mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-21 13:23:36 +00:00
Merge branch 'master' into bitlocker-csp-non-silent-scenario-update
This commit is contained in:
@ -137,8 +137,8 @@ The filter selections will resolve as an additional query term and the results w
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
## Public Advanced Hunting query GitHub repository
|
## Public Advanced hunting query GitHub repository
|
||||||
Check out the [Advanced Hunting repository](https://github.com/Microsoft/WindowsDefenderATP-Hunting-Queries). Contribute and use example queries shared by our customers.
|
Check out the [Advanced hunting repository](https://github.com/Microsoft/WindowsDefenderATP-Hunting-Queries). Contribute and use example queries shared by our customers.
|
||||||
|
|
||||||
|
|
||||||
>Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-advancedhunting-belowfoldlink)
|
>Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-advancedhunting-belowfoldlink)
|
||||||
|
@ -11,7 +11,7 @@ ms.pagetype: security
|
|||||||
ms.author: macapara
|
ms.author: macapara
|
||||||
author: mjcaparas
|
author: mjcaparas
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.date: 07/01/2018
|
ms.date: 11/19/2018
|
||||||
---
|
---
|
||||||
|
|
||||||
# Onboard machines to the Windows Defender ATP service
|
# Onboard machines to the Windows Defender ATP service
|
||||||
@ -128,7 +128,7 @@ If the **START_TYPE** is not set to **AUTO_START**, then you'll need to set the
|
|||||||
#### Internet connectivity
|
#### Internet connectivity
|
||||||
Internet connectivity on machines is required either directly or through proxy.
|
Internet connectivity on machines is required either directly or through proxy.
|
||||||
|
|
||||||
The Windows Defender ATP sensor can utilize a daily average bandwidth of 5MB to communicate with the Windows Defender ATP cloud service and report cyber data.
|
The Windows Defender ATP sensor can utilize a daily average bandwidth of 5MB to communicate with the Windows Defender ATP cloud service and report cyber data. One-off activities such as file uploads and investigation package collection are not included in this daily average bandwidth.
|
||||||
|
|
||||||
For more information on additional proxy configuration settings see, [Configure machine proxy and Internet connectivity settings](configure-proxy-internet-windows-defender-advanced-threat-protection.md) .
|
For more information on additional proxy configuration settings see, [Configure machine proxy and Internet connectivity settings](configure-proxy-internet-windows-defender-advanced-threat-protection.md) .
|
||||||
|
|
||||||
|
@ -11,7 +11,7 @@ ms.pagetype: security
|
|||||||
ms.author: macapara
|
ms.author: macapara
|
||||||
author: mjcaparas
|
author: mjcaparas
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.date: 10/10/2018
|
ms.date: 11/19/2018
|
||||||
---
|
---
|
||||||
|
|
||||||
# Onboard previous versions of Windows
|
# Onboard previous versions of Windows
|
||||||
@ -46,12 +46,13 @@ Windows Defender ATP integrates with System Center Endpoint Protection to provid
|
|||||||
The following steps are required to enable this integration:
|
The following steps are required to enable this integration:
|
||||||
- Install the [January 2017 anti-malware platform update for Endpoint Protection clients](https://support.microsoft.com/help/3209361/january-2017-anti-malware-platform-update-for-endpoint-protection-clie)
|
- Install the [January 2017 anti-malware platform update for Endpoint Protection clients](https://support.microsoft.com/help/3209361/january-2017-anti-malware-platform-update-for-endpoint-protection-clie)
|
||||||
- Configure the SCEP client Cloud Protection Service membership to the **Advanced** setting
|
- Configure the SCEP client Cloud Protection Service membership to the **Advanced** setting
|
||||||
|
- Configure your network to allow connections to the Windows Defender Antivirus cloud. For more information, see [Allow connections to the Windows Defender Antivirus cloud](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-antivirus/configure-network-connections-windows-defender-antivirus#allow-connections-to-the-windows-defender-antivirus-cloud)
|
||||||
|
|
||||||
## Install and configure Microsoft Monitoring Agent (MMA) to report sensor data to Windows Defender ATP
|
## Install and configure Microsoft Monitoring Agent (MMA) to report sensor data to Windows Defender ATP
|
||||||
|
|
||||||
### Before you begin
|
### Before you begin
|
||||||
Review the following details to verify minimum system requirements:
|
Review the following details to verify minimum system requirements:
|
||||||
- Install the [February monthly update rollup](https://support.microsoft.com/help/4074598/windows-7-update-kb4074598) or a later monthly update rollup.
|
- Install the [February monthly update rollup](https://support.microsoft.com/help/4074598/windows-7-update-kb4074598)
|
||||||
|
|
||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
>Only applicable for Windows 7 SP1 Enterprise and Windows 7 SP1 Pro.
|
>Only applicable for Windows 7 SP1 Enterprise and Windows 7 SP1 Pro.
|
||||||
@ -67,9 +68,9 @@ Review the following details to verify minimum system requirements:
|
|||||||
>Only applicable for Windows 7 SP1 Enterprise and Windows 7 SP1 Pro.
|
>Only applicable for Windows 7 SP1 Enterprise and Windows 7 SP1 Pro.
|
||||||
>Don't install .NET framework 4.0.x, since it will negate the above installation.
|
>Don't install .NET framework 4.0.x, since it will negate the above installation.
|
||||||
|
|
||||||
|
- Meet the Azure Log Analytics agent minimum system requirements. For more information, see [Collect data from computers in you environment with Log Analytics](https://docs.microsoft.com/en-us/azure/log-analytics/log-analytics-concept-hybrid#prerequisites)
|
||||||
|
|
||||||
|
|
||||||
- Meet the Azure Log Analytics agent minimum system requirements. For more information, see [Collect data from computers in your environment with Log Analytics](https://docs.microsoft.com/azure/log-analytics/log-analytics-concept-hybrid#prerequisites)
|
|
||||||
|
|
||||||
1. Download the agent setup file: [Windows 64-bit agent](https://go.microsoft.com/fwlink/?LinkId=828603) or [Windows 32-bit agent](https://go.microsoft.com/fwlink/?LinkId=828604).
|
1. Download the agent setup file: [Windows 64-bit agent](https://go.microsoft.com/fwlink/?LinkId=828603) or [Windows 32-bit agent](https://go.microsoft.com/fwlink/?LinkId=828604).
|
||||||
|
|
||||||
@ -89,7 +90,7 @@ Once completed, you should see onboarded endpoints in the portal within an hour.
|
|||||||
|
|
||||||
### Configure proxy and Internet connectivity settings
|
### Configure proxy and Internet connectivity settings
|
||||||
|
|
||||||
- Each Windows endpoint must be able to connect to the Internet using HTTPS. This connection can be direct, using a proxy, or through the [OMS Gateway](https://docs.microsoft.com/azure/log-analytics/log-analytics-oms-gateway).
|
- Each Windows endpoint must be able to connect to the Internet using HTTPS. This connection can be direct, using a proxy, or through the [OMS Gateway](https://docs.microsoft.com/en-us/azure/log-analytics/log-analytics-oms-gateway).
|
||||||
- If a proxy or firewall is blocking all traffic by default and allowing only specific domains through or HTTPS scanning (SSL inspection) is enabled, make sure that the following URLs are white-listed to permit communication with Windows Defender ATP service:
|
- If a proxy or firewall is blocking all traffic by default and allowing only specific domains through or HTTPS scanning (SSL inspection) is enabled, make sure that the following URLs are white-listed to permit communication with Windows Defender ATP service:
|
||||||
|
|
||||||
Agent Resource | Ports
|
Agent Resource | Ports
|
||||||
|
@ -11,7 +11,7 @@ ms.pagetype: security
|
|||||||
ms.author: macapara
|
ms.author: macapara
|
||||||
author: mjcaparas
|
author: mjcaparas
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.date: 10/26/2018
|
ms.date: 11/19/2018
|
||||||
---
|
---
|
||||||
|
|
||||||
# Pull Windows Defender ATP alerts using REST API
|
# Pull Windows Defender ATP alerts using REST API
|
||||||
@ -106,6 +106,7 @@ DateTime?sinceTimeUtc | string | Defines the lower time bound alerts are retriev
|
|||||||
DateTime?untilTimeUtc | string | Defines the upper time bound alerts are retrieved. <br> The time range will be: from `sinceTimeUtc` time to `untilTimeUtc` time. <br><br> **NOTE**: When not specified, the default value will be the current time.
|
DateTime?untilTimeUtc | string | Defines the upper time bound alerts are retrieved. <br> The time range will be: from `sinceTimeUtc` time to `untilTimeUtc` time. <br><br> **NOTE**: When not specified, the default value will be the current time.
|
||||||
string ago | string | Pulls alerts in the following time range: from `(current_time - ago)` time to `current_time` time. <br><br> Value should be set according to **ISO 8601** duration format <br> E.g. `ago=PT10M` will pull alerts received in the last 10 minutes.
|
string ago | string | Pulls alerts in the following time range: from `(current_time - ago)` time to `current_time` time. <br><br> Value should be set according to **ISO 8601** duration format <br> E.g. `ago=PT10M` will pull alerts received in the last 10 minutes.
|
||||||
int?limit | int | Defines the number of alerts to be retrieved. Most recent alerts will be retrieved based on the number defined.<br><br> **NOTE**: When not specified, all alerts available in the time range will be retrieved.
|
int?limit | int | Defines the number of alerts to be retrieved. Most recent alerts will be retrieved based on the number defined.<br><br> **NOTE**: When not specified, all alerts available in the time range will be retrieved.
|
||||||
|
machinegroups | String | Specifies machine groups to pull alerts from . <br><br> **NOTE**: When not specified, alerts from all machine groups will be retrieved. <br><br> Example: <br><br> ```https://wdatp-alertexporter-eu.securitycenter.windows.com/api/Alerts/?machinegroups=UKMachines&machinegroups=FranceMachines```
|
||||||
|
|
||||||
### Request example
|
### Request example
|
||||||
The following example demonstrates how to retrieve all the alerts in your organization.
|
The following example demonstrates how to retrieve all the alerts in your organization.
|
||||||
|
@ -158,6 +158,9 @@ Outlook will not be allowed to create child processes.
|
|||||||
|
|
||||||
This is a typical malware behavior, especially for macro-based attacks that attempt to use Office apps to launch or download malicious executables.
|
This is a typical malware behavior, especially for macro-based attacks that attempt to use Office apps to launch or download malicious executables.
|
||||||
|
|
||||||
|
>[!NOTE]
|
||||||
|
>This rule applies to Outlook only.
|
||||||
|
|
||||||
### Rule: Block Adobe Reader from creating child processes
|
### Rule: Block Adobe Reader from creating child processes
|
||||||
|
|
||||||
This rule blocks Adobe Reader from creating child processes.
|
This rule blocks Adobe Reader from creating child processes.
|
||||||
|
Reference in New Issue
Block a user