mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-13 13:57:22 +00:00
link updates
This commit is contained in:
parent
c9e454cfff
commit
ca6ff29e5e
@ -23,7 +23,7 @@ Microsoft will collect and store information from your configured endpoints in a
|
|||||||
|
|
||||||
Information collected includes code file data (such as file names, sizes, and hashes), process data (running processes, hashes), registry data, network connection data (host IPs and ports), and machine details (such as GUIDs, names, and the operating system version).
|
Information collected includes code file data (such as file names, sizes, and hashes), process data (running processes, hashes), registry data, network connection data (host IPs and ports), and machine details (such as GUIDs, names, and the operating system version).
|
||||||
|
|
||||||
Microsoft stores this data in a Microsoft Azure security-specific data store, and maintains it in accordance with Microsoft privacy practices and [Microsoft Trust Center policies](https://azure.microsoft.com/en-us/support/trust-center/43).
|
Microsoft stores this data in a Microsoft Azure security-specific data store, and maintains it in accordance with Microsoft privacy practices and [Microsoft Trust Center policies](https://azure.microsoft.com/en-us/support/trust-center/).
|
||||||
|
|
||||||
Microsoft uses this data to:
|
Microsoft uses this data to:
|
||||||
- Proactively identify indicators of attack (IOAs) in your organization
|
- Proactively identify indicators of attack (IOAs) in your organization
|
||||||
@ -34,7 +34,7 @@ We do not mine your data for advertising or for any other purpose other than pro
|
|||||||
|
|
||||||
## Do I have flexibility to select where to store my data?
|
## Do I have flexibility to select where to store my data?
|
||||||
|
|
||||||
Yes. Data for this new service is stored in Microsoft Azure datacenters in the United States and European Union based on the geolocation properties you specify when you onboard to the service. This provides a convenient way to minimize compliance risk by actively selecting the geographic locations in which your data will reside. Microsoft will not transfer the data from the specified geolocation except in specific circumstances during the TAP stage (see the question [Is there a difference between how you handle data for the TAP program and for General Availability?](Is-there-a-difference-between-how-Microsoft-handles-data-for-the-TAP-program-and-foR-General-Availability?). If you have concerns about storage of data in a particular country, please contact [winatp@microsoft.com](mailto:winatp@microsoft.com).
|
Yes. Data for this new service is stored in Microsoft Azure datacenters in the United States and European Union based on the geolocation properties you specify when you onboard to the service. This provides a convenient way to minimize compliance risk by actively selecting the geographic locations in which your data will reside. Microsoft will not transfer the data from the specified geolocation except in specific circumstances during the TAP stage (see the question [Is there a difference between how you handle data for the TAP program and for General Availability?](#Is-there-a-difference-between-how-Microsoft-handles-data-for-the-TAP-program-and-foR-General-Availability?). If you have concerns about storage of data in a particular country, please contact [winatp@microsoft.com](mailto:winatp@microsoft.com).
|
||||||
|
|
||||||
## Is my data isolated from other customer data?
|
## Is my data isolated from other customer data?
|
||||||
Yes. The new cloud service provides appropriate segregation at a number of levels, such as isolation of files, configurations, and telemetry data. Aside from data access authentication, simply keeping different data appropriately segregated provides well-recognized protection.
|
Yes. The new cloud service provides appropriate segregation at a number of levels, such as isolation of files, configurations, and telemetry data. Aside from data access authentication, simply keeping different data appropriately segregated provides well-recognized protection.
|
||||||
|
@ -44,7 +44,7 @@ The **Alerts related to this machine** section provides a list of alerts that ar
|
|||||||
|
|
||||||
The **Machine timeline** section provides a chronological view of the events and associated alerts that have been observed on the machine.
|
The **Machine timeline** section provides a chronological view of the events and associated alerts that have been observed on the machine.
|
||||||
|
|
||||||
You'll see an aggregated view of alerts, a short description of the alert, details on the action taken, and which user ran the action. This helps you see significant activities or behaviors that occurred on a machine within your network in relation to a specific time frame. Several icons are used to identify various detections and their current state. For more information, see [Windows Defender ATP icons](icons-windows-atp.md).
|
You'll see an aggregated view of alerts, a short description of the alert, details on the action taken, and which user ran the action. This helps you see significant activities or behaviors that occurred on a machine within your network in relation to a specific time frame. Several icons are used to identify various detections and their current state. For more information, see [Windows Defender ATP icons](portal-overview-windows-defender-advanced-threat-protection.md#windows-defender-atp-icons).
|
||||||
|
|
||||||
This feature also enables you to selectively drill down into a behavior or event that occurred within a given time period. You can view the temporal sequence of events that occurred on a machine over a specified time period.
|
This feature also enables you to selectively drill down into a behavior or event that occurred within a given time period. You can view the temporal sequence of events that occurred on a machine over a specified time period.
|
||||||
|
|
||||||
|
@ -33,7 +33,7 @@ When you open the portal, you’ll see the main areas of the application:
|
|||||||
|
|
||||||

|

|
||||||
|
|
||||||
You can navigate through the portal using the menu options available in all sections. Refer to Table 3 for a description of each section.
|
You can navigate through the portal using the menu options available in all sections. Refer to the following table for a description of each section.
|
||||||
|
|
||||||
Area | Description
|
Area | Description
|
||||||
:---|:---
|
:---|:---
|
||||||
@ -58,5 +58,6 @@ Icon | Description
|
|||||||
| Remediated – Threat removed from the machine
|
| Remediated – Threat removed from the machine
|
||||||
| Not remediated – Threat not removed from the machine.
|
| Not remediated – Threat not removed from the machine.
|
||||||
|
|
||||||
|
|
||||||
### Related topic
|
### Related topic
|
||||||
[Use the Windows Defender Advanced Threat Protection portal](use-windows-defender-advanced-threat-protection.md)
|
[Use the Windows Defender Advanced Threat Protection portal](use-windows-defender-advanced-threat-protection.md)
|
@ -89,9 +89,9 @@ For example, if endpoints are not appearing in the **Machines view** list,you mi
|
|||||||
|
|
||||||
Message | Action
|
Message | Action
|
||||||
:---|:---
|
:---|:---
|
||||||
Windows Advanced Threat Protection Service failed to connect to server at ```<variable>``` | Check the connection to the URL. See [Configure proxy and Internet connectivity](Configure-proxy-and-Internet-connectivity). |
|
Windows Advanced Threat Protection Service failed to connect to server at ```<variable>``` | Check the connection to the URL. See [Configure proxy and Internet connectivity](#configure-proxy-and-Internet-connectivity).
|
||||||
Windows Advanced Threat Protection Service failed to read onboarding parameters. Failure code: ```<variable>``` | Check that GP settings are correct and there are not settings impacting permissions in the policy. |
|
Windows Advanced Threat Protection Service failed to read onboarding parameters. Failure code: ```<variable>``` | Check that GP settings are correct and there are not settings impacting permissions in the policy.
|
||||||
Windows Advanced Threat Protection Service failed to persist onboarding information. Failure code: ```<variable>``` | Check that GP settings are correct and there are not settings impacting permissions in the policy.|
|
Windows Advanced Threat Protection Service failed to persist onboarding information. Failure code: ```<variable>``` | Check that GP settings are correct and there are not settings impacting permissions in the policy.
|
||||||
|
|
||||||
|
|
||||||
## Related topics
|
## Related topics
|
||||||
|
Loading…
x
Reference in New Issue
Block a user