackSurfaceReductionRules_Ids :
|
3. AttackSurfaceReductionRules_Ids:
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
|
Loading…
x
Reference in New Issue
Block a user