mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-14 14:27:22 +00:00
fix issues
This commit is contained in:
parent
603e415f49
commit
c9ef09f6c0
@ -86,4 +86,3 @@ DeviceNetworkEvents
|
|||||||
|
|
||||||
## Related topics
|
## Related topics
|
||||||
- [Applying network protection with GP - policy CSP](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-defender#defender-enablenetworkprotection)
|
- [Applying network protection with GP - policy CSP](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-defender#defender-enablenetworkprotection)
|
||||||
- [Protect your network](https://docs.microsoft.comwindows/security/threat-protection/windows-defender-exploit-guard/network-protection-exploit-guard)
|
|
@ -133,7 +133,7 @@ structure required for your environment.
|
|||||||
|--------|-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|---------------------|
|
|--------|-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|---------------------|
|
||||||
| Tier 1 | **Local security operations team / IT team**<br>This team usually triages and investigates alerts contained within their geolocation and escalates to Tier 2 in cases where an active remediation is required. | |
|
| Tier 1 | **Local security operations team / IT team**<br>This team usually triages and investigates alerts contained within their geolocation and escalates to Tier 2 in cases where an active remediation is required. | |
|
||||||
| Tier 2 | **Regional security operations team**<br>This team can see all the machines for their region and perform remediation actions. | View data |
|
| Tier 2 | **Regional security operations team**<br>This team can see all the machines for their region and perform remediation actions. | View data |
|
||||||
| Tier 3 | **Global security operations team**<br>This team consists of security experts and are authorized to see and perform all actions from the portal. | View data <br> Alerts investigation Active remediation ctions <br> Alerts investigation Active remediation actions <br> Manage portal system settings <br> Manage security settings |
|
| Tier 3 | **Global security operations team**<br>This team consists of security experts and are authorized to see and perform all actions from the portal. | View data <br> Alerts investigation Active remediation actions <br> Alerts investigation Active remediation actions <br> Manage portal system settings <br> Manage security settings |
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
@ -375,7 +375,7 @@ To deploy the MMA with System Center Configuration Manager, follow the steps
|
|||||||
below to utilize the provided batch files to onboard the systems. The CMD file
|
below to utilize the provided batch files to onboard the systems. The CMD file
|
||||||
when executed, will require the system to copy files from a network share by the
|
when executed, will require the system to copy files from a network share by the
|
||||||
System, the System will install MMA, Install the DependencyAgent, and configure
|
System, the System will install MMA, Install the DependencyAgent, and configure
|
||||||
MMA for enrolment into the workspace.
|
MMA for enrollment into the workspace.
|
||||||
|
|
||||||
|
|
||||||
1. In System Center Configuration Manager console, navigate to **Software
|
1. In System Center Configuration Manager console, navigate to **Software
|
||||||
|
@ -100,6 +100,7 @@ Over time, new ways to manage security policy settings have been introduced, whi
|
|||||||
</tbody>
|
</tbody>
|
||||||
</table>
|
</table>
|
||||||
|
|
||||||
|
|
||||||
## <a href="" id="bkmk-secpol"></a>Using the Local Security Policy snap-in
|
## <a href="" id="bkmk-secpol"></a>Using the Local Security Policy snap-in
|
||||||
|
|
||||||
The Local Security Policy snap-in (Secpol.msc) restricts the view of local policy objects to the following policies and features:
|
The Local Security Policy snap-in (Secpol.msc) restricts the view of local policy objects to the following policies and features:
|
||||||
@ -209,6 +210,7 @@ The following table lists the features of the Security Configuration Manager.
|
|||||||
</tbody>
|
</tbody>
|
||||||
</table>
|
</table>
|
||||||
|
|
||||||
|
|
||||||
### <a href="" id="bkmk-seccfgana"></a>Security Configuration and Analysis
|
### <a href="" id="bkmk-seccfgana"></a>Security Configuration and Analysis
|
||||||
|
|
||||||
Security Configuration and Analysis is an MMC snap-in for analyzing and configuring local system security.
|
Security Configuration and Analysis is an MMC snap-in for analyzing and configuring local system security.
|
||||||
|
Loading…
x
Reference in New Issue
Block a user