update images fix acrolinx

This commit is contained in:
Joey Caparas 2020-08-11 11:08:12 -07:00
parent e969850bbc
commit c37e5f35aa
3 changed files with 45 additions and 46 deletions

Binary file not shown.

Before

Width:  |  Height:  |  Size: 182 KiB

After

Width:  |  Height:  |  Size: 200 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 199 KiB

After

Width:  |  Height:  |  Size: 213 KiB

View File

@ -23,11 +23,11 @@ ms.topic: article
- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559)
In this section we will be using Microsoft Endpoint Manager (MEM) to deploy
In this section, we will be using Microsoft Endpoint Manager (MEM) to deploy
Microsoft Defender ATP to your endpoints.
For more information about MEM, check out the following:
- [Microsoft Entpoint Manager page](https://docs.microsoft.com/en-us/mem/)
For more information about MEM, check out these resources:
- [Microsoft Endpoint Manager page](https://docs.microsoft.com/en-us/mem/)
- [Blog post on convergence of Intune and ConfigMgr](https://www.microsoft.com/microsoft-365/blog/2019/11/04/use-the-power-of-cloud-intelligence-to-simplify-and-accelerate-it-and-the-move-to-a-modern-workplace/)
- [Introduction video on MEM](https://www.microsoft.com/microsoft-365/blog/2019/11/04/use-the-power-of-cloud-intelligence-to-simplify-and-accelerate-it-and-the-move-to-a-modern-workplace)
@ -36,11 +36,11 @@ This process is a multi-step process, you'll need to:
- Identify target devices or users
- Create an AAD group (User or Device)
- Create an Azure Active Directory group (User or Device)
- Create a Configuration Profile
- In MEM we'll guide you in creating a separate policy for each feature
- In MEM, we'll guide you in creating a separate policy for each feature
## Resources
@ -54,7 +54,7 @@ Here are the links you'll need for the rest of the process:
- [Intune Security baselines](https://docs.microsoft.com/en-us/mem/intune/protect/security-baseline-settings-defender-atp#microsoft-defender)
## Identify target devices or users
In this section we will create a test group to assign your configurations on.
In this section, we will create a test group to assign your configurations on.
>[!NOTE]
>Intune uses Azure Active Directory (Azure AD) groups to manage devices and
@ -81,7 +81,7 @@ needs.<br>
5. From the **Groups > All groups** pane, open your new group.
6. Click on **Members > Add members**.
6. Select **Members > Add members**.
7. Find your test user or device and select it.
@ -93,7 +93,7 @@ needs.<br>
In the following section, you'll create a number of configuration policies.
First is a configuration policy to select which groups of users or devices will
be onboarded to Microsoft Defender ATP. Then you will continue by creating several
different types of Endpoint Security policies.
different types of Endpoint security policies.
### Endpoint detection and response
@ -107,31 +107,31 @@ different types of Endpoint Security policies.
3. Under **Platform, select Windows 10 and Later, Profile - Endpoint detection
and response > Create**.
4. Enter name and description, then click **Next**.
4. Enter a name and description, then select **Next**.
![Image of Microsoft Endpoint Manager portal](images/a5b2d23bdd50b160fef4afd25dda28d4.png)
5. Select settings as required, then click **Next**.
5. Select settings as required, then select **Next**.
![Image of Microsoft Endpoint Manager portal](images/cea7e288b5d42a9baf1aef0754ade910.png)
>[!NOTE]
>In this instance, this has been auto populated as Microsoft Defender ATP has already been integrated with Intune. For more information on the integration, see [Enable Microsoft Defender ATP in Intune](https://docs.microsoft.com/mem/intune/protect/advanced-threat-protection#enable-microsoft-defender-atp-in-intune). <br>
>If you have not integrated Microsoft Defender ATP h and Intune, complete [these
>If you have not integrated Microsoft Defender ATP and Intune, complete [these
steps](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-mdm#onboard-machines-using-microsoft-intune)
to create and upload an onboarding blob.
![Image of Microsoft Endpoint Manager portal](images/2466460812371ffae2d19a10c347d6f4.png)
6. Add scope tags if required, then click **Next**.
6. Add scope tags if required, then select **Next**.
![Image of Microsoft Endpoint Manager portal](images/ef844f52ec2c0d737ce793f68b5e8408.png)
7. Add test group by clicking on **Select groups to include** and choose your group, then click **Next**.
7. Add test group by clicking on **Select groups to include** and choose your group, then select **Next**.
![Image of Microsoft Endpoint Manager portal](images/fc3525e20752da026ec9f46ab4fec64f.png)
8. Review and accept, then click **Create**.
8. Review and accept, then select **Create**.
![Image of Microsoft Endpoint Manager portal](images/289172dbd7bd34d55d24810d9d4d8158.png)
@ -150,29 +150,29 @@ different types of Endpoint Security policies.
3. Select **Platform - Windows 10 and Later - Windows and Profile Microsoft
Defender Antivirus > Create**.
4. Enter name and description, then click **Next**.
4. Enter name and description, then select **Next**.
![Image of Microsoft Endpoint Manager portal](images/a7d738dd4509d65407b7d12beaa3e917.png)
5. In the Configuration settings page: Set the configurations you require for
Microsoft Defender Antivirus (Cloud Protection, Exclusions, Real Time
5. In the **Configuration settings page**: Set the configurations you require for
Microsoft Defender Antivirus (Cloud Protection, Exclusions, Real-Time
Protection, and Remediation).
![Image of Microsoft Endpoint Manager portal](images/3840b1576d6f79a1d72eb14760ef5e8c.png)
6. Add scope tags if required, then click **Next**.
6. Add scope tags if required, then select **Next**.
![Image of Microsoft Endpoint Manager portal](images/2055e4f9b9141525c0eb681e7ba19381.png)
7. Select groups to include, assign to your test group > Next
7. Select groups to include, assign to your test group, then select **Next**.
![Image of Microsoft Endpoint Manager portal](images/48318a51adee06bff3908e8ad4944dc9.png)
8. Review and create, then click **Create**.
8. Review and create, then select **Create**.
![Image of Microsoft Endpoint Manager portal](images/dfdadab79112d61bd3693d957084b0ec.png)
9. You can see the configuration policy you created as per below
9. You'll see the configuration policy you created.
![Image of Microsoft Endpoint Manager portal](images/38180219e632d6e4ec7bd25a46398da8.png)
@ -182,22 +182,22 @@ different types of Endpoint Security policies.
2. Navigate to **Endpoint security > Attack surface reduction**.
3. Click on **Create Policy**.
3. Select **Create Policy**.
>[!NOTE]
>We will be setting these as Audit.
5. Select **Platform - Windows 10 and Later Profile - Attack surface reduction
4. Select **Platform - Windows 10 and Later Profile - Attack surface reduction
rules > Create**.
![Image of Microsoft Endpoint Manager portal](images/522d9bb4288dc9c1a957392b51384fdd.png)
6. Enter a name and description, then click **Next**.
5. Enter a name and description, then select **Next**.
![Image of Microsoft Endpoint Manager portal](images/a5a71fd73ec389f3cdce6d1a6bd1ff31.png)
7. In the Configuration settings page: Set the configurations you require for
Attack surface reduction rules, then click **Next**.
6. In the **Configuration settings page**: Set the configurations you require for
Attack surface reduction rules, then select **Next**.
>[!NOTE]
>We will be configuring all of the Attack surface reduction rules to Audit.
@ -206,19 +206,19 @@ different types of Endpoint Security policies.
![Image of Microsoft Endpoint Manager portal](images/dd0c00efe615a64a4a368f54257777d0.png)
8. Add Scope Tags as required, then click **Next**.
7. Add Scope Tags as required, then select **Next**.
![Image of Microsoft Endpoint Manager portal](images/6daa8d347c98fe94a0d9c22797ff6f28.png)
9. Select groups to include and assign to test group, then click **Next**.
8. Select groups to include and assign to test group, then select **Next**.
![Image of Microsoft Endpoint Manager portal](images/45cefc8e4e474321b4d47b4626346597.png)
10. Review the details, then click **Create**.
9. Review the details, then select **Create**.
![Image of Microsoft Endpoint Manager portal](images/2c2e87c5fedc87eba17be0cdeffdb17f.png)
11. View the policy.
10. View the policy.
![Image of Microsoft Endpoint Manager portal](images/7a631d17cc42500dacad4e995823ffef.png)
@ -228,18 +228,18 @@ different types of Endpoint Security policies.
2. Navigate to **Endpoint security > Attack surface reduction**.
3. Click on **Create Policy**.
3. Select **Create Policy**.
4. Select **Windows 10 and Later Web protection > Create**.
![Image of Microsoft Endpoint Manager portal](images/cd7b5a1cbc16cc05f878cdc99ba4c27f.png)
5. Enter name and description, then click **Next**.
5. Enter a name and description, then select **Next**.
![Image of Microsoft Endpoint Manager portal](images/5be573a60cd4fa56a86a6668b62dd808.png)
6. In the Configuration settings page: Set the configurations you require for
Web Protection, then click **Next**.
6. In the **Configuration settings page**: Set the configurations you require for
Web Protection, then select **Next**.
>[!NOTE]
>We are configuring Web Protection to Block.
@ -270,38 +270,37 @@ different types of Endpoint Security policies.
### Confirm Policies have applied
Once the Configuration policy has been assigned it will take some time to apply.
Once the Configuration policy has been assigned, it will take some time to apply.
For information on timing, see [Intune configuration information](https://docs.microsoft.com/mem/intune/configuration/device-profile-troubleshoot#how-long-does-it-take-for-devices-to-get-a-policy-profile-or-app-after-they-are-assigned).
To confirm that the configuration policy has been applied to your test device
follow the following process for each configuration policy.
To confirm that the configuration policy has been applied to your test device, follow the following process for each configuration policy.
1. Open the MEM portal and navigate to the relevant policy as shown in the
steps above. The following example shows the next generation protection settings.
![Image of Microsoft Endpoint Manager portal](images/43ab6aa74471ee2977e154a4a5ef2d39.png)
2. Click on the **Configuration Policy** to view the policy status.
2. Select the **Configuration Policy** to view the policy status.
![Image of Microsoft Endpoint Manager portal](images/55ecaca0e4a022f0e29d45aeed724e6c.png)
3. Click on **Device Status** to see the status.
3. Select **Device Status** to see the status.
![Image of Microsoft Endpoint Manager portal](images/18a50df62cc38749000dbfb48e9a4c9b.png)
4. Click on **User Status** to see the status.
4. Select **User Status** to see the status.
![Image of Microsoft Endpoint Manager portal](images/4e965749ff71178af8873bc91f9fe525.png)
5. Click on **Per-setting status** to see the status.
5. Select **Per-setting status** to see the status.
>[!TIP]
>This view is very useful to identify any settings that conflict with another policy.
![Image of Microsoft Endpoint Manager portal](images/42acc69d0128ed09804010bdbdf0a43c.png)
### Endpoint Detection and Response
### Endpoint detection and response
1. Before applying the configuration, the Microsoft Defender ATP
@ -314,7 +313,7 @@ follow the following process for each configuration policy.
![Image of Services panel](images/a621b699899f1b41db211170074ea59e.png)
3. After the services is running on the device, the device appears in Microsoft
3. After the services are running on the device, the device appears in Microsoft
Defender Security Center.
![Image of Microsoft Defender Security Center](images/df0c64001b9219cfbd10f8f81a273190.png)