fix issues

This commit is contained in:
Joey Caparas 2020-01-17 15:36:39 -08:00
parent 603e415f49
commit c9ef09f6c0
4 changed files with 4 additions and 3 deletions

View File

@ -86,4 +86,3 @@ DeviceNetworkEvents
## Related topics ## Related topics
- [Applying network protection with GP - policy CSP](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-defender#defender-enablenetworkprotection) - [Applying network protection with GP - policy CSP](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-defender#defender-enablenetworkprotection)
- [Protect your network](https://docs.microsoft.comwindows/security/threat-protection/windows-defender-exploit-guard/network-protection-exploit-guard)

View File

@ -133,7 +133,7 @@ structure required for your environment.
|--------|-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|---------------------| |--------|-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|---------------------|
| Tier 1 | **Local security operations team / IT team**<br>This team usually triages and investigates alerts contained within their geolocation and escalates to Tier 2 in cases where an active remediation is required. | | | Tier 1 | **Local security operations team / IT team**<br>This team usually triages and investigates alerts contained within their geolocation and escalates to Tier 2 in cases where an active remediation is required. | |
| Tier 2 | **Regional security operations team**<br>This team can see all the machines for their region and perform remediation actions. | View data | | Tier 2 | **Regional security operations team**<br>This team can see all the machines for their region and perform remediation actions. | View data |
| Tier 3 | **Global security operations team**<br>This team consists of security experts and are authorized to see and perform all actions from the portal. | View data <br> Alerts investigation Active remediation ctions <br> Alerts investigation Active remediation actions <br> Manage portal system settings <br> Manage security settings | | Tier 3 | **Global security operations team**<br>This team consists of security experts and are authorized to see and perform all actions from the portal. | View data <br> Alerts investigation Active remediation actions <br> Alerts investigation Active remediation actions <br> Manage portal system settings <br> Manage security settings |

View File

@ -375,7 +375,7 @@ To deploy the MMA with System Center Configuration Manager, follow the steps
below to utilize the provided batch files to onboard the systems. The CMD file below to utilize the provided batch files to onboard the systems. The CMD file
when executed, will require the system to copy files from a network share by the when executed, will require the system to copy files from a network share by the
System, the System will install MMA, Install the DependencyAgent, and configure System, the System will install MMA, Install the DependencyAgent, and configure
MMA for enrolment into the workspace. MMA for enrollment into the workspace.
1. In System Center Configuration Manager console, navigate to **Software 1. In System Center Configuration Manager console, navigate to **Software

View File

@ -100,6 +100,7 @@ Over time, new ways to manage security policy settings have been introduced, whi
</tbody> </tbody>
</table> </table>
## <a href="" id="bkmk-secpol"></a>Using the Local Security Policy snap-in ## <a href="" id="bkmk-secpol"></a>Using the Local Security Policy snap-in
The Local Security Policy snap-in (Secpol.msc) restricts the view of local policy objects to the following policies and features: The Local Security Policy snap-in (Secpol.msc) restricts the view of local policy objects to the following policies and features:
@ -209,6 +210,7 @@ The following table lists the features of the Security Configuration Manager.
</tbody> </tbody>
</table> </table>
### <a href="" id="bkmk-seccfgana"></a>Security Configuration and Analysis ### <a href="" id="bkmk-seccfgana"></a>Security Configuration and Analysis
Security Configuration and Analysis is an MMC snap-in for analyzing and configuring local system security. Security Configuration and Analysis is an MMC snap-in for analyzing and configuring local system security.