mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-13 22:07:22 +00:00
Merge branch 'master' into av-relnotes
This commit is contained in:
commit
ddc1f0f2d8
@ -0,0 +1,12 @@
|
||||
<!-- This file is generated automatically each week. Changes made to this file will be overwritten.-->
|
||||
|
||||
|
||||
|
||||
## Week of October 26, 2020
|
||||
|
||||
|
||||
| Published On |Topic title | Change |
|
||||
|------|------------|--------|
|
||||
| 10/27/2020 | [Add unsigned app to code integrity policy (Windows 10)](/microsoft-store/add-unsigned-app-to-code-integrity-policy) | modified |
|
||||
| 10/27/2020 | [Device Guard signing (Windows 10)](/microsoft-store/device-guard-signing-portal) | modified |
|
||||
| 10/27/2020 | [Sign code integrity policy with Device Guard signing (Windows 10)](/microsoft-store/sign-code-integrity-policy-with-device-guard-signing) | modified |
|
@ -119,6 +119,7 @@ Requirements:
|
||||
> [!NOTE]
|
||||
> In Windows 10, version 1903, the MDM.admx file was updated to include an option to select which credential is used to enroll the device. **Device Credential** is a new option that will only have an effect on clients that have installed Windows 10, version 1903 or later.
|
||||
> The default behavior for older releases is to revert to **User Credential**.
|
||||
> **Device Credential** is not supported for enrollment type when you have a ConfigMgr Agent on your device.
|
||||
|
||||
When a group policy refresh occurs on the client, a task is created and scheduled to run every 5 minutes for the duration of one day. The task is called " Schedule created by enrollment client for automatically enrolling in MDM from AAD."
|
||||
|
||||
|
@ -86,7 +86,6 @@ ms.date: 10/08/2020
|
||||
- [Search/AllowSearchToUseLocation](policy-csp-search.md#search-allowsearchtouselocation)
|
||||
- [Security/AllowAddProvisioningPackage](policy-csp-security.md#security-allowaddprovisioningpackage)
|
||||
- [Security/AllowRemoveProvisioningPackage](policy-csp-security.md#security-allowremoveprovisioningpackage)
|
||||
- [Security/RequireDeviceEncryption](policy-csp-security.md#security-requiredeviceencryption)
|
||||
- [Settings/AllowDateTime](policy-csp-settings.md#settings-allowdatetime)
|
||||
- [Settings/AllowVPN](policy-csp-settings.md#settings-allowvpn)
|
||||
- [Speech/AllowSpeechModelUpdate](policy-csp-speech.md#speech-allowspeechmodelupdate)
|
||||
|
@ -2,14 +2,14 @@
|
||||
title: VPNv2 CSP
|
||||
description: Learn how the VPNv2 configuration service provider (CSP) allows the mobile device management (MDM) server to configure the VPN profile of the device.
|
||||
ms.assetid: 51ADA62E-1EE5-4F15-B2AD-52867F5B2AD2
|
||||
ms.reviewer:
|
||||
ms.reviewer: pesmith
|
||||
manager: dansimp
|
||||
ms.author: dansimp
|
||||
ms.topic: article
|
||||
ms.prod: w10
|
||||
ms.technology: windows
|
||||
author: manikadhiman
|
||||
ms.date: 11/01/2017
|
||||
ms.date: 10/30/2020
|
||||
---
|
||||
|
||||
# VPNv2 CSP
|
||||
@ -19,19 +19,19 @@ The VPNv2 configuration service provider allows the mobile device management (MD
|
||||
|
||||
Here are the requirements for this CSP:
|
||||
|
||||
- VPN configuration commands must be wrapped in an Atomic block in SyncML.
|
||||
- For best results, configure your VPN certificates first before pushing down VPN profiles to devices. If you are using Windows Information Protection (WIP) (formerly known as Enterprise Data Protection), then you should configure VPN first before you configure WIP policies.
|
||||
- Instead of changing individual properties, follow these steps to make any changes:
|
||||
- VPN configuration commands must be wrapped in an Atomic block in SyncML.
|
||||
- For best results, configure your VPN certificates first before pushing down VPN profiles to devices. If you are using Windows Information Protection (WIP) (formerly known as Enterprise Data Protection), then you should configure VPN first before you configure WIP policies.
|
||||
- Instead of changing individual properties, follow these steps to make any changes:
|
||||
|
||||
- Send a Delete command for the ProfileName to delete the entire profile.
|
||||
- Send the entire profile again with new values wrapped in an Atomic block.
|
||||
- Send a Delete command for the ProfileName to delete the entire profile.
|
||||
- Send the entire profile again with new values wrapped in an Atomic block.
|
||||
|
||||
In certain conditions you can change some properties directly, but we do not recommend it.
|
||||
|
||||
The XSDs for all EAP methods are shipped in the box and can be found at the following locations:
|
||||
|
||||
- C:\\Windows\\schemas\\EAPHost
|
||||
- C:\\Windows\\schemas\\EAPMethods
|
||||
- `C:\\Windows\\schemas\\EAPHost`
|
||||
- `C:\\Windows\\schemas\\EAPMethods`
|
||||
|
||||
The following diagram shows the VPNv2 configuration service provider in tree format.
|
||||
|
||||
@ -45,7 +45,8 @@ Unique alpha numeric identifier for the profile. The profile name must not inclu
|
||||
|
||||
Supported operations include Get, Add, and Delete.
|
||||
|
||||
> **Note** If the profile name has a space or other non-alphanumeric character, it must be properly escaped according to the URL encoding standard.
|
||||
> [!NOTE]
|
||||
> If the profile name has a space or other non-alphanumeric character, it must be properly escaped according to the URL encoding standard.
|
||||
|
||||
<a href="" id="vpnv2-profilename-apptriggerlist"></a>**VPNv2/**<em>ProfileName</em>**/AppTriggerList**
|
||||
Optional node. List of applications set to trigger the VPN. If any of these apps are launched and the VPN profile is currently the active profile, this VPN profile will be triggered to connect.
|
||||
@ -64,8 +65,8 @@ App identity, which is either an app’s package family name or file path. The t
|
||||
<a href="" id="vpnv2-profilename-apptriggerlist-apptriggerrowid-app-type"></a>**VPNv2/**<em>ProfileName</em>**/AppTriggerList/**<em>appTriggerRowId</em>**/App/Type**
|
||||
Returns the type of **App/Id**. This value can be either of the following:
|
||||
|
||||
- PackageFamilyName - When this is returned, the App/Id value represents the PackageFamilyName of the app. The PackageFamilyName is the unique name of the Microsoft Store application.
|
||||
- FilePath - When this is returned, the App/Id value represents the full file path of the app. For example, `C:\Windows\System\Notepad.exe`.
|
||||
- PackageFamilyName - When this is returned, the App/Id value represents the PackageFamilyName of the app. The PackageFamilyName is the unique name of the Microsoft Store application.
|
||||
- FilePath - When this is returned, the App/Id value represents the full file path of the app. For example, `C:\Windows\System\Notepad.exe`.
|
||||
|
||||
Value type is chr. Supported operation is Get.
|
||||
|
||||
@ -99,8 +100,8 @@ Value type is int. Supported operations include Get, Add, Replace, and Delete.
|
||||
<a href="" id="vpnv2-profilename-routelist-routerowid-exclusionroute"></a>**VPNv2/**<em>ProfileName</em>**/RouteList/**<em>routeRowId</em>**/ExclusionRoute**
|
||||
Added in Windows 10, version 1607. A boolean value that specifies if the route being added should point to the VPN Interface or the Physical Interface as the Gateway. Valid values:
|
||||
|
||||
- False (default) - This route will direct traffic over the VPN
|
||||
- True - This route will direct traffic over the physical interface.
|
||||
- False (default) - This route will direct traffic over the VPN
|
||||
- True - This route will direct traffic over the physical interface.
|
||||
|
||||
Supported operations include Get, Add, Replace, and Delete.
|
||||
|
||||
@ -117,16 +118,16 @@ Supported operations include Get, Add, Replace, and Delete.
|
||||
<a href="" id="vpnv2-profilename-domainnameinformationlist-dnirowid-domainname"></a>**VPNv2/**<em>ProfileName</em>**/DomainNameInformationList/**<em>dniRowId</em>**/DomainName**
|
||||
Used to indicate the namespace to which the policy applies. When a Name query is issued, the DNS client compares the name in the query to all of the namespaces under DomainNameInformationList to find a match. This parameter can be one of the following types:
|
||||
|
||||
- FQDN - Fully qualified domain name
|
||||
- Suffix - A domain suffix that will be appended to the shortname query for DNS resolution. To specify a suffix, prepend a **.** to the DNS suffix.
|
||||
- FQDN - Fully qualified domain name
|
||||
- Suffix - A domain suffix that will be appended to the shortname query for DNS resolution. To specify a suffix, prepend a **.** to the DNS suffix.
|
||||
|
||||
Value type is chr. Supported operations include Get, Add, Replace, and Delete.
|
||||
|
||||
<a href="" id="vpnv2-profilename-domainnameinformationlist-dnirowid-domainnametype"></a>**VPNv2/**<em>ProfileName</em>**/DomainNameInformationList/**<em>dniRowId</em>**/DomainNameType**
|
||||
Returns the namespace type. This value can be one of the following:
|
||||
|
||||
- FQDN - If the DomainName was not prepended with a **.** and applies only to the fully qualified domain name (FQDN) of a specified host.
|
||||
- Suffix - If the DomainName was prepended with a **.** and applies to the specified namespace, all records in that namespace, and all subdomains.
|
||||
- FQDN - If the DomainName was not prepended with a **.** and applies only to the fully qualified domain name (FQDN) of a specified host.
|
||||
- Suffix - If the DomainName was prepended with a **.** and applies to the specified namespace, all records in that namespace, and all subdomains.
|
||||
|
||||
Value type is chr. Supported operation is Get.
|
||||
|
||||
@ -138,9 +139,8 @@ Value type is chr. Supported operations include Get, Add, Replace, and Delete.
|
||||
<a href="" id="vpnv2-profilename-domainnameinformationlist-dnirowid-webproxyservers"></a>**VPNv2/**<em>ProfileName</em>**/DomainNameInformationList/**<em>dniRowId</em>**/WebProxyServers**
|
||||
Optional. Web Proxy Server IP address if you are redirecting traffic through your intranet.
|
||||
|
||||
> **Note** Currently only one web proxy server is supported.
|
||||
|
||||
|
||||
> [!NOTE]
|
||||
> Currently only one web proxy server is supported.
|
||||
|
||||
Value type is chr. Supported operations include Get, Add, Replace, and Delete.
|
||||
|
||||
@ -166,9 +166,8 @@ Supported operations include Get, Add, Replace, and Delete.
|
||||
<a href="" id="vpnv2-profilename-trafficfilterlist"></a>**VPNv2/**<em>ProfileName</em>**/TrafficFilterList**
|
||||
An optional node that specifies a list of rules. Only traffic that matches these rules can be sent via the VPN Interface.
|
||||
|
||||
> **Note** Once a TrafficFilterList is added, all traffic are blocked other than the ones matching the rules.
|
||||
|
||||
|
||||
> [!NOTE]
|
||||
> Once a TrafficFilterList is added, all traffic are blocked other than the ones matching the rules.
|
||||
|
||||
When adding multiple rules, each rule operates based on an OR with the other rules. Within each rule, each property operates based on an AND with each other.
|
||||
|
||||
@ -183,9 +182,9 @@ App identity for the app-based traffic filter.
|
||||
|
||||
The value for this node can be one of the following:
|
||||
|
||||
- PackageFamilyName - This App/Id value represents the PackageFamilyName of the app. The PackageFamilyName is the unique name of a Microsoft Store application.
|
||||
- FilePath - This App/Id value represents the full file path of the app. For example, `C:\Windows\System\Notepad.exe`.
|
||||
- SYSTEM – This value enables Kernel Drivers to send traffic through VPN (for example, PING or SMB).
|
||||
- PackageFamilyName - This App/Id value represents the PackageFamilyName of the app. The PackageFamilyName is the unique name of a Microsoft Store application.
|
||||
- FilePath - This App/Id value represents the full file path of the app. For example, `C:\Windows\System\Notepad.exe`.
|
||||
- SYSTEM – This value enables Kernel Drivers to send traffic through VPN (for example, PING or SMB).
|
||||
|
||||
Value type is chr. Supported operations include Get, Add, Replace, and Delete.
|
||||
|
||||
@ -205,18 +204,16 @@ Value type is int. Supported operations include Get, Add, Replace, and Delete.
|
||||
<a href="" id="vpnv2-profilename-trafficfilterlist-trafficfilterid-localportranges"></a>**VPNv2/**<em>ProfileName</em>**/TrafficFilterList/**<em>trafficFilterId</em>**/LocalPortRanges**
|
||||
A list of comma separated values specifying local port ranges to allow. For example, `100-120, 200, 300-320`.
|
||||
|
||||
> **Note** Ports are only valid when the protocol is set to TCP=6 or UDP=17.
|
||||
|
||||
|
||||
> [!NOTE]
|
||||
> Ports are only valid when the protocol is set to TCP=6 or UDP=17.
|
||||
|
||||
Value type is chr. Supported operations include Get, Add, Replace, and Delete.
|
||||
|
||||
<a href="" id="vpnv2-profilename-trafficfilterlist-trafficfilterid-remoteportranges"></a>**VPNv2/**<em>ProfileName</em>**/TrafficFilterList/**<em>trafficFilterId</em>**/RemotePortRanges**
|
||||
A list of comma separated values specifying remote port ranges to allow. For example, `100-120, 200, 300-320`.
|
||||
|
||||
> **Note** Ports are only valid when the protocol is set to TCP=6 or UDP=17.
|
||||
|
||||
|
||||
> [!NOTE]
|
||||
> Ports are only valid when the protocol is set to TCP=6 or UDP=17.
|
||||
|
||||
Value type is chr. Supported operations include Get, Add, Replace, and Delete.
|
||||
|
||||
@ -233,13 +230,23 @@ Value type is chr. Supported operations include Get, Add, Replace, and Delete.
|
||||
<a href="" id="vpnv2-profilename-trafficfilterlist-trafficfilterid-routingpolicytype"></a>**VPNv2/**<em>ProfileName</em>**/TrafficFilterList/**<em>trafficFilterId</em>**/RoutingPolicyType**
|
||||
Specifies the routing policy if an App or Claims type is used in the traffic filter. The scope of this property is for this traffic filter rule alone. The value can be one of the following:
|
||||
|
||||
- SplitTunnel - For this traffic filter rule, only the traffic meant for the VPN interface (as determined by the networking stack) goes over the interface. Internet traffic can continue to go over the other interfaces.
|
||||
- ForceTunnel - For this traffic rule all IP traffic must go through the VPN Interface only.
|
||||
- SplitTunnel - For this traffic filter rule, only the traffic meant for the VPN interface (as determined by the networking stack) goes over the interface. Internet traffic can continue to go over the other interfaces.
|
||||
- ForceTunnel - For this traffic rule all IP traffic must go through the VPN Interface only.
|
||||
|
||||
This is only applicable for App ID based Traffic Filter rules.
|
||||
|
||||
Value type is chr. Supported operations include Get, Add, Replace, and Delete.
|
||||
|
||||
<a href="" id="vpnv2-profilename-trafficfilterlist-trafficfilterid-direction"></a>**VPNv2/**<em>ProfileName</em>**/TrafficFilterList/**<em>trafficFilterId</em>**/Direction**
|
||||
Added in Windows 10, version 2004. Specifies the traffic direction to apply this policy to. Default is Outbound. The value can be one of the following:
|
||||
|
||||
- Outbound - The rule applies to all outbound traffic
|
||||
- nbound - The rule applies to all inbound traffic
|
||||
|
||||
If no inbound filter is provided, then by default all unsolicated inbound traffic will be blocked.
|
||||
|
||||
Value type is chr. Supported operations include Get, Add, Replace, and Delete.
|
||||
|
||||
<a href="" id="vpnv2-profilename-edpmodeid"></a>**VPNv2/**<em>ProfileName</em>**/EdpModeId**
|
||||
Enterprise ID, which is required for connecting this VPN profile with an WIP policy. When this is set, the networking stack looks for this Enterprise ID in the app token to determine if the traffic is allowed to go over the VPN. If the profile is active, it also automatically triggers the VPN to connect. We recommend having only one such profile per device.
|
||||
|
||||
@ -255,21 +262,22 @@ Supported operations include Get, Add, Replace, and Delete.
|
||||
<a href="" id="vpnv2-profilename-alwayson"></a>**VPNv2/**<em>ProfileName</em>**/AlwaysOn**
|
||||
An optional flag to enable Always On mode. This will automatically connect the VPN at sign-in and will stay connected until the user manually disconnects.
|
||||
|
||||
> **Note** Always On only works for the active profile. The first profile provisioned that can be auto triggered will automatically be set as active.
|
||||
> [!NOTE]
|
||||
> Always On only works for the active profile. The first profile provisioned that can be auto triggered will automatically be set as active.
|
||||
|
||||
Preserving user Always On preference
|
||||
|
||||
Windows has a feature to preserve a user’s AlwaysOn preference. In the event that a user manually unchecks the “Connect automatically” checkbox, Windows will remember this user preference for this profile name by adding the profile name to the value AutoTriggerDisabledProfilesList.
|
||||
Should a management tool remove/add the same profile name back and set AlwaysOn to true, Windows will not check the box if the profile name exists in the below registry value in order to preserve user preference.
|
||||
Key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\RasMan\Config
|
||||
Key: `HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\RasMan\Config`
|
||||
Value: AutoTriggerDisabledProfilesList
|
||||
Type: REG_MULTI_SZ
|
||||
|
||||
|
||||
Valid values:
|
||||
|
||||
- False (default) - Always On is turned off.
|
||||
- True - Always On is turned on.
|
||||
- False (default) - Always On is turned off.
|
||||
- True - Always On is turned on.
|
||||
|
||||
Value type is bool. Supported operations include Get, Add, Replace, and Delete.
|
||||
|
||||
@ -278,15 +286,15 @@ Lockdown profile.
|
||||
|
||||
Valid values:
|
||||
|
||||
- False (default) - this is not a LockDown profile.
|
||||
- True - this is a LockDown profile.
|
||||
- False (default) - this is not a LockDown profile.
|
||||
- True - this is a LockDown profile.
|
||||
|
||||
When the LockDown profile is turned on, it does the following things:
|
||||
|
||||
- First, it automatically becomes an "always on" profile.
|
||||
- Second, it can never be disconnected.
|
||||
- Third, if the profile is not connected, then the user has no network.
|
||||
- Fourth, no other profiles may be connected or modified.
|
||||
- First, it automatically becomes an "always on" profile.
|
||||
- Second, it can never be disconnected.
|
||||
- Third, if the profile is not connected, then the user has no network.
|
||||
- Fourth, no other profiles may be connected or modified.
|
||||
|
||||
A Lockdown profile must be deleted before you can add, remove, or connect other profiles.
|
||||
|
||||
@ -297,14 +305,14 @@ Device tunnel profile.
|
||||
|
||||
Valid values:
|
||||
|
||||
- False (default) - this is not a device tunnel profile.
|
||||
- True - this is a device tunnel profile.
|
||||
- False (default) - this is not a device tunnel profile.
|
||||
- True - this is a device tunnel profile.
|
||||
|
||||
When the DeviceTunnel profile is turned on, it does the following things:
|
||||
|
||||
- First, it automatically becomes an "always on" profile.
|
||||
- Second, it does not require the presence or logging in of any user to the machine in order for it to connect.
|
||||
- Third, no other device tunnel profile maybe be present on the same machine.
|
||||
- First, it automatically becomes an "always on" profile.
|
||||
- Second, it does not require the presence or logging in of any user to the machine in order for it to connect.
|
||||
- Third, no other device tunnel profile maybe be present on the same machine.
|
||||
|
||||
A device tunnel profile must be deleted before another device tunnel profile can be added, removed, or connected.
|
||||
|
||||
@ -315,8 +323,8 @@ Allows registration of the connection's address in DNS.
|
||||
|
||||
Valid values:
|
||||
|
||||
- False = Do not register the connection's address in DNS (default).
|
||||
- True = Register the connection's addresses in DNS.
|
||||
- False = Do not register the connection's address in DNS (default).
|
||||
- True = Register the connection's addresses in DNS.
|
||||
|
||||
<a href="" id="vpnv2-profilename-dnssuffix"></a>**VPNv2/**<em>ProfileName</em>**/DnsSuffix**
|
||||
Optional. Specifies one or more comma separated DNS suffixes. The first in the list is also used as the primary connection specific DNS suffix for the VPN Interface. The entire list will also be added into the SuffixSearchList.
|
||||
@ -435,22 +443,23 @@ Value type is chr. Supported operations include Get, Add, Replace, and Delete.
|
||||
<a href="" id="vpnv2-profilename-nativeprofile-routingpolicytype"></a>**VPNv2/**<em>ProfileName</em>**/NativeProfile/RoutingPolicyType**
|
||||
Optional for native profiles. Type of routing policy. This value can be one of the following:
|
||||
|
||||
- SplitTunnel - Traffic can go over any interface as determined by the networking stack.
|
||||
- ForceTunnel - All IP traffic must go over the VPN interface.
|
||||
- SplitTunnel - Traffic can go over any interface as determined by the networking stack.
|
||||
- ForceTunnel - All IP traffic must go over the VPN interface.
|
||||
|
||||
Value type is chr. Supported operations include Get, Add, Replace, and Delete.
|
||||
|
||||
<a href="" id="vpnv2-profilename-nativeprofile-nativeprotocoltype"></a>**VPNv2/**<em>ProfileName</em>**/NativeProfile/NativeProtocolType**
|
||||
Required for native profiles. Type of tunneling protocol used. This value can be one of the following:
|
||||
|
||||
- PPTP
|
||||
- L2TP
|
||||
- IKEv2
|
||||
- Automatic
|
||||
- PPTP
|
||||
- L2TP
|
||||
- IKEv2
|
||||
- Automatic
|
||||
|
||||
Value type is chr. Supported operations include Get, Add, Replace, and Delete.
|
||||
|
||||
> **Note** The **Automatic** option means that the device will try each of the built-in tunneling protocols until one succeeds. It will attempt protocols in following order: SSTP, IKEv2, PPTP and then L2TP. This order is not customizable.
|
||||
> [!NOTE]
|
||||
> The **Automatic** option means that the device will try each of the built-in tunneling protocols until one succeeds. It will attempt protocols in following order: SSTP, IKEv2, PPTP and then L2TP. This order is not customizable.
|
||||
|
||||
<a href="" id="vpnv2-profilename-nativeprofile-authentication"></a>**VPNv2/**<em>ProfileName</em>**/NativeProfile/Authentication**
|
||||
Required node for native profile. It contains authentication information for the native VPN profile.
|
||||
@ -502,12 +511,12 @@ Added in Windows 10, version 1607.
|
||||
|
||||
The following list contains the valid values:
|
||||
|
||||
- MD596
|
||||
- SHA196
|
||||
- SHA256128
|
||||
- GCMAES128
|
||||
- GCMAES192
|
||||
- GCMAES256
|
||||
- MD596
|
||||
- SHA196
|
||||
- SHA256128
|
||||
- GCMAES128
|
||||
- GCMAES192
|
||||
- GCMAES256
|
||||
|
||||
Value type is chr. Supported operations include Get, Add, Replace, and Delete.
|
||||
|
||||
@ -516,14 +525,14 @@ Added in Windows 10, version 1607.
|
||||
|
||||
The following list contains the valid values:
|
||||
|
||||
- DES
|
||||
- DES3
|
||||
- AES128
|
||||
- AES192
|
||||
- AES256
|
||||
- GCMAES128
|
||||
- GCMAES192
|
||||
- GCMAES256
|
||||
- DES
|
||||
- DES3
|
||||
- AES128
|
||||
- AES192
|
||||
- AES256
|
||||
- GCMAES128
|
||||
- GCMAES192
|
||||
- GCMAES256
|
||||
|
||||
Value type is chr. Supported operations include Get, Add, Replace, and Delete.
|
||||
|
||||
@ -532,13 +541,13 @@ Added in Windows 10, version 1607.
|
||||
|
||||
The following list contains the valid values:
|
||||
|
||||
- DES
|
||||
- DES3
|
||||
- AES128
|
||||
- AES192
|
||||
- AES256
|
||||
- AES\_GCM_128
|
||||
- AES\_GCM_256
|
||||
- DES
|
||||
- DES3
|
||||
- AES128
|
||||
- AES192
|
||||
- AES256
|
||||
- AES\_GCM_128
|
||||
- AES\_GCM_256
|
||||
|
||||
Value type is chr. Supported operations include Get, Add, Replace, and Delete.
|
||||
|
||||
@ -547,10 +556,10 @@ Added in Windows 10, version 1607.
|
||||
|
||||
The following list contains the valid values:
|
||||
|
||||
- MD5
|
||||
- SHA196
|
||||
- SHA256
|
||||
- SHA384
|
||||
- MD5
|
||||
- SHA196
|
||||
- SHA256
|
||||
- SHA384
|
||||
|
||||
Value type is chr. Supported operations include Get, Add, Replace, and Delete.
|
||||
|
||||
@ -559,12 +568,12 @@ Added in Windows 10, version 1607.
|
||||
|
||||
The following list contains the valid values:
|
||||
|
||||
- Group1
|
||||
- Group2
|
||||
- Group14
|
||||
- ECP256
|
||||
- ECP384
|
||||
- Group24
|
||||
- Group1
|
||||
- Group2
|
||||
- Group14
|
||||
- ECP256
|
||||
- ECP384
|
||||
- Group24
|
||||
|
||||
Value type is chr. Supported operations include Get, Add, Replace, and Delete.
|
||||
|
||||
@ -573,13 +582,13 @@ Added in Windows 10, version 1607.
|
||||
|
||||
The following list contains the valid values:
|
||||
|
||||
- PFS1
|
||||
- PFS2
|
||||
- PFS2048
|
||||
- ECP256
|
||||
- ECP384
|
||||
- PFSMM
|
||||
- PFS24
|
||||
- PFS1
|
||||
- PFS2
|
||||
- PFS2048
|
||||
- ECP256
|
||||
- ECP384
|
||||
- PFSMM
|
||||
- PFS24
|
||||
|
||||
Value type is chr. Supported operations include Get, Add, Replace, and Delete.
|
||||
|
||||
@ -1308,8 +1317,7 @@ Servers
|
||||
</Add>
|
||||
```
|
||||
|
||||
## Related topics
|
||||
|
||||
## See also
|
||||
|
||||
[Configuration service provider reference](configuration-service-provider-reference.md)
|
||||
|
||||
|
@ -2,14 +2,14 @@
|
||||
title: VPNv2 DDF file
|
||||
description: This topic shows the OMA DM device description framework (DDF) for the VPNv2 configuration service provider.
|
||||
ms.assetid: 4E2F36B7-D2EE-4F48-AD1A-6BDE7E72CC94
|
||||
ms.reviewer:
|
||||
ms.reviewer: pesmith
|
||||
manager: dansimp
|
||||
ms.author: dansimp
|
||||
ms.topic: article
|
||||
ms.prod: w10
|
||||
ms.technology: windows
|
||||
author: manikadhiman
|
||||
ms.date: 12/05/2017
|
||||
ms.date: 10/30/2020
|
||||
---
|
||||
|
||||
# VPNv2 DDF file
|
||||
@ -19,7 +19,7 @@ This topic shows the OMA DM device description framework (DDF) for the **VPNv2**
|
||||
|
||||
Looking for the DDF XML files? See [CSP DDF files download](configuration-service-provider-reference.md#csp-ddf-files-download).
|
||||
|
||||
The XML below is for Windows 10, version 1709.
|
||||
The XML below is for Windows 10, version 2004.
|
||||
|
||||
```xml
|
||||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
@ -32,7 +32,7 @@ The XML below is for Windows 10, version 1709.
|
||||
<VerDTD>1.2</VerDTD>
|
||||
<Node>
|
||||
<NodeName>VPNv2</NodeName>
|
||||
<Path>./Device/Vendor/MSFT</Path>
|
||||
<Path>./Vendor/MSFT</Path>
|
||||
<DFProperties>
|
||||
<AccessType>
|
||||
<Get />
|
||||
@ -830,6 +830,33 @@ The XML below is for Windows 10, version 1709.
|
||||
</DFType>
|
||||
</DFProperties>
|
||||
</Node>
|
||||
<Node>
|
||||
<NodeName>Direction</NodeName>
|
||||
<DFProperties>
|
||||
<AccessType>
|
||||
<Get />
|
||||
<Add />
|
||||
<Delete />
|
||||
<Replace />
|
||||
</AccessType>
|
||||
<Description>
|
||||
Outbound - The traffic filter allows traffic to reach destinations matching this rule. This is the default.
|
||||
Inbound - The traffic filter allows traffic coming from external locations matching this rule.
|
||||
</Description>
|
||||
<DFFormat>
|
||||
<chr />
|
||||
</DFFormat>
|
||||
<Occurrence>
|
||||
<ZeroOrOne />
|
||||
</Occurrence>
|
||||
<Scope>
|
||||
<Dynamic />
|
||||
</Scope>
|
||||
<DFType>
|
||||
<MIME>text/plain</MIME>
|
||||
</DFType>
|
||||
</DFProperties>
|
||||
</Node>
|
||||
</Node>
|
||||
</Node>
|
||||
<Node>
|
||||
@ -1625,6 +1652,76 @@ The XML below is for Windows 10, version 1709.
|
||||
</DFType>
|
||||
</DFProperties>
|
||||
</Node>
|
||||
<Node>
|
||||
<NodeName>WebAuth</NodeName>
|
||||
<DFProperties>
|
||||
<AccessType>
|
||||
<Add />
|
||||
<Get />
|
||||
</AccessType>
|
||||
<Description>Nodes under WebAuth can be used to enable WebToken based authentication for 3rd Party Plugin VPN Profiles.</Description>
|
||||
<DFFormat>
|
||||
<node />
|
||||
</DFFormat>
|
||||
<Occurrence>
|
||||
<ZeroOrOne />
|
||||
</Occurrence>
|
||||
<Scope>
|
||||
<Dynamic />
|
||||
</Scope>
|
||||
<DFType>
|
||||
<DDFName></DDFName>
|
||||
</DFType>
|
||||
</DFProperties>
|
||||
<Node>
|
||||
<NodeName>Enabled</NodeName>
|
||||
<DFProperties>
|
||||
<AccessType>
|
||||
<Add />
|
||||
<Delete />
|
||||
<Get />
|
||||
<Replace />
|
||||
</AccessType>
|
||||
<Description>Enables the WebToken based authentication flow.</Description>
|
||||
<DFFormat>
|
||||
<bool />
|
||||
</DFFormat>
|
||||
<Occurrence>
|
||||
<One />
|
||||
</Occurrence>
|
||||
<Scope>
|
||||
<Dynamic />
|
||||
</Scope>
|
||||
<DFType>
|
||||
<MIME>text/plain</MIME>
|
||||
</DFType>
|
||||
</DFProperties>
|
||||
</Node>
|
||||
<Node>
|
||||
<NodeName>ClientId</NodeName>
|
||||
<DFProperties>
|
||||
<AccessType>
|
||||
<Add />
|
||||
<Delete />
|
||||
<Get />
|
||||
<Replace />
|
||||
</AccessType>
|
||||
<Description>The client ID to specify when communicating with the Web Account provider in retrieving the token.</Description>
|
||||
<DFFormat>
|
||||
<chr />
|
||||
</DFFormat>
|
||||
<Occurrence>
|
||||
<One />
|
||||
</Occurrence>
|
||||
<Scope>
|
||||
<Dynamic />
|
||||
</Scope>
|
||||
<DFType>
|
||||
<MIME>text/plain</MIME>
|
||||
</DFType>
|
||||
</DFProperties>
|
||||
</Node>
|
||||
</Node>
|
||||
</Node>
|
||||
<Node>
|
||||
<NodeName>NativeProfile</NodeName>
|
||||
@ -2225,6 +2322,33 @@ The XML below is for Windows 10, version 1709.
|
||||
</DFType>
|
||||
</DFProperties>
|
||||
</Node>
|
||||
<Node>
|
||||
<NodeName>PlumbIKEv2TSAsRoutes</NodeName>
|
||||
<DFProperties>
|
||||
<AccessType>
|
||||
<Add />
|
||||
<Delete />
|
||||
<Get />
|
||||
<Replace />
|
||||
</AccessType>
|
||||
<Description>
|
||||
True: Plumb traffic selectors as routes onto VPN interface
|
||||
False: Do not plumb traffic selectors as routes
|
||||
</Description>
|
||||
<DFFormat>
|
||||
<bool />
|
||||
</DFFormat>
|
||||
<Occurrence>
|
||||
<ZeroOrOne />
|
||||
</Occurrence>
|
||||
<Scope>
|
||||
<Dynamic />
|
||||
</Scope>
|
||||
<DFType>
|
||||
<MIME>text/plain</MIME>
|
||||
</DFType>
|
||||
</DFProperties>
|
||||
</Node>
|
||||
</Node>
|
||||
</Node>
|
||||
</Node>
|
||||
@ -3718,6 +3842,76 @@ The XML below is for Windows 10, version 1709.
|
||||
</DFType>
|
||||
</DFProperties>
|
||||
</Node>
|
||||
<Node>
|
||||
<NodeName>WebAuth</NodeName>
|
||||
<DFProperties>
|
||||
<AccessType>
|
||||
<Add />
|
||||
<Get />
|
||||
</AccessType>
|
||||
<Description>Nodes under WebAuth can be used to enable WebToken based authentication for 3rd Party Plugin VPN Profiles.</Description>
|
||||
<DFFormat>
|
||||
<node />
|
||||
</DFFormat>
|
||||
<Occurrence>
|
||||
<ZeroOrOne />
|
||||
</Occurrence>
|
||||
<Scope>
|
||||
<Dynamic />
|
||||
</Scope>
|
||||
<DFType>
|
||||
<DDFName></DDFName>
|
||||
</DFType>
|
||||
</DFProperties>
|
||||
<Node>
|
||||
<NodeName>Enabled</NodeName>
|
||||
<DFProperties>
|
||||
<AccessType>
|
||||
<Add />
|
||||
<Delete />
|
||||
<Get />
|
||||
<Replace />
|
||||
</AccessType>
|
||||
<Description>Enables the WebToken based authentication flow.</Description>
|
||||
<DFFormat>
|
||||
<bool />
|
||||
</DFFormat>
|
||||
<Occurrence>
|
||||
<One />
|
||||
</Occurrence>
|
||||
<Scope>
|
||||
<Dynamic />
|
||||
</Scope>
|
||||
<DFType>
|
||||
<MIME>text/plain</MIME>
|
||||
</DFType>
|
||||
</DFProperties>
|
||||
</Node>
|
||||
<Node>
|
||||
<NodeName>ClientId</NodeName>
|
||||
<DFProperties>
|
||||
<AccessType>
|
||||
<Add />
|
||||
<Delete />
|
||||
<Get />
|
||||
<Replace />
|
||||
</AccessType>
|
||||
<Description>The client ID to specify when communicating with the Web Account provider in retrieving the token.</Description>
|
||||
<DFFormat>
|
||||
<chr />
|
||||
</DFFormat>
|
||||
<Occurrence>
|
||||
<One />
|
||||
</Occurrence>
|
||||
<Scope>
|
||||
<Dynamic />
|
||||
</Scope>
|
||||
<DFType>
|
||||
<MIME>text/plain</MIME>
|
||||
</DFType>
|
||||
</DFProperties>
|
||||
</Node>
|
||||
</Node>
|
||||
</Node>
|
||||
<Node>
|
||||
<NodeName>NativeProfile</NodeName>
|
||||
@ -4318,6 +4512,33 @@ The XML below is for Windows 10, version 1709.
|
||||
</DFType>
|
||||
</DFProperties>
|
||||
</Node>
|
||||
<Node>
|
||||
<NodeName>PlumbIKEv2TSAsRoutes</NodeName>
|
||||
<DFProperties>
|
||||
<AccessType>
|
||||
<Add />
|
||||
<Delete />
|
||||
<Get />
|
||||
<Replace />
|
||||
</AccessType>
|
||||
<Description>
|
||||
True: Plumb traffic selectors as routes onto VPN interface
|
||||
False: Do not plumb traffic selectors as routes
|
||||
</Description>
|
||||
<DFFormat>
|
||||
<bool />
|
||||
</DFFormat>
|
||||
<Occurrence>
|
||||
<ZeroOrOne />
|
||||
</Occurrence>
|
||||
<Scope>
|
||||
<Dynamic />
|
||||
</Scope>
|
||||
<DFType>
|
||||
<MIME>text/plain</MIME>
|
||||
</DFType>
|
||||
</DFProperties>
|
||||
</Node>
|
||||
</Node>
|
||||
</Node>
|
||||
</Node>
|
||||
|
@ -125,7 +125,7 @@ The following list shows the supported values:
|
||||
- 1 - Non-enterprise content embedded on enterprise sites are stopped from opening in Internet Explorer or Microsoft Edge outside of Microsoft Defender Application Guard.
|
||||
|
||||
> [!NOTE]
|
||||
> This policy setting is no longer supported in the new Microsoft Edge browser.
|
||||
> This policy setting is no longer supported in the new Microsoft Edge browser. The policy will be deprecated and removed in a future release.
|
||||
|
||||
<!--ADMXMapped-->
|
||||
ADMX Info:
|
||||
|
@ -19,7 +19,9 @@
|
||||
### [Deployment phases](microsoft-defender-atp/deployment-phases.md)
|
||||
### [Phase 1: Prepare](microsoft-defender-atp/prepare-deployment.md)
|
||||
### [Phase 2: Set up](microsoft-defender-atp/production-deployment.md)
|
||||
### [Phase 3: Onboard](microsoft-defender-atp/onboarding.md)
|
||||
### [Phase 3: Onboard]()
|
||||
#### [Onboarding overview](microsoft-defender-atp/onboarding.md)
|
||||
#### [Deployment rings](microsoft-defender-atp/deployment-rings.md)
|
||||
#### [Onboarding using Microsoft Endpoint Configuration Manager](microsoft-defender-atp/onboarding-endpoint-configuration-manager.md)
|
||||
#### [Onboarding using Microsoft Endpoint Manager](microsoft-defender-atp/onboarding-endpoint-manager.md)
|
||||
#### [Onboard supported devices](microsoft-defender-atp/onboard-configure.md)
|
||||
|
File diff suppressed because it is too large
Load Diff
@ -59,7 +59,7 @@ The following image shows an example of an alert that was triggered by behaviora
|
||||
|
||||
- **[Feedback-loop blocking](feedback-loop-blocking.md)** (also referred to as rapid protection) Threat detections are observed through behavioral intelligence. Threats are stopped and prevented from running on other endpoints. (Feedback-loop blocking is enabled by default.)
|
||||
|
||||
- **[Endpoint detection and response (EDR) in block mode](edr-in-block-mode.md)** Malicious artifacts or behaviors that are observed through post-breach protection are blocked and contained. EDR in block mode works even if Microsoft Defender Antivirus is not the primary antivirus solution. (EDR in block mode, currently in preview, is not enabled by default; you turn it on in the Microsoft Defender Security Center.)
|
||||
- **[Endpoint detection and response (EDR) in block mode](edr-in-block-mode.md)** Malicious artifacts or behaviors that are observed through post-breach protection are blocked and contained. EDR in block mode works even if Microsoft Defender Antivirus is not the primary antivirus solution. (EDR in block mode is not enabled by default; you turn it on in the Microsoft Defender Security Center.)
|
||||
|
||||
Expect more to come in the area of behavioral blocking and containment, as Microsoft continues to improve threat protection features and capabilities. To see what's planned and rolling out now, visit the [Microsoft 365 roadmap](https://www.microsoft.com/microsoft-365/roadmap).
|
||||
|
||||
|
@ -41,6 +41,8 @@ The deployment guide will guide you through the recommended path in deploying Mi
|
||||
|
||||
If you're unfamiliar with the general deployment planning steps, check out the [Plan deployment](deployment-strategy.md) topic to get a high-level overview of the general deployment steps and methods.
|
||||
|
||||
|
||||
|
||||
## In Scope
|
||||
|
||||
The following is in scope for this deployment guide:
|
||||
|
@ -0,0 +1,121 @@
|
||||
---
|
||||
title: Deploy Microsoft Defender ATP in rings
|
||||
description: Learn how to deploy Microsoft Defender ATP in rings
|
||||
keywords: deploy, rings, evaluate, pilot, insider fast, insider slow, setup, onboard, phase, deployment, deploying, adoption, configuring
|
||||
search.product: eADQiWindows 10XVcnh
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
ms.author: macapara
|
||||
author: mjcaparas
|
||||
ms.localizationpriority: medium
|
||||
manager: dansimp
|
||||
audience: ITPro
|
||||
ms.collection:
|
||||
- M365-security-compliance
|
||||
- m365solution-endpointprotect
|
||||
- m365solution-overview
|
||||
ms.topic: article
|
||||
---
|
||||
|
||||
# Deploy Microsoft Defender ATP in rings
|
||||
|
||||
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
|
||||
|
||||
**Applies to:**
|
||||
- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2146631)
|
||||
|
||||
|
||||
Deploying Microsoft Defender ATP can be done using a ring-based deployment approach.
|
||||
|
||||
The deployment rings can be applied in the following scenarios:
|
||||
- [New deployments](#new-deployments)
|
||||
- [Existing deployments](#existing-deployments)
|
||||
|
||||
## New deployments
|
||||
|
||||

|
||||
|
||||
|
||||
A ring-based approach is a method of identifying a set of endpoints to onboard and verifying that certain criteria is met before proceeding to deploy the service to a larger set of devices. You can define the exit criteria for each ring and ensure that they are satisfied before moving on to the next ring.
|
||||
|
||||
Adopting a ring-based deployment helps reduce potential issues that could arise while rolling out the service. By piloting a certain number of devices first, you can identify potential issues and mitigate potential risks that might arise.
|
||||
|
||||
|
||||
Table 1 provides an example of the deployment rings you might use.
|
||||
|
||||
**Table 1**
|
||||
|
||||
|**Deployment ring**|**Description**|
|
||||
|:-----|:-----|
|
||||
Evaluate | Ring 1: Identify 50 systems for pilot testing
|
||||
Pilot | Ring 2: Identify the next 50-100 endpoints in production environment <br>
|
||||
Full deployment | Ring 3: Roll out service to the rest of environment in larger increments
|
||||
|
||||
|
||||
|
||||
### Exit criteria
|
||||
An example set of exit criteria for these rings can include:
|
||||
- Devices show up in the device inventory list
|
||||
- Alerts appear in dashboard
|
||||
- [Run a detection test](run-detection-test.md)
|
||||
- [Run a simulated attack on a device](attack-simulations.md)
|
||||
|
||||
### Evaluate
|
||||
Identify a small number of test machines in your environment to onboard to the service. Ideally, these machines would be fewer than 50 endpoints.
|
||||
|
||||
|
||||
### Pilot
|
||||
Microsoft Defender ATP supports a variety of endpoints that you can onboard to the service. In this ring, identify several devices to onboard and based on the exit criteria you define, decide to proceed to the next deployment ring.
|
||||
|
||||
The following table shows the supported endpoints and the corresponding tool you can use to onboard devices to the service.
|
||||
|
||||
| Endpoint | Deployment tool |
|
||||
|--------------|------------------------------------------|
|
||||
| **Windows** | [Local script (up to 10 devices)](configure-endpoints-script.md) <br> NOTE: If you want to deploy more than 10 devices in a production environment, use the Group Policy method instead or the other supported tools listed below.<br> [Group Policy](configure-endpoints-gp.md) <br> [Microsoft Endpoint Manager/ Mobile Device Manager](configure-endpoints-mdm.md) <br> [Microsoft Endpoint Configuration Manager](configure-endpoints-sccm.md) <br> [VDI scripts](configure-endpoints-vdi.md) |
|
||||
| **macOS** | [Local script](mac-install-manually.md) <br> [Microsoft Endpoint Manager](mac-install-with-intune.md) <br> [JAMF Pro](mac-install-with-jamf.md) <br> [Mobile Device Management](mac-install-with-other-mdm.md) |
|
||||
| **Linux Server** | [Local script](linux-install-manually.md) <br> [Puppet](linux-install-with-puppet.md) <br> [Ansible](linux-install-with-ansible.md)|
|
||||
| **iOS** | [App-based](ios-install.md) |
|
||||
| **Android** | [Microsoft Endpoint Manager](android-intune.md) |
|
||||
|
||||
|
||||
|
||||
|
||||
### Full deployment
|
||||
At this stage, you can use the [Plan deployment](deployment-strategy.md) material to help you plan your deployment.
|
||||
|
||||
|
||||
Use the following material to select the appropriate Microsoft Defender ATP architecture that best suites your organization.
|
||||
|
||||
|**Item**|**Description**|
|
||||
|:-----|:-----|
|
||||
|[](https://github.com/MicrosoftDocs/windows-itpro-docs/raw/public/windows/security/threat-protection/microsoft-defender-atp/downloads/mdatp-deployment-strategy.pdf)<br/> [PDF](https://github.com/MicrosoftDocs/windows-itpro-docs/raw/public/windows/security/threat-protection/microsoft-defender-atp/downloads/mdatp-deployment-strategy.pdf) \| [Visio](https://github.com/MicrosoftDocs/windows-itpro-docs/raw/public/windows/security/threat-protection/microsoft-defender-atp/downloads/mdatp-deployment-strategy.vsdx) | The architectural material helps you plan your deployment for the following architectures: <ul><li> Cloud-native </li><li> Co-management </li><li> On-premise</li><li>Evaluation and local onboarding</li>
|
||||
|
||||
|
||||
|
||||
|
||||
## Existing deployments
|
||||
|
||||
### Windows endpoints
|
||||
For Windows and/or Windows Servers, you select several machines to test ahead of time (before patch Tuesday) by using the **Security Update Validation program (SUVP)**.
|
||||
|
||||
For more information, see:
|
||||
- [What is the Security Update Validation Program](https://techcommunity.microsoft.com/t5/windows-it-pro-blog/what-is-the-security-update-validation-program/ba-p/275767)
|
||||
- [Software Update Validation Program and Microsoft Malware Protection Center Establishment - TwC Interactive Timeline Part 4](https://www.microsoft.com/security/blog/2012/03/28/software-update-validation-program-and-microsoft-malware-protection-center-establishment-twc-interactive-timeline-part-4/)
|
||||
|
||||
|
||||
### Non-Windows endpoints
|
||||
With macOS and Linux, you could take a couple of systems and run in the "InsidersFast" channel.
|
||||
|
||||
>[!NOTE]
|
||||
>Ideally at least one security admin and one developer so that you are able to find compatibility, performance and reliability issues before the build makes it into the "Production" channel.
|
||||
|
||||
The choice of the channel determines the type and frequency of updates that are offered to your device. Devices in insiders-fast are the first ones to receive updates and new features, followed later by insiders-slow and lastly by prod.
|
||||
|
||||

|
||||
|
||||
In order to preview new features and provide early feedback, it is recommended that you configure some devices in your enterprise to use either insiders-fast or insiders-slow.
|
||||
|
||||
>[!WARNING]
|
||||
>Switching the channel after the initial installation requires the product to be reinstalled. To switch the product channel: uninstall the existing package, re-configure your device to use the new channel, and follow the steps in this document to install the package from the new location.
|
@ -39,7 +39,7 @@ EDR in block mode is also integrated with [threat & vulnerability management](ht
|
||||
:::image type="content" source="images/edrblockmode-TVMrecommendation.png" alt-text="recommendation to turn on EDR in block mode":::
|
||||
|
||||
> [!NOTE]
|
||||
> EDR in block mode is currently in preview, available to organizations who have opted in to receive **[preview features](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/preview)**. To get the best protection, make sure to **[deploy Microsoft Defender ATP baselines](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/configure-machines-security-baseline)**.
|
||||
> To get the best protection, make sure to **[deploy Microsoft Defender ATP baselines](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/configure-machines-security-baseline)**.
|
||||
|
||||
## What happens when something is detected?
|
||||
|
||||
@ -70,10 +70,10 @@ The following image shows an instance of unwanted software that was detected and
|
||||
|---------|---------|
|
||||
|Permissions |Global Administrator or Security Administrator role assigned in [Azure Active Directory](https://docs.microsoft.com/azure/active-directory/fundamentals/active-directory-users-assign-role-azure-portal). See [Basic permissions](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/basic-permissions). |
|
||||
|Operating system |One of the following versions: <br/>- Windows 10 (all releases) <br/>- Windows Server 2016 or later |
|
||||
|Windows E5 enrollment |Windows E5 is included in the following subscriptions: <br/>- Microsoft 365 E5 <br/>- Microsoft 365 E3 together with the Identity & Threat Protection offering <br/><br/>See [Components](https://docs.microsoft.com/microsoft-365/enterprise/microsoft-365-overview?view=o365-worldwide#components) and [features and capabilities for each plan](https://www.microsoft.com/microsoft-365/compare-all-microsoft-365-plans). |
|
||||
|Windows E5 enrollment |Windows E5 is included in the following subscriptions: <br/>- Microsoft 365 E5 <br/>- Microsoft 365 E3 together with the Identity & Threat Protection offering <br/><br/>See [Components](https://docs.microsoft.com/microsoft-365/enterprise/microsoft-365-overview?view=o365-worldwide&preserve-view=true#components) and [features and capabilities for each plan](https://www.microsoft.com/microsoft-365/compare-all-microsoft-365-plans). |
|
||||
|Cloud-delivered protection |Make sure Microsoft Defender Antivirus is configured such that cloud-delivered protection is enabled. <br/><br/>See [Enable cloud-delivered protection](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/enable-cloud-protection-microsoft-defender-antivirus). |
|
||||
|Microsoft Defender Antivirus antimalware client |Make sure your client is up to date. Using PowerShell, run the [Get-MpComputerStatus](https://docs.microsoft.com/powershell/module/defender/get-mpcomputerstatus?view=win10-ps) cmdlet as an administrator. <br/>In the **AMProductVersion** line, you should see **4.18.2001.10** or above. |
|
||||
|Microsoft Defender Antivirus engine |Make sure your engine is up to date. Using PowerShell, run the [Get-MpComputerStatus](https://docs.microsoft.com/powershell/module/defender/get-mpcomputerstatus?view=win10-ps) cmdlet as an administrator. <br/> In the **AMEngineVersion** line, you should see **1.1.16700.2** or above. |
|
||||
|Microsoft Defender Antivirus antimalware client |Make sure your client is up to date. Using PowerShell, run the [Get-MpComputerStatus](https://docs.microsoft.com/powershell/module/defender/get-mpcomputerstatus?view=win10-ps&preserve-view=true) cmdlet as an administrator. <br/>In the **AMProductVersion** line, you should see **4.18.2001.10** or above. |
|
||||
|Microsoft Defender Antivirus engine |Make sure your engine is up to date. Using PowerShell, run the [Get-MpComputerStatus](https://docs.microsoft.com/powershell/module/defender/get-mpcomputerstatus?view=win10-ps&preserve-view=true) cmdlet as an administrator. <br/> In the **AMEngineVersion** line, you should see **1.1.16700.2** or above. |
|
||||
|
||||
> [!IMPORTANT]
|
||||
> To get the best protection value, make sure your antivirus solution is configured to receive regular updates and essential features, and that your exclusions are defined.
|
||||
|
@ -100,7 +100,7 @@ Use the following procedure to enable network protection on domain-joined comput
|
||||
4. Double-click the **Prevent users and apps from accessing dangerous websites** setting and set the option to **Enabled**. In the options section, you must specify one of the following options:
|
||||
* **Block** - Users can't access malicious IP addresses and domains
|
||||
* **Disable (Default)** - The Network protection feature won't work. Users won't be blocked from accessing malicious domains
|
||||
* **Audit Mode** - If a user visits a malicious IP address or domain, an event won't be recorded in the Windows event log. However, the user won't be blocked from visiting the address.
|
||||
* **Audit Mode** - If a user visits a malicious IP address or domain, an event will be recorded in the Windows event log. However, the user won't be blocked from visiting the address.
|
||||
|
||||
> [!IMPORTANT]
|
||||
> To fully enable network protection, you must set the Group Policy option to **Enabled** and also select **Block** in the options drop-down menu.
|
||||
|
@ -66,8 +66,7 @@ Authorization | String | Bearer {token}. **Required**.
|
||||
Empty
|
||||
|
||||
## Response
|
||||
If successful and machines were found - 200 OK with list of the machines in the response body.
|
||||
If no machine found - 404 Not Found.
|
||||
If successful - 200 OK with list of the machines in the response body.
|
||||
If the timestamp is not in the past 30 days - 400 Bad Request.
|
||||
|
||||
## Example
|
||||
|
Binary file not shown.
After Width: | Height: | Size: 24 KiB |
Binary file not shown.
After Width: | Height: | Size: 37 KiB |
@ -43,6 +43,10 @@ ms.topic: conceptual
|
||||
> 2. Refer to this documentation for detailed configuration information and instructions: [New configuration profiles for macOS Catalina and newer versions of macOS](mac-sysext-policies.md).
|
||||
> 3. Monitor this page for an announcement of the actual release of MDATP for Mac agent update.
|
||||
|
||||
## 101.10.72
|
||||
|
||||
- Bug fixes
|
||||
|
||||
## 101.09.61
|
||||
|
||||
- Added a new managed preference for [disabling the option to send feedback](mac-preferences.md#show--hide-option-to-send-feedback)
|
||||
|
@ -110,7 +110,7 @@ The package contains the following folders:
|
||||
| System Information| Contains a SystemInformation.txt file which lists system information such as OS version and network cards. |
|
||||
| Temp Directories| Contains a set of text files that lists the files located in %Temp% for every user in the system. </br></br> This can help to track suspicious files that an attacker may have dropped on the system. </br></br> <div class="alert"><b>NOTE:</b> If the file contains the following message: “The system cannot find the path specified”, it means that there is no temp directory for this user, and might be because the user didn’t log in to the system.</div> |
|
||||
| Users and Groups| Provides a list of files that each represent a group and its members. |
|
||||
|WdSupportLogs| Provides the MpCmdRunLog.txt and MPSupportFiles.cab |
|
||||
|WdSupportLogs| Provides the MpCmdRunLog.txt and MPSupportFiles.cab </br></br> <div class="alert"><b>NOTE:</b> This folder will only be created on Windows 10, version 1709 or later with February 2020 update rollup or more recent installed:</br> Win10 1709 (RS3) Build 16299.1717 : [KB4537816](https://support.microsoft.com/en-us/help/4537816/windows-10-update-kb4537816) </br> Win10 1803 (RS4) Build 17134.1345 : [KB4537795](https://support.microsoft.com/en-us/help/4537795/windows-10-update-kb4537795) </br> Win10 1809 (RS5) Build 17763.1075 : [KB4537818](https://support.microsoft.com/en-us/help/4537818/windows-10-update-kb4537818) </br> Win10 1903/1909 (19h1/19h2) Builds 18362.693 and 18363.693 : [KB4535996](https://support.microsoft.com/en-us/help/4535996/windows-10-update-kb4535996) </div> |
|
||||
| CollectionSummaryReport.xls| This file is a summary of the investigation package collection, it contains the list of data points, the command used to extract the data, the execution status, and the error code in case of failure. You can use this report to track if the package includes all the expected data and identify if there were any errors. |
|
||||
|
||||
## Run Microsoft Defender Antivirus scan on devices
|
||||
|
@ -27,6 +27,7 @@ The SCT enables administrators to effectively manage their enterprise’s Group
|
||||
The Security Compliance Toolkit consists of:
|
||||
|
||||
- Windows 10 security baselines
|
||||
- Windows 10 Version 20H2 (October 2020 Update)
|
||||
- Windows 10 Version 2004 (May 2020 Update)
|
||||
- Windows 10 Version 1909 (November 2019 Update)
|
||||
- Windows 10 Version 1903 (May 2019 Update)
|
||||
|
Loading…
x
Reference in New Issue
Block a user