From ca6ff29e5e33556fe098e1fc24e84fcea1c6689f Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Tue, 19 Apr 2016 15:11:45 +1000 Subject: [PATCH] link updates --- ...e-privacy-windows-defender-advanced-threat-protection.md | 4 ++-- ...investigate-alerts-windows-advanced-threat-protection.md | 2 +- ...-overview-windows-defender-advanced-threat-protection.md | 3 ++- ...leshoot-onboarding-windows-advanced-threat-protection.md | 6 +++--- 4 files changed, 8 insertions(+), 7 deletions(-) diff --git a/windows/keep-secure/data-storage-privacy-windows-defender-advanced-threat-protection.md b/windows/keep-secure/data-storage-privacy-windows-defender-advanced-threat-protection.md index 3362a6187a..6e15ee83b6 100644 --- a/windows/keep-secure/data-storage-privacy-windows-defender-advanced-threat-protection.md +++ b/windows/keep-secure/data-storage-privacy-windows-defender-advanced-threat-protection.md @@ -23,7 +23,7 @@ Microsoft will collect and store information from your configured endpoints in a Information collected includes code file data (such as file names, sizes, and hashes), process data (running processes, hashes), registry data, network connection data (host IPs and ports), and machine details (such as GUIDs, names, and the operating system version). -Microsoft stores this data in a Microsoft Azure security-specific data store, and maintains it in accordance with Microsoft privacy practices and [Microsoft Trust Center policies](https://azure.microsoft.com/en-us/support/trust-center/43). +Microsoft stores this data in a Microsoft Azure security-specific data store, and maintains it in accordance with Microsoft privacy practices and [Microsoft Trust Center policies](https://azure.microsoft.com/en-us/support/trust-center/). Microsoft uses this data to: - Proactively identify indicators of attack (IOAs) in your organization @@ -34,7 +34,7 @@ We do not mine your data for advertising or for any other purpose other than pro ## Do I have flexibility to select where to store my data? -Yes. Data for this new service is stored in Microsoft Azure datacenters in the United States and European Union based on the geolocation properties you specify when you onboard to the service. This provides a convenient way to minimize compliance risk by actively selecting the geographic locations in which your data will reside. Microsoft will not transfer the data from the specified geolocation except in specific circumstances during the TAP stage (see the question [Is there a difference between how you handle data for the TAP program and for General Availability?](Is-there-a-difference-between-how-Microsoft-handles-data-for-the-TAP-program-and-foR-General-Availability?). If you have concerns about storage of data in a particular country, please contact [winatp@microsoft.com](mailto:winatp@microsoft.com). +Yes. Data for this new service is stored in Microsoft Azure datacenters in the United States and European Union based on the geolocation properties you specify when you onboard to the service. This provides a convenient way to minimize compliance risk by actively selecting the geographic locations in which your data will reside. Microsoft will not transfer the data from the specified geolocation except in specific circumstances during the TAP stage (see the question [Is there a difference between how you handle data for the TAP program and for General Availability?](#Is-there-a-difference-between-how-Microsoft-handles-data-for-the-TAP-program-and-foR-General-Availability?). If you have concerns about storage of data in a particular country, please contact [winatp@microsoft.com](mailto:winatp@microsoft.com). ## Is my data isolated from other customer data? Yes. The new cloud service provides appropriate segregation at a number of levels, such as isolation of files, configurations, and telemetry data. Aside from data access authentication, simply keeping different data appropriately segregated provides well-recognized protection. diff --git a/windows/keep-secure/investigate-alerts-windows-advanced-threat-protection.md b/windows/keep-secure/investigate-alerts-windows-advanced-threat-protection.md index 5e384fe297..dfd19d659a 100644 --- a/windows/keep-secure/investigate-alerts-windows-advanced-threat-protection.md +++ b/windows/keep-secure/investigate-alerts-windows-advanced-threat-protection.md @@ -44,7 +44,7 @@ The **Alerts related to this machine** section provides a list of alerts that ar The **Machine timeline** section provides a chronological view of the events and associated alerts that have been observed on the machine. -You'll see an aggregated view of alerts, a short description of the alert, details on the action taken, and which user ran the action. This helps you see significant activities or behaviors that occurred on a machine within your network in relation to a specific time frame. Several icons are used to identify various detections and their current state. For more information, see [Windows Defender ATP icons](icons-windows-atp.md). +You'll see an aggregated view of alerts, a short description of the alert, details on the action taken, and which user ran the action. This helps you see significant activities or behaviors that occurred on a machine within your network in relation to a specific time frame. Several icons are used to identify various detections and their current state. For more information, see [Windows Defender ATP icons](portal-overview-windows-defender-advanced-threat-protection.md#windows-defender-atp-icons). This feature also enables you to selectively drill down into a behavior or event that occurred within a given time period. You can view the temporal sequence of events that occurred on a machine over a specified time period. diff --git a/windows/keep-secure/portal-overview-windows-defender-advanced-threat-protection.md b/windows/keep-secure/portal-overview-windows-defender-advanced-threat-protection.md index a88759d18b..c64ddcd962 100644 --- a/windows/keep-secure/portal-overview-windows-defender-advanced-threat-protection.md +++ b/windows/keep-secure/portal-overview-windows-defender-advanced-threat-protection.md @@ -33,7 +33,7 @@ When you open the portal, you’ll see the main areas of the application: ![Windows Defender Advanced Threat Protection portal](images/portal.png) -You can navigate through the portal using the menu options available in all sections. Refer to Table 3 for a description of each section. +You can navigate through the portal using the menu options available in all sections. Refer to the following table for a description of each section. Area | Description :---|:--- @@ -58,5 +58,6 @@ Icon | Description ![Remediated icon](images/remediated-icon.png)| Remediated – Threat removed from the machine ![Not remediated icon](images/not-remediated-icon.png)| Not remediated – Threat not removed from the machine. + ### Related topic [Use the Windows Defender Advanced Threat Protection portal](use-windows-defender-advanced-threat-protection.md) \ No newline at end of file diff --git a/windows/keep-secure/troubleshoot-onboarding-windows-advanced-threat-protection.md b/windows/keep-secure/troubleshoot-onboarding-windows-advanced-threat-protection.md index 4f552589c8..7b18fe46bb 100644 --- a/windows/keep-secure/troubleshoot-onboarding-windows-advanced-threat-protection.md +++ b/windows/keep-secure/troubleshoot-onboarding-windows-advanced-threat-protection.md @@ -89,9 +89,9 @@ For example, if endpoints are not appearing in the **Machines view** list,you mi Message | Action :---|:--- -Windows Advanced Threat Protection Service failed to connect to server at `````` | Check the connection to the URL. See [Configure proxy and Internet connectivity](Configure-proxy-and-Internet-connectivity). | - Windows Advanced Threat Protection Service failed to read onboarding parameters. Failure code: `````` | Check that GP settings are correct and there are not settings impacting permissions in the policy. | -Windows Advanced Threat Protection Service failed to persist onboarding information. Failure code: `````` | Check that GP settings are correct and there are not settings impacting permissions in the policy.| +Windows Advanced Threat Protection Service failed to connect to server at `````` | Check the connection to the URL. See [Configure proxy and Internet connectivity](#configure-proxy-and-Internet-connectivity). + Windows Advanced Threat Protection Service failed to read onboarding parameters. Failure code: `````` | Check that GP settings are correct and there are not settings impacting permissions in the policy. +Windows Advanced Threat Protection Service failed to persist onboarding information. Failure code: `````` | Check that GP settings are correct and there are not settings impacting permissions in the policy. ## Related topics