mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-12 21:37:22 +00:00
Merge pull request #4862 from MicrosoftDocs/master
Publish 03/08/21, 3:30 PM
This commit is contained in:
commit
e35037b2d8
@ -81,6 +81,9 @@ This table shows the correct sequence for applying the various tasks to the file
|
|||||||
|Add .NET and .NET cumulative updates | | | 24 |
|
|Add .NET and .NET cumulative updates | | | 24 |
|
||||||
|Export image | 8 | 17 | 25 |
|
|Export image | 8 | 17 | 25 |
|
||||||
|
|
||||||
|
> [!NOTE]
|
||||||
|
> Starting in February 2021, the latest cumulative update and servicing stack update will be combined and distributed in the Microsoft Update Catalog as a new combined cumulative update. For Steps 1, 9, and 18 that require the servicing stack update for updating the installation media, you should use the combined cumulative update. For more information on the combined cumulative update, see [Servicing stack updates](https://docs.microsoft.com/windows/deployment/update/servicing-stack-updates).
|
||||||
|
|
||||||
### Multiple Windows editions
|
### Multiple Windows editions
|
||||||
|
|
||||||
The main operating system file (install.wim) contains multiple editions of Windows 10. It’s possible that only an update for a given edition is required to deploy it, based on the index. Or, it might be that all editions need an update. Further, ensure that languages are installed before Features on Demand, and the latest cumulative update is always applied last.
|
The main operating system file (install.wim) contains multiple editions of Windows 10. It’s possible that only an update for a given edition is required to deploy it, based on the index. Or, it might be that all editions need an update. Further, ensure that languages are installed before Features on Demand, and the latest cumulative update is always applied last.
|
||||||
|
@ -29,8 +29,6 @@ Servicing stack updates provide fixes to the servicing stack, the component that
|
|||||||
|
|
||||||
Servicing stack updates improve the reliability of the update process to mitigate potential issues while installing the latest quality updates and feature updates. If you don't install the latest servicing stack update, there's a risk that your device can't be updated with the latest Microsoft security fixes.
|
Servicing stack updates improve the reliability of the update process to mitigate potential issues while installing the latest quality updates and feature updates. If you don't install the latest servicing stack update, there's a risk that your device can't be updated with the latest Microsoft security fixes.
|
||||||
|
|
||||||
For information about some changes to servicing stack updates, see [Simplifing Deployment of Servicing Stack Updates](https://techcommunity.microsoft.com/t5/windows-it-pro-blog/simplifying-on-premises-deployment-of-servicing-stack-updates/ba-p/1646039) on the Windows IT Pro blog.
|
|
||||||
|
|
||||||
## When are they released?
|
## When are they released?
|
||||||
|
|
||||||
Servicing stack update are released depending on new issues or vulnerabilities. In rare occasions a servicing stack update may need to be released on demand to address an issue impacting systems installing the monthly security update. Starting in November 2018 new servicing stack updates will be classified as "Security" with a severity rating of "Critical."
|
Servicing stack update are released depending on new issues or vulnerabilities. In rare occasions a servicing stack update may need to be released on demand to address an issue impacting systems installing the monthly security update. Starting in November 2018 new servicing stack updates will be classified as "Security" with a severity rating of "Critical."
|
||||||
@ -44,7 +42,6 @@ Both Windows 10 and Windows Server use the cumulative update mechanism, in which
|
|||||||
|
|
||||||
Servicing stack updates must ship separately from the cumulative updates because they modify the component that installs Windows updates. The servicing stack is released separately because the servicing stack itself requires an update. For example, the cumulative update [KB4284880](https://support.microsoft.com/help/4284880/windows-10-update-kb4284880) requires the [May 17, 2018 servicing stack update](https://support.microsoft.com/help/4132216), which includes updates to Windows Update.
|
Servicing stack updates must ship separately from the cumulative updates because they modify the component that installs Windows updates. The servicing stack is released separately because the servicing stack itself requires an update. For example, the cumulative update [KB4284880](https://support.microsoft.com/help/4284880/windows-10-update-kb4284880) requires the [May 17, 2018 servicing stack update](https://support.microsoft.com/help/4132216), which includes updates to Windows Update.
|
||||||
|
|
||||||
|
|
||||||
## Is there any special guidance?
|
## Is there any special guidance?
|
||||||
|
|
||||||
Microsoft recommends you install the latest servicing stack updates for your operating system before installing the latest cumulative update.
|
Microsoft recommends you install the latest servicing stack updates for your operating system before installing the latest cumulative update.
|
||||||
@ -58,3 +55,7 @@ Typically, the improvements are reliability and performance improvements that do
|
|||||||
* Servicing stack update releases are specific to the operating system version (build number), much like quality updates.
|
* Servicing stack update releases are specific to the operating system version (build number), much like quality updates.
|
||||||
* Search to install latest available [Servicing stack update for Windows 10](https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/ADV990001).
|
* Search to install latest available [Servicing stack update for Windows 10](https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/ADV990001).
|
||||||
* Once a servicing stack update is installed, it cannot be removed or uninstalled from the machine.
|
* Once a servicing stack update is installed, it cannot be removed or uninstalled from the machine.
|
||||||
|
|
||||||
|
## Simplifying on-premises deployment of servicing stack updates
|
||||||
|
|
||||||
|
With the Windows Update experience, servicing stack updates and cumulative updates are deployed together to the device. The update stack automatically orchestrates the installation, so both are applied correctly. Starting in February 2021, the cumulative update will include the latest servicing stack updates, to provide a single cumulative update payload to both Windows Server Update Services (WSUS) and Microsoft Catalog. If you use an endpoint management tool backed by WSUS, such as Configuration Manager, you will only have to select and deploy the monthly cumulative update. The latest servicing stack updates will automatically be applied correctly. Release notes and file information for cumulative updates, including those related to the servicing stack, will be in a single KB article. The combined monthly cumulative update will be available on Windows 10, version 2004 and later starting with the 2021 2C release, KB4601382.
|
||||||
|
@ -29,6 +29,9 @@ ms.topic: article
|
|||||||
>- Windows Server 2012
|
>- Windows Server 2012
|
||||||
>- Windows Server 2016
|
>- Windows Server 2016
|
||||||
>- Windows Server 2019
|
>- Windows Server 2019
|
||||||
|
>- Office 2013*
|
||||||
|
>- Office 2016*
|
||||||
|
>- Office 2019*
|
||||||
|
|
||||||
**Looking for retail activation?**
|
**Looking for retail activation?**
|
||||||
|
|
||||||
@ -47,9 +50,9 @@ The process proceeds as follows:
|
|||||||
- Install the Volume Activation Services server role on a domain controller and add a KMS host key by using the Volume Activation Tools Wizard.
|
- Install the Volume Activation Services server role on a domain controller and add a KMS host key by using the Volume Activation Tools Wizard.
|
||||||
- Extend the domain to the Windows Server 2012 R2 or higher schema level, and add a KMS host key by using the VAMT.
|
- Extend the domain to the Windows Server 2012 R2 or higher schema level, and add a KMS host key by using the VAMT.
|
||||||
|
|
||||||
1. Microsoft verifies the KMS host key, and an activation object is created.
|
2. Microsoft verifies the KMS host key, and an activation object is created.
|
||||||
|
|
||||||
1. Client computers are activated by receiving the activation object from a domain controller during startup.
|
3. Client computers are activated by receiving the activation object from a domain controller during startup.
|
||||||
|
|
||||||
> [!div class="mx-imgBorder"]
|
> [!div class="mx-imgBorder"]
|
||||||
> 
|
> 
|
||||||
@ -73,33 +76,33 @@ When a reactivation event occurs, the client queries AD DS for the activation o
|
|||||||
|
|
||||||
1. Use an account with Domain Administrator and Enterprise Administrator credentials to sign in to a domain controller.
|
1. Use an account with Domain Administrator and Enterprise Administrator credentials to sign in to a domain controller.
|
||||||
|
|
||||||
1. Launch Server Manager.
|
2. Launch Server Manager.
|
||||||
|
|
||||||
1. Add the Volume Activation Services role, as shown in Figure 11.
|
3. Add the Volume Activation Services role, as shown in Figure 11.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
**Figure 11**. Adding the Volume Activation Services role
|
**Figure 11**. Adding the Volume Activation Services role
|
||||||
|
|
||||||
1. Click the link to launch the Volume Activation Tools (Figure 12).
|
4. Click the link to launch the Volume Activation Tools (Figure 12).
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
**Figure 12**. Launching the Volume Activation Tools
|
**Figure 12**. Launching the Volume Activation Tools
|
||||||
|
|
||||||
1. Select the **Active Directory-Based Activation** option (Figure 13).
|
5. Select the **Active Directory-Based Activation** option (Figure 13).
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
**Figure 13**. Selecting Active Directory-Based Activation
|
**Figure 13**. Selecting Active Directory-Based Activation
|
||||||
|
|
||||||
1. Enter your KMS host key and (optionally) a display name (Figure 14).
|
6. Enter your KMS host key and (optionally) a display name (Figure 14).
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
**Figure 14**. Entering your KMS host key
|
**Figure 14**. Entering your KMS host key
|
||||||
|
|
||||||
1. Activate your KMS host key by phone or online (Figure 15).
|
7. Activate your KMS host key by phone or online (Figure 15).
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
@ -115,23 +118,18 @@ When a reactivation event occurs, the client queries AD DS for the activation o
|
|||||||
>
|
>
|
||||||
> - [Office 2019 VL pack](https://www.microsoft.com/download/details.aspx?id=57342)
|
> - [Office 2019 VL pack](https://www.microsoft.com/download/details.aspx?id=57342)
|
||||||
|
|
||||||
1. After activating the key, click **Commit**, and then click **Close**.
|
8. After activating the key, click **Commit**, and then click **Close**.
|
||||||
|
|
||||||
## Verifying the configuration of Active Directory-based activation
|
## Verifying the configuration of Active Directory-based activation
|
||||||
|
|
||||||
To verify your Active Directory-based activation configuration, complete the following steps:
|
To verify your Active Directory-based activation configuration, complete the following steps:
|
||||||
|
|
||||||
1. After you configure Active Directory-based activation, start a computer that is running an edition of Windows that is configured by volume licensing.
|
1. After you configure Active Directory-based activation, start a computer that is running an edition of Windows that is configured by volume licensing.
|
||||||
|
2. If the computer has been previously configured with a MAK key, replace the MAK key with the GVLK by running the **slmgr.vbs /ipk** command and specifying the GLVK as the new product key.
|
||||||
1. If the computer has been previously configured with a MAK key, replace the MAK key with the GVLK by running the **slmgr.vbs /ipk** command and specifying the GLVK as the new product key.
|
3. If the computer is not joined to your domain, join it to the domain.
|
||||||
|
4. Sign in to the computer.
|
||||||
1. If the computer is not joined to your domain, join it to the domain.
|
5. Open Windows Explorer, right-click **Computer**, and then click **Properties**.
|
||||||
|
6. Scroll down to the **Windows activation** section, and verify that this client has been activated.
|
||||||
1. Sign in to the computer.
|
|
||||||
|
|
||||||
1. Open Windows Explorer, right-click **Computer**, and then click **Properties**.
|
|
||||||
|
|
||||||
1. Scroll down to the **Windows activation** section, and verify that this client has been activated.
|
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> If you are using both KMS and Active Directory-based activation, it may be difficult to see whether a client has been activated by KMS or by Active Directory-based activation. Consider disabling KMS during the test, or make sure that you are using a client computer that has not already been activated by KMS. The **slmgr.vbs /dlv** command also indicates whether KMS has been used.
|
> If you are using both KMS and Active Directory-based activation, it may be difficult to see whether a client has been activated by KMS or by Active Directory-based activation. Consider disabling KMS during the test, or make sure that you are using a client computer that has not already been activated by KMS. The **slmgr.vbs /dlv** command also indicates whether KMS has been used.
|
||||||
|
@ -0,0 +1,209 @@
|
|||||||
|
---
|
||||||
|
title: Deploying Certificates to Key Trust Users to Enable RDP
|
||||||
|
description: Learn how to deploy certificates to a Key Trust user to enable remote desktop with supplied credentials
|
||||||
|
keywords: identity, PIN, biometric, Hello, passport, WHFB, hybrid, cert-trust, device, registration, unlock, remote desktop, RDP
|
||||||
|
ms.prod: w10
|
||||||
|
ms.mktglfcycl: deploy
|
||||||
|
ms.sitesec: library
|
||||||
|
ms.pagetype: security, mobile
|
||||||
|
audience: ITPro
|
||||||
|
author: mapalko
|
||||||
|
ms.author: mapalko
|
||||||
|
manager: dansimp
|
||||||
|
ms.collection: M365-identity-device-management
|
||||||
|
ms.topic: article
|
||||||
|
localizationpriority: medium
|
||||||
|
ms.date: 02/22/2021
|
||||||
|
ms.reviewer:
|
||||||
|
---
|
||||||
|
|
||||||
|
# Deploying Certificates to Key Trust Users to Enable RDP
|
||||||
|
|
||||||
|
**Applies To**
|
||||||
|
|
||||||
|
- Windows 10, version 1703 or later
|
||||||
|
- Hybrid deployment
|
||||||
|
- Key trust
|
||||||
|
|
||||||
|
Windows Hello for Business supports using a certificate as the supplied credential when establishing a remote desktop connection to a server or other device. For certificate trust deployments, creation of this certificate occurs at container creation time.
|
||||||
|
|
||||||
|
This document discusses an approach for key trust deployments where authentication certificates can be deployed to an existing key trust user.
|
||||||
|
|
||||||
|
Three approaches are documented here:
|
||||||
|
|
||||||
|
1. Deploying a certificate to hybrid joined devices using an on-premises Active Directory certificate enrollment policy.
|
||||||
|
|
||||||
|
1. Deploying a certificate to hybrid or Azure AD joined devices using Simple Certificate Enrollment Protocol (SCEP) and Intune.
|
||||||
|
|
||||||
|
1. Working with non-Microsoft enterprise certificate authorities.
|
||||||
|
|
||||||
|
## Deploying a certificate to a hybrid joined device using an on-premises Active Directory Certificate enrollment policy
|
||||||
|
|
||||||
|
### Create a Windows Hello for Business certificate template
|
||||||
|
|
||||||
|
1. Sign in to your issuing certificate authority (CA).
|
||||||
|
|
||||||
|
1. Open the **Certificate Authority** Console (%windir%\system32\certsrv.msc).
|
||||||
|
|
||||||
|
1. In the left pane of the MMC, expand **Certification Authority (Local)**, and then expand your CA within the Certification Authority list.
|
||||||
|
|
||||||
|
1. Right-click **Certificate Templates** and then click **Manage** to open the **Certificate Templates** console.
|
||||||
|
|
||||||
|
1. Right-click the **Smartcard Logon** template and click **Duplicate Template**
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
1. On the **Compatibility** tab:
|
||||||
|
1. Clear the **Show resulting changes** check box
|
||||||
|
1. Select **Windows Server 2012 or Windows Server 2012 R2** from the Certification Authority list
|
||||||
|
1. Select **Windows Server 2012 or Windows Server 2012 R2** from the Certification Recipient list
|
||||||
|
|
||||||
|
1. On the **General** tab:
|
||||||
|
1. Specify a Template display name, such as **WHfB Certificate Authentication**
|
||||||
|
1. Set the validity period to the desired value
|
||||||
|
1. Take note of the Template name for later, which should be the same as the Template display name minus spaces (**WHfBCertificateAuthentication** in this example).
|
||||||
|
|
||||||
|
1. On the **Extensions** tab, verify the **Application Policies** extension includes **Smart Card Logon**.
|
||||||
|
|
||||||
|
1. On the **Subject Name** tab:
|
||||||
|
1. Select the **Build from this Active Directory** information button if it is not already selected
|
||||||
|
1. Select **Fully distinguished name** from the **Subject name format** list if Fully distinguished name is not already selected
|
||||||
|
1. Select the **User Principal Name (UPN)** check box under **Include this information in alternative subject name**
|
||||||
|
1. On the **Request Handling** tab:
|
||||||
|
1. Select the **Renew with same key** check box
|
||||||
|
1. Set the Purpose to **Signature and smartcard logon**
|
||||||
|
1. Click **Yes** when prompted to change the certificate purpose
|
||||||
|
1. Click **Prompt the user during enrollment**
|
||||||
|
|
||||||
|
1. On the **Cryptography** tab:
|
||||||
|
1. Set the Provider Category to **Key Storage Provider**
|
||||||
|
1. Set the Algorithm name to **RSA**
|
||||||
|
1. Set the minimum key size to **2048**
|
||||||
|
1. Select **Requests must use one of the following providers**
|
||||||
|
1. Tick **Microsoft Software Key Storage Provider**
|
||||||
|
1. Set the Request hash to **SHA256**
|
||||||
|
|
||||||
|
1. On the **Security** tab, add the security group that you want to give **Enroll** access to. For example, if you want to give access to all users, select the **Authenticated** users group, and then select Enroll permissions for them .
|
||||||
|
|
||||||
|
1. Click **OK** to finalize your changes and create the new template. Your new template should now appear in the list of Certificate Templates.
|
||||||
|
|
||||||
|
1. Close the Certificate Templates console.
|
||||||
|
|
||||||
|
1. Open an elevated command prompt and change to a temporary working directory.
|
||||||
|
|
||||||
|
1. Execute the following command:
|
||||||
|
|
||||||
|
certutil -dstemplate \<TemplateName\> \> \<TemplateName\>.txt
|
||||||
|
|
||||||
|
Replace \<TemplateName\> with the Template name you took note of earlier in step 7.
|
||||||
|
|
||||||
|
1. Open the text file created by the command above.
|
||||||
|
1. Delete the last line of the output from the file that reads **CertUtil: -dsTemplate command completed successfully.**
|
||||||
|
1. Modify the line that reads **pKIDefaultCSPs = "1,Microsoft Software Key Storage Provider"** to **pKIDefaultCSPs = "1,Microsoft Passport Key Storage Provider"**
|
||||||
|
|
||||||
|
1. Save the text file.
|
||||||
|
|
||||||
|
1. Update the certificate template by executing the following command:
|
||||||
|
|
||||||
|
certutil - dsaddtemplate \<TemplateName\>.txt
|
||||||
|
|
||||||
|
1. In the Certificate Authority console, right-click **Certificate Templates**, select **New**, and select **Certificate Template to Issue**
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
1. From the list of templates, select the template you previously created (**WHFB Certificate Authentication**) and click **OK**. It can take some time for the template to replicate to all servers and become available in this list.
|
||||||
|
|
||||||
|
1. After the template replicates, in the MMC, right-click in the Certification Authority list, click **All Tasks** and then click **Stop Service**. Right-click the name of the CA again, click **All Tasks**, and then click **Start Service**.
|
||||||
|
|
||||||
|
### Requesting a Certificate
|
||||||
|
|
||||||
|
1. Ensure the hybrid Azure AD joined device has network line of sight to Active Directory domain controllers and the issuing certificate authority.
|
||||||
|
|
||||||
|
1. Start the **Certificates – Current User** console (%windir%\system32\certmgr.msc).
|
||||||
|
|
||||||
|
1. In the left pane of the MMC, right-click **Personal**, click **All Tasks**, and then click **Request New Certificate…**
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
1. On the Certificate Enrollment screen, click **Next**.
|
||||||
|
|
||||||
|
1. Under Select Certificate Enrollment Policy, ensure **Active Directory Enrollment Policy** is selected and then click **Next**.
|
||||||
|
|
||||||
|
1. Under Request Certificates, click the check-box next to the certificate template you created in the previous section (WHfB Certificate Authentication) and then click **Enroll**.
|
||||||
|
|
||||||
|
1. After a successful certificate request, click Finish on the Certificate Installation Results screen
|
||||||
|
|
||||||
|
## Deploying a certificate to Hybrid or Azure AD Joined Devices using Simple Certificate Enrollment Protocol (SCEP) via Intune
|
||||||
|
|
||||||
|
Deploying a certificate to Azure AD Joined Devices may be achieved with the Simple Certificate Enrollment Protocol (SCEP) via Intune. For guidance deploying the required infrastructure, refer to [Configure infrastructure to support SCEP certificate profiles with Microsoft Intune](https://docs.microsoft.com/mem/intune/protect/certificates-scep-configure).
|
||||||
|
|
||||||
|
Next you should deploy the root CA certificate (and any other intermediate certificate authority certificates) to Azure AD Joined Devices using a Trusted root certificate profile with Intune. For guidance, refer to [Create trusted certificate profiles in Microsoft Intune](https://docs.microsoft.com/mem/intune/protect/certificates-trusted-root).
|
||||||
|
|
||||||
|
Once these requirements have been met, a new device configuration profile may be configured from Intune that provisions a certificate for the user of the device. Proceed as follows:
|
||||||
|
|
||||||
|
1. Sign in to the Microsoft [Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431).
|
||||||
|
|
||||||
|
1. Navigate to Devices \> Configuration Profiles \> Create profile.
|
||||||
|
|
||||||
|
1. Enter the following properties:
|
||||||
|
1. For Platform, select **Windows 10 and later**.
|
||||||
|
1. For Profile, select **SCEP Certificate**.
|
||||||
|
1. Click **Create**.
|
||||||
|
|
||||||
|
1. In **Basics**, enter the following parameters:
|
||||||
|
1. **Name**: Enter a descriptive name for the profile. Name your profiles so you can easily identify them later. For example, a good profile name is SCEP profile for entire company.
|
||||||
|
1. **Description**: Enter a description for the profile. This setting is optional, but recommended.
|
||||||
|
1. Select **Next**.
|
||||||
|
|
||||||
|
1. In the **Configuration settings**, complete the following:
|
||||||
|
1. For Certificate Type, choose **User**.
|
||||||
|
1. For Subject name format, set it to **CN={{UserPrincipalName}}**.
|
||||||
|
1. Under Subject alternative name, select **User principal name (UPN)** from the drop-down menu and set the value to **CN={{UserPrincipalName}}**.
|
||||||
|
1. For Certificate validity period, set a value of your choosing.
|
||||||
|
1. For Key storage provider (KSP), choose **Enroll to Windows Hello for Business, otherwise fail (Windows 10 and later)**.
|
||||||
|
1. For Key usage, choose **Digital Signature**.
|
||||||
|
1. For Key size (bits), choose **2048**.
|
||||||
|
1. For Hash algorithm, choose **SHA-2**.
|
||||||
|
1. Under Root Certificate, click **+Root Certificate** and select the trusted certificate profile you created earlier for the Root CA Certificate.
|
||||||
|
1. Under Extended key usage, add the following:
|
||||||
|
|
||||||
|
| Name | Object Identifier | Predefined Values |
|
||||||
|
|------|-------------------|-------------------|
|
||||||
|
| Smart Card Logon | 1.3.6.1.4.1.311.20.2.2 | Smart Card Logon |
|
||||||
|
| Client Authentication | 1.3.6.1.5.5.7.3.2 | Client Authentication |
|
||||||
|
|
||||||
|
1. For Renewal threshold (%), set a value of your choosing.
|
||||||
|
1. For SCEP Server URLs, provide the public endpoint that you configured during the deployment of your SCEP infrastructure.
|
||||||
|
1. Click **Next**
|
||||||
|
1. In Assignments, target the devices or users who should receive a certificate and click **Next**
|
||||||
|
|
||||||
|
1. In Applicability Rules, provide additional issuance restrictions if required and click **Next**
|
||||||
|
|
||||||
|
1. In Review + create, click **Create**
|
||||||
|
|
||||||
|
Once the configuration profile has been created, targeted clients will receive the profile from Intune on their next refresh cycle. You should find a new certificate in the user store. To validate the certificate is present, do the following steps:
|
||||||
|
|
||||||
|
1. Open the Certificates - Current User console (%windir%\system32\certmgr.msc)
|
||||||
|
|
||||||
|
1. In the left pane of the MMC, expand **Personal** and select **Certificates**
|
||||||
|
|
||||||
|
1. In the right-hand pane of the MMC, check for the new certificate
|
||||||
|
|
||||||
|
> [!NOTE]
|
||||||
|
> This infrastructure may also deploy the same certificates to co-managed or modern-managed Hybrid AAD-Joined devices using Intune Policies.
|
||||||
|
|
||||||
|
## Using non-Microsoft Enterprise Certificate Authorities
|
||||||
|
|
||||||
|
If you are using a Public Key Infrastructure that uses non-Microsoft services, the certificate templates published to the on-premises Active Directory may not be available. For guidance with integration of Intune/SCEP with non-Microsoft PKI deployments, refer to [Use third-party certification authorities (CA) with SCEP in Microsoft Intune](https://docs.microsoft.com/mem/intune/protect/certificate-authority-add-scep-overview).
|
||||||
|
|
||||||
|
As an alternative to using SCEP or if none of the previously covered solutions will work in your environment, you can manually generate Certificate Signing Requests (CSR) for submission to your PKI. To assist with this approach, you can use the [Generate-CertificateRequest](https://www.powershellgallery.com/packages/Generate-CertificateRequest) PowerShell commandlet.
|
||||||
|
|
||||||
|
The Generate-CertificateRequest commandlet will generate an .inf file for a pre-existing Windows Hello for Business key. The .inf can be used to generate a certificate request manually using certreq.exe. The commandlet will also generate a .req file, which can be submitted to your PKI for a certificate.
|
||||||
|
|
||||||
|
## RDP Sign-in with Windows Hello for Business Certificate Authentication
|
||||||
|
|
||||||
|
After adding the certificate using an approach from any of the previous sections, you should be able to RDP to any Windows device or server in the same Forest as the user’s on-premises Active Directory account, provided the PKI certificate chain for the issuing certificate authority is deployed to that target server.
|
||||||
|
|
||||||
|
1. Open the Remote Desktop Client (%windir%\system32\mstsc.exe) on the Hybrid AAD-Joined client where the authentication certificate has been deployed.
|
||||||
|
1. Attempt an RDP session to a target server.
|
||||||
|
1. Use the certificate credential protected by your Windows Hello for Business gesture.
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Remote Desktop
|
title: Remote Desktop
|
||||||
description: Learn how Windows Hello for Business supports using a certificate deployed to a WHFB container to a remote desktop to a server or another device.
|
description: Learn how Windows Hello for Business supports using biometrics with remote desktop
|
||||||
keywords: identity, PIN, biometric, Hello, passport, WHFB, hybrid, cert-trust, device, registration, unlock, remote desktop, RDP
|
keywords: identity, PIN, biometric, Hello, passport, WHFB, hybrid, cert-trust, device, registration, unlock, remote desktop, RDP
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
@ -13,7 +13,7 @@ manager: dansimp
|
|||||||
ms.collection: M365-identity-device-management
|
ms.collection: M365-identity-device-management
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
localizationpriority: medium
|
localizationpriority: medium
|
||||||
ms.date: 09/16/2020
|
ms.date: 02/24/2021
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
---
|
---
|
||||||
|
|
||||||
|
Binary file not shown.
After Width: | Height: | Size: 8.5 KiB |
Binary file not shown.
After Width: | Height: | Size: 7.8 KiB |
Binary file not shown.
After Width: | Height: | Size: 33 KiB |
@ -103,6 +103,8 @@
|
|||||||
href: hello-cert-trust-policy-settings.md
|
href: hello-cert-trust-policy-settings.md
|
||||||
- name: Managing Windows Hello for Business in your organization
|
- name: Managing Windows Hello for Business in your organization
|
||||||
href: hello-manage-in-organization.md
|
href: hello-manage-in-organization.md
|
||||||
|
- name: Deploying Certificates to Key Trust Users to Enable RDP
|
||||||
|
href: hello-deployment-rdp-certs.md
|
||||||
- name: Windows Hello for Business Features
|
- name: Windows Hello for Business Features
|
||||||
items:
|
items:
|
||||||
- name: Conditional Access
|
- name: Conditional Access
|
||||||
|
@ -14,7 +14,7 @@ audience: ITPro
|
|||||||
author: denisebmsft
|
author: denisebmsft
|
||||||
ms.author: deniseb
|
ms.author: deniseb
|
||||||
ms.custom: nextgen
|
ms.custom: nextgen
|
||||||
ms.date: 02/17/2021
|
ms.date: 03/08/2021
|
||||||
ms.technology: mde
|
ms.technology: mde
|
||||||
---
|
---
|
||||||
|
|
||||||
@ -64,7 +64,7 @@ Tamper protection doesn't prevent you from viewing your security settings. And,
|
|||||||
| Turn tamper protection on (or off) for an individual device | [Manage tamper protection on an individual device](#manage-tamper-protection-on-an-individual-device) |
|
| Turn tamper protection on (or off) for an individual device | [Manage tamper protection on an individual device](#manage-tamper-protection-on-an-individual-device) |
|
||||||
| Turn tamper protection on (or off) for all or part of your organization using Intune <p>Fine-tune tamper protection settings in your organization | [Manage tamper protection for your organization using Intune](#manage-tamper-protection-for-your-organization-using-intune) |
|
| Turn tamper protection on (or off) for all or part of your organization using Intune <p>Fine-tune tamper protection settings in your organization | [Manage tamper protection for your organization using Intune](#manage-tamper-protection-for-your-organization-using-intune) |
|
||||||
| Turn tamper protection on (or off) for your organization with Configuration Manager | [Manage tamper protection for your organization using tenant attach with Configuration Manager, version 2006](#manage-tamper-protection-for-your-organization-with-configuration-manager-version-2006) |
|
| Turn tamper protection on (or off) for your organization with Configuration Manager | [Manage tamper protection for your organization using tenant attach with Configuration Manager, version 2006](#manage-tamper-protection-for-your-organization-with-configuration-manager-version-2006) |
|
||||||
| Turn tamper protection on (or off) in the Microsoft Defender Security Center <p>Manage tamper protection across your tenant <p>(Currently in preview) | [Manage tamper protection for your organization using the Microsoft Defender Security Center](#manage-tamper-protection-for-your-organization-using-the-microsoft-defender-security-center) |
|
| Turn tamper protection on (or off) in the Microsoft Defender Security Center <p>Manage tamper protection across your tenant | [Manage tamper protection for your organization using the Microsoft Defender Security Center](#manage-tamper-protection-for-your-organization-using-the-microsoft-defender-security-center) |
|
||||||
| View details about tampering attempts on devices | [View information about tampering attempts](#view-information-about-tampering-attempts) |
|
| View details about tampering attempts on devices | [View information about tampering attempts](#view-information-about-tampering-attempts) |
|
||||||
| Review your security recommendations | [Review security recommendations](#review-your-security-recommendations) |
|
| Review your security recommendations | [Review security recommendations](#review-your-security-recommendations) |
|
||||||
| Review the list of frequently asked questions (FAQs) | [Browse the FAQs](#view-information-about-tampering-attempts) |
|
| Review the list of frequently asked questions (FAQs) | [Browse the FAQs](#view-information-about-tampering-attempts) |
|
||||||
@ -85,7 +85,9 @@ Here's what you see in the Windows Security app:
|
|||||||

|

|
||||||
|
|
||||||
1. Select **Start**, and start typing *Security*. In the search results, select **Windows Security**.
|
1. Select **Start**, and start typing *Security*. In the search results, select **Windows Security**.
|
||||||
|
|
||||||
2. Select **Virus & threat protection** > **Virus & threat protection settings**.
|
2. Select **Virus & threat protection** > **Virus & threat protection settings**.
|
||||||
|
|
||||||
3. Set **Tamper Protection** to **On** or **Off**.
|
3. Set **Tamper Protection** to **On** or **Off**.
|
||||||
|
|
||||||
## Manage tamper protection for your organization using Intune
|
## Manage tamper protection for your organization using Intune
|
||||||
@ -95,9 +97,13 @@ If you are part of your organization's security team, and your subscription incl
|
|||||||
### Requirements for managing tamper protection in Intune
|
### Requirements for managing tamper protection in Intune
|
||||||
|
|
||||||
- You must have appropriate [permissions](../microsoft-defender-atp/assign-portal-access.md), such as global admin, security admin, or security operations.
|
- You must have appropriate [permissions](../microsoft-defender-atp/assign-portal-access.md), such as global admin, security admin, or security operations.
|
||||||
|
|
||||||
- Your organization uses [Intune to manage devices](https://docs.microsoft.com/intune/fundamentals/what-is-device-management). ([Intune licenses](https://docs.microsoft.com/intune/fundamentals/licenses) are required; Intune is included in Microsoft 365 E5.)
|
- Your organization uses [Intune to manage devices](https://docs.microsoft.com/intune/fundamentals/what-is-device-management). ([Intune licenses](https://docs.microsoft.com/intune/fundamentals/licenses) are required; Intune is included in Microsoft 365 E5.)
|
||||||
|
|
||||||
- Your Windows devices must be running Windows 10 OS [1709](https://docs.microsoft.com/windows/release-health/status-windows-10-1709), [1803](https://docs.microsoft.com/windows/release-health/status-windows-10-1803), [1809](https://docs.microsoft.com/windows/release-health/status-windows-10-1809-and-windows-server-2019) or later. (For more information about releases, see [Windows 10 release information](https://docs.microsoft.com/windows/release-health/release-information).)
|
- Your Windows devices must be running Windows 10 OS [1709](https://docs.microsoft.com/windows/release-health/status-windows-10-1709), [1803](https://docs.microsoft.com/windows/release-health/status-windows-10-1803), [1809](https://docs.microsoft.com/windows/release-health/status-windows-10-1809-and-windows-server-2019) or later. (For more information about releases, see [Windows 10 release information](https://docs.microsoft.com/windows/release-health/release-information).)
|
||||||
|
|
||||||
- You must be using Windows security with [security intelligence](https://www.microsoft.com/wdsi/definitions) updated to version 1.287.60.0 (or above).
|
- You must be using Windows security with [security intelligence](https://www.microsoft.com/wdsi/definitions) updated to version 1.287.60.0 (or above).
|
||||||
|
|
||||||
- Your devices must be using anti-malware platform version 4.18.1906.3 (or above) and anti-malware engine version 1.1.15500.X (or above). ([Manage Microsoft Defender Antivirus updates and apply baselines](manage-updates-baselines-microsoft-defender-antivirus.md).)
|
- Your devices must be using anti-malware platform version 4.18.1906.3 (or above) and anti-malware engine version 1.1.15500.X (or above). ([Manage Microsoft Defender Antivirus updates and apply baselines](manage-updates-baselines-microsoft-defender-antivirus.md).)
|
||||||
|
|
||||||
### Turn tamper protection on (or off) in Intune
|
### Turn tamper protection on (or off) in Intune
|
||||||
@ -105,12 +111,15 @@ If you are part of your organization's security team, and your subscription incl
|
|||||||

|

|
||||||
|
|
||||||
1. Go to the [Microsoft Endpoint Manager admin center](https://endpoint.microsoft.com) and sign in with your work or school account.
|
1. Go to the [Microsoft Endpoint Manager admin center](https://endpoint.microsoft.com) and sign in with your work or school account.
|
||||||
|
|
||||||
2. Select **Devices** > **Configuration Profiles**.
|
2. Select **Devices** > **Configuration Profiles**.
|
||||||
|
|
||||||
3. Create a profile that includes the following settings:
|
3. Create a profile that includes the following settings:
|
||||||
- **Platform: Windows 10 and later**
|
- **Platform: Windows 10 and later**
|
||||||
- **Profile type: Endpoint protection**
|
- **Profile type: Endpoint protection**
|
||||||
- **Category: Microsoft Defender Security Center**
|
- **Category: Microsoft Defender Security Center**
|
||||||
- **Tamper Protection: Enabled**
|
- **Tamper Protection: Enabled**
|
||||||
|
|
||||||
4. Assign the profile to one or more groups.
|
4. Assign the profile to one or more groups.
|
||||||
|
|
||||||
### Are you using Windows OS 1709, 1803, or 1809?
|
### Are you using Windows OS 1709, 1803, or 1809?
|
||||||
@ -120,7 +129,9 @@ If you are using Windows 10 OS [1709](https://docs.microsoft.com/windows/release
|
|||||||
#### Use PowerShell to determine whether tamper protection is turned on
|
#### Use PowerShell to determine whether tamper protection is turned on
|
||||||
|
|
||||||
1. Open the Windows PowerShell app.
|
1. Open the Windows PowerShell app.
|
||||||
|
|
||||||
2. Use the [Get-MpComputerStatus](https://docs.microsoft.com/powershell/module/defender/get-mpcomputerstatus?view=win10-ps&preserve-view=true) PowerShell cmdlet.
|
2. Use the [Get-MpComputerStatus](https://docs.microsoft.com/powershell/module/defender/get-mpcomputerstatus?view=win10-ps&preserve-view=true) PowerShell cmdlet.
|
||||||
|
|
||||||
3. In the list of results, look for `IsTamperProtected`. (A value of *true* means tamper protection is enabled.)
|
3. In the list of results, look for `IsTamperProtected`. (A value of *true* means tamper protection is enabled.)
|
||||||
|
|
||||||
## Manage tamper protection for your organization with Configuration Manager, version 2006
|
## Manage tamper protection for your organization with Configuration Manager, version 2006
|
||||||
@ -133,9 +144,11 @@ If you're using [version 2006 of Configuration Manager](https://docs.microsoft.c
|
|||||||

|

|
||||||
|
|
||||||
1. Set up tenant attach. See [Microsoft Endpoint Manager tenant attach: Device sync and device actions](https://docs.microsoft.com/mem/configmgr/tenant-attach/device-sync-actions).
|
1. Set up tenant attach. See [Microsoft Endpoint Manager tenant attach: Device sync and device actions](https://docs.microsoft.com/mem/configmgr/tenant-attach/device-sync-actions).
|
||||||
|
|
||||||
2. In the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431), go to **Endpoint security** > **Antivirus**, and choose **+ Create Policy**.<br/>
|
2. In the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431), go to **Endpoint security** > **Antivirus**, and choose **+ Create Policy**.<br/>
|
||||||
- In the **Platform** list, select **Windows 10 and Windows Server (ConfigMgr)**.
|
- In the **Platform** list, select **Windows 10 and Windows Server (ConfigMgr)**.
|
||||||
- In the **Profile** list, select **Windows Security experience (preview)**. <br/>
|
- In the **Profile** list, select **Windows Security experience (preview)**. <br/>
|
||||||
|
|
||||||
3. Deploy the policy to your device collection.
|
3. Deploy the policy to your device collection.
|
||||||
|
|
||||||
### Need help with this?
|
### Need help with this?
|
||||||
@ -147,24 +160,29 @@ See the following resources:
|
|||||||
|
|
||||||
## Manage tamper protection for your organization using the Microsoft Defender Security Center
|
## Manage tamper protection for your organization using the Microsoft Defender Security Center
|
||||||
|
|
||||||
Currently in preview, tamper protection can be turned on or off in the Microsoft Defender Security Center ([https://securitycenter.windows.com](https://securitycenter.windows.com)). Here are a few points to keep in mind:
|
Tamper protection can be turned on or off for your tenant using the Microsoft Defender Security Center ([https://securitycenter.windows.com](https://securitycenter.windows.com)). Here are a few points to keep in mind:
|
||||||
|
|
||||||
- When you use the Microsoft Defender Security Center to manage tamper protection, you do not have to use Intune or the tenant attach method.
|
- When you use the Microsoft Defender Security Center to manage tamper protection, you do not have to use Intune or the tenant attach method.
|
||||||
|
|
||||||
- When you manage tamper protection in the Microsoft Defender Security Center, the setting is applied tenant wide, affecting all of your devices that are running Windows 10, Windows Server 2016, or Windows Server 2019. To fine-tune tamper protection (such as having tamper protection on for some devices but off for others), use either [Intune](#manage-tamper-protection-for-your-organization-using-intune) or [Configuration Manager with tenant attach](#manage-tamper-protection-for-your-organization-with-configuration-manager-version-2006).
|
- When you manage tamper protection in the Microsoft Defender Security Center, the setting is applied tenant wide, affecting all of your devices that are running Windows 10, Windows Server 2016, or Windows Server 2019. To fine-tune tamper protection (such as having tamper protection on for some devices but off for others), use either [Intune](#manage-tamper-protection-for-your-organization-using-intune) or [Configuration Manager with tenant attach](#manage-tamper-protection-for-your-organization-with-configuration-manager-version-2006).
|
||||||
|
|
||||||
- If you have a hybrid environment, tamper protection settings configured in Intune take precedence over settings configured in the Microsoft Defender Security Center.
|
- If you have a hybrid environment, tamper protection settings configured in Intune take precedence over settings configured in the Microsoft Defender Security Center.
|
||||||
- Tamper protection is generally available; however, the ability to manage tamper protection in the Microsoft Defender Security Center is currently in preview.
|
|
||||||
|
|
||||||
### Requirements for managing tamper protection in the Microsoft Defender Security Center
|
### Requirements for managing tamper protection in the Microsoft Defender Security Center
|
||||||
|
|
||||||
- You must have appropriate [permissions](../microsoft-defender-atp/assign-portal-access.md), such as global admin, security admin, or security operations.
|
- You must have appropriate [permissions](../microsoft-defender-atp/assign-portal-access.md), such as global admin, security admin, or security operations.
|
||||||
|
|
||||||
- Your Windows devices must be running one of the following versions of Windows:
|
- Your Windows devices must be running one of the following versions of Windows:
|
||||||
- Windows 10
|
- Windows 10
|
||||||
- [Windows Server 2019](/windows-server/get-started-19/whats-new-19)
|
- [Windows Server 2019](/windows-server/get-started-19/whats-new-19)
|
||||||
- Windows Server, version [1803](https://docs.microsoft.com/windows/release-health/status-windows-10-1803) or later
|
- Windows Server, version [1803](https://docs.microsoft.com/windows/release-health/status-windows-10-1803) or later
|
||||||
- [Windows Server 2016](/windows-server/get-started/whats-new-in-windows-server-2016)
|
- [Windows Server 2016](/windows-server/get-started/whats-new-in-windows-server-2016)
|
||||||
- For more information about releases, see [Windows 10 release information](https://docs.microsoft.com/windows/release-health/release-information).
|
- For more information about releases, see [Windows 10 release information](https://docs.microsoft.com/windows/release-health/release-information).
|
||||||
|
|
||||||
- Your devices must be [onboarded to Microsoft Defender for Endpoint](../microsoft-defender-atp/onboarding.md).
|
- Your devices must be [onboarded to Microsoft Defender for Endpoint](../microsoft-defender-atp/onboarding.md).
|
||||||
|
|
||||||
- Your devices must be using anti-malware platform version 4.18.2010.7 (or above) and anti-malware engine version 1.1.17600.5 (or above). ([Manage Microsoft Defender Antivirus updates and apply baselines](manage-updates-baselines-microsoft-defender-antivirus.md).)
|
- Your devices must be using anti-malware platform version 4.18.2010.7 (or above) and anti-malware engine version 1.1.17600.5 (or above). ([Manage Microsoft Defender Antivirus updates and apply baselines](manage-updates-baselines-microsoft-defender-antivirus.md).)
|
||||||
|
|
||||||
- [Cloud-delivered protection must be turned on](enable-cloud-protection-microsoft-defender-antivirus.md).
|
- [Cloud-delivered protection must be turned on](enable-cloud-protection-microsoft-defender-antivirus.md).
|
||||||
|
|
||||||
### Turn tamper protection on (or off) in the Microsoft Defender Security Center
|
### Turn tamper protection on (or off) in the Microsoft Defender Security Center
|
||||||
@ -172,7 +190,9 @@ Currently in preview, tamper protection can be turned on or off in the Microsoft
|
|||||||

|

|
||||||
|
|
||||||
1. Go to the Microsoft Defender Security Center ([https://securitycenter.windows.com](https://securitycenter.windows.com)) and sign in.
|
1. Go to the Microsoft Defender Security Center ([https://securitycenter.windows.com](https://securitycenter.windows.com)) and sign in.
|
||||||
|
|
||||||
2. Choose **Settings**.
|
2. Choose **Settings**.
|
||||||
|
|
||||||
3. Go to **General** > **Advanced features**, and then turn tamper protection on.
|
3. Go to **General** > **Advanced features**, and then turn tamper protection on.
|
||||||
|
|
||||||
## View information about tampering attempts
|
## View information about tampering attempts
|
||||||
|
@ -20,8 +20,8 @@ ms.technology: mde
|
|||||||
# Add or Remove Machine Tags API
|
# Add or Remove Machine Tags API
|
||||||
|
|
||||||
**Applies to:**
|
**Applies to:**
|
||||||
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631)
|
|
||||||
- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)
|
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2154037)
|
||||||
|
|
||||||
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
|
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
|
||||||
|
|
||||||
@ -90,7 +90,7 @@ If successful, this method returns 200 - Ok response code and the updated Machin
|
|||||||
|
|
||||||
Here is an example of a request that adds machine tag.
|
Here is an example of a request that adds machine tag.
|
||||||
|
|
||||||
```
|
```http
|
||||||
POST https://api.securitycenter.microsoft.com/api/machines/1e5bc9d7e413ddd7902c2932e418702b84d0cc07/tags
|
POST https://api.securitycenter.microsoft.com/api/machines/1e5bc9d7e413ddd7902c2932e418702b84d0cc07/tags
|
||||||
```
|
```
|
||||||
|
|
||||||
|
@ -26,8 +26,8 @@ ms.technology: mde
|
|||||||
>Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-advancedfeats-abovefoldlink)
|
>Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-advancedfeats-abovefoldlink)
|
||||||
|
|
||||||
**Applies to:**
|
**Applies to:**
|
||||||
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/?linkid=2154037)
|
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2154037)
|
||||||
- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)
|
|
||||||
|
|
||||||
Use the `AssignedIPAddresses()` function in your advanced hunting queries to quickly obtain the latest IP addresses that have been assigned to a device. If you specify a timestamp argument, this function obtains the most recent IP addresses at the specified time.
|
Use the `AssignedIPAddresses()` function in your advanced hunting queries to quickly obtain the latest IP addresses that have been assigned to a device. If you specify a timestamp argument, this function obtains the most recent IP addresses at the specified time.
|
||||||
|
|
||||||
|
@ -23,8 +23,8 @@ ms.technology: mde
|
|||||||
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
|
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
|
||||||
|
|
||||||
**Applies to:**
|
**Applies to:**
|
||||||
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631)
|
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2154037)
|
||||||
- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)
|
|
||||||
|
|
||||||
>Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-bestpractices-abovefoldlink)
|
>Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-bestpractices-abovefoldlink)
|
||||||
|
|
||||||
|
@ -24,8 +24,8 @@ ms.technology: mde
|
|||||||
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
|
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
|
||||||
|
|
||||||
**Applies to:**
|
**Applies to:**
|
||||||
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/?linkid=2154037)
|
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2154037)
|
||||||
- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)
|
|
||||||
|
|
||||||
|
|
||||||
>Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-advancedhuntingref-abovefoldlink)
|
>Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-advancedhuntingref-abovefoldlink)
|
||||||
|
@ -23,8 +23,8 @@ ms.technology: mde
|
|||||||
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
|
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
|
||||||
|
|
||||||
**Applies to:**
|
**Applies to:**
|
||||||
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/?linkid=2154037)
|
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2154037)
|
||||||
- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)
|
|
||||||
|
|
||||||
>Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-advancedhuntingref-abovefoldlink)
|
>Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-advancedhuntingref-abovefoldlink)
|
||||||
|
|
||||||
|
@ -24,8 +24,7 @@ ms.technology: mde
|
|||||||
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
|
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
|
||||||
|
|
||||||
**Applies to:**
|
**Applies to:**
|
||||||
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/?linkid=2154037)
|
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2154037)
|
||||||
- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)
|
|
||||||
|
|
||||||
|
|
||||||
>Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-advancedhuntingref-abovefoldlink)
|
>Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-advancedhuntingref-abovefoldlink)
|
||||||
|
@ -23,8 +23,7 @@ ms.technology: mde
|
|||||||
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
|
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
|
||||||
|
|
||||||
**Applies to:**
|
**Applies to:**
|
||||||
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/?linkid=2154037)
|
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2154037)
|
||||||
- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)
|
|
||||||
|
|
||||||
|
|
||||||
>Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-advancedhuntingref-abovefoldlink)
|
>Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-advancedhuntingref-abovefoldlink)
|
||||||
|
@ -23,8 +23,7 @@ ms.technology: mde
|
|||||||
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
|
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
|
||||||
|
|
||||||
**Applies to:**
|
**Applies to:**
|
||||||
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/?linkid=2154037)
|
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2154037)
|
||||||
- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)
|
|
||||||
|
|
||||||
|
|
||||||
>Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-advancedhuntingref-abovefoldlink)
|
>Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-advancedhuntingref-abovefoldlink)
|
||||||
|
@ -23,8 +23,7 @@ ms.technology: mde
|
|||||||
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
|
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
|
||||||
|
|
||||||
**Applies to:**
|
**Applies to:**
|
||||||
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/?linkid=2154037)
|
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2154037)
|
||||||
- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)
|
|
||||||
|
|
||||||
|
|
||||||
>Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-advancedhuntingref-abovefoldlink)
|
>Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-advancedhuntingref-abovefoldlink)
|
||||||
|
@ -23,8 +23,7 @@ ms.technology: mde
|
|||||||
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
|
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
|
||||||
|
|
||||||
**Applies to:**
|
**Applies to:**
|
||||||
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/?linkid=2154037)
|
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2154037)
|
||||||
- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)
|
|
||||||
|
|
||||||
|
|
||||||
>Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-advancedhuntingref-abovefoldlink)
|
>Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-advancedhuntingref-abovefoldlink)
|
||||||
|
@ -23,8 +23,7 @@ ms.technology: mde
|
|||||||
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
|
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
|
||||||
|
|
||||||
**Applies to:**
|
**Applies to:**
|
||||||
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/?linkid=2154037)
|
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2154037)
|
||||||
- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)
|
|
||||||
|
|
||||||
|
|
||||||
>Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-advancedhuntingref-abovefoldlink)
|
>Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-advancedhuntingref-abovefoldlink)
|
||||||
|
@ -23,9 +23,7 @@ ms.technology: mde
|
|||||||
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
|
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
|
||||||
|
|
||||||
**Applies to:**
|
**Applies to:**
|
||||||
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/?linkid=2154037)
|
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2154037)
|
||||||
- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)
|
|
||||||
|
|
||||||
|
|
||||||
>Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-advancedhuntingref-abovefoldlink)
|
>Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-advancedhuntingref-abovefoldlink)
|
||||||
|
|
||||||
|
@ -23,8 +23,7 @@ ms.technology: mde
|
|||||||
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
|
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
|
||||||
|
|
||||||
**Applies to:**
|
**Applies to:**
|
||||||
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/?linkid=2154037)
|
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2154037)
|
||||||
- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)
|
|
||||||
|
|
||||||
|
|
||||||
>Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-advancedhuntingref-abovefoldlink)
|
>Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-advancedhuntingref-abovefoldlink)
|
||||||
|
@ -23,8 +23,8 @@ ms.technology: mde
|
|||||||
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
|
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
|
||||||
|
|
||||||
**Applies to:**
|
**Applies to:**
|
||||||
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/?linkid=2154037)
|
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2154037)
|
||||||
- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)
|
|
||||||
|
|
||||||
>Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-advancedhuntingref-abovefoldlink)
|
>Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-advancedhuntingref-abovefoldlink)
|
||||||
|
|
||||||
|
@ -23,8 +23,9 @@ ms.technology: mde
|
|||||||
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
|
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
|
||||||
|
|
||||||
**Applies to:**
|
**Applies to:**
|
||||||
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/?linkid=2154037)
|
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2154037)
|
||||||
- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)
|
|
||||||
|
|
||||||
|
|
||||||
>Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/WindowsForBusiness/windows-atp?ocid=docs-wdatp-advancedhuntingref-abovefoldlink)
|
>Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/WindowsForBusiness/windows-atp?ocid=docs-wdatp-advancedhuntingref-abovefoldlink)
|
||||||
|
|
||||||
|
@ -23,8 +23,8 @@ ms.technology: mde
|
|||||||
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
|
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
|
||||||
|
|
||||||
**Applies to:**
|
**Applies to:**
|
||||||
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/?linkid=2154037)
|
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2154037)
|
||||||
- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)
|
|
||||||
|
|
||||||
>Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/WindowsForBusiness/windows-atp?ocid=docs-wdatp-advancedhuntingref-abovefoldlink)
|
>Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/WindowsForBusiness/windows-atp?ocid=docs-wdatp-advancedhuntingref-abovefoldlink)
|
||||||
|
|
||||||
|
@ -23,8 +23,7 @@ ms.technology: mde
|
|||||||
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
|
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
|
||||||
|
|
||||||
**Applies to:**
|
**Applies to:**
|
||||||
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/?linkid=2154037)
|
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2154037)
|
||||||
- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)
|
|
||||||
|
|
||||||
>Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/WindowsForBusiness/windows-atp?ocid=docs-wdatp-advancedhuntingref-abovefoldlink)
|
>Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/WindowsForBusiness/windows-atp?ocid=docs-wdatp-advancedhuntingref-abovefoldlink)
|
||||||
|
|
||||||
|
@ -23,8 +23,8 @@ ms.technology: mde
|
|||||||
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
|
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
|
||||||
|
|
||||||
**Applies to:**
|
**Applies to:**
|
||||||
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/?linkid=2154037)
|
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2154037)
|
||||||
- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)
|
|
||||||
|
|
||||||
>Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/WindowsForBusiness/windows-atp?ocid=docs-wdatp-advancedhuntingref-abovefoldlink)
|
>Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/WindowsForBusiness/windows-atp?ocid=docs-wdatp-advancedhuntingref-abovefoldlink)
|
||||||
|
|
||||||
|
@ -23,8 +23,7 @@ ms.technology: mde
|
|||||||
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
|
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
|
||||||
|
|
||||||
**Applies to:**
|
**Applies to:**
|
||||||
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/?linkid=2154037)
|
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2154037)
|
||||||
- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)
|
|
||||||
|
|
||||||
>Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/WindowsForBusiness/windows-atp?ocid=docs-wdatp-advancedhuntingref-abovefoldlink)
|
>Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/WindowsForBusiness/windows-atp?ocid=docs-wdatp-advancedhuntingref-abovefoldlink)
|
||||||
|
|
||||||
|
@ -23,8 +23,8 @@ ms.technology: mde
|
|||||||
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
|
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
|
||||||
|
|
||||||
**Applies to:**
|
**Applies to:**
|
||||||
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/?linkid=2154037)
|
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2154037)
|
||||||
- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)
|
|
||||||
|
|
||||||
>Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-advancedhunting-abovefoldlink)
|
>Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-advancedhunting-abovefoldlink)
|
||||||
|
|
||||||
|
@ -24,8 +24,7 @@ ms.technology: mde
|
|||||||
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
|
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
|
||||||
|
|
||||||
**Applies to:**
|
**Applies to:**
|
||||||
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/?linkid=2154037)
|
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2154037)
|
||||||
- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)
|
|
||||||
|
|
||||||
[Advanced hunting](advanced-hunting-overview.md) relies on data coming from across your organization. To get the most comprehensive data possible, ensure that you have the correct settings in the corresponding data sources.
|
[Advanced hunting](advanced-hunting-overview.md) relies on data coming from across your organization. To get the most comprehensive data possible, ensure that you have the correct settings in the corresponding data sources.
|
||||||
|
|
||||||
|
@ -23,8 +23,7 @@ ms.technology: mde
|
|||||||
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
|
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
|
||||||
|
|
||||||
**Applies to:**
|
**Applies to:**
|
||||||
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631)
|
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2154037)
|
||||||
- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)
|
|
||||||
|
|
||||||
>Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-advancedhunting-abovefoldlink)
|
>Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-advancedhunting-abovefoldlink)
|
||||||
|
|
||||||
|
@ -22,8 +22,8 @@ ms.technology: mde
|
|||||||
# Take action on advanced hunting query results
|
# Take action on advanced hunting query results
|
||||||
|
|
||||||
**Applies to:**
|
**Applies to:**
|
||||||
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631)
|
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2154037)
|
||||||
- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)
|
|
||||||
|
|
||||||
|
|
||||||
> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-advancedhuntingref-abovefoldlink)
|
> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-advancedhuntingref-abovefoldlink)
|
||||||
|
@ -25,8 +25,7 @@ ms.technology: mde
|
|||||||
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
|
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
|
||||||
|
|
||||||
**Applies to:**
|
**Applies to:**
|
||||||
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631)
|
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2154037)
|
||||||
- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)
|
|
||||||
|
|
||||||
> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink)
|
> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink)
|
||||||
|
|
||||||
@ -38,8 +37,8 @@ Topic | Description
|
|||||||
[View and organize the Alerts queue](alerts-queue.md) | Shows a list of alerts that were flagged in your network.
|
[View and organize the Alerts queue](alerts-queue.md) | Shows a list of alerts that were flagged in your network.
|
||||||
[Manage alerts](manage-alerts.md) | Learn about how you can manage alerts such as change its status, assign it to a security operations member, and see the history of an alert.
|
[Manage alerts](manage-alerts.md) | Learn about how you can manage alerts such as change its status, assign it to a security operations member, and see the history of an alert.
|
||||||
[Investigate alerts](investigate-alerts.md)| Investigate alerts that are affecting your network, understand what they mean, and how to resolve them.
|
[Investigate alerts](investigate-alerts.md)| Investigate alerts that are affecting your network, understand what they mean, and how to resolve them.
|
||||||
[Investigate files](investigate-files.md)| Investigate the details of a file associated with a specific alert, behaviour, or event.
|
[Investigate files](investigate-files.md)| Investigate the details of a file associated with a specific alert, behavior, or event.
|
||||||
[Investigate devices](investigate-machines.md)| Investigate the details of a device associated with a specific alert, behaviour, or event.
|
[Investigate devices](investigate-machines.md)| Investigate the details of a device associated with a specific alert, behavior, or event.
|
||||||
[Investigate an IP address](investigate-ip.md) | Examine possible communication between devices in your network and external internet protocol (IP) addresses.
|
[Investigate an IP address](investigate-ip.md) | Examine possible communication between devices in your network and external internet protocol (IP) addresses.
|
||||||
[Investigate a domain](investigate-domain.md) | Investigate a domain to see if devices and servers in your network have been communicating with a known malicious domain.
|
[Investigate a domain](investigate-domain.md) | Investigate a domain to see if devices and servers in your network have been communicating with a known malicious domain.
|
||||||
[Investigate a user account](investigate-user.md) | Identify user accounts with the most active alerts and investigate cases of potential compromised credentials.
|
[Investigate a user account](investigate-user.md) | Identify user accounts with the most active alerts and investigate cases of potential compromised credentials.
|
||||||
|
@ -96,12 +96,12 @@ Grant Full Disk Access to the following components:
|
|||||||
- Microsoft Defender for Endpoint
|
- Microsoft Defender for Endpoint
|
||||||
- Identifier: `com.microsoft.wdav`
|
- Identifier: `com.microsoft.wdav`
|
||||||
- Identifier Type: Bundle ID
|
- Identifier Type: Bundle ID
|
||||||
- Code Requirement: identifier "com.microsoft.wdav" and anchor apple generic and certificate 1[field.1.2.840.113635.100.6.2.6] /\* exists \*/ and certificate leaf[field.1.2.840.113635.100.6.1.13] /\* exists \*/ and certificate leaf[subject.OU] = UBF8T346G9
|
- Code Requirement: `identifier "com.microsoft.wdav" and anchor apple generic and certificate 1[field.1.2.840.113635.100.6.2.6] /* exists */ and certificate leaf[field.1.2.840.113635.100.6.1.13] /* exists */ and certificate leaf[subject.OU] = UBF8T346G9`
|
||||||
|
|
||||||
- Microsoft Defender for Endpoint Security Extension
|
- Microsoft Defender for Endpoint Security Extension
|
||||||
- Identifier: `com.microsoft.wdav.epsext`
|
- Identifier: `com.microsoft.wdav.epsext`
|
||||||
- Identifier Type: Bundle ID
|
- Identifier Type: Bundle ID
|
||||||
- Code Requirement: identifier "com.microsoft.wdav.epsext" and anchor apple generic and certificate 1[field.1.2.840.113635.100.6.2.6] /* exists */ and certificate leaf[field.1.2.840.113635.100.6.1.13] /* exists */ and certificate leaf[subject.OU] = UBF8T346G9
|
- Code Requirement: `identifier "com.microsoft.wdav.epsext" and anchor apple generic and certificate 1[field.1.2.840.113635.100.6.2.6] /* exists */ and certificate leaf[field.1.2.840.113635.100.6.1.13] /* exists */ and certificate leaf[subject.OU] = UBF8T346G9`
|
||||||
|
|
||||||
### Network extension policy
|
### Network extension policy
|
||||||
|
|
||||||
@ -110,7 +110,7 @@ As part of the Endpoint Detection and Response capabilities, Microsoft Defender
|
|||||||
- Filter type: Plugin
|
- Filter type: Plugin
|
||||||
- Plugin bundle identifier: `com.microsoft.wdav`
|
- Plugin bundle identifier: `com.microsoft.wdav`
|
||||||
- Filter data provider bundle identifier: `com.microsoft.wdav.netext`
|
- Filter data provider bundle identifier: `com.microsoft.wdav.netext`
|
||||||
- Filter data provider designated requirement: identifier "com.microsoft.wdav.netext" and anchor apple generic and certificate 1[field.1.2.840.113635.100.6.2.6] /* exists */ and certificate leaf[field.1.2.840.113635.100.6.1.13] /* exists */ and certificate leaf[subject.OU] = UBF8T346G9
|
- Filter data provider designated requirement: `identifier "com.microsoft.wdav.tunnelext" and anchor apple generic and certificate 1[field.1.2.840.113635.100.6.2.6] /* exists */ and certificate leaf[field.1.2.840.113635.100.6.1.13] /* exists */ and certificate leaf[subject.OU] = UBF8T346G9`
|
||||||
- Filter sockets: `true`
|
- Filter sockets: `true`
|
||||||
|
|
||||||
## Check installation status
|
## Check installation status
|
||||||
|
@ -512,7 +512,7 @@ These steps are applicable of macOS 10.15 (Catalina) or newer.
|
|||||||
|
|
||||||
- Identifier: `com.microsoft.wdav`
|
- Identifier: `com.microsoft.wdav`
|
||||||
- Identifier Type: Bundle ID
|
- Identifier Type: Bundle ID
|
||||||
- Code Requirement: identifier "com.microsoft.wdav" and anchor apple generic and certificate 1[field.1.2.840.113635.100.6.2.6] /\* exists \*/ and certificate leaf[field.1.2.840.113635.100.6.1.13] /\* exists \*/ and certificate leaf[subject.OU] = UBF8T346G9
|
- Code Requirement: `identifier "com.microsoft.wdav" and anchor apple generic and certificate 1[field.1.2.840.113635.100.6.2.6] /* exists */ and certificate leaf[field.1.2.840.113635.100.6.1.13] /* exists */ and certificate leaf[subject.OU] = UBF8T346G9`
|
||||||
|
|
||||||
|
|
||||||

|

|
||||||
@ -537,7 +537,7 @@ These steps are applicable of macOS 10.15 (Catalina) or newer.
|
|||||||
|
|
||||||
- Identifier: `com.microsoft.wdav.epsext`
|
- Identifier: `com.microsoft.wdav.epsext`
|
||||||
- Identifier Type: Bundle ID
|
- Identifier Type: Bundle ID
|
||||||
- Code Requirement: identifier "com.microsoft.wdav.epsext" and anchor apple generic and certificate 1[field.1.2.840.113635.100.6.2.6] /* exists */ and certificate leaf[field.1.2.840.113635.100.6.1.13] /* exists */ and certificate leaf[subject.OU] = UBF8T346G9
|
- Code Requirement: `identifier "com.microsoft.wdav.epsext" and anchor apple generic and certificate 1[field.1.2.840.113635.100.6.2.6] /* exists */ and certificate leaf[field.1.2.840.113635.100.6.1.13] /* exists */ and certificate leaf[subject.OU] = UBF8T346G9`
|
||||||
|
|
||||||
10. Select **+ Add**.
|
10. Select **+ Add**.
|
||||||
|
|
||||||
|
@ -15,6 +15,7 @@ ms.reviewer:
|
|||||||
manager: dansimp
|
manager: dansimp
|
||||||
ms.custom: asr
|
ms.custom: asr
|
||||||
ms.technology: mde
|
ms.technology: mde
|
||||||
|
ms.date: 03/08/2021
|
||||||
---
|
---
|
||||||
|
|
||||||
# Protect your network
|
# Protect your network
|
||||||
@ -27,33 +28,30 @@ ms.technology: mde
|
|||||||
|
|
||||||
> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink)
|
> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink)
|
||||||
|
|
||||||
|
Network protection helps reduce the attack surface of your devices from Internet-based events. It prevents employees from using any application to access dangerous domains that might host phishing scams, exploits, and other malicious content on the Internet. Network protection expands the scope of [Microsoft Defender SmartScreen](../microsoft-defender-smartscreen/microsoft-defender-smartscreen-overview.md) to block all outbound HTTP(s) traffic that attempts to connect to low-reputation sources (based on the domain or hostname).
|
||||||
|
|
||||||
Network protection helps reduce the attack surface of your devices from Internet-based events. It prevents employees from using any application to access dangerous domains that may host phishing scams, exploits, and other malicious content on the Internet.
|
Network protection is supported on Windows, beginning with Windows 10, version 1709.
|
||||||
|
|
||||||
Network protection expands the scope of [Microsoft Defender SmartScreen](../microsoft-defender-smartscreen/microsoft-defender-smartscreen-overview.md) to block all outbound HTTP(s) traffic that attempts to connect to low-reputation sources (based on the domain or hostname).
|
|
||||||
|
|
||||||
Network protection is supported beginning with Windows 10, version 1709.
|
|
||||||
|
|
||||||
For more information about how to enable network protection, see [Enable network protection](enable-network-protection.md). Use Group Policy, PowerShell, or MDM CSPs to enable and manage network protection in your network.
|
For more information about how to enable network protection, see [Enable network protection](enable-network-protection.md). Use Group Policy, PowerShell, or MDM CSPs to enable and manage network protection in your network.
|
||||||
|
|
||||||
> [!TIP]
|
> [!TIP]
|
||||||
> You can visit the Windows Defender Testground website at [demo.wd.microsoft.com](https://demo.wd.microsoft.com?ocid=cx-wddocs-testground) to confirm the feature is working and see how it works.
|
> See the Microsoft Defender ATP testground site at [demo.wd.microsoft.com](https://demo.wd.microsoft.com?ocid=cx-wddocs-testground) to see how network protection works.
|
||||||
|
|
||||||
Network protection works best with [Microsoft Defender for Endpoint](../microsoft-defender-atp/microsoft-defender-advanced-threat-protection.md), which gives you detailed reporting into Windows Defender EG events and blocks as part of the usual [alert investigation scenarios](../microsoft-defender-atp/investigate-alerts.md).
|
Network protection works best with [Microsoft Defender for Endpoint](../microsoft-defender-atp/microsoft-defender-advanced-threat-protection.md), which gives you detailed reporting into exploit protection events and blocks as part of [alert investigation scenarios](../microsoft-defender-atp/investigate-alerts.md).
|
||||||
|
|
||||||
When network protection blocks a connection, a notification will be displayed from the Action Center. You can [customize the notification](customize-attack-surface-reduction.md#customize-the-notification) with your company details and contact information. You can also enable the rules individually to customize what techniques the feature monitors.
|
When network protection blocks a connection, a notification is displayed from the Action Center. Your security operations team can [customize the notification](customize-attack-surface-reduction.md#customize-the-notification) with your organization's details and contact information. In addition, individual attack surface reduction rules can be enabled and customized to suit certain techniques to monitor.
|
||||||
|
|
||||||
You can also use [audit mode](audit-windows-defender.md) to evaluate how Network protection would impact your organization if it were enabled.
|
You can also use [audit mode](audit-windows-defender.md) to evaluate how network protection would impact your organization if it were enabled.
|
||||||
|
|
||||||
## Requirements
|
## Requirements
|
||||||
|
|
||||||
Network protection requires Windows 10 Pro or Enterprise, and Microsoft Defender Antivirus real-time protection.
|
Network protection requires Windows 10 Pro or Enterprise, and Microsoft Defender Antivirus real-time protection.
|
||||||
|
|
||||||
| Windows 10 version | Microsoft Defender Antivirus |
|
| Windows version | Microsoft Defender Antivirus |
|
||||||
|:---|:---|
|
|:---|:---|
|
||||||
| Windows 10 version 1709 or later | [Microsoft Defender AV real-time protection](../microsoft-defender-antivirus/configure-real-time-protection-microsoft-defender-antivirus.md) and [cloud-delivered protection](../microsoft-defender-antivirus/enable-cloud-protection-microsoft-defender-antivirus.md) must be enabled |
|
| Windows 10 version 1709 or later <p>Windows Server 1803 or later | [Microsoft Defender Antivirus real-time protection](../microsoft-defender-antivirus/configure-real-time-protection-microsoft-defender-antivirus.md) and [cloud-delivered protection](../microsoft-defender-antivirus/enable-cloud-protection-microsoft-defender-antivirus.md) must be enabled |
|
||||||
|
|
||||||
After you have enabled the services, you might need to configure your network or firewall to allow the connections between the services and your endpoints.
|
After you have enabled the services, you might need to configure your network or firewall to allow the connections between the services and your devices (also referred to as endpoints).
|
||||||
|
|
||||||
- .smartscreen.microsoft.com
|
- .smartscreen.microsoft.com
|
||||||
- .smartscreen-prod.microsoft.com
|
- .smartscreen-prod.microsoft.com
|
||||||
@ -79,13 +77,13 @@ You can review the Windows event log to see events that are created when network
|
|||||||
|
|
||||||
2. Select **OK**.
|
2. Select **OK**.
|
||||||
|
|
||||||
3. This will create a custom view that filters to only show the following events related to network protection:
|
This procedure creates a custom view that filters to only show the following events related to network protection:
|
||||||
|
|
||||||
| Event ID | Description |
|
| Event ID | Description |
|
||||||
|:---|:---|
|
|:---|:---|
|
||||||
| 5007 | Event when settings are changed |
|
| 5007 | Event when settings are changed |
|
||||||
| 1125 | Event when network protection fires in audit mode |
|
| 1125 | Event when network protection fires in audit mode |
|
||||||
| 1126 | Event when network protection fires in block mode |
|
| 1126 | Event when network protection fires in block mode |
|
||||||
|
|
||||||
## Related articles
|
## Related articles
|
||||||
|
|
||||||
|
Loading…
x
Reference in New Issue
Block a user