mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-24 14:53:44 +00:00
remove -wdatp from within file links
This commit is contained in:
@ -36,8 +36,8 @@ Delegated (work or school account) | Machine.ReadWrite | 'Read and write machine
|
|||||||
|
|
||||||
>[!Note]
|
>[!Note]
|
||||||
> When obtaining a token using user credentials:
|
> When obtaining a token using user credentials:
|
||||||
>- The user needs to have at least the following role permission: 'Manage security setting' (See [Create and manage roles](user-roles-windows-defender-advanced-threat-protection.md) for more information)
|
>- The user needs to have at least the following role permission: 'Manage security setting' (See [Create and manage roles](user-roles.md) for more information)
|
||||||
>- User needs to have access to the machine, based on machine group settings (See [Create and manage machine groups](machine-groups-windows-defender-advanced-threat-protection.md) for more information)
|
>- User needs to have access to the machine, based on machine group settings (See [Create and manage machine groups](machine-groups.md) for more information)
|
||||||
|
|
||||||
## HTTP request
|
## HTTP request
|
||||||
```
|
```
|
||||||
|
@ -29,7 +29,7 @@ Depending on the Microsoft security products that you use, some advanced feature
|
|||||||
Use the following advanced features to get better protected from potentially malicious files and gain better insight during security investigations:
|
Use the following advanced features to get better protected from potentially malicious files and gain better insight during security investigations:
|
||||||
|
|
||||||
## Automated investigation
|
## Automated investigation
|
||||||
When you enable this feature, you'll be able to take advantage of the automated investigation and remediation features of the service. For more information, see [Automated investigations](automated-investigations-windows-defender-advanced-threat-protection.md).
|
When you enable this feature, you'll be able to take advantage of the automated investigation and remediation features of the service. For more information, see [Automated investigations](automated-investigations.md).
|
||||||
|
|
||||||
## Auto-resolve remediated alerts
|
## Auto-resolve remediated alerts
|
||||||
For tenants created on or after Windows 10, version 1809 the automated investigations capability is configured by default to resolve alerts where the automated analysis result status is "No threats found" or "Remediated". If you don’t want to have alerts auto-resolved, you’ll need to manually turn off the feature.
|
For tenants created on or after Windows 10, version 1809 the automated investigations capability is configured by default to resolve alerts where the automated analysis result status is "No threats found" or "Remediated". If you don’t want to have alerts auto-resolved, you’ll need to manually turn off the feature.
|
||||||
@ -53,7 +53,7 @@ When you enable this feature, you'll be able to see user details stored in Azure
|
|||||||
- Alert queue
|
- Alert queue
|
||||||
- Machine details page
|
- Machine details page
|
||||||
|
|
||||||
For more information, see [Investigate a user account](investigate-user-windows-defender-advanced-threat-protection.md).
|
For more information, see [Investigate a user account](investigate-user.md).
|
||||||
|
|
||||||
## Skype for Business integration
|
## Skype for Business integration
|
||||||
Enabling the Skype for Business integration gives you the ability to communicate with users using Skype for Business, email, or phone. This can be handy when you need to communicate with the user and mitigate risks.
|
Enabling the Skype for Business integration gives you the ability to communicate with users using Skype for Business, email, or phone. This can be handy when you need to communicate with the user and mitigate risks.
|
||||||
@ -128,7 +128,7 @@ You'll have access to upcoming features which you can provide feedback on to hel
|
|||||||
3. Click **Save preferences**.
|
3. Click **Save preferences**.
|
||||||
|
|
||||||
## Related topics
|
## Related topics
|
||||||
- [Update data retention settings](data-retention-settings-windows-defender-advanced-threat-protection.md)
|
- [Update data retention settings](data-retention-settings.md)
|
||||||
- [Configure alert notifications](configure-email-notifications-windows-defender-advanced-threat-protection.md)
|
- [Configure alert notifications](configure-email-notifications.md)
|
||||||
- [Enable and create Power BI reports using Microsoft Defender ATP data](powerbi-reports-windows-defender-advanced-threat-protection.md)
|
- [Enable and create Power BI reports using Microsoft Defender ATP data](powerbi-reports.md)
|
||||||
- [Enable Secure Score security controls](enable-secure-score-windows-defender-advanced-threat-protection.md)
|
- [Enable Secure Score security controls](enable-secure-score.md)
|
||||||
|
@ -118,5 +118,5 @@ To effectively build queries that span multiple tables, you need to understand t
|
|||||||
>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-advancedhuntingref-belowfoldlink)
|
>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-advancedhuntingref-belowfoldlink)
|
||||||
|
|
||||||
## Related topic
|
## Related topic
|
||||||
- [Query data using Advanced hunting](advanced-hunting-windows-defender-advanced-threat-protection.md)
|
- [Query data using Advanced hunting](advanced-hunting.md)
|
||||||
- [Advanced hunting query language best practices](advanced-hunting-best-practices-windows-defender-advanced-threat-protection.md)
|
- [Advanced hunting query language best practices](advanced-hunting-best-practices.md)
|
@ -149,8 +149,8 @@ Check out the [Advanced hunting repository](https://github.com/Microsoft/Windows
|
|||||||
>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-advancedhunting-belowfoldlink)
|
>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-advancedhunting-belowfoldlink)
|
||||||
|
|
||||||
## Related topic
|
## Related topic
|
||||||
- [Advanced hunting reference](advanced-hunting-reference-windows-defender-advanced-threat-protection.md)
|
- [Advanced hunting reference](advanced-hunting-reference.md)
|
||||||
- [Advanced hunting query language best practices](advanced-hunting-best-practices-windows-defender-advanced-threat-protection.md)
|
- [Advanced hunting query language best practices](advanced-hunting-best-practices.md)
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
@ -25,13 +25,13 @@ Learn how you can view and manage the queue so that you can effectively investig
|
|||||||
## In this section
|
## In this section
|
||||||
Topic | Description
|
Topic | Description
|
||||||
:---|:---
|
:---|:---
|
||||||
[View and organize the Alerts queue](alerts-queue-windows-defender-advanced-threat-protection.md) | Shows a list of alerts that were flagged in your network.
|
[View and organize the Alerts queue](alerts-queue.md) | Shows a list of alerts that were flagged in your network.
|
||||||
[Manage alerts](manage-alerts-windows-defender-advanced-threat-protection.md) | Learn about how you can manage alerts such as change its status, assign it to a security operations member, and see the history of an alert.
|
[Manage alerts](manage-alerts.md) | Learn about how you can manage alerts such as change its status, assign it to a security operations member, and see the history of an alert.
|
||||||
[Investigate alerts](investigate-alerts-windows-defender-advanced-threat-protection.md)| Investigate alerts that are affecting your network, understand what they mean, and how to resolve them.
|
[Investigate alerts](investigate-alerts.md)| Investigate alerts that are affecting your network, understand what they mean, and how to resolve them.
|
||||||
[Investigate files](investigate-files-windows-defender-advanced-threat-protection.md)| Investigate the details of a file associated with a specific alert, behaviour, or event.
|
[Investigate files](investigate-files.md)| Investigate the details of a file associated with a specific alert, behaviour, or event.
|
||||||
[Investigate machines](investigate-machines-windows-defender-advanced-threat-protection.md)| Investigate the details of a machine associated with a specific alert, behaviour, or event.
|
[Investigate machines](investigate-machines.md)| Investigate the details of a machine associated with a specific alert, behaviour, or event.
|
||||||
[Investigate an IP address](investigate-ip-windows-defender-advanced-threat-protection.md) | Examine possible communication between machines in your network and external internet protocol (IP) addresses.
|
[Investigate an IP address](investigate-ip.md) | Examine possible communication between machines in your network and external internet protocol (IP) addresses.
|
||||||
[Investigate a domain](investigate-domain-windows-defender-advanced-threat-protection.md) | Investigate a domain to see if machines and servers in your network have been communicating with a known malicious domain.
|
[Investigate a domain](investigate-domain.md) | Investigate a domain to see if machines and servers in your network have been communicating with a known malicious domain.
|
||||||
[Investigate a user account](investigate-user-windows-defender-advanced-threat-protection.md) | Identify user accounts with the most active alerts and investigate cases of potential compromised credentials.
|
[Investigate a user account](investigate-user.md) | Identify user accounts with the most active alerts and investigate cases of potential compromised credentials.
|
||||||
|
|
||||||
|
|
||||||
|
@ -90,15 +90,15 @@ Limit the alerts queue view by selecting the OS platform that you're interested
|
|||||||
If you have specific machine groups that you're interested in checking the alerts on, you can select the groups to limit the alerts queue view to display just those machine groups.
|
If you have specific machine groups that you're interested in checking the alerts on, you can select the groups to limit the alerts queue view to display just those machine groups.
|
||||||
|
|
||||||
### Associated threat
|
### Associated threat
|
||||||
Use this filter to focus on alerts that are related to high profile threats. You can see the full list of high-profile threats in [Threat analytics](threat-analytics-dashboard-windows-defender-advanced-threat-protection.md).
|
Use this filter to focus on alerts that are related to high profile threats. You can see the full list of high-profile threats in [Threat analytics](threat-analytics-dashboard.md).
|
||||||
|
|
||||||
|
|
||||||
## Related topics
|
## Related topics
|
||||||
- [Manage Microsoft Defender Advanced Threat Protection alerts](manage-alerts-windows-defender-advanced-threat-protection.md)
|
- [Manage Microsoft Defender Advanced Threat Protection alerts](manage-alerts.md)
|
||||||
- [Investigate Microsoft Defender Advanced Threat Protection alerts](investigate-alerts-windows-defender-advanced-threat-protection.md)
|
- [Investigate Microsoft Defender Advanced Threat Protection alerts](investigate-alerts.md)
|
||||||
- [Investigate a file associated with a Microsoft Defender ATP alert](investigate-files-windows-defender-advanced-threat-protection.md)
|
- [Investigate a file associated with a Microsoft Defender ATP alert](investigate-files.md)
|
||||||
- [Investigate machines in the Microsoft Defender ATP Machines list](investigate-machines-windows-defender-advanced-threat-protection.md)
|
- [Investigate machines in the Microsoft Defender ATP Machines list](investigate-machines.md)
|
||||||
- [Investigate an IP address associated with a Microsoft Defender ATP alert](investigate-ip-windows-defender-advanced-threat-protection.md)
|
- [Investigate an IP address associated with a Microsoft Defender ATP alert](investigate-ip.md)
|
||||||
- [Investigate a domain associated with a Microsoft Defender ATP alert](investigate-domain-windows-defender-advanced-threat-protection.md)
|
- [Investigate a domain associated with a Microsoft Defender ATP alert](investigate-domain.md)
|
||||||
- [Investigate a user account in Microsoft Defender ATP](investigate-user-windows-defender-advanced-threat-protection.md)
|
- [Investigate a user account in Microsoft Defender ATP](investigate-user.md)
|
||||||
|
|
||||||
|
@ -37,7 +37,7 @@ Understand what data fields are exposed as part of the alerts API and how they m
|
|||||||
The following table lists the available fields exposed in the alerts API payload. It shows examples for the populated values and a reference on how data is reflected on the portal.
|
The following table lists the available fields exposed in the alerts API payload. It shows examples for the populated values and a reference on how data is reflected on the portal.
|
||||||
|
|
||||||
|
|
||||||
The ArcSight field column contains the default mapping between the Microsoft Defender ATP fields and the built-in fields in ArcSight. You can download the mapping file from the portal when you enable the SIEM integration feature and you can modify it to match the needs of your organization. For more information, see [Enable SIEM integration in Microsoft Defender ATP](enable-siem-integration-windows-defender-advanced-threat-protection.md).
|
The ArcSight field column contains the default mapping between the Microsoft Defender ATP fields and the built-in fields in ArcSight. You can download the mapping file from the portal when you enable the SIEM integration feature and you can modify it to match the needs of your organization. For more information, see [Enable SIEM integration in Microsoft Defender ATP](enable-siem-integration.md).
|
||||||
|
|
||||||
Field numbers match the numbers in the images below.
|
Field numbers match the numbers in the images below.
|
||||||
|
|
||||||
@ -92,8 +92,8 @@ Field numbers match the numbers in the images below.
|
|||||||
|
|
||||||
|
|
||||||
## Related topics
|
## Related topics
|
||||||
- [Enable SIEM integration in Microsoft Defender ATP](enable-siem-integration-windows-defender-advanced-threat-protection.md)
|
- [Enable SIEM integration in Microsoft Defender ATP](enable-siem-integration.md)
|
||||||
- [Configure Splunk to pull Microsoft Defender ATP alerts](configure-splunk-windows-defender-advanced-threat-protection.md)
|
- [Configure Splunk to pull Microsoft Defender ATP alerts](configure-splunk.md)
|
||||||
- [Configure ArcSight to pull Microsoft Defender ATP alerts](configure-arcsight-windows-defender-advanced-threat-protection.md)
|
- [Configure ArcSight to pull Microsoft Defender ATP alerts](configure-arcsight.md)
|
||||||
- [Pull Microsoft Defender ATP alerts using REST API](pull-alerts-using-rest-api-windows-defender-advanced-threat-protection.md)
|
- [Pull Microsoft Defender ATP alerts using REST API](pull-alerts-using-rest-api.md)
|
||||||
- [Troubleshoot SIEM tool integration issues](troubleshoot-siem-windows-defender-advanced-threat-protection.md)
|
- [Troubleshoot SIEM tool integration issues](troubleshoot-siem.md)
|
||||||
|
@ -30,7 +30,7 @@ ms.date: 11/28/2018
|
|||||||
Microsoft Defender ATP supports two ways to manage permissions:
|
Microsoft Defender ATP supports two ways to manage permissions:
|
||||||
|
|
||||||
- **Basic permissions management**: Set permissions to either full access or read-only.
|
- **Basic permissions management**: Set permissions to either full access or read-only.
|
||||||
- **Role-based access control (RBAC)**: Set granular permissions by defining roles, assigning Azure AD user groups to the roles, and granting the user groups access to machine groups. For more information on RBAC, see [Manage portal access using role-based access control](rbac-windows-defender-advanced-threat-protection.md).
|
- **Role-based access control (RBAC)**: Set granular permissions by defining roles, assigning Azure AD user groups to the roles, and granting the user groups access to machine groups. For more information on RBAC, see [Manage portal access using role-based access control](rbac.md).
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
>If you have already assigned basic permissions, you may switch to RBAC anytime. Consider the following before making the switch:
|
>If you have already assigned basic permissions, you may switch to RBAC anytime. Consider the following before making the switch:
|
||||||
@ -44,5 +44,5 @@ Microsoft Defender ATP supports two ways to manage permissions:
|
|||||||
>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-portalaccess-belowfoldlink)
|
>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-portalaccess-belowfoldlink)
|
||||||
|
|
||||||
## Related topic
|
## Related topic
|
||||||
- [Use basic permissions to access the portal](basic-permissions-windows-defender-advanced-threat-protection.md)
|
- [Use basic permissions to access the portal](basic-permissions.md)
|
||||||
- [Manage portal access using RBAC](rbac-windows-defender-advanced-threat-protection.md)
|
- [Manage portal access using RBAC](rbac.md)
|
||||||
|
@ -38,7 +38,7 @@ You might want to experience Microsoft Defender ATP before you onboard more than
|
|||||||
|
|
||||||
## Before you begin
|
## Before you begin
|
||||||
|
|
||||||
To run any of the provided simulations, you need at least [one onboarded machine](onboard-configure-windows-defender-advanced-threat-protection.md).
|
To run any of the provided simulations, you need at least [one onboarded machine](onboard-configure.md).
|
||||||
|
|
||||||
Read the walkthrough document provided with each attack scenario. Each document includes OS and application requirements as well as detailed instructions that are specific to an attack scenario.
|
Read the walkthrough document provided with each attack scenario. Each document includes OS and application requirements as well as detailed instructions that are specific to an attack scenario.
|
||||||
|
|
||||||
@ -66,5 +66,5 @@ Read the walkthrough document provided with each attack scenario. Each document
|
|||||||
|
|
||||||
|
|
||||||
## Related topics
|
## Related topics
|
||||||
- [Onboard machines](onboard-configure-windows-defender-advanced-threat-protection.md)
|
- [Onboard machines](onboard-configure.md)
|
||||||
- [Onboard Windows 10 machines](configure-endpoints-windows-defender-advanced-threat-protection.md)
|
- [Onboard Windows 10 machines](configure-endpoints.md)
|
@ -73,14 +73,14 @@ Semi - require approval for non-temp folders remediation | An approval is requir
|
|||||||
Semi - require approval for core folders remediation | An approval is required on files or executables that are in the operating system directories such as Windows folder and Program files folder. <br><br> Files or executables in all other folders will automatically be remediated if needed.
|
Semi - require approval for core folders remediation | An approval is required on files or executables that are in the operating system directories such as Windows folder and Program files folder. <br><br> Files or executables in all other folders will automatically be remediated if needed.
|
||||||
Full - remediate threats automatically | All remediation actions will be performed automatically.
|
Full - remediate threats automatically | All remediation actions will be performed automatically.
|
||||||
|
|
||||||
For more information on how to configure these automation levels, see [Create and manage machine groups](machine-groups-windows-defender-advanced-threat-protection.md).
|
For more information on how to configure these automation levels, see [Create and manage machine groups](machine-groups.md).
|
||||||
|
|
||||||
The default machine group is configured for semi-automatic remediation. This means that any malicious entity that needs to be remediated requires an approval and the investigation is added to the **Pending actions** section, this can be changed to fully automatic so that no user approval is needed.
|
The default machine group is configured for semi-automatic remediation. This means that any malicious entity that needs to be remediated requires an approval and the investigation is added to the **Pending actions** section, this can be changed to fully automatic so that no user approval is needed.
|
||||||
|
|
||||||
When a pending action is approved, the entity is then remediated and this new state is reflected in the **Entities** tab of the investigation.
|
When a pending action is approved, the entity is then remediated and this new state is reflected in the **Entities** tab of the investigation.
|
||||||
|
|
||||||
## Related topic
|
## Related topic
|
||||||
- [Learn about the automated investigations dashboard](manage-auto-investigation-windows-defender-advanced-threat-protection.md)
|
- [Learn about the automated investigations dashboard](manage-auto-investigation.md)
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
@ -31,7 +31,7 @@ You can use either of the following:
|
|||||||
- Azure PowerShell
|
- Azure PowerShell
|
||||||
- Azure Portal
|
- Azure Portal
|
||||||
|
|
||||||
For granular control over permissions, [switch to role-based access control](rbac-windows-defender-advanced-threat-protection.md).
|
For granular control over permissions, [switch to role-based access control](rbac.md).
|
||||||
|
|
||||||
## Assign user access using Azure PowerShell
|
## Assign user access using Azure PowerShell
|
||||||
You can assign users with one of the following levels of permissions:
|
You can assign users with one of the following levels of permissions:
|
||||||
@ -73,4 +73,4 @@ For more information, see [Assign administrator and non-administrator roles to u
|
|||||||
|
|
||||||
|
|
||||||
## Related topic
|
## Related topic
|
||||||
- [Manage portal access using RBAC](rbac-windows-defender-advanced-threat-protection.md)
|
- [Manage portal access using RBAC](rbac.md)
|
||||||
|
@ -37,7 +37,7 @@ There are two status indicators on the tile that provide information on the numb
|
|||||||
|
|
||||||
Clicking any of the groups directs you to Machines list, filtered according to your choice.
|
Clicking any of the groups directs you to Machines list, filtered according to your choice.
|
||||||
|
|
||||||
You can also download the entire list in CSV format using the **Export to CSV** feature. For more information on filters, see [View and organize the Machines list](machines-view-overview-windows-defender-advanced-threat-protection.md).
|
You can also download the entire list in CSV format using the **Export to CSV** feature. For more information on filters, see [View and organize the Machines list](machines-view-overview.md).
|
||||||
|
|
||||||
You can filter the health state list by the following status:
|
You can filter the health state list by the following status:
|
||||||
- **Active** - Machines that are actively reporting to the Microsoft Defender ATP service.
|
- **Active** - Machines that are actively reporting to the Microsoft Defender ATP service.
|
||||||
@ -57,4 +57,4 @@ In the **Machines list**, you can download a full list of all the machines in yo
|
|||||||
>Export the list in CSV format to display the unfiltered data. The CSV file will include all machines in the organization, regardless of any filtering applied in the view itself and can take a significant amount of time to download, depending on how large your organization is.
|
>Export the list in CSV format to display the unfiltered data. The CSV file will include all machines in the organization, regardless of any filtering applied in the view itself and can take a significant amount of time to download, depending on how large your organization is.
|
||||||
|
|
||||||
## Related topic
|
## Related topic
|
||||||
- [Fix unhealthy sensors in Microsoft Defender ATP](fix-unhealhty-sensors-windows-defender-advanced-threat-protection.md)
|
- [Fix unhealthy sensors in Microsoft Defender ATP](fix-unhealhty-sensors.md)
|
||||||
|
@ -37,8 +37,8 @@ Delegated (work or school account) | Machine.CollectForensics | 'Collect forensi
|
|||||||
|
|
||||||
>[!Note]
|
>[!Note]
|
||||||
> When obtaining a token using user credentials:
|
> When obtaining a token using user credentials:
|
||||||
>- The user needs to have at least the following role permission: 'Alerts Investigation' (See [Create and manage roles](user-roles-windows-defender-advanced-threat-protection.md) for more information)
|
>- The user needs to have at least the following role permission: 'Alerts Investigation' (See [Create and manage roles](user-roles.md) for more information)
|
||||||
>- The user needs to have access to the machine, based on machine group settings (See [Create and manage machine groups](machine-groups-windows-defender-advanced-threat-protection.md) for more information)
|
>- The user needs to have access to the machine, based on machine group settings (See [Create and manage machine groups](machine-groups.md) for more information)
|
||||||
|
|
||||||
## HTTP request
|
## HTTP request
|
||||||
```
|
```
|
||||||
|
@ -56,7 +56,7 @@ There are three ways to address a risk:
|
|||||||
2. Resolve active alerts on the machine. This will remove the risk from the machine.
|
2. Resolve active alerts on the machine. This will remove the risk from the machine.
|
||||||
3. You can remove the machine from the active policies and consequently, conditional access will not be applied on the machine.
|
3. You can remove the machine from the active policies and consequently, conditional access will not be applied on the machine.
|
||||||
|
|
||||||
Manual remediation requires a secops admin to investigate an alert and address the risk seen on the device. The automated remediation is configured through configuration settings provided in the following section, [Configure conditional access](configure-conditional-access-windows-defender-advanced-threat-protection.md).
|
Manual remediation requires a secops admin to investigate an alert and address the risk seen on the device. The automated remediation is configured through configuration settings provided in the following section, [Configure conditional access](configure-conditional-access.md).
|
||||||
|
|
||||||
When the risk is removed either through manual or automated remediation, the device returns to a compliant state and access to applications is granted.
|
When the risk is removed either through manual or automated remediation, the device returns to a compliant state and access to applications is granted.
|
||||||
|
|
||||||
@ -70,7 +70,7 @@ The following example sequence of events explains conditional access in action:
|
|||||||
|
|
||||||
|
|
||||||
## Related topic
|
## Related topic
|
||||||
- [Configure conditional access in Microsoft Defender ATP](configure-conditional-access-windows-defender-advanced-threat-protection.md)
|
- [Configure conditional access in Microsoft Defender ATP](configure-conditional-access.md)
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
@ -36,7 +36,7 @@ Configuring the HP ArcSight Connector tool requires several configuration files
|
|||||||
|
|
||||||
This section guides you in getting the necessary information to set and use the required configuration files correctly.
|
This section guides you in getting the necessary information to set and use the required configuration files correctly.
|
||||||
|
|
||||||
- Make sure you have enabled the SIEM integration feature from the **Settings** menu. For more information, see [Enable SIEM integration in Microsoft Defender ATP](enable-siem-integration-windows-defender-advanced-threat-protection.md).
|
- Make sure you have enabled the SIEM integration feature from the **Settings** menu. For more information, see [Enable SIEM integration in Microsoft Defender ATP](enable-siem-integration.md).
|
||||||
|
|
||||||
- Have the file you saved from enabling the SIEM integration feature ready. You'll need to get the following values:
|
- Have the file you saved from enabling the SIEM integration feature ready. You'll need to get the following values:
|
||||||
- OAuth 2.0 Token refresh URL
|
- OAuth 2.0 Token refresh URL
|
||||||
@ -107,7 +107,7 @@ The following steps assume that you have completed all the required steps in [Be
|
|||||||
<td>Browse to the location of the *wdatp-connector.properties* file. The name must match the file provided in the .zip that you downloaded.</td>
|
<td>Browse to the location of the *wdatp-connector.properties* file. The name must match the file provided in the .zip that you downloaded.</td>
|
||||||
<tr>
|
<tr>
|
||||||
<td>Refresh Token</td>
|
<td>Refresh Token</td>
|
||||||
<td>You can obtain a refresh token in two ways: by generating a refresh token from the **SIEM settings** page or using the restutil tool. <br><br> For more information on generating a refresh token from the **Preferences setup** , see [Enable SIEM integration in Microsoft Defender ATP](enable-siem-integration-windows-defender-advanced-threat-protection.md). </br> </br>**Get your refresh token using the restutil tool:** </br> a. Open a command prompt. Navigate to C:\\*folder_location*\current\bin where *folder_location* represents the location where you installed the tool. </br></br> b. Type: `arcsight restutil token -config` from the bin directory.For example: **arcsight restutil boxtoken -proxy proxy.location.hp.com:8080** A Web browser window will open. </br> </br>c. Type in your credentials then click on the password field to let the page redirect. In the login prompt, enter your credentials. </br> </br>d. A refresh token is shown in the command prompt. </br></br> e. Copy and paste it into the **Refresh Token** field.
|
<td>You can obtain a refresh token in two ways: by generating a refresh token from the **SIEM settings** page or using the restutil tool. <br><br> For more information on generating a refresh token from the **Preferences setup** , see [Enable SIEM integration in Microsoft Defender ATP](enable-siem-integration.md). </br> </br>**Get your refresh token using the restutil tool:** </br> a. Open a command prompt. Navigate to C:\\*folder_location*\current\bin where *folder_location* represents the location where you installed the tool. </br></br> b. Type: `arcsight restutil token -config` from the bin directory.For example: **arcsight restutil boxtoken -proxy proxy.location.hp.com:8080** A Web browser window will open. </br> </br>c. Type in your credentials then click on the password field to let the page redirect. In the login prompt, enter your credentials. </br> </br>d. A refresh token is shown in the command prompt. </br></br> e. Copy and paste it into the **Refresh Token** field.
|
||||||
</td>
|
</td>
|
||||||
</tr>
|
</tr>
|
||||||
</tr>
|
</tr>
|
||||||
@ -187,7 +187,7 @@ Microsoft Defender ATP alerts will appear as discrete events, with "Microsoft”
|
|||||||
> Verify that the connector is running by stopping the process again. Then start the connector again, and no browser window should appear.
|
> Verify that the connector is running by stopping the process again. Then start the connector again, and no browser window should appear.
|
||||||
|
|
||||||
## Related topics
|
## Related topics
|
||||||
- [Enable SIEM integration in Microsoft Defender ATP](enable-siem-integration-windows-defender-advanced-threat-protection.md)
|
- [Enable SIEM integration in Microsoft Defender ATP](enable-siem-integration.md)
|
||||||
- [Configure Splunk to pull Microsoft Defender ATP alerts](configure-splunk-windows-defender-advanced-threat-protection.md)
|
- [Configure Splunk to pull Microsoft Defender ATP alerts](configure-splunk.md)
|
||||||
- [Pull Microsoft Defender ATP alerts using REST API](pull-alerts-using-rest-api-windows-defender-advanced-threat-protection.md)
|
- [Pull Microsoft Defender ATP alerts using REST API](pull-alerts-using-rest-api.md)
|
||||||
- [Troubleshoot SIEM tool integration issues](troubleshoot-siem-windows-defender-advanced-threat-protection.md)
|
- [Troubleshoot SIEM tool integration issues](troubleshoot-siem.md)
|
||||||
|
@ -31,7 +31,7 @@ You can configure Microsoft Defender ATP to send email notifications to specifie
|
|||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> Only users with 'Manage security settings' permissions can configure email notifications. If you've chosen to use basic permissions management, users with Security Administrator or Global Administrator roles can configure email notifications.
|
> Only users with 'Manage security settings' permissions can configure email notifications. If you've chosen to use basic permissions management, users with Security Administrator or Global Administrator roles can configure email notifications.
|
||||||
|
|
||||||
You can set the alert severity levels that trigger notifications. You can also add or remove recipients of the email notification. New recipients get notified about alerts encountered after they are added. For more information about alerts, see [View and organize the Alerts queue](alerts-queue-windows-defender-advanced-threat-protection.md).
|
You can set the alert severity levels that trigger notifications. You can also add or remove recipients of the email notification. New recipients get notified about alerts encountered after they are added. For more information about alerts, see [View and organize the Alerts queue](alerts-queue.md).
|
||||||
|
|
||||||
If you're using role-based access control (RBAC), recipients will only receive notifications based on the machine groups that were configured in the notification rule.
|
If you're using role-based access control (RBAC), recipients will only receive notifications based on the machine groups that were configured in the notification rule.
|
||||||
Users with the proper permission can only create, edit, or delete notifications that are limited to their machine group management scope.
|
Users with the proper permission can only create, edit, or delete notifications that are limited to their machine group management scope.
|
||||||
@ -57,7 +57,7 @@ You can create rules that determine the machines and alert severities to send em
|
|||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
> This information might be processed by recipient mail servers that ar not in the geographic location you have selected for your Microsoft Defender ATP data.
|
> This information might be processed by recipient mail servers that ar not in the geographic location you have selected for your Microsoft Defender ATP data.
|
||||||
|
|
||||||
- **Machines** - Choose whether to notify recipients for alerts on all machines (Global administrator role only) or on selected machine groups. For more information, see [Create and manage machine groups](machine-groups-windows-defender-advanced-threat-protection.md).
|
- **Machines** - Choose whether to notify recipients for alerts on all machines (Global administrator role only) or on selected machine groups. For more information, see [Create and manage machine groups](machine-groups.md).
|
||||||
- **Alert severity** - Choose the alert severity level.
|
- **Alert severity** - Choose the alert severity level.
|
||||||
|
|
||||||
4. Click **Next**.
|
4. Click **Next**.
|
||||||
@ -99,7 +99,7 @@ This section lists various issues that you may encounter when using email notifi
|
|||||||
3. Check your email application rules that might be catching and moving your Microsoft Defender ATP email notifications.
|
3. Check your email application rules that might be catching and moving your Microsoft Defender ATP email notifications.
|
||||||
|
|
||||||
## Related topics
|
## Related topics
|
||||||
- [Update data retention settings](data-retention-settings-windows-defender-advanced-threat-protection.md)
|
- [Update data retention settings](data-retention-settings.md)
|
||||||
- [Enable and create Power BI reports using Microsoft Defender ATP data](powerbi-reports-windows-defender-advanced-threat-protection.md)
|
- [Enable and create Power BI reports using Microsoft Defender ATP data](powerbi-reports.md)
|
||||||
- [Enable Secure Score security controls](enable-secure-score-windows-defender-advanced-threat-protection.md)
|
- [Enable Secure Score security controls](enable-secure-score.md)
|
||||||
- [Configure advanced features](advanced-features-windows-defender-advanced-threat-protection.md)
|
- [Configure advanced features](advanced-features.md)
|
@ -63,7 +63,7 @@ ms.date: 04/24/2018
|
|||||||
9. Click **OK** and close any open GPMC windows.
|
9. Click **OK** and close any open GPMC windows.
|
||||||
|
|
||||||
>[!TIP]
|
>[!TIP]
|
||||||
> After onboarding the machine, you can choose to run a detection test to verify that the machine is properly onboarded to the service. For more information, see [Run a detection test on a newly onboarded Microsoft Defender ATP machine](run-detection-test-windows-defender-advanced-threat-protection.md).
|
> After onboarding the machine, you can choose to run a detection test to verify that the machine is properly onboarded to the service. For more information, see [Run a detection test on a newly onboarded Microsoft Defender ATP machine](run-detection-test.md).
|
||||||
|
|
||||||
## Additional Microsoft Defender ATP configuration settings
|
## Additional Microsoft Defender ATP configuration settings
|
||||||
For each machine, you can state whether samples can be collected from the machine when a request is made through Microsoft Defender Security Center to submit a file for deep analysis.
|
For each machine, you can state whether samples can be collected from the machine when a request is made through Microsoft Defender Security Center to submit a file for deep analysis.
|
||||||
@ -141,9 +141,9 @@ With Group Policy there isn’t an option to monitor deployment of policies on t
|
|||||||
|
|
||||||
|
|
||||||
## Related topics
|
## Related topics
|
||||||
- [Onboard Windows 10 machines using System Center Configuration Manager](configure-endpoints-sccm-windows-defender-advanced-threat-protection.md)
|
- [Onboard Windows 10 machines using System Center Configuration Manager](configure-endpoints-sccm.md)
|
||||||
- [Onboard Windows 10 machines using Mobile Device Management tools](configure-endpoints-mdm-windows-defender-advanced-threat-protection.md)
|
- [Onboard Windows 10 machines using Mobile Device Management tools](configure-endpoints-mdm.md)
|
||||||
- [Onboard Windows 10 machines using a local script](configure-endpoints-script-windows-defender-advanced-threat-protection.md)
|
- [Onboard Windows 10 machines using a local script](configure-endpoints-script.md)
|
||||||
- [Onboard non-persistent virtual desktop infrastructure (VDI) machines](configure-endpoints-vdi-windows-defender-advanced-threat-protection.md)
|
- [Onboard non-persistent virtual desktop infrastructure (VDI) machines](configure-endpoints-vdi.md)
|
||||||
- [Run a detection test on a newly onboarded Microsoft Defender ATP machines](run-detection-test-windows-defender-advanced-threat-protection.md)
|
- [Run a detection test on a newly onboarded Microsoft Defender ATP machines](run-detection-test.md)
|
||||||
- [Troubleshoot Microsoft Defender Advanced Threat Protection onboarding issues](troubleshoot-onboarding-windows-defender-advanced-threat-protection.md)
|
- [Troubleshoot Microsoft Defender Advanced Threat Protection onboarding issues](troubleshoot-onboarding.md)
|
||||||
|
@ -49,7 +49,7 @@ For more information on using Microsoft Defender ATP CSP see, [WindowsAdvancedTh
|
|||||||
|
|
||||||
|
|
||||||
>[!TIP]
|
>[!TIP]
|
||||||
> After onboarding the machine, you can choose to run a detection test to verify that a machine is properly onboarded to the service. For more information, see [Run a detection test on a newly onboarded Microsoft Defender ATP machine](run-detection-test-windows-defender-advanced-threat-protection.md).
|
> After onboarding the machine, you can choose to run a detection test to verify that a machine is properly onboarded to the service. For more information, see [Run a detection test on a newly onboarded Microsoft Defender ATP machine](run-detection-test.md).
|
||||||
|
|
||||||
## Offboard and monitor machines using Mobile Device Management tools
|
## Offboard and monitor machines using Mobile Device Management tools
|
||||||
For security reasons, the package used to Offboard machines will expire 30 days after the date it was downloaded. Expired offboarding packages sent to a machine will be rejected. When downloading an offboarding package you will be notified of the packages expiry date and it will also be included in the package name.
|
For security reasons, the package used to Offboard machines will expire 30 days after the date it was downloaded. Expired offboarding packages sent to a machine will be rejected. When downloading an offboarding package you will be notified of the packages expiry date and it will also be included in the package name.
|
||||||
@ -79,9 +79,9 @@ For security reasons, the package used to Offboard machines will expire 30 days
|
|||||||
> Offboarding causes the machine to stop sending sensor data to the portal but data from the machine, including reference to any alerts it has had will be retained for up to 6 months.
|
> Offboarding causes the machine to stop sending sensor data to the portal but data from the machine, including reference to any alerts it has had will be retained for up to 6 months.
|
||||||
|
|
||||||
## Related topics
|
## Related topics
|
||||||
- [Onboard Windows 10 machines using Group Policy](configure-endpoints-gp-windows-defender-advanced-threat-protection.md)
|
- [Onboard Windows 10 machines using Group Policy](configure-endpoints-gp.md)
|
||||||
- [Onboard Windows 10 machines using System Center Configuration Manager](configure-endpoints-sccm-windows-defender-advanced-threat-protection.md)
|
- [Onboard Windows 10 machines using System Center Configuration Manager](configure-endpoints-sccm.md)
|
||||||
- [Onboard Windows 10 machines using a local script](configure-endpoints-script-windows-defender-advanced-threat-protection.md)
|
- [Onboard Windows 10 machines using a local script](configure-endpoints-script.md)
|
||||||
- [Onboard non-persistent virtual desktop infrastructure (VDI) machines](configure-endpoints-vdi-windows-defender-advanced-threat-protection.md)
|
- [Onboard non-persistent virtual desktop infrastructure (VDI) machines](configure-endpoints-vdi.md)
|
||||||
- [Run a detection test on a newly onboarded Microsoft Defender ATP machine](run-detection-test-windows-defender-advanced-threat-protection.md)
|
- [Run a detection test on a newly onboarded Microsoft Defender ATP machine](run-detection-test.md)
|
||||||
- [Troubleshoot Microsoft Defender Advanced Threat Protection onboarding issues](troubleshoot-onboarding-windows-defender-advanced-threat-protection.md)
|
- [Troubleshoot Microsoft Defender Advanced Threat Protection onboarding issues](troubleshoot-onboarding.md)
|
||||||
|
@ -71,7 +71,7 @@ To effectively offboard the machine from the service, you'll need to disable the
|
|||||||
>If you decide to turn on the third-party integration again after disabling the integration, you'll need to regenerate the token and reapply it on machines.
|
>If you decide to turn on the third-party integration again after disabling the integration, you'll need to regenerate the token and reapply it on machines.
|
||||||
|
|
||||||
## Related topics
|
## Related topics
|
||||||
- [Onboard Windows 10 machines](configure-endpoints-windows-defender-advanced-threat-protection.md)
|
- [Onboard Windows 10 machines](configure-endpoints.md)
|
||||||
- [Onboard servers](configure-server-endpoints-windows-defender-advanced-threat-protection.md)
|
- [Onboard servers](configure-server-endpoints.md)
|
||||||
- [Configure proxy and Internet connectivity settings](configure-proxy-internet-windows-defender-advanced-threat-protection.md)
|
- [Configure proxy and Internet connectivity settings](configure-proxy-internet.md)
|
||||||
- [Troubleshooting Microsoft Defender Advanced Threat Protection onboarding issues](troubleshoot-onboarding-windows-defender-advanced-threat-protection.md)
|
- [Troubleshooting Microsoft Defender Advanced Threat Protection onboarding issues](troubleshoot-onboarding.md)
|
@ -69,7 +69,7 @@ You can use existing System Center Configuration Manager functionality to create
|
|||||||
> Microsoft Defender ATP doesn't support onboarding during the [Out-Of-Box Experience (OOBE)](https://answers.microsoft.com/en-us/windows/wiki/windows_10/how-to-complete-the-windows-10-out-of-box/47e3f943-f000-45e3-8c5c-9d85a1a0cf87) phase. Make sure users complete OOBE after running Windows installation or upgrading.
|
> Microsoft Defender ATP doesn't support onboarding during the [Out-Of-Box Experience (OOBE)](https://answers.microsoft.com/en-us/windows/wiki/windows_10/how-to-complete-the-windows-10-out-of-box/47e3f943-f000-45e3-8c5c-9d85a1a0cf87) phase. Make sure users complete OOBE after running Windows installation or upgrading.
|
||||||
|
|
||||||
>[!TIP]
|
>[!TIP]
|
||||||
> After onboarding the machine, you can choose to run a detection test to verify that an machine is properly onboarded to the service. For more information, see [Run a detection test on a newly onboarded Microsoft Defender ATP machine](run-detection-test-windows-defender-advanced-threat-protection.md).
|
> After onboarding the machine, you can choose to run a detection test to verify that an machine is properly onboarded to the service. For more information, see [Run a detection test on a newly onboarded Microsoft Defender ATP machine](run-detection-test.md).
|
||||||
|
|
||||||
### Configure sample collection settings
|
### Configure sample collection settings
|
||||||
For each machine, you can set a configuration value to state whether samples can be collected from the machine when a request is made through Microsoft Defender Security Center to submit a file for deep analysis.
|
For each machine, you can set a configuration value to state whether samples can be collected from the machine when a request is made through Microsoft Defender Security Center to submit a file for deep analysis.
|
||||||
@ -140,7 +140,7 @@ Monitoring with SCCM consists of two parts:
|
|||||||
|
|
||||||
4. Review the status indicators under **Completion Statistics** and **Content Status**.
|
4. Review the status indicators under **Completion Statistics** and **Content Status**.
|
||||||
|
|
||||||
If there are failed deployments (machines with **Error**, **Requirements Not Met**, or **Failed statuses**), you may need to troubleshoot the machines. For more information see, [Troubleshoot Microsoft Defender Advanced Threat Protection onboarding issues](troubleshoot-onboarding-windows-defender-advanced-threat-protection.md).
|
If there are failed deployments (machines with **Error**, **Requirements Not Met**, or **Failed statuses**), you may need to troubleshoot the machines. For more information see, [Troubleshoot Microsoft Defender Advanced Threat Protection onboarding issues](troubleshoot-onboarding.md).
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
@ -158,9 +158,9 @@ Value: “1”
|
|||||||
For more information about System Center Configuration Manager Compliance see [Get started with compliance settings in System Center Configuration Manager](https://docs.microsoft.com/sccm/compliance/get-started/get-started-with-compliance-settings).
|
For more information about System Center Configuration Manager Compliance see [Get started with compliance settings in System Center Configuration Manager](https://docs.microsoft.com/sccm/compliance/get-started/get-started-with-compliance-settings).
|
||||||
|
|
||||||
## Related topics
|
## Related topics
|
||||||
- [Onboard Windows 10 machines using Group Policy](configure-endpoints-gp-windows-defender-advanced-threat-protection.md)
|
- [Onboard Windows 10 machines using Group Policy](configure-endpoints-gp.md)
|
||||||
- [Onboard Windows 10 machines using Mobile Device Management tools](configure-endpoints-mdm-windows-defender-advanced-threat-protection.md)
|
- [Onboard Windows 10 machines using Mobile Device Management tools](configure-endpoints-mdm.md)
|
||||||
- [Onboard Windows 10 machines using a local script](configure-endpoints-script-windows-defender-advanced-threat-protection.md)
|
- [Onboard Windows 10 machines using a local script](configure-endpoints-script.md)
|
||||||
- [Onboard non-persistent virtual desktop infrastructure (VDI) machines](configure-endpoints-vdi-windows-defender-advanced-threat-protection.md)
|
- [Onboard non-persistent virtual desktop infrastructure (VDI) machines](configure-endpoints-vdi.md)
|
||||||
- [Run a detection test on a newly onboarded Microsoft Defender ATP machine](run-detection-test-windows-defender-advanced-threat-protection.md)
|
- [Run a detection test on a newly onboarded Microsoft Defender ATP machine](run-detection-test.md)
|
||||||
- [Troubleshoot Microsoft Defender Advanced Threat Protection onboarding issues](troubleshoot-onboarding-windows-defender-advanced-threat-protection.md)
|
- [Troubleshoot Microsoft Defender Advanced Threat Protection onboarding issues](troubleshoot-onboarding.md)
|
||||||
|
@ -32,7 +32,7 @@ ms.topic: article
|
|||||||
You can also manually onboard individual machines to Microsoft Defender ATP. You might want to do this first when testing the service before you commit to onboarding all machines in your network.
|
You can also manually onboard individual machines to Microsoft Defender ATP. You might want to do this first when testing the service before you commit to onboarding all machines in your network.
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> The script has been optimized to be used on a limited number of machines (1-10 machines). To deploy to scale, use other deployment options. For more information on using other deployment options, see [Onboard Window 10 machines](configure-endpoints-windows-defender-advanced-threat-protection.md).
|
> The script has been optimized to be used on a limited number of machines (1-10 machines). To deploy to scale, use other deployment options. For more information on using other deployment options, see [Onboard Window 10 machines](configure-endpoints.md).
|
||||||
|
|
||||||
## Onboard machines
|
## Onboard machines
|
||||||
1. Open the GP configuration package .zip file (*WindowsDefenderATPOnboardingPackage.zip*) that you downloaded from the service onboarding wizard. You can also get the package from [Microsoft Defender Security Center](https://securitycenter.windows.com/):
|
1. Open the GP configuration package .zip file (*WindowsDefenderATPOnboardingPackage.zip*) that you downloaded from the service onboarding wizard. You can also get the package from [Microsoft Defender Security Center](https://securitycenter.windows.com/):
|
||||||
@ -60,11 +60,11 @@ You can also manually onboard individual machines to Microsoft Defender ATP. You
|
|||||||
|
|
||||||
5. Press the **Enter** key or click **OK**.
|
5. Press the **Enter** key or click **OK**.
|
||||||
|
|
||||||
For information on how you can manually validate that the machine is compliant and correctly reports sensor data see, [Troubleshoot Microsoft Defender Advanced Threat Protection onboarding issues](troubleshoot-onboarding-windows-defender-advanced-threat-protection.md).
|
For information on how you can manually validate that the machine is compliant and correctly reports sensor data see, [Troubleshoot Microsoft Defender Advanced Threat Protection onboarding issues](troubleshoot-onboarding.md).
|
||||||
|
|
||||||
|
|
||||||
>[!TIP]
|
>[!TIP]
|
||||||
> After onboarding the machine, you can choose to run a detection test to verify that an machine is properly onboarded to the service. For more information, see [Run a detection test on a newly onboarded Microsoft Defender ATP endpoint](run-detection-test-windows-defender-advanced-threat-protection.md).
|
> After onboarding the machine, you can choose to run a detection test to verify that an machine is properly onboarded to the service. For more information, see [Run a detection test on a newly onboarded Microsoft Defender ATP endpoint](run-detection-test.md).
|
||||||
|
|
||||||
## Configure sample collection settings
|
## Configure sample collection settings
|
||||||
For each machine, you can set a configuration value to state whether samples can be collected from the machine when a request is made through Microsoft Defender Security Center to submit a file for deep analysis.
|
For each machine, you can set a configuration value to state whether samples can be collected from the machine when a request is made through Microsoft Defender Security Center to submit a file for deep analysis.
|
||||||
@ -122,7 +122,7 @@ For security reasons, the package used to Offboard machines will expire 30 days
|
|||||||
|
|
||||||
|
|
||||||
## Monitor machine configuration
|
## Monitor machine configuration
|
||||||
You can follow the different verification steps in the [Troubleshoot onboarding issues](troubleshoot-onboarding-windows-defender-advanced-threat-protection.md) to verify that the script completed successfully and the agent is running.
|
You can follow the different verification steps in the [Troubleshoot onboarding issues](troubleshoot-onboarding.md) to verify that the script completed successfully and the agent is running.
|
||||||
|
|
||||||
Monitoring can also be done directly on the portal, or by using the different deployment tools.
|
Monitoring can also be done directly on the portal, or by using the different deployment tools.
|
||||||
|
|
||||||
@ -135,9 +135,9 @@ Monitoring can also be done directly on the portal, or by using the different de
|
|||||||
|
|
||||||
|
|
||||||
## Related topics
|
## Related topics
|
||||||
- [Onboard Windows 10 machines using Group Policy](configure-endpoints-gp-windows-defender-advanced-threat-protection.md)
|
- [Onboard Windows 10 machines using Group Policy](configure-endpoints-gp.md)
|
||||||
- [Onboard Windows 10 machines using System Center Configuration Manager](configure-endpoints-sccm-windows-defender-advanced-threat-protection.md)
|
- [Onboard Windows 10 machines using System Center Configuration Manager](configure-endpoints-sccm.md)
|
||||||
- [Onboard Windows 10 machines using Mobile Device Management tools](configure-endpoints-mdm-windows-defender-advanced-threat-protection.md)
|
- [Onboard Windows 10 machines using Mobile Device Management tools](configure-endpoints-mdm.md)
|
||||||
- [Onboard non-persistent virtual desktop infrastructure (VDI) machines](configure-endpoints-vdi-windows-defender-advanced-threat-protection.md)
|
- [Onboard non-persistent virtual desktop infrastructure (VDI) machines](configure-endpoints-vdi.md)
|
||||||
- [Run a detection test on a newly onboarded Microsoft Defender ATP machine](run-detection-test-windows-defender-advanced-threat-protection.md)
|
- [Run a detection test on a newly onboarded Microsoft Defender ATP machine](run-detection-test.md)
|
||||||
- [Troubleshoot Microsoft Defender Advanced Threat Protection onboarding issues](troubleshoot-onboarding-windows-defender-advanced-threat-protection.md)
|
- [Troubleshoot Microsoft Defender Advanced Threat Protection onboarding issues](troubleshoot-onboarding.md)
|
||||||
|
@ -91,10 +91,10 @@ You can onboard VDI machines using a single entry or multiple entries for each m
|
|||||||
8. Use the search function by entering the machine name and select **Machine** as search type.
|
8. Use the search function by entering the machine name and select **Machine** as search type.
|
||||||
|
|
||||||
## Related topics
|
## Related topics
|
||||||
- [Onboard Windows 10 machines using Group Policy](configure-endpoints-gp-windows-defender-advanced-threat-protection.md)
|
- [Onboard Windows 10 machines using Group Policy](configure-endpoints-gp.md)
|
||||||
- [Onboard Windows 10 machines using System Center Configuration Manager](configure-endpoints-sccm-windows-defender-advanced-threat-protection.md)
|
- [Onboard Windows 10 machines using System Center Configuration Manager](configure-endpoints-sccm.md)
|
||||||
- [Onboard Windows 10 machines using Mobile Device Management tools](configure-endpoints-mdm-windows-defender-advanced-threat-protection.md)
|
- [Onboard Windows 10 machines using Mobile Device Management tools](configure-endpoints-mdm.md)
|
||||||
- [Onboard Windows 10 machines using a local script](configure-endpoints-script-windows-defender-advanced-threat-protection.md)
|
- [Onboard Windows 10 machines using a local script](configure-endpoints-script.md)
|
||||||
- [Troubleshoot Microsoft Defender Advanced Threat Protection onboarding issues](troubleshoot-onboarding-windows-defender-advanced-threat-protection.md)
|
- [Troubleshoot Microsoft Defender Advanced Threat Protection onboarding issues](troubleshoot-onboarding.md)
|
||||||
|
|
||||||
|
|
||||||
|
@ -39,11 +39,11 @@ The following deployment tools and methods are supported:
|
|||||||
## In this section
|
## In this section
|
||||||
Topic | Description
|
Topic | Description
|
||||||
:---|:---
|
:---|:---
|
||||||
[Onboard Windows 10 machines using Group Policy](configure-endpoints-gp-windows-defender-advanced-threat-protection.md) | Use Group Policy to deploy the configuration package on machines.
|
[Onboard Windows 10 machines using Group Policy](configure-endpoints-gp.md) | Use Group Policy to deploy the configuration package on machines.
|
||||||
[Onboard Windows 10 machines using System Center Configuration Manager](configure-endpoints-sccm-windows-defender-advanced-threat-protection.md) | You can use either use System Center Configuration Manager (current branch) version 1606 or System Center Configuration Manager(current branch) version 1602 or earlier to deploy the configuration package on machines.
|
[Onboard Windows 10 machines using System Center Configuration Manager](configure-endpoints-sccm.md) | You can use either use System Center Configuration Manager (current branch) version 1606 or System Center Configuration Manager(current branch) version 1602 or earlier to deploy the configuration package on machines.
|
||||||
[Onboard Windows 10 machines using Mobile Device Management tools](configure-endpoints-mdm-windows-defender-advanced-threat-protection.md) | Use Mobile Device Management tools or Microsoft Intune to deploy the configuration package on machine.
|
[Onboard Windows 10 machines using Mobile Device Management tools](configure-endpoints-mdm.md) | Use Mobile Device Management tools or Microsoft Intune to deploy the configuration package on machine.
|
||||||
[Onboard Windows 10 machines using a local script](configure-endpoints-script-windows-defender-advanced-threat-protection.md) | Learn how to use the local script to deploy the configuration package on endpoints.
|
[Onboard Windows 10 machines using a local script](configure-endpoints-script.md) | Learn how to use the local script to deploy the configuration package on endpoints.
|
||||||
[Onboard non-persistent virtual desktop infrastructure (VDI) machines](configure-endpoints-vdi-windows-defender-advanced-threat-protection.md) | Learn how to use the configuration package to configure VDI machines.
|
[Onboard non-persistent virtual desktop infrastructure (VDI) machines](configure-endpoints-vdi.md) | Learn how to use the configuration package to configure VDI machines.
|
||||||
|
|
||||||
|
|
||||||
>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-configureendpoints-belowfoldlink)
|
>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-configureendpoints-belowfoldlink)
|
@ -83,9 +83,9 @@ Grant the guest user access and permissions to your Microsoft Defender Security
|
|||||||
|
|
||||||
Granting access to guest user is done the same way as granting access to a user who is a member of your tenant.
|
Granting access to guest user is done the same way as granting access to a user who is a member of your tenant.
|
||||||
|
|
||||||
If you're using basic permissions to access the portal, the guest user must be assigned a Security Administrator role in **your** tenant. For more information, see [Use basic permissions to access the portal](basic-permissions-windows-defender-advanced-threat-protection.md).
|
If you're using basic permissions to access the portal, the guest user must be assigned a Security Administrator role in **your** tenant. For more information, see [Use basic permissions to access the portal](basic-permissions.md).
|
||||||
|
|
||||||
If you're using role-based access control (RBAC), the guest user must be to added to the appropriate group or groups in **your** tenant. Fore more information on RBAC in Microsoft Defender ATP, see [Manage portal access using RBAC](rbac-windows-defender-advanced-threat-protection.md).
|
If you're using role-based access control (RBAC), the guest user must be to added to the appropriate group or groups in **your** tenant. Fore more information on RBAC in Microsoft Defender ATP, see [Manage portal access using RBAC](rbac.md).
|
||||||
|
|
||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
>There is no difference between the Member user and Guest user roles from RBAC perspective.
|
>There is no difference between the Member user and Guest user roles from RBAC perspective.
|
||||||
@ -123,7 +123,7 @@ Use the following steps to obtain the MSSP customer tenant ID and then use the I
|
|||||||
|
|
||||||
After access the portal is granted, alert notification rules can to be created so that emails are sent to MSSPs when alerts associated with the tenant are created and set conditions are met.
|
After access the portal is granted, alert notification rules can to be created so that emails are sent to MSSPs when alerts associated with the tenant are created and set conditions are met.
|
||||||
|
|
||||||
For more information, see [Create rules for alert notifications](configure-email-notifications-windows-defender-advanced-threat-protection.md#create-rules-for-alert-notifications).
|
For more information, see [Create rules for alert notifications](configure-email-notifications.md#create-rules-for-alert-notifications).
|
||||||
|
|
||||||
These check boxes must be checked:
|
These check boxes must be checked:
|
||||||
- **Include organization name** - The customer name will be added to email notifications
|
- **Include organization name** - The customer name will be added to email notifications
|
||||||
@ -272,17 +272,17 @@ You'll need to have **Manage portal system settings** permission to whitelist th
|
|||||||
|
|
||||||
5. Click **Authorize application**.
|
5. Click **Authorize application**.
|
||||||
|
|
||||||
You can now download the relevant configuration file for your SIEM and connect to the Microsoft Defender ATP API. For more information see, [Pull alerts to your SIEM tools](configure-siem-windows-defender-advanced-threat-protection.md).
|
You can now download the relevant configuration file for your SIEM and connect to the Microsoft Defender ATP API. For more information see, [Pull alerts to your SIEM tools](configure-siem.md).
|
||||||
|
|
||||||
- In the ArcSight configuration file / Splunk Authentication Properties file you will have to write your application key manually by settings the secret value.
|
- In the ArcSight configuration file / Splunk Authentication Properties file you will have to write your application key manually by settings the secret value.
|
||||||
- Instead of acquiring a refresh token in the portal, use the script from the previous step to acquire a refresh token (or acquire it by other means).
|
- Instead of acquiring a refresh token in the portal, use the script from the previous step to acquire a refresh token (or acquire it by other means).
|
||||||
|
|
||||||
## Fetch alerts from MSSP customer's tenant using APIs
|
## Fetch alerts from MSSP customer's tenant using APIs
|
||||||
For information on how to fetch alerts using REST API, see [Pull alerts using REST API](pull-alerts-using-rest-api-windows-defender-advanced-threat-protection.md).
|
For information on how to fetch alerts using REST API, see [Pull alerts using REST API](pull-alerts-using-rest-api.md).
|
||||||
|
|
||||||
## Related topics
|
## Related topics
|
||||||
- [Use basic permissions to access the portal](basic-permissions-windows-defender-advanced-threat-protection.md)
|
- [Use basic permissions to access the portal](basic-permissions.md)
|
||||||
- [Manage portal access using RBAC](rbac-windows-defender-advanced-threat-protection.md)
|
- [Manage portal access using RBAC](rbac.md)
|
||||||
- [Pull alerts to your SIEM tools](configure-siem-windows-defender-advanced-threat-protection.md)
|
- [Pull alerts to your SIEM tools](configure-siem.md)
|
||||||
- [Pull alerts using REST API](pull-alerts-using-rest-api-windows-defender-advanced-threat-protection.md)
|
- [Pull alerts using REST API](pull-alerts-using-rest-api.md)
|
||||||
|
|
||||||
|
@ -169,5 +169,5 @@ However, if the connectivity check results indicate a failure, an HTTP error is
|
|||||||
> When the TelemetryProxyServer is set, in Registry or via Group Policy, Microsoft Defender ATP will fall back to direct if it can't access the defined proxy.
|
> When the TelemetryProxyServer is set, in Registry or via Group Policy, Microsoft Defender ATP will fall back to direct if it can't access the defined proxy.
|
||||||
|
|
||||||
## Related topics
|
## Related topics
|
||||||
- [Onboard Windows 10 machines](configure-endpoints-windows-defender-advanced-threat-protection.md)
|
- [Onboard Windows 10 machines](configure-endpoints.md)
|
||||||
- [Troubleshoot Microsoft Defender Advanced Threat Protection onboarding issues](troubleshoot-onboarding-windows-defender-advanced-threat-protection.md)
|
- [Troubleshoot Microsoft Defender Advanced Threat Protection onboarding issues](troubleshoot-onboarding.md)
|
||||||
|
@ -70,7 +70,7 @@ You'll need to tak the following steps if you choose to onboard servers through
|
|||||||
- If you're already leveraging System Center Operations Manager (SCOM) or Azure Monitor (formerly known as Operations Management Suite (OMS)), simply attach the Microsoft Monitoring Agent (MMA) to report to your Microsoft Defender ATP workspace through Multi Homing support. Otherwise, install and configure MMA to report sensor data to Microsoft Defender ATP as instructed below. For more information, see [Collect log data with Azure Log Analytics agent](https://docs.microsoft.com/azure/azure-monitor/platform/log-analytics-agent).
|
- If you're already leveraging System Center Operations Manager (SCOM) or Azure Monitor (formerly known as Operations Management Suite (OMS)), simply attach the Microsoft Monitoring Agent (MMA) to report to your Microsoft Defender ATP workspace through Multi Homing support. Otherwise, install and configure MMA to report sensor data to Microsoft Defender ATP as instructed below. For more information, see [Collect log data with Azure Log Analytics agent](https://docs.microsoft.com/azure/azure-monitor/platform/log-analytics-agent).
|
||||||
|
|
||||||
|
|
||||||
>[!TIP]
|
>[!TIP]
|
||||||
> After onboarding the machine, you can choose to run a detection test to verify that it is properly onboarded to the service. For more information, see [Run a detection test on a newly onboarded Microsoft Defender ATP endpoint](run-detection-test.md).
|
> After onboarding the machine, you can choose to run a detection test to verify that it is properly onboarded to the service. For more information, see [Run a detection test on a newly onboarded Microsoft Defender ATP endpoint](run-detection-test.md).
|
||||||
|
|
||||||
### Configure and update System Center Endpoint Protection clients
|
### Configure and update System Center Endpoint Protection clients
|
||||||
@ -135,9 +135,9 @@ Supported tools include:
|
|||||||
- Group Policy
|
- Group Policy
|
||||||
- System Center Configuration Manager 2012 / 2012 R2 1511 / 1602
|
- System Center Configuration Manager 2012 / 2012 R2 1511 / 1602
|
||||||
- VDI onboarding scripts for non-persistent machines
|
- VDI onboarding scripts for non-persistent machines
|
||||||
|
|
||||||
For more information, see [Onboard Windows 10 machines](configure-endpoints.md). Support for Windows Server, version 1803 and Windows 2019 provides deeper insight into activities happening on the server, coverage for kernel and memory attack detection, and enables response actions on Windows Server endpoint as well.
|
For more information, see [Onboard Windows 10 machines](configure-endpoints.md). Support for Windows Server, version 1803 and Windows 2019 provides deeper insight into activities happening on the server, coverage for kernel and memory attack detection, and enables response actions on Windows Server endpoint as well.
|
||||||
|
|
||||||
1. Configure Microsoft Defender ATP onboarding settings on the server. For more information, see [Onboard Windows 10 machines](configure-endpoints.md).
|
1. Configure Microsoft Defender ATP onboarding settings on the server. For more information, see [Onboard Windows 10 machines](configure-endpoints.md).
|
||||||
|
|
||||||
2. If you’re running a third party antimalware solution, you'll need to apply the following Windows Defender AV passive mode settings and verify it was configured correctly:
|
2. If you’re running a third party antimalware solution, you'll need to apply the following Windows Defender AV passive mode settings and verify it was configured correctly:
|
||||||
@ -231,8 +231,8 @@ To offboard the server, you can use either of the following methods:
|
|||||||
$AgentCfg.ReloadConfiguration()
|
$AgentCfg.ReloadConfiguration()
|
||||||
```
|
```
|
||||||
|
|
||||||
## Related topics
|
## Related topics
|
||||||
- [Onboard Windows 10 machines](configure-endpoints-windows-defender-advanced-threat-protection.md)
|
- [Onboard Windows 10 machines](configure-endpoints.md)
|
||||||
- [Onboard non-Windows machines](configure-endpoints-non-windows-windows-defender-advanced-threat-protection.md)
|
- [Onboard non-Windows machines](configure-endpoints-non-windows.md)
|
||||||
- [Configure proxy and Internet connectivity settings](configure-proxy-internet-windows-defender-advanced-threat-protection.md)
|
- [Configure proxy and Internet connectivity settings](configure-proxy-internet.md)
|
||||||
- [Run a detection test on a newly onboarded Microsoft Defender ATP machine](run-detection-test-windows-defender-advanced-threat-protection.md)
|
- [Run a detection test on a newly onboarded Microsoft Defender ATP machine](run-detection-test.md)
|
||||||
|
@ -37,27 +37,27 @@ Microsoft Defender ATP currently supports the following SIEM tools:
|
|||||||
|
|
||||||
To use either of these supported SIEM tools you'll need to:
|
To use either of these supported SIEM tools you'll need to:
|
||||||
|
|
||||||
- [Enable SIEM integration in Microsoft Defender ATP](enable-siem-integration-windows-defender-advanced-threat-protection.md)
|
- [Enable SIEM integration in Microsoft Defender ATP](enable-siem-integration.md)
|
||||||
- Configure the supported SIEM tool:
|
- Configure the supported SIEM tool:
|
||||||
- [Configure Splunk to pull Microsoft Defender ATP alerts](configure-splunk-windows-defender-advanced-threat-protection.md)
|
- [Configure Splunk to pull Microsoft Defender ATP alerts](configure-splunk.md)
|
||||||
- [Configure HP ArcSight to pull Microsoft Defender ATP alerts](configure-arcsight-windows-defender-advanced-threat-protection.md)
|
- [Configure HP ArcSight to pull Microsoft Defender ATP alerts](configure-arcsight.md)
|
||||||
|
|
||||||
For more information on the list of fields exposed in the alerts API see, [Microsoft Defender ATP alert API fields](api-portal-mapping-windows-defender-advanced-threat-protection.md).
|
For more information on the list of fields exposed in the alerts API see, [Microsoft Defender ATP alert API fields](api-portal-mapping.md).
|
||||||
|
|
||||||
|
|
||||||
## Pull Microsoft Defender ATP alerts using REST API
|
## Pull Microsoft Defender ATP alerts using REST API
|
||||||
Microsoft Defender ATP supports the OAuth 2.0 protocol to pull alerts using REST API.
|
Microsoft Defender ATP supports the OAuth 2.0 protocol to pull alerts using REST API.
|
||||||
|
|
||||||
For more information, see [Pull Microsoft Defender ATP alerts using REST API](pull-alerts-using-rest-api-windows-defender-advanced-threat-protection.md).
|
For more information, see [Pull Microsoft Defender ATP alerts using REST API](pull-alerts-using-rest-api.md).
|
||||||
|
|
||||||
|
|
||||||
## In this section
|
## In this section
|
||||||
|
|
||||||
Topic | Description
|
Topic | Description
|
||||||
:---|:---
|
:---|:---
|
||||||
[Enable SIEM integration in Microsoft Defender ATP](enable-siem-integration-windows-defender-advanced-threat-protection.md)| Learn about enabling the SIEM integration feature in the **Settings** page in the portal so that you can use and generate the required information to configure supported SIEM tools.
|
[Enable SIEM integration in Microsoft Defender ATP](enable-siem-integration.md)| Learn about enabling the SIEM integration feature in the **Settings** page in the portal so that you can use and generate the required information to configure supported SIEM tools.
|
||||||
[Configure Splunk to pull Microsoft Defender ATP alerts](configure-splunk-windows-defender-advanced-threat-protection.md)| Learn about installing the REST API Modular Input app and other configuration settings to enable Splunk to pull Microsoft Defender ATP alerts.
|
[Configure Splunk to pull Microsoft Defender ATP alerts](configure-splunk.md)| Learn about installing the REST API Modular Input app and other configuration settings to enable Splunk to pull Microsoft Defender ATP alerts.
|
||||||
[Configure HP ArcSight to pull Microsoft Defender ATP alerts](configure-arcsight-windows-defender-advanced-threat-protection.md)| Learn about installing the HP ArcSight REST FlexConnector package and the files you need to configure ArcSight to pull Microsoft Defender ATP alerts.
|
[Configure HP ArcSight to pull Microsoft Defender ATP alerts](configure-arcsight.md)| Learn about installing the HP ArcSight REST FlexConnector package and the files you need to configure ArcSight to pull Microsoft Defender ATP alerts.
|
||||||
[Microsoft Defender ATP alert API fields](api-portal-mapping-windows-defender-advanced-threat-protection.md) | Understand what data fields are exposed as part of the alerts API and how they map to Microsoft Defender Security Center.
|
[Microsoft Defender ATP alert API fields](api-portal-mapping.md) | Understand what data fields are exposed as part of the alerts API and how they map to Microsoft Defender Security Center.
|
||||||
[Pull Microsoft Defender ATP alerts using REST API](pull-alerts-using-rest-api-windows-defender-advanced-threat-protection.md) | Use the Client credentials OAuth 2.0 flow to pull alerts from Microsoft Defender ATP using REST API.
|
[Pull Microsoft Defender ATP alerts using REST API](pull-alerts-using-rest-api.md) | Use the Client credentials OAuth 2.0 flow to pull alerts from Microsoft Defender ATP using REST API.
|
||||||
[Troubleshoot SIEM tool integration issues](troubleshoot-siem-windows-defender-advanced-threat-protection.md) | Address issues you might encounter when using the SIEM integration feature.
|
[Troubleshoot SIEM tool integration issues](troubleshoot-siem.md) | Address issues you might encounter when using the SIEM integration feature.
|
||||||
|
@ -34,7 +34,7 @@ You'll need to configure Splunk so that it can pull Microsoft Defender ATP alert
|
|||||||
## Before you begin
|
## Before you begin
|
||||||
|
|
||||||
- Install the [REST API Modular Input app](https://splunkbase.splunk.com/app/1546/) in Splunk.
|
- Install the [REST API Modular Input app](https://splunkbase.splunk.com/app/1546/) in Splunk.
|
||||||
- Make sure you have enabled the **SIEM integration** feature from the **Settings** menu. For more information, see [Enable SIEM integration in Microsoft Defender ATP](enable-siem-integration-windows-defender-advanced-threat-protection.md)
|
- Make sure you have enabled the **SIEM integration** feature from the **Settings** menu. For more information, see [Enable SIEM integration in Microsoft Defender ATP](enable-siem-integration.md)
|
||||||
|
|
||||||
- Have the details file you saved from enabling the **SIEM integration** feature ready. You'll need to get the following values:
|
- Have the details file you saved from enabling the **SIEM integration** feature ready. You'll need to get the following values:
|
||||||
- OAuth 2 Token refresh URL
|
- OAuth 2 Token refresh URL
|
||||||
@ -146,8 +146,8 @@ Use the solution explorer to view alerts in Splunk.
|
|||||||
>```source="rest://windows atp alerts" | spath | dedup _raw | table *```
|
>```source="rest://windows atp alerts" | spath | dedup _raw | table *```
|
||||||
|
|
||||||
## Related topics
|
## Related topics
|
||||||
- [Enable SIEM integration in Microsoft Defender ATP](enable-siem-integration-windows-defender-advanced-threat-protection.md)
|
- [Enable SIEM integration in Microsoft Defender ATP](enable-siem-integration.md)
|
||||||
- [Configure ArcSight to pull Microsoft Defender ATP alerts](configure-arcsight-windows-defender-advanced-threat-protection.md)
|
- [Configure ArcSight to pull Microsoft Defender ATP alerts](configure-arcsight.md)
|
||||||
- [Microsoft Defender ATP alert API fields](api-portal-mapping-windows-defender-advanced-threat-protection.md)
|
- [Microsoft Defender ATP alert API fields](api-portal-mapping.md)
|
||||||
- [Pull Microsoft Defender ATP alerts using REST API](pull-alerts-using-rest-api-windows-defender-advanced-threat-protection.md)
|
- [Pull Microsoft Defender ATP alerts using REST API](pull-alerts-using-rest-api.md)
|
||||||
- [Troubleshoot SIEM tool integration issues](troubleshoot-siem-windows-defender-advanced-threat-protection.md)
|
- [Troubleshoot SIEM tool integration issues](troubleshoot-siem.md)
|
||||||
|
@ -38,8 +38,8 @@ Delegated (work or school account) | Alert.ReadWrite | 'Read and write alerts'
|
|||||||
|
|
||||||
>[!Note]
|
>[!Note]
|
||||||
> When obtaining a token using user credentials:
|
> When obtaining a token using user credentials:
|
||||||
>- The user needs to have at least the following role permission: 'Alerts investigation' (See [Create and manage roles](user-roles-windows-defender-advanced-threat-protection.md) for more information)
|
>- The user needs to have at least the following role permission: 'Alerts investigation' (See [Create and manage roles](user-roles.md) for more information)
|
||||||
>- The user needs to have access to the machine associated with the alert, based on machine group settings (See [Create and manage machine groups](machine-groups-windows-defender-advanced-threat-protection.md) for more information)
|
>- The user needs to have access to the machine associated with the alert, based on machine group settings (See [Create and manage machine groups](machine-groups.md) for more information)
|
||||||
|
|
||||||
## HTTP request
|
## HTTP request
|
||||||
```
|
```
|
||||||
|
@ -32,7 +32,7 @@ ms.date: 04/24/2018
|
|||||||
You can define custom alert definitions and indicators of compromise (IOC) using the threat intelligence API. Creating custom threat intelligence alerts allows you to generate specific alerts that are applicable to your organization.
|
You can define custom alert definitions and indicators of compromise (IOC) using the threat intelligence API. Creating custom threat intelligence alerts allows you to generate specific alerts that are applicable to your organization.
|
||||||
|
|
||||||
## Before you begin
|
## Before you begin
|
||||||
Before creating custom alerts, you'll need to enable the threat intelligence application in Azure Active Directory and generate access tokens. For more information, see [Enable the custom threat intelligence application](enable-custom-ti-windows-defender-advanced-threat-protection.md).
|
Before creating custom alerts, you'll need to enable the threat intelligence application in Azure Active Directory and generate access tokens. For more information, see [Enable the custom threat intelligence application](enable-custom-ti.md).
|
||||||
|
|
||||||
### Use the threat intelligence REST API to create custom threat intelligence alerts
|
### Use the threat intelligence REST API to create custom threat intelligence alerts
|
||||||
You can call and specify the resource URLs using one of the following operations to access and manipulate a threat intelligence resource:
|
You can call and specify the resource URLs using one of the following operations to access and manipulate a threat intelligence resource:
|
||||||
@ -71,7 +71,7 @@ Make an HTTP POST request to the token issuing endpoint with the following param
|
|||||||
> The authorization server URL is `https://login.windows.net/<AADTenantID>/oauth2/token`. Replace `<AADTenantID>` with your Azure Active Directory tenant ID.
|
> The authorization server URL is `https://login.windows.net/<AADTenantID>/oauth2/token`. Replace `<AADTenantID>` with your Azure Active Directory tenant ID.
|
||||||
|
|
||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
> The `<ClientId>`, `<ClientSecret>`, and the `<AuthorizationServerUrl>` are all provided to you when enabling the custom threat intelligence application. For more information, see [Enable the custom threat intelligence application](enable-custom-ti-windows-defender-advanced-threat-protection.md).
|
> The `<ClientId>`, `<ClientSecret>`, and the `<AuthorizationServerUrl>` are all provided to you when enabling the custom threat intelligence application. For more information, see [Enable the custom threat intelligence application](enable-custom-ti.md).
|
||||||
|
|
||||||
|
|
||||||
```
|
```
|
||||||
@ -405,14 +405,14 @@ These parameters are compatible with the [OData V4 query language](http://docs.o
|
|||||||
|
|
||||||
## Code examples
|
## Code examples
|
||||||
The following articles provide detailed code examples that demonstrate how to use the custom threat intelligence API in several programming languages:
|
The following articles provide detailed code examples that demonstrate how to use the custom threat intelligence API in several programming languages:
|
||||||
- [PowerShell code examples](powershell-example-code-windows-defender-advanced-threat-protection.md)
|
- [PowerShell code examples](powershell-example-code.md)
|
||||||
- [Python code examples](python-example-code-windows-defender-advanced-threat-protection.md)
|
- [Python code examples](python-example-code.md)
|
||||||
|
|
||||||
|
|
||||||
## Related topics
|
## Related topics
|
||||||
- [Understand threat intelligence concepts](threat-indicator-concepts-windows-defender-advanced-threat-protection.md)
|
- [Understand threat intelligence concepts](threat-indicator-concepts.md)
|
||||||
- [Enable the custom threat intelligence API in Microsoft Defender ATP](enable-custom-ti-windows-defender-advanced-threat-protection.md)
|
- [Enable the custom threat intelligence API in Microsoft Defender ATP](enable-custom-ti.md)
|
||||||
- [PowerShell code examples for the custom threat intelligence API](powershell-example-code-windows-defender-advanced-threat-protection.md)
|
- [PowerShell code examples for the custom threat intelligence API](powershell-example-code.md)
|
||||||
- [Python code examples for the custom threat intelligence API](python-example-code-windows-defender-advanced-threat-protection.md)
|
- [Python code examples for the custom threat intelligence API](python-example-code.md)
|
||||||
- [Experiment with custom threat intelligence alerts](experiment-custom-ti-windows-defender-advanced-threat-protection.md)
|
- [Experiment with custom threat intelligence alerts](experiment-custom-ti.md)
|
||||||
- [Troubleshoot custom threat intelligence issues](troubleshoot-custom-ti-windows-defender-advanced-threat-protection.md)
|
- [Troubleshoot custom threat intelligence issues](troubleshoot-custom-ti.md)
|
||||||
|
@ -41,8 +41,8 @@ During the onboarding process, a wizard takes you through the general settings o
|
|||||||
|
|
||||||
|
|
||||||
## Related topics
|
## Related topics
|
||||||
- [Update data retention settings](data-retention-settings-windows-defender-advanced-threat-protection.md)
|
- [Update data retention settings](data-retention-settings.md)
|
||||||
- [Configure alert notifications in Microsoft Defender ATP](configure-email-notifications-windows-defender-advanced-threat-protection.md)
|
- [Configure alert notifications in Microsoft Defender ATP](configure-email-notifications.md)
|
||||||
- [Enable and create Power BI reports using Microsoft Defender ATP data](powerbi-reports-windows-defender-advanced-threat-protection.md)
|
- [Enable and create Power BI reports using Microsoft Defender ATP data](powerbi-reports.md)
|
||||||
- [Enable Secure Score security controls](enable-secure-score-windows-defender-advanced-threat-protection.md)
|
- [Enable Secure Score security controls](enable-secure-score.md)
|
||||||
- [Configure advanced features](advanced-features-windows-defender-advanced-threat-protection.md)
|
- [Configure advanced features](advanced-features.md)
|
||||||
|
@ -41,16 +41,16 @@ Before you can create custom threat intelligence (TI) using REST API, you'll nee
|
|||||||
|
|
||||||
>[!WARNING]
|
>[!WARNING]
|
||||||
>The client secret is only displayed once. Make sure you keep a copy of it in a safe place. <br>
|
>The client secret is only displayed once. Make sure you keep a copy of it in a safe place. <br>
|
||||||
For more information about getting a new secret see, [Learn how to get a new secret](troubleshoot-custom-ti-windows-defender-advanced-threat-protection.md#learn-how-to-get-a-new-client-secret).
|
For more information about getting a new secret see, [Learn how to get a new secret](troubleshoot-custom-ti.md#learn-how-to-get-a-new-client-secret).
|
||||||
|
|
||||||
4. Select **Generate tokens** to get an access and refresh token.
|
4. Select **Generate tokens** to get an access and refresh token.
|
||||||
|
|
||||||
You’ll need to use the access token in the Authorization header when doing REST API calls.
|
You’ll need to use the access token in the Authorization header when doing REST API calls.
|
||||||
|
|
||||||
## Related topics
|
## Related topics
|
||||||
- [Understand threat intelligence concepts](threat-indicator-concepts-windows-defender-advanced-threat-protection.md)
|
- [Understand threat intelligence concepts](threat-indicator-concepts.md)
|
||||||
- [Create custom alerts using the threat intelligence API](custom-ti-api-windows-defender-advanced-threat-protection.md)
|
- [Create custom alerts using the threat intelligence API](custom-ti-api.md)
|
||||||
- [PowerShell code examples for the custom threat intelligence API](powershell-example-code-windows-defender-advanced-threat-protection.md)
|
- [PowerShell code examples for the custom threat intelligence API](powershell-example-code.md)
|
||||||
- [Python code examples for the custom threat intelligence API](python-example-code-windows-defender-advanced-threat-protection.md)
|
- [Python code examples for the custom threat intelligence API](python-example-code.md)
|
||||||
- [Experiment with custom threat intelligence alerts](experiment-custom-ti-windows-defender-advanced-threat-protection.md)
|
- [Experiment with custom threat intelligence alerts](experiment-custom-ti.md)
|
||||||
- [Troubleshoot custom threat intelligence issues](troubleshoot-custom-ti-windows-defender-advanced-threat-protection.md)
|
- [Troubleshoot custom threat intelligence issues](troubleshoot-custom-ti.md)
|
||||||
|
@ -39,8 +39,8 @@ Set the baselines for calculating the score of Windows Defender security control
|
|||||||
3. Click **Save preferences**.
|
3. Click **Save preferences**.
|
||||||
|
|
||||||
## Related topics
|
## Related topics
|
||||||
- [View the Secure Score dashboard](secure-score-dashboard-windows-defender-advanced-threat-protection.md)
|
- [View the Secure Score dashboard](secure-score-dashboard.md)
|
||||||
- [Update data retention settings for Microsoft Defender ATP](data-retention-settings-windows-defender-advanced-threat-protection.md)
|
- [Update data retention settings for Microsoft Defender ATP](data-retention-settings.md)
|
||||||
- [Configure alert notifications in Microsoft Defender ATP](configure-email-notifications-windows-defender-advanced-threat-protection.md)
|
- [Configure alert notifications in Microsoft Defender ATP](configure-email-notifications.md)
|
||||||
- [Enable and create Power BI reports using Microsoft Defender ATP data](powerbi-reports-windows-defender-advanced-threat-protection.md)
|
- [Enable and create Power BI reports using Microsoft Defender ATP data](powerbi-reports.md)
|
||||||
- [Configure advanced features in Microsoft Defender ATP](advanced-features-windows-defender-advanced-threat-protection.md)
|
- [Configure advanced features in Microsoft Defender ATP](advanced-features.md)
|
||||||
|
@ -44,7 +44,7 @@ Enable security information and event management (SIEM) integration so you can p
|
|||||||
|
|
||||||
> [!WARNING]
|
> [!WARNING]
|
||||||
>The client secret is only displayed once. Make sure you keep a copy of it in a safe place.<br>
|
>The client secret is only displayed once. Make sure you keep a copy of it in a safe place.<br>
|
||||||
For more information about getting a new secret see, [Learn how to get a new secret](troubleshoot-custom-ti-windows-defender-advanced-threat-protection.md#learn-how-to-get-a-new-client-secret).
|
For more information about getting a new secret see, [Learn how to get a new secret](troubleshoot-custom-ti.md#learn-how-to-get-a-new-client-secret).
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
@ -70,8 +70,8 @@ You can now proceed with configuring your SIEM solution or connecting to the ale
|
|||||||
You can configure IBM QRadar to collect alerts from Microsoft Defender ATP. For more information, see [IBM Knowledge Center](https://www.ibm.com/support/knowledgecenter/SS42VS_DSM/c_dsm_guide_MS_Win_Defender_ATP_overview.html?cp=SS42VS_7.3.1).
|
You can configure IBM QRadar to collect alerts from Microsoft Defender ATP. For more information, see [IBM Knowledge Center](https://www.ibm.com/support/knowledgecenter/SS42VS_DSM/c_dsm_guide_MS_Win_Defender_ATP_overview.html?cp=SS42VS_7.3.1).
|
||||||
|
|
||||||
## Related topics
|
## Related topics
|
||||||
- [Configure Splunk to pull Microsoft Defender ATP alerts](configure-splunk-windows-defender-advanced-threat-protection.md)
|
- [Configure Splunk to pull Microsoft Defender ATP alerts](configure-splunk.md)
|
||||||
- [Configure HP ArcSight to pull Microsoft Defender ATP alerts](configure-arcsight-windows-defender-advanced-threat-protection.md)
|
- [Configure HP ArcSight to pull Microsoft Defender ATP alerts](configure-arcsight.md)
|
||||||
- [Microsoft Defender ATP alert API fields](api-portal-mapping-windows-defender-advanced-threat-protection.md)
|
- [Microsoft Defender ATP alert API fields](api-portal-mapping.md)
|
||||||
- [Pull Microsoft Defender ATP alerts using REST API](pull-alerts-using-rest-api-windows-defender-advanced-threat-protection.md)
|
- [Pull Microsoft Defender ATP alerts using REST API](pull-alerts-using-rest-api.md)
|
||||||
- [Troubleshoot SIEM tool integration issues](troubleshoot-siem-windows-defender-advanced-threat-protection.md)
|
- [Troubleshoot SIEM tool integration issues](troubleshoot-siem.md)
|
||||||
|
@ -88,7 +88,7 @@ This URL will match that seen in the Firewall or network activity.</td>
|
|||||||
<td>Microsoft Defender Advanced Threat Protection service failed to connect to the server at ```variable```.</td>
|
<td>Microsoft Defender Advanced Threat Protection service failed to connect to the server at ```variable```.</td>
|
||||||
<td>Variable = URL of the Microsoft Defender ATP processing servers.<br>
|
<td>Variable = URL of the Microsoft Defender ATP processing servers.<br>
|
||||||
The service could not contact the external processing servers at that URL.</td>
|
The service could not contact the external processing servers at that URL.</td>
|
||||||
<td>Check the connection to the URL. See [Configure proxy and Internet connectivity](configure-proxy-internet-windows-defender-advanced-threat-protection.md).</td>
|
<td>Check the connection to the URL. See [Configure proxy and Internet connectivity](configure-proxy-internet.md).</td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr>
|
<tr>
|
||||||
<td>6</td>
|
<td>6</td>
|
||||||
@ -96,14 +96,14 @@ The service could not contact the external processing servers at that URL.</td>
|
|||||||
<td>The machine did not onboard correctly and will not be reporting to the portal.</td>
|
<td>The machine did not onboard correctly and will not be reporting to the portal.</td>
|
||||||
<td>Onboarding must be run before starting the service.<br>
|
<td>Onboarding must be run before starting the service.<br>
|
||||||
Check that the onboarding settings and scripts were deployed properly. Try to redeploy the configuration packages.<br>
|
Check that the onboarding settings and scripts were deployed properly. Try to redeploy the configuration packages.<br>
|
||||||
See [Onboard Windows 10 machines](configure-endpoints-windows-defender-advanced-threat-protection.md).</td>
|
See [Onboard Windows 10 machines](configure-endpoints.md).</td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr>
|
<tr>
|
||||||
<td>7</td>
|
<td>7</td>
|
||||||
<td>Microsoft Defender Advanced Threat Protection service failed to read the onboarding parameters. Failure: ```variable```.</td>
|
<td>Microsoft Defender Advanced Threat Protection service failed to read the onboarding parameters. Failure: ```variable```.</td>
|
||||||
<td>Variable = detailed error description. The machine did not onboard correctly and will not be reporting to the portal.</td>
|
<td>Variable = detailed error description. The machine did not onboard correctly and will not be reporting to the portal.</td>
|
||||||
<td>Check that the onboarding settings and scripts were deployed properly. Try to redeploy the configuration packages.<br>
|
<td>Check that the onboarding settings and scripts were deployed properly. Try to redeploy the configuration packages.<br>
|
||||||
See [Onboard Windows 10 machines](configure-endpoints-windows-defender-advanced-threat-protection.md).</td>
|
See [Onboard Windows 10 machines](configure-endpoints.md).</td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr>
|
<tr>
|
||||||
<td>8</td>
|
<td>8</td>
|
||||||
@ -111,21 +111,21 @@ See [Onboard Windows 10 machines](configure-endpoints-windows-defender-advanced-
|
|||||||
<td>**During onboarding:** The service failed to clean its configuration during the onboarding. The onboarding process continues. <br><br> **During offboarding:** The service failed to clean its configuration during the offboarding. The offboarding process finished but the service keeps running.
|
<td>**During onboarding:** The service failed to clean its configuration during the onboarding. The onboarding process continues. <br><br> **During offboarding:** The service failed to clean its configuration during the offboarding. The offboarding process finished but the service keeps running.
|
||||||
</td>
|
</td>
|
||||||
<td>**Onboarding:** No action required. <br><br> **Offboarding:** Reboot the system.<br>
|
<td>**Onboarding:** No action required. <br><br> **Offboarding:** Reboot the system.<br>
|
||||||
See [Onboard Windows 10 machines](configure-endpoints-windows-defender-advanced-threat-protection.md).</td>
|
See [Onboard Windows 10 machines](configure-endpoints.md).</td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr>
|
<tr>
|
||||||
<td>9</td>
|
<td>9</td>
|
||||||
<td>Microsoft Defender Advanced Threat Protection service failed to change its start type. Failure code: ```variable```.</td>
|
<td>Microsoft Defender Advanced Threat Protection service failed to change its start type. Failure code: ```variable```.</td>
|
||||||
<td>**During onboarding:** The machine did not onboard correctly and will not be reporting to the portal. <br><br>**During offboarding:** Failed to change the service start type. The offboarding process continues. </td>
|
<td>**During onboarding:** The machine did not onboard correctly and will not be reporting to the portal. <br><br>**During offboarding:** Failed to change the service start type. The offboarding process continues. </td>
|
||||||
<td>Check that the onboarding settings and scripts were deployed properly. Try to redeploy the configuration packages.<br>
|
<td>Check that the onboarding settings and scripts were deployed properly. Try to redeploy the configuration packages.<br>
|
||||||
See [Onboard Windows 10 machines](configure-endpoints-windows-defender-advanced-threat-protection.md).</td>
|
See [Onboard Windows 10 machines](configure-endpoints.md).</td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr>
|
<tr>
|
||||||
<td>10</td>
|
<td>10</td>
|
||||||
<td>Microsoft Defender Advanced Threat Protection service failed to persist the onboarding information. Failure code: ```variable```.</td>
|
<td>Microsoft Defender Advanced Threat Protection service failed to persist the onboarding information. Failure code: ```variable```.</td>
|
||||||
<td>The machine did not onboard correctly and will not be reporting to the portal.</td>
|
<td>The machine did not onboard correctly and will not be reporting to the portal.</td>
|
||||||
<td>Check that the onboarding settings and scripts were deployed properly. Try to redeploy the configuration packages.<br>
|
<td>Check that the onboarding settings and scripts were deployed properly. Try to redeploy the configuration packages.<br>
|
||||||
See [Onboard Windows 10 machines](configure-endpoints-windows-defender-advanced-threat-protection.md).</td>
|
See [Onboard Windows 10 machines](configure-endpoints.md).</td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr>
|
<tr>
|
||||||
<td>11</td>
|
<td>11</td>
|
||||||
@ -151,15 +151,15 @@ It may take several hours for the machine to appear in the portal.</td>
|
|||||||
<td>Microsoft Defender Advanced Threat Protection cannot start command channel with URL: ```variable```.</td>
|
<td>Microsoft Defender Advanced Threat Protection cannot start command channel with URL: ```variable```.</td>
|
||||||
<td>Variable = URL of the Microsoft Defender ATP processing servers.<br>
|
<td>Variable = URL of the Microsoft Defender ATP processing servers.<br>
|
||||||
The service could not contact the external processing servers at that URL.</td>
|
The service could not contact the external processing servers at that URL.</td>
|
||||||
<td>Check the connection to the URL. See [Configure proxy and Internet connectivity](configure-proxy-internet-windows-defender-advanced-threat-protection.md).</td>
|
<td>Check the connection to the URL. See [Configure proxy and Internet connectivity](configure-proxy-internet.md).</td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr>
|
<tr>
|
||||||
<td>17</td>
|
<td>17</td>
|
||||||
<td>Microsoft Defender Advanced Threat Protection service failed to change the Connected User Experiences and Telemetry service location. Failure code: ```variable```.</td>
|
<td>Microsoft Defender Advanced Threat Protection service failed to change the Connected User Experiences and Telemetry service location. Failure code: ```variable```.</td>
|
||||||
<td>An error occurred with the Windows telemetry service.</td>
|
<td>An error occurred with the Windows telemetry service.</td>
|
||||||
<td>[Ensure the diagnostic data service is enabled](troubleshoot-onboarding-windows-defender-advanced-threat-protection.md#ensure-the-diagnostics-service-is-enabled).<br>
|
<td>[Ensure the diagnostic data service is enabled](troubleshoot-onboarding.md#ensure-the-diagnostics-service-is-enabled).<br>
|
||||||
Check that the onboarding settings and scripts were deployed properly. Try to redeploy the configuration packages.<br>
|
Check that the onboarding settings and scripts were deployed properly. Try to redeploy the configuration packages.<br>
|
||||||
See [Onboard Windows 10 machines](configure-endpoints-windows-defender-advanced-threat-protection.md).</td>
|
See [Onboard Windows 10 machines](configure-endpoints.md).</td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr>
|
<tr>
|
||||||
<td>18</td>
|
<td>18</td>
|
||||||
@ -186,7 +186,7 @@ If this error persists after a system restart, ensure all Windows updates have f
|
|||||||
<td>The machine did not onboard correctly.
|
<td>The machine did not onboard correctly.
|
||||||
It will report to the portal, however the service may not appear as registered in SCCM or the registry.</td>
|
It will report to the portal, however the service may not appear as registered in SCCM or the registry.</td>
|
||||||
<td>Check that the onboarding settings and scripts were deployed properly. Try to redeploy the configuration packages.<br>
|
<td>Check that the onboarding settings and scripts were deployed properly. Try to redeploy the configuration packages.<br>
|
||||||
See [Onboard Windows 10 machines](configure-endpoints-windows-defender-advanced-threat-protection.md).</td>
|
See [Onboard Windows 10 machines](configure-endpoints.md).</td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr>
|
<tr>
|
||||||
<td>26</td>
|
<td>26</td>
|
||||||
@ -194,23 +194,23 @@ See [Onboard Windows 10 machines](configure-endpoints-windows-defender-advanced-
|
|||||||
<td>The machine did not onboard correctly.<br>
|
<td>The machine did not onboard correctly.<br>
|
||||||
It will report to the portal, however the service may not appear as registered in SCCM or the registry.</td>
|
It will report to the portal, however the service may not appear as registered in SCCM or the registry.</td>
|
||||||
<td>Check that the onboarding settings and scripts were deployed properly. Try to redeploy the configuration packages.<br>
|
<td>Check that the onboarding settings and scripts were deployed properly. Try to redeploy the configuration packages.<br>
|
||||||
See [Onboard Windows 10 machines](configure-endpoints-windows-defender-advanced-threat-protection.md).</td>
|
See [Onboard Windows 10 machines](configure-endpoints.md).</td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr>
|
<tr>
|
||||||
<td>27</td>
|
<td>27</td>
|
||||||
<td>Microsoft Defender Advanced Threat Protection service failed to enable SENSE aware mode in Windows Defender Antivirus. Onboarding process failed. Failure code: ```variable```.</td>
|
<td>Microsoft Defender Advanced Threat Protection service failed to enable SENSE aware mode in Windows Defender Antivirus. Onboarding process failed. Failure code: ```variable```.</td>
|
||||||
<td>Normally, Windows Defender Antivirus will enter a special passive state if another real-time antimalware product is running properly on the machine, and the machine is reporting to Microsoft Defender ATP.</td>
|
<td>Normally, Windows Defender Antivirus will enter a special passive state if another real-time antimalware product is running properly on the machine, and the machine is reporting to Microsoft Defender ATP.</td>
|
||||||
<td>Check that the onboarding settings and scripts were deployed properly. Try to redeploy the configuration packages.<br>
|
<td>Check that the onboarding settings and scripts were deployed properly. Try to redeploy the configuration packages.<br>
|
||||||
See [Onboard Windows 10 machines](configure-endpoints-windows-defender-advanced-threat-protection.md).<br>
|
See [Onboard Windows 10 machines](configure-endpoints.md).<br>
|
||||||
Ensure real-time antimalware protection is running properly.</td>
|
Ensure real-time antimalware protection is running properly.</td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr>
|
<tr>
|
||||||
<td>28</td>
|
<td>28</td>
|
||||||
<td>Microsoft Defender Advanced Threat Protection Connected User Experiences and Telemetry service registration failed. Failure code: ```variable```.</td>
|
<td>Microsoft Defender Advanced Threat Protection Connected User Experiences and Telemetry service registration failed. Failure code: ```variable```.</td>
|
||||||
<td>An error occurred with the Windows telemetry service.</td>
|
<td>An error occurred with the Windows telemetry service.</td>
|
||||||
<td>[Ensure the diagnostic data service is enabled](troubleshoot-onboarding-windows-defender-advanced-threat-protection.md#ensure-the-diagnostic-data-service-is-enabled).<br>
|
<td>[Ensure the diagnostic data service is enabled](troubleshoot-onboarding.md#ensure-the-diagnostic-data-service-is-enabled).<br>
|
||||||
Check that the onboarding settings and scripts were deployed properly. Try to redeploy the configuration packages.<br>
|
Check that the onboarding settings and scripts were deployed properly. Try to redeploy the configuration packages.<br>
|
||||||
See [Onboard Windows 10 machines](configure-endpoints-windows-defender-advanced-threat-protection.md).</td>
|
See [Onboard Windows 10 machines](configure-endpoints.md).</td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr>
|
<tr>
|
||||||
<td>29</td>
|
<td>29</td>
|
||||||
@ -223,14 +223,14 @@ See [Onboard Windows 10 machines](configure-endpoints-windows-defender-advanced-
|
|||||||
<td>Microsoft Defender Advanced Threat Protection service failed to disable SENSE aware mode in Windows Defender Antivirus. Failure code: ```variable```.</td>
|
<td>Microsoft Defender Advanced Threat Protection service failed to disable SENSE aware mode in Windows Defender Antivirus. Failure code: ```variable```.</td>
|
||||||
<td>Normally, Windows Defender Antivirus will enter a special passive state if another real-time antimalware product is running properly on the machine, and the machine is reporting to Microsoft Defender ATP.</td>
|
<td>Normally, Windows Defender Antivirus will enter a special passive state if another real-time antimalware product is running properly on the machine, and the machine is reporting to Microsoft Defender ATP.</td>
|
||||||
<td>Check that the onboarding settings and scripts were deployed properly. Try to redeploy the configuration packages.<br>
|
<td>Check that the onboarding settings and scripts were deployed properly. Try to redeploy the configuration packages.<br>
|
||||||
See [Onboard Windows 10 machines](configure-endpoints-windows-defender-advanced-threat-protection.md)<br>
|
See [Onboard Windows 10 machines](configure-endpoints.md)<br>
|
||||||
Ensure real-time antimalware protection is running properly.</td>
|
Ensure real-time antimalware protection is running properly.</td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr>
|
<tr>
|
||||||
<td>31</td>
|
<td>31</td>
|
||||||
<td>Microsoft Defender Advanced Threat Protection Connected User Experiences and Telemetry service unregistration failed. Failure code: ```variable```.</td>
|
<td>Microsoft Defender Advanced Threat Protection Connected User Experiences and Telemetry service unregistration failed. Failure code: ```variable```.</td>
|
||||||
<td>An error occurred with the Windows telemetry service during onboarding. The offboarding process continues.</td>
|
<td>An error occurred with the Windows telemetry service during onboarding. The offboarding process continues.</td>
|
||||||
<td>[Check for errors with the Windows telemetry service](troubleshoot-onboarding-windows-defender-advanced-threat-protection.md#ensure-the-diagnostic-data-service-is-enabled).</td>
|
<td>[Check for errors with the Windows telemetry service](troubleshoot-onboarding.md#ensure-the-diagnostic-data-service-is-enabled).</td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr>
|
<tr>
|
||||||
<td>32</td>
|
<td>32</td>
|
||||||
@ -249,9 +249,9 @@ If the identifier does not persist, the same machine might appear twice in the p
|
|||||||
<td>34</td>
|
<td>34</td>
|
||||||
<td>Microsoft Defender Advanced Threat Protection service failed to add itself as a dependency on the Connected User Experiences and Telemetry service, causing onboarding process to fail. Failure code: ```variable```.</td>
|
<td>Microsoft Defender Advanced Threat Protection service failed to add itself as a dependency on the Connected User Experiences and Telemetry service, causing onboarding process to fail. Failure code: ```variable```.</td>
|
||||||
<td>An error occurred with the Windows telemetry service.</td>
|
<td>An error occurred with the Windows telemetry service.</td>
|
||||||
<td>[Ensure the diagnostic data service is enabled](troubleshoot-onboarding-windows-defender-advanced-threat-protection.md#ensure-the-diagnostic-data-service-is-enabled).<br>
|
<td>[Ensure the diagnostic data service is enabled](troubleshoot-onboarding.md#ensure-the-diagnostic-data-service-is-enabled).<br>
|
||||||
Check that the onboarding settings and scripts were deployed properly. Try to redeploy the configuration packages.<br>
|
Check that the onboarding settings and scripts were deployed properly. Try to redeploy the configuration packages.<br>
|
||||||
See [Onboard Windows 10 machines](configure-endpoints-windows-defender-advanced-threat-protection.md).</td>
|
See [Onboard Windows 10 machines](configure-endpoints.md).</td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr>
|
<tr>
|
||||||
<td>35</td>
|
<td>35</td>
|
||||||
@ -345,6 +345,6 @@ See [Onboard Windows 10 machines](configure-endpoints-windows-defender-advanced-
|
|||||||
>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-eventerrorcodes-belowfoldlink)
|
>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-eventerrorcodes-belowfoldlink)
|
||||||
|
|
||||||
## Related topics
|
## Related topics
|
||||||
- [Onboard Windows 10 machines](configure-endpoints-windows-defender-advanced-threat-protection.md)
|
- [Onboard Windows 10 machines](configure-endpoints.md)
|
||||||
- [Configure machine proxy and Internet connectivity settings](configure-proxy-internet-windows-defender-advanced-threat-protection.md)
|
- [Configure machine proxy and Internet connectivity settings](configure-proxy-internet.md)
|
||||||
- [Troubleshoot Microsoft Defender ATP](troubleshoot-onboarding-windows-defender-advanced-threat-protection.md)
|
- [Troubleshoot Microsoft Defender ATP](troubleshoot-onboarding.md)
|
||||||
|
@ -31,14 +31,14 @@ ms.date: 11/09/2017
|
|||||||
|
|
||||||
With the Microsoft Defender ATP threat intelligence API, you can create custom threat intelligence alerts that can help you keep track of possible attack activities in your organization.
|
With the Microsoft Defender ATP threat intelligence API, you can create custom threat intelligence alerts that can help you keep track of possible attack activities in your organization.
|
||||||
|
|
||||||
For more information about threat intelligence concepts, see [Understand threat intelligence concepts](threat-indicator-concepts-windows-defender-advanced-threat-protection.md).
|
For more information about threat intelligence concepts, see [Understand threat intelligence concepts](threat-indicator-concepts.md).
|
||||||
|
|
||||||
This article demonstrates an end-to-end usage of the threat intelligence API to get you started in using the threat intelligence API.
|
This article demonstrates an end-to-end usage of the threat intelligence API to get you started in using the threat intelligence API.
|
||||||
|
|
||||||
You'll be guided through sample steps so you can experience how the threat intelligence API feature works. Sample steps include creating alerts definitions and indicators of compromise (IOCs), and examples of how triggered custom TI alerts look like.
|
You'll be guided through sample steps so you can experience how the threat intelligence API feature works. Sample steps include creating alerts definitions and indicators of compromise (IOCs), and examples of how triggered custom TI alerts look like.
|
||||||
|
|
||||||
## Step 1: Enable the threat intelligence API and obtain authentication details
|
## Step 1: Enable the threat intelligence API and obtain authentication details
|
||||||
To use the threat intelligence API feature, you'll need to enable the feature. For more information, see [Enable the custom threat intelligence application](enable-custom-ti-windows-defender-advanced-threat-protection.md).
|
To use the threat intelligence API feature, you'll need to enable the feature. For more information, see [Enable the custom threat intelligence application](enable-custom-ti.md).
|
||||||
|
|
||||||
This step is required to generate security credentials that you need to use while working with the API.
|
This step is required to generate security credentials that you need to use while working with the API.
|
||||||
|
|
||||||
@ -153,9 +153,9 @@ This step will guide you in exploring the custom alert in the portal.
|
|||||||
> There is a latency time of approximately 20 minutes between the time a custom TI is introduced and when it becomes effective.
|
> There is a latency time of approximately 20 minutes between the time a custom TI is introduced and when it becomes effective.
|
||||||
|
|
||||||
## Related topics
|
## Related topics
|
||||||
- [Understand threat intelligence concepts](threat-indicator-concepts-windows-defender-advanced-threat-protection.md)
|
- [Understand threat intelligence concepts](threat-indicator-concepts.md)
|
||||||
- [Enable the custom threat intelligence API in Microsoft Defender ATP](enable-custom-ti-windows-defender-advanced-threat-protection.md)
|
- [Enable the custom threat intelligence API in Microsoft Defender ATP](enable-custom-ti.md)
|
||||||
- [Create custom alerts using the threat intelligence API](custom-ti-api-windows-defender-advanced-threat-protection.md)
|
- [Create custom alerts using the threat intelligence API](custom-ti-api.md)
|
||||||
- [PowerShell code examples for the custom threat intelligence API](powershell-example-code-windows-defender-advanced-threat-protection.md)
|
- [PowerShell code examples for the custom threat intelligence API](powershell-example-code.md)
|
||||||
- [Python code examples for the custom threat intelligence API](python-example-code-windows-defender-advanced-threat-protection.md)
|
- [Python code examples for the custom threat intelligence API](python-example-code.md)
|
||||||
- [Troubleshoot custom threat intelligence issues](troubleshoot-custom-ti-windows-defender-advanced-threat-protection.md)
|
- [Troubleshoot custom threat intelligence issues](troubleshoot-custom-ti.md)
|
||||||
|
@ -43,7 +43,7 @@ This page explains how to create an AAD application, get an access token to Micr
|
|||||||
|
|
||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
> When accessing Microsoft Defender ATP API on behalf of a user, you will need the correct App permission and user permission.
|
> When accessing Microsoft Defender ATP API on behalf of a user, you will need the correct App permission and user permission.
|
||||||
> If you are not familiar with user permissions on Microsoft Defender ATP, see [Manage portal access using role-based access control](rbac-windows-defender-advanced-threat-protection.md).
|
> If you are not familiar with user permissions on Microsoft Defender ATP, see [Manage portal access using role-based access control](rbac.md).
|
||||||
|
|
||||||
>[!TIP]
|
>[!TIP]
|
||||||
> If you have the permission to perform an action in the portal, you have the permission to perform the action in the API.
|
> If you have the permission to perform an action in the portal, you have the permission to perform the action in the API.
|
||||||
|
@ -40,8 +40,8 @@ Delegated (work or school account) | Machine.ReadWrite | 'Read and write machine
|
|||||||
|
|
||||||
>[!Note]
|
>[!Note]
|
||||||
> When obtaining a token using user credentials:
|
> When obtaining a token using user credentials:
|
||||||
>- The user needs to have at least the following role permission: 'View Data' (See [Create and manage roles](user-roles-windows-defender-advanced-threat-protection.md) for more information)
|
>- The user needs to have at least the following role permission: 'View Data' (See [Create and manage roles](user-roles.md) for more information)
|
||||||
>- Response will include only machines,that the user have access to, based on machine group settings (See [Create and manage machine groups](machine-groups-windows-defender-advanced-threat-protection.md) for more information)
|
>- Response will include only machines,that the user have access to, based on machine group settings (See [Create and manage machine groups](machine-groups.md) for more information)
|
||||||
|
|
||||||
## HTTP request
|
## HTTP request
|
||||||
```
|
```
|
||||||
|
@ -61,10 +61,10 @@ This status indicates that there's limited communication between the machine and
|
|||||||
|
|
||||||
The following suggested actions can help fix issues related to a misconfigured machine with impaired communications:
|
The following suggested actions can help fix issues related to a misconfigured machine with impaired communications:
|
||||||
|
|
||||||
- [Ensure the machine has Internet connection](troubleshoot-onboarding-windows-defender-advanced-threat-protection.md#troubleshoot-onboarding-issues-on-the-machine)</br>
|
- [Ensure the machine has Internet connection](troubleshoot-onboarding.md#troubleshoot-onboarding-issues-on-the-machine)</br>
|
||||||
The Window Defender ATP sensor requires Microsoft Windows HTTP (WinHTTP) to report sensor data and communicate with the Microsoft Defender ATP service.
|
The Window Defender ATP sensor requires Microsoft Windows HTTP (WinHTTP) to report sensor data and communicate with the Microsoft Defender ATP service.
|
||||||
|
|
||||||
- [Verify client connectivity to Microsoft Defender ATP service URLs](configure-proxy-internet-windows-defender-advanced-threat-protection.md#verify-client-connectivity-to-windows-defender-atp-service-urls)</br>
|
- [Verify client connectivity to Microsoft Defender ATP service URLs](configure-proxy-internet.md#verify-client-connectivity-to-windows-defender-atp-service-urls)</br>
|
||||||
Verify the proxy configuration completed successfully, that WinHTTP can discover and communicate through the proxy server in your environment, and that the proxy server allows traffic to the Microsoft Defender ATP service URLs.
|
Verify the proxy configuration completed successfully, that WinHTTP can discover and communicate through the proxy server in your environment, and that the proxy server allows traffic to the Microsoft Defender ATP service URLs.
|
||||||
|
|
||||||
If you took corrective actions and the machine status is still misconfigured, [open a support ticket](https://go.microsoft.com/fwlink/?LinkID=761093&clcid=0x409).
|
If you took corrective actions and the machine status is still misconfigured, [open a support ticket](https://go.microsoft.com/fwlink/?LinkID=761093&clcid=0x409).
|
||||||
@ -73,19 +73,19 @@ If you took corrective actions and the machine status is still misconfigured, [o
|
|||||||
A misconfigured machine with status ‘No sensor data’ has communication with the service but can only report partial sensor data.
|
A misconfigured machine with status ‘No sensor data’ has communication with the service but can only report partial sensor data.
|
||||||
Follow theses actions to correct known issues related to a misconfigured machine with status ‘No sensor data’:
|
Follow theses actions to correct known issues related to a misconfigured machine with status ‘No sensor data’:
|
||||||
|
|
||||||
- [Ensure the machine has Internet connection](troubleshoot-onboarding-windows-defender-advanced-threat-protection.md#troubleshoot-onboarding-issues-on-the-machine)</br>
|
- [Ensure the machine has Internet connection](troubleshoot-onboarding.md#troubleshoot-onboarding-issues-on-the-machine)</br>
|
||||||
The Window Defender ATP sensor requires Microsoft Windows HTTP (WinHTTP) to report sensor data and communicate with the Microsoft Defender ATP service.
|
The Window Defender ATP sensor requires Microsoft Windows HTTP (WinHTTP) to report sensor data and communicate with the Microsoft Defender ATP service.
|
||||||
|
|
||||||
- [Verify client connectivity to Microsoft Defender ATP service URLs](configure-proxy-internet-windows-defender-advanced-threat-protection.md#verify-client-connectivity-to-windows-defender-atp-service-urls)</br>
|
- [Verify client connectivity to Microsoft Defender ATP service URLs](configure-proxy-internet.md#verify-client-connectivity-to-windows-defender-atp-service-urls)</br>
|
||||||
Verify the proxy configuration completed successfully, that WinHTTP can discover and communicate through the proxy server in your environment, and that the proxy server allows traffic to the Microsoft Defender ATP service URLs.
|
Verify the proxy configuration completed successfully, that WinHTTP can discover and communicate through the proxy server in your environment, and that the proxy server allows traffic to the Microsoft Defender ATP service URLs.
|
||||||
|
|
||||||
- [Ensure the diagnostic data service is enabled](troubleshoot-onboarding-windows-defender-advanced-threat-protection.md#ensure-the-diagnostics-service-is-enabled)</br>
|
- [Ensure the diagnostic data service is enabled](troubleshoot-onboarding.md#ensure-the-diagnostics-service-is-enabled)</br>
|
||||||
If the machines aren't reporting correctly, you might need to check that the Windows 10 diagnostic data service is set to automatically start and is running on the endpoint.
|
If the machines aren't reporting correctly, you might need to check that the Windows 10 diagnostic data service is set to automatically start and is running on the endpoint.
|
||||||
|
|
||||||
- [Ensure that Windows Defender Antivirus is not disabled by policy](troubleshoot-onboarding-windows-defender-advanced-threat-protection.md#ensure-that-windows-defender-antivirus-is-not-disabled-by-a-policy)</br>
|
- [Ensure that Windows Defender Antivirus is not disabled by policy](troubleshoot-onboarding.md#ensure-that-windows-defender-antivirus-is-not-disabled-by-a-policy)</br>
|
||||||
If your machines are running a third-party antimalware client, the Microsoft Defender ATP agent needs the Windows Defender Antivirus Early Launch Antimalware (ELAM) driver to be enabled.
|
If your machines are running a third-party antimalware client, the Microsoft Defender ATP agent needs the Windows Defender Antivirus Early Launch Antimalware (ELAM) driver to be enabled.
|
||||||
|
|
||||||
If you took corrective actions and the machine status is still misconfigured, [open a support ticket](https://go.microsoft.com/fwlink/?LinkID=761093&clcid=0x409).
|
If you took corrective actions and the machine status is still misconfigured, [open a support ticket](https://go.microsoft.com/fwlink/?LinkID=761093&clcid=0x409).
|
||||||
|
|
||||||
## Related topic
|
## Related topic
|
||||||
- [Check sensor health state in Microsoft Defender ATP](check-sensor-status-windows-defender-advanced-threat-protection.md)
|
- [Check sensor health state in Microsoft Defender ATP](check-sensor-status.md)
|
||||||
|
@ -37,8 +37,8 @@ Delegated (work or school account) | Alert.ReadWrite | 'Read and write alerts'
|
|||||||
|
|
||||||
>[!Note]
|
>[!Note]
|
||||||
> When obtaining a token using user credentials:
|
> When obtaining a token using user credentials:
|
||||||
>- The user needs to have at least the following role permission: 'View Data' (See [Create and manage roles](user-roles-windows-defender-advanced-threat-protection.md) for more information)
|
>- The user needs to have at least the following role permission: 'View Data' (See [Create and manage roles](user-roles.md) for more information)
|
||||||
>- The user needs to have access to the machine associated with the alert, based on machine group settings (See [Create and manage machine groups](machine-groups-windows-defender-advanced-threat-protection.md) for more information)
|
>- The user needs to have access to the machine associated with the alert, based on machine group settings (See [Create and manage machine groups](machine-groups.md) for more information)
|
||||||
|
|
||||||
## HTTP request
|
## HTTP request
|
||||||
```
|
```
|
||||||
|
@ -35,8 +35,8 @@ Delegated (work or school account) | URL.Read.All | 'Read URLs'
|
|||||||
|
|
||||||
>[!Note]
|
>[!Note]
|
||||||
> When obtaining a token using user credentials:
|
> When obtaining a token using user credentials:
|
||||||
>- The user needs to have at least the following role permission: 'View Data' (See [Create and manage roles](user-roles-windows-defender-advanced-threat-protection.md) for more information)
|
>- The user needs to have at least the following role permission: 'View Data' (See [Create and manage roles](user-roles.md) for more information)
|
||||||
>- The user needs to have access to the machine associated with the alert, based on machine group settings (See [Create and manage machine groups](machine-groups-windows-defender-advanced-threat-protection.md) for more information)
|
>- The user needs to have access to the machine associated with the alert, based on machine group settings (See [Create and manage machine groups](machine-groups.md) for more information)
|
||||||
|
|
||||||
## HTTP request
|
## HTTP request
|
||||||
```
|
```
|
||||||
|
@ -35,8 +35,8 @@ Delegated (work or school account) | File.Read.All | 'Read file profiles'
|
|||||||
|
|
||||||
>[!Note]
|
>[!Note]
|
||||||
> When obtaining a token using user credentials:
|
> When obtaining a token using user credentials:
|
||||||
>- The user needs to have at least the following role permission: 'View Data' (See [Create and manage roles](user-roles-windows-defender-advanced-threat-protection.md) for more information)
|
>- The user needs to have at least the following role permission: 'View Data' (See [Create and manage roles](user-roles.md) for more information)
|
||||||
>- The user needs to have access to the machine associated with the alert, based on machine group settings (See [Create and manage machine groups](machine-groups-windows-defender-advanced-threat-protection.md) for more information)
|
>- The user needs to have access to the machine associated with the alert, based on machine group settings (See [Create and manage machine groups](machine-groups.md) for more information)
|
||||||
|
|
||||||
## HTTP request
|
## HTTP request
|
||||||
```
|
```
|
||||||
|
@ -36,8 +36,8 @@ Delegated (work or school account) | Ip.Read.All | 'Read IP address profiles'
|
|||||||
|
|
||||||
>[!Note]
|
>[!Note]
|
||||||
> When obtaining a token using user credentials:
|
> When obtaining a token using user credentials:
|
||||||
>- The user needs to have at least the following role permission: 'View Data' (See [Create and manage roles](user-roles-windows-defender-advanced-threat-protection.md) for more information)
|
>- The user needs to have at least the following role permission: 'View Data' (See [Create and manage roles](user-roles.md) for more information)
|
||||||
>- The user needs to have access to the machine associated with the alert, based on machine group settings (See [Create and manage machine groups](machine-groups-windows-defender-advanced-threat-protection.md) for more information)
|
>- The user needs to have access to the machine associated with the alert, based on machine group settings (See [Create and manage machine groups](machine-groups.md) for more information)
|
||||||
|
|
||||||
## HTTP request
|
## HTTP request
|
||||||
```
|
```
|
||||||
|
@ -38,8 +38,8 @@ Delegated (work or school account) | Machine.ReadWrite | 'Read and write machine
|
|||||||
|
|
||||||
>[!Note]
|
>[!Note]
|
||||||
> When obtaining a token using user credentials:
|
> When obtaining a token using user credentials:
|
||||||
>- The user needs to have at least the following role permission: 'View Data' (See [Create and manage roles](user-roles-windows-defender-advanced-threat-protection.md) for more information)
|
>- The user needs to have at least the following role permission: 'View Data' (See [Create and manage roles](user-roles.md) for more information)
|
||||||
>- The user needs to have access to the machine associated with the alert, based on machine group settings (See [Create and manage machine groups](machine-groups-windows-defender-advanced-threat-protection.md) for more information)
|
>- The user needs to have access to the machine associated with the alert, based on machine group settings (See [Create and manage machine groups](machine-groups.md) for more information)
|
||||||
|
|
||||||
## HTTP request
|
## HTTP request
|
||||||
```
|
```
|
||||||
|
@ -36,8 +36,8 @@ Delegated (work or school account) | User.Read.All | 'Read user profiles'
|
|||||||
|
|
||||||
>[!Note]
|
>[!Note]
|
||||||
> When obtaining a token using user credentials:
|
> When obtaining a token using user credentials:
|
||||||
>- The user needs to have at least the following role permission: 'View Data' (See [Create and manage roles](user-roles-windows-defender-advanced-threat-protection.md) for more information)
|
>- The user needs to have at least the following role permission: 'View Data' (See [Create and manage roles](user-roles.md) for more information)
|
||||||
>- The user needs to have access to the machine associated with the alert, based on machine group settings (See [Create and manage machine groups](machine-groups-windows-defender-advanced-threat-protection.md) for more information)
|
>- The user needs to have access to the machine associated with the alert, based on machine group settings (See [Create and manage machine groups](machine-groups.md) for more information)
|
||||||
|
|
||||||
## HTTP request
|
## HTTP request
|
||||||
```
|
```
|
||||||
|
@ -42,8 +42,8 @@ Delegated (work or school account) | Alert.ReadWrite | 'Read and write alerts'
|
|||||||
|
|
||||||
>[!Note]
|
>[!Note]
|
||||||
> When obtaining a token using user credentials:
|
> When obtaining a token using user credentials:
|
||||||
>- The user needs to have at least the following role permission: 'View Data' (See [Create and manage roles](user-roles-windows-defender-advanced-threat-protection.md) for more information)
|
>- The user needs to have at least the following role permission: 'View Data' (See [Create and manage roles](user-roles.md) for more information)
|
||||||
>- The response will include only alerts that are associated with machines that the user can access, based on machine group settings (See [Create and manage machine groups](machine-groups-windows-defender-advanced-threat-protection.md) for more information)
|
>- The response will include only alerts that are associated with machines that the user can access, based on machine group settings (See [Create and manage machine groups](machine-groups.md) for more information)
|
||||||
|
|
||||||
## HTTP request
|
## HTTP request
|
||||||
```
|
```
|
||||||
|
@ -42,8 +42,8 @@ Delegated (work or school account) | Alert.ReadWrite | 'Read and write alerts'
|
|||||||
|
|
||||||
>[!Note]
|
>[!Note]
|
||||||
> When obtaining a token using user credentials:
|
> When obtaining a token using user credentials:
|
||||||
>- The user needs to have at least the following role permission: 'View Data' (See [Create and manage roles](user-roles-windows-defender-advanced-threat-protection.md) for more information)
|
>- The user needs to have at least the following role permission: 'View Data' (See [Create and manage roles](user-roles.md) for more information)
|
||||||
>- Response will include only alerts, associated with machines, that the user have access to, based on machine group settings (See [Create and manage machine groups](machine-groups-windows-defender-advanced-threat-protection.md) for more information)
|
>- Response will include only alerts, associated with machines, that the user have access to, based on machine group settings (See [Create and manage machine groups](machine-groups.md) for more information)
|
||||||
|
|
||||||
## HTTP request
|
## HTTP request
|
||||||
```
|
```
|
||||||
|
@ -37,8 +37,8 @@ Delegated (work or school account) | Machine.ReadWrite | 'Read and write machine
|
|||||||
|
|
||||||
>[!Note]
|
>[!Note]
|
||||||
> When obtaining a token using user credentials:
|
> When obtaining a token using user credentials:
|
||||||
>- The user needs to have at least the following role permission: 'View Data' (See [Create and manage roles](user-roles-windows-defender-advanced-threat-protection.md) for more information)
|
>- The user needs to have at least the following role permission: 'View Data' (See [Create and manage roles](user-roles.md) for more information)
|
||||||
>- Response will include only machines that the user can access, based on machine group settings (See [Create and manage machine groups](machine-groups-windows-defender-advanced-threat-protection.md) for more information)
|
>- Response will include only machines that the user can access, based on machine group settings (See [Create and manage machine groups](machine-groups.md) for more information)
|
||||||
|
|
||||||
## HTTP request
|
## HTTP request
|
||||||
```
|
```
|
||||||
|
@ -36,7 +36,7 @@ Delegated (work or school account) | URL.Read.All | 'Read URLs'
|
|||||||
|
|
||||||
>[!Note]
|
>[!Note]
|
||||||
> When obtaining a token using user credentials:
|
> When obtaining a token using user credentials:
|
||||||
>- The user needs to have at least the following role permission: 'View Data' (See [Create and manage roles](user-roles-windows-defender-advanced-threat-protection.md) for more information)
|
>- The user needs to have at least the following role permission: 'View Data' (See [Create and manage roles](user-roles.md) for more information)
|
||||||
|
|
||||||
## HTTP request
|
## HTTP request
|
||||||
```
|
```
|
||||||
|
@ -37,7 +37,7 @@ Delegated (work or school account) | File.Read.All | 'Read all file profiles'
|
|||||||
|
|
||||||
>[!Note]
|
>[!Note]
|
||||||
> When obtaining a token using user credentials:
|
> When obtaining a token using user credentials:
|
||||||
>- The user needs to have at least the following role permission: 'View Data' (See [Create and manage roles](user-roles-windows-defender-advanced-threat-protection.md) for more information)
|
>- The user needs to have at least the following role permission: 'View Data' (See [Create and manage roles](user-roles.md) for more information)
|
||||||
|
|
||||||
|
|
||||||
## HTTP request
|
## HTTP request
|
||||||
|
@ -40,8 +40,8 @@ Delegated (work or school account) | Alert.ReadWrite | 'Read and write alerts'
|
|||||||
|
|
||||||
>[!Note]
|
>[!Note]
|
||||||
> When obtaining a token using user credentials:
|
> When obtaining a token using user credentials:
|
||||||
>- The user needs to have at least the following role permission: 'View Data' (See [Create and manage roles](user-roles-windows-defender-advanced-threat-protection.md) for more information)
|
>- The user needs to have at least the following role permission: 'View Data' (See [Create and manage roles](user-roles.md) for more information)
|
||||||
>- Response will include only alerts, associated with machines, that the user have access to, based on machine group settings (See [Create and manage machine groups](machine-groups-windows-defender-advanced-threat-protection.md) for more information)
|
>- Response will include only alerts, associated with machines, that the user have access to, based on machine group settings (See [Create and manage machine groups](machine-groups.md) for more information)
|
||||||
|
|
||||||
## HTTP request
|
## HTTP request
|
||||||
```
|
```
|
||||||
|
@ -39,8 +39,8 @@ Delegated (work or school account) | Machine.ReadWrite | 'Read and write machine
|
|||||||
|
|
||||||
>[!Note]
|
>[!Note]
|
||||||
> When obtaining a token using user credentials:
|
> When obtaining a token using user credentials:
|
||||||
>- The user needs to have at least the following role permission: 'View Data' (See [Create and manage roles](user-roles-windows-defender-advanced-threat-protection.md) for more information)
|
>- The user needs to have at least the following role permission: 'View Data' (See [Create and manage roles](user-roles.md) for more information)
|
||||||
>- Response will include only machines, that the user have access to, based on machine group settings (See [Create and manage machine groups](machine-groups-windows-defender-advanced-threat-protection.md) for more information)
|
>- Response will include only machines, that the user have access to, based on machine group settings (See [Create and manage machine groups](machine-groups.md) for more information)
|
||||||
|
|
||||||
## HTTP request
|
## HTTP request
|
||||||
```
|
```
|
||||||
|
@ -40,7 +40,7 @@ Delegated (work or school account) | File.Read.All | 'Read file profiles'
|
|||||||
|
|
||||||
>[!Note]
|
>[!Note]
|
||||||
> When obtaining a token using user credentials:
|
> When obtaining a token using user credentials:
|
||||||
>- The user needs to have at least the following role permission: 'View Data' (See [Create and manage roles](user-roles-windows-defender-advanced-threat-protection.md) for more information)
|
>- The user needs to have at least the following role permission: 'View Data' (See [Create and manage roles](user-roles.md) for more information)
|
||||||
|
|
||||||
## HTTP request
|
## HTTP request
|
||||||
```
|
```
|
||||||
|
@ -38,8 +38,8 @@ Delegated (work or school account) | Alert.ReadWrite | 'Read and write alerts'
|
|||||||
|
|
||||||
>[!Note]
|
>[!Note]
|
||||||
> When obtaining a token using user credentials:
|
> When obtaining a token using user credentials:
|
||||||
>- The user needs to have at least the following role permission: 'View Data' (See [Create and manage roles](user-roles-windows-defender-advanced-threat-protection.md) for more information)
|
>- The user needs to have at least the following role permission: 'View Data' (See [Create and manage roles](user-roles.md) for more information)
|
||||||
>- Response will include only alerts, associated with machines, that the user have access to, based on machine group settings (See [Create and manage machine groups](machine-groups-windows-defender-advanced-threat-protection.md) for more information)
|
>- Response will include only alerts, associated with machines, that the user have access to, based on machine group settings (See [Create and manage machine groups](machine-groups.md) for more information)
|
||||||
|
|
||||||
## HTTP request
|
## HTTP request
|
||||||
```
|
```
|
||||||
|
@ -38,8 +38,8 @@ Delegated (work or school account) | Machine.ReadWrite | 'Read and write machine
|
|||||||
|
|
||||||
>[!Note]
|
>[!Note]
|
||||||
> When obtaining a token using user credentials:
|
> When obtaining a token using user credentials:
|
||||||
>- The user needs to have at least the following role permission: 'View Data' (See [Create and manage roles](user-roles-windows-defender-advanced-threat-protection.md) for more information)
|
>- The user needs to have at least the following role permission: 'View Data' (See [Create and manage roles](user-roles.md) for more information)
|
||||||
>- Response will include only machines, that the user have access to, based on machine group settings (See [Create and manage machine groups](machine-groups-windows-defender-advanced-threat-protection.md) for more information)
|
>- Response will include only machines, that the user have access to, based on machine group settings (See [Create and manage machine groups](machine-groups.md) for more information)
|
||||||
|
|
||||||
## HTTP request
|
## HTTP request
|
||||||
```
|
```
|
||||||
|
@ -38,7 +38,7 @@ Delegated (work or school account) | Ip.Read.All | 'Read IP address profiles'
|
|||||||
|
|
||||||
>[!Note]
|
>[!Note]
|
||||||
> When obtaining a token using user credentials:
|
> When obtaining a token using user credentials:
|
||||||
>- The user needs to have at least the following role permission: 'View Data' (See [Create and manage roles](user-roles-windows-defender-advanced-threat-protection.md) for more information)
|
>- The user needs to have at least the following role permission: 'View Data' (See [Create and manage roles](user-roles.md) for more information)
|
||||||
|
|
||||||
## HTTP request
|
## HTTP request
|
||||||
```
|
```
|
||||||
|
@ -39,8 +39,8 @@ Delegated (work or school account) | Machine.ReadWrite | 'Read and write machine
|
|||||||
|
|
||||||
>[!Note]
|
>[!Note]
|
||||||
> When obtaining a token using user credentials:
|
> When obtaining a token using user credentials:
|
||||||
>- The user needs to have at least the following role permission: 'View Data' (See [Create and manage roles](user-roles-windows-defender-advanced-threat-protection.md) for more information)
|
>- The user needs to have at least the following role permission: 'View Data' (See [Create and manage roles](user-roles.md) for more information)
|
||||||
>- User needs to have access to the machine, based on machine group settings (See [Create and manage machine groups](machine-groups-windows-defender-advanced-threat-protection.md) for more information)
|
>- User needs to have access to the machine, based on machine group settings (See [Create and manage machine groups](machine-groups.md) for more information)
|
||||||
|
|
||||||
|
|
||||||
## HTTP request
|
## HTTP request
|
||||||
|
@ -36,8 +36,8 @@ Delegated (work or school account) | User.Read.All | 'Read user profiles'
|
|||||||
|
|
||||||
>[!Note]
|
>[!Note]
|
||||||
> When obtaining a token using user credentials:
|
> When obtaining a token using user credentials:
|
||||||
>- The user needs to have at least the following role permission: 'View Data' (See [Create and manage roles](user-roles-windows-defender-advanced-threat-protection.md) for more information)
|
>- The user needs to have at least the following role permission: 'View Data' (See [Create and manage roles](user-roles.md) for more information)
|
||||||
>- Response will include users only if the machine is visible to the user, based on machine group settings (See [Create and manage machine groups](machine-groups-windows-defender-advanced-threat-protection.md) for more information)
|
>- Response will include users only if the machine is visible to the user, based on machine group settings (See [Create and manage machine groups](machine-groups.md) for more information)
|
||||||
|
|
||||||
## HTTP request
|
## HTTP request
|
||||||
```
|
```
|
||||||
|
@ -38,8 +38,8 @@ Delegated (work or school account) | Alert.ReadWrite | 'Read and write alerts'
|
|||||||
|
|
||||||
>[!Note]
|
>[!Note]
|
||||||
> When obtaining a token using user credentials:
|
> When obtaining a token using user credentials:
|
||||||
>- The user needs to have at least the following role permission: 'View Data' (See [Create and manage roles](user-roles-windows-defender-advanced-threat-protection.md) for more information)
|
>- The user needs to have at least the following role permission: 'View Data' (See [Create and manage roles](user-roles.md) for more information)
|
||||||
>- User needs to have access to the machine, based on machine group settings (See [Create and manage machine groups](machine-groups-windows-defender-advanced-threat-protection.md) for more information)
|
>- User needs to have access to the machine, based on machine group settings (See [Create and manage machine groups](machine-groups.md) for more information)
|
||||||
|
|
||||||
## HTTP request
|
## HTTP request
|
||||||
```
|
```
|
||||||
|
@ -39,7 +39,7 @@ Delegated (work or school account) | Machine.ReadWrite | 'Read and write machine
|
|||||||
|
|
||||||
>[!Note]
|
>[!Note]
|
||||||
> When obtaining a token using user credentials:
|
> When obtaining a token using user credentials:
|
||||||
>- The user needs to have at least the following role permission: 'View Data' (See [Create and manage roles](user-roles-windows-defender-advanced-threat-protection.md) for more information)
|
>- The user needs to have at least the following role permission: 'View Data' (See [Create and manage roles](user-roles.md) for more information)
|
||||||
|
|
||||||
## HTTP request
|
## HTTP request
|
||||||
```
|
```
|
||||||
|
@ -42,7 +42,7 @@ Delegated (work or school account) | Machine.ReadWrite | 'Read and write machine
|
|||||||
|
|
||||||
>[!Note]
|
>[!Note]
|
||||||
> When obtaining a token using user credentials:
|
> When obtaining a token using user credentials:
|
||||||
>- The user needs to have at least the following role permission: 'View Data' (See [Create and manage roles](user-roles-windows-defender-advanced-threat-protection.md) for more information)
|
>- The user needs to have at least the following role permission: 'View Data' (See [Create and manage roles](user-roles.md) for more information)
|
||||||
|
|
||||||
## HTTP request
|
## HTTP request
|
||||||
```
|
```
|
||||||
|
@ -39,8 +39,8 @@ Delegated (work or school account) | Machine.ReadWrite | 'Read and write machine
|
|||||||
|
|
||||||
>[!Note]
|
>[!Note]
|
||||||
> When obtaining a token using user credentials:
|
> When obtaining a token using user credentials:
|
||||||
>- The user needs to have at least the following role permission: 'View Data' (See [Create and manage roles](user-roles-windows-defender-advanced-threat-protection.md) for more information)
|
>- The user needs to have at least the following role permission: 'View Data' (See [Create and manage roles](user-roles.md) for more information)
|
||||||
>- Response will include only machines,that the user have access to, based on machine group settings (See [Create and manage machine groups](machine-groups-windows-defender-advanced-threat-protection.md) for more information)
|
>- Response will include only machines,that the user have access to, based on machine group settings (See [Create and manage machine groups](machine-groups.md) for more information)
|
||||||
|
|
||||||
## HTTP request
|
## HTTP request
|
||||||
```
|
```
|
||||||
|
@ -35,8 +35,8 @@ Delegated (work or school account) | Machine.CollectForensics | 'Collect forensi
|
|||||||
|
|
||||||
>[!Note]
|
>[!Note]
|
||||||
> When obtaining a token using user credentials:
|
> When obtaining a token using user credentials:
|
||||||
>- The user needs to have at least the following role permission: 'Alerts Investigation' (See [Create and manage roles](user-roles-windows-defender-advanced-threat-protection.md) for more information)
|
>- The user needs to have at least the following role permission: 'Alerts Investigation' (See [Create and manage roles](user-roles.md) for more information)
|
||||||
>- The user needs to have access to the machine, based on machine group settings (See [Create and manage machine groups](machine-groups-windows-defender-advanced-threat-protection.md) for more information)
|
>- The user needs to have access to the machine, based on machine group settings (See [Create and manage machine groups](machine-groups.md) for more information)
|
||||||
|
|
||||||
## HTTP request
|
## HTTP request
|
||||||
```
|
```
|
||||||
|
@ -58,10 +58,10 @@ Bring the power of Microsoft Threat Protection to your organization.
|
|||||||
## In this section
|
## In this section
|
||||||
Topic | Description
|
Topic | Description
|
||||||
:---|:---
|
:---|:---
|
||||||
[Minimum requirements](minimum-requirements-windows-defender-advanced-threat-protection.md) | Learn about the requirements for onboarding machines to the platform.
|
[Minimum requirements](minimum-requirements.md) | Learn about the requirements for onboarding machines to the platform.
|
||||||
[Validate licensing and complete setup](licensing-windows-defender-advanced-threat-protection.md) | Get guidance on how to check that licenses have been provisioned to your organization and how to access the portal for the first time.
|
[Validate licensing and complete setup](licensing.md) | Get guidance on how to check that licenses have been provisioned to your organization and how to access the portal for the first time.
|
||||||
[Preview features](preview-windows-defender-advanced-threat-protection.md) | Learn about new features in the Microsoft Defender ATP preview release and be among the first to try upcoming features by turning on the preview experience.
|
[Preview features](preview.md) | Learn about new features in the Microsoft Defender ATP preview release and be among the first to try upcoming features by turning on the preview experience.
|
||||||
[Data storage and privacy](data-storage-privacy-windows-defender-advanced-threat-protection.md) | Explains the data storage and privacy details related to Microsoft Defender ATP.
|
[Data storage and privacy](data-storage-privacy.md) | Explains the data storage and privacy details related to Microsoft Defender ATP.
|
||||||
[Assign user access to the portal](assign-portal-access-windows-defender-advanced-threat-protection.md) | Set permissions to manage who can access the portal. You can set basic permissions or set granular permissions using role-based access control (RBAC).
|
[Assign user access to the portal](assign-portal-access.md) | Set permissions to manage who can access the portal. You can set basic permissions or set granular permissions using role-based access control (RBAC).
|
||||||
[Evaluate Microsoft Defender ATP](evaluate-atp.md) | Evaluate the various capabilities in Microsoft Defender ATP and test features out.
|
[Evaluate Microsoft Defender ATP](evaluate-atp.md) | Evaluate the various capabilities in Microsoft Defender ATP and test features out.
|
||||||
[Access the Microsoft Defender Security Center Community Center](community-windows-defender-advanced-threat-protection.md) | The Microsoft Defender ATP Community Center is a place where community members can learn, collaborate, and share experiences about the product.
|
[Access the Microsoft Defender Security Center Community Center](community.md) | The Microsoft Defender ATP Community Center is a place where community members can learn, collaborate, and share experiences about the product.
|
@ -37,8 +37,8 @@ Delegated (work or school account) | Alert.ReadWrite | 'Read and write alerts'
|
|||||||
|
|
||||||
>[!Note]
|
>[!Note]
|
||||||
> When obtaining a token using user credentials:
|
> When obtaining a token using user credentials:
|
||||||
>- The user needs to have at least the following role permission: 'View Data' (See [Create and manage roles](user-roles-windows-defender-advanced-threat-protection.md) for more information)
|
>- The user needs to have at least the following role permission: 'View Data' (See [Create and manage roles](user-roles.md) for more information)
|
||||||
>- Response will include only alerts, associated with machines, that the user have access to, based on machine group settings (See [Create and manage machine groups](machine-groups-windows-defender-advanced-threat-protection.md) for more information)
|
>- Response will include only alerts, associated with machines, that the user have access to, based on machine group settings (See [Create and manage machine groups](machine-groups.md) for more information)
|
||||||
|
|
||||||
## HTTP request
|
## HTTP request
|
||||||
```
|
```
|
||||||
|
@ -38,8 +38,8 @@ Delegated (work or school account) | Machine.ReadWrite | 'Read and write machine
|
|||||||
|
|
||||||
>[!Note]
|
>[!Note]
|
||||||
> When obtaining a token using user credentials:
|
> When obtaining a token using user credentials:
|
||||||
>- The user needs to have at least the following role permission: 'View Data' (See [Create and manage roles](user-roles-windows-defender-advanced-threat-protection.md) for more information)
|
>- The user needs to have at least the following role permission: 'View Data' (See [Create and manage roles](user-roles.md) for more information)
|
||||||
>- Response will include only machines that the user can access, based on machine group settings (See [Create and manage machine groups](machine-groups-windows-defender-advanced-threat-protection.md) for more information)
|
>- Response will include only machines that the user can access, based on machine group settings (See [Create and manage machine groups](machine-groups.md) for more information)
|
||||||
|
|
||||||
## HTTP request
|
## HTTP request
|
||||||
```
|
```
|
||||||
|
@ -32,7 +32,7 @@ Microsoft Defender ATP applies correlation analytics and aggregates all related
|
|||||||
Topic | Description
|
Topic | Description
|
||||||
:---|:---
|
:---|:---
|
||||||
[View and organize the Incidents queue](view-incidents-queue.md)| See the list of incidents and learn how to apply filters to limit the list and get a more focused view.
|
[View and organize the Incidents queue](view-incidents-queue.md)| See the list of incidents and learn how to apply filters to limit the list and get a more focused view.
|
||||||
[Manage incidents](manage-incidents-windows-defender-advanced-threat-protection.md) | Learn how to manage incidents by assigning it, updating its status, or setting its classification and other actions.
|
[Manage incidents](manage-incidents.md) | Learn how to manage incidents by assigning it, updating its status, or setting its classification and other actions.
|
||||||
[Investigate incidents](investigate-incidents-windows-defender-advanced-threat-protection.md)| See associated alerts, manage the incident, see alert metadata, and visualizations to help you investigate an incident.
|
[Investigate incidents](investigate-incidents.md)| See associated alerts, manage the incident, see alert metadata, and visualizations to help you investigate an incident.
|
||||||
|
|
||||||
|
|
||||||
|
@ -38,7 +38,7 @@ Microsoft Defender ATP applies two methods to discover and protect data:
|
|||||||
|
|
||||||
|
|
||||||
## Data discovery
|
## Data discovery
|
||||||
Microsoft Defender ATP automatically discovers files with sensitivity labels on Windows devices when the feature is enabled. You can enable the Azure Information Protection integration feature from Microsoft Defender Security Center. For more information, see [Configure advanced features](advanced-features-windows-defender-advanced-threat-protection.md#azure-information-protection).
|
Microsoft Defender ATP automatically discovers files with sensitivity labels on Windows devices when the feature is enabled. You can enable the Azure Information Protection integration feature from Microsoft Defender Security Center. For more information, see [Configure advanced features](advanced-features.md#azure-information-protection).
|
||||||
|
|
||||||
|
|
||||||

|

|
||||||
|
@ -26,11 +26,11 @@ ms.topic: article
|
|||||||
Initiate AutoIR investigation on a machine.
|
Initiate AutoIR investigation on a machine.
|
||||||
|
|
||||||
>[!Note]
|
>[!Note]
|
||||||
> This page focuses on performing an automated investigation on a machine. See [Automated Investigation](automated-investigations-windows-defender-advanced-threat-protection.md) for more information.
|
> This page focuses on performing an automated investigation on a machine. See [Automated Investigation](automated-investigations.md) for more information.
|
||||||
|
|
||||||
## Limitations
|
## Limitations
|
||||||
1. The number of executions is limited (up to 5 calls per hour).
|
1. The number of executions is limited (up to 5 calls per hour).
|
||||||
2. For Automated Investigation limitations, see [Automated Investigation](automated-investigations-windows-defender-advanced-threat-protection.md).
|
2. For Automated Investigation limitations, see [Automated Investigation](automated-investigations.md).
|
||||||
|
|
||||||
## Permissions
|
## Permissions
|
||||||
One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender ATP APIs](apis-intro.md)
|
One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender ATP APIs](apis-intro.md)
|
||||||
@ -42,8 +42,8 @@ Delegated (work or school account) | Alert.ReadWrite | 'Read and write alerts'
|
|||||||
|
|
||||||
>[!Note]
|
>[!Note]
|
||||||
> When obtaining a token using user credentials:
|
> When obtaining a token using user credentials:
|
||||||
>- The user needs to have at least the following role permission: 'Alerts Investigation' (See [Create and manage roles](user-roles-windows-defender-advanced-threat-protection.md) for more information)
|
>- The user needs to have at least the following role permission: 'Alerts Investigation' (See [Create and manage roles](user-roles.md) for more information)
|
||||||
>- The user needs to have access to the machine, based on machine group settings (See [Create and manage machine groups](machine-groups-windows-defender-advanced-threat-protection.md) for more information)
|
>- The user needs to have access to the machine, based on machine group settings (See [Create and manage machine groups](machine-groups.md) for more information)
|
||||||
|
|
||||||
## HTTP request
|
## HTTP request
|
||||||
```
|
```
|
||||||
|
@ -32,14 +32,14 @@ Investigate alerts that are affecting your network, understand what they mean, a
|
|||||||
|
|
||||||
Click an alert to see the alert details view and the various tiles that provide information about the alert.
|
Click an alert to see the alert details view and the various tiles that provide information about the alert.
|
||||||
|
|
||||||
You can also manage an alert and see alert metadata along with other information that can help you make better decisions on how to approach them. You'll also see a status of the automated investigation on the upper right corner. Clicking on the link will take you to the Automated investigations view. For more information, see [Automated investigations](automated-investigations-windows-defender-advanced-threat-protection.md).
|
You can also manage an alert and see alert metadata along with other information that can help you make better decisions on how to approach them. You'll also see a status of the automated investigation on the upper right corner. Clicking on the link will take you to the Automated investigations view. For more information, see [Automated investigations](automated-investigations.md).
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
|
|
||||||
The alert context tile shows the where, who, and when context of the alert. As with other pages, you can click on the icon beside the name or user account to bring up the machine or user details pane. The alert details view also has a status tile that shows the status of the alert in the queue. You'll also see a description and a set of recommended actions which you can expand.
|
The alert context tile shows the where, who, and when context of the alert. As with other pages, you can click on the icon beside the name or user account to bring up the machine or user details pane. The alert details view also has a status tile that shows the status of the alert in the queue. You'll also see a description and a set of recommended actions which you can expand.
|
||||||
|
|
||||||
For more information about managing alerts, see [Manage alerts](manage-alerts-windows-defender-advanced-threat-protection.md).
|
For more information about managing alerts, see [Manage alerts](manage-alerts.md).
|
||||||
|
|
||||||
The alert details page also shows the alert process tree, an incident graph, and an artifact timeline.
|
The alert details page also shows the alert process tree, an incident graph, and an artifact timeline.
|
||||||
|
|
||||||
@ -93,12 +93,12 @@ The **Artifact timeline** feature provides an addition view of the evidence that
|
|||||||
Selecting an alert detail brings up the **Details pane** where you'll be able to see more information about the alert such as file details, detections, instances of it observed worldwide, and in the organization.
|
Selecting an alert detail brings up the **Details pane** where you'll be able to see more information about the alert such as file details, detections, instances of it observed worldwide, and in the organization.
|
||||||
|
|
||||||
## Related topics
|
## Related topics
|
||||||
- [View and organize the Microsoft Defender Advanced Threat Protection Alerts queue ](alerts-queue-windows-defender-advanced-threat-protection.md)
|
- [View and organize the Microsoft Defender Advanced Threat Protection Alerts queue ](alerts-queue.md)
|
||||||
- [Manage Microsoft Defender Advanced Threat Protection alerts](manage-alerts-windows-defender-advanced-threat-protection.md)
|
- [Manage Microsoft Defender Advanced Threat Protection alerts](manage-alerts.md)
|
||||||
- [Investigate a file associated with a Microsoft Defender ATP alert](investigate-files-windows-defender-advanced-threat-protection.md)
|
- [Investigate a file associated with a Microsoft Defender ATP alert](investigate-files.md)
|
||||||
- [Investigate machines in the Microsoft Defender ATP Machines list](investigate-machines-windows-defender-advanced-threat-protection.md)
|
- [Investigate machines in the Microsoft Defender ATP Machines list](investigate-machines.md)
|
||||||
- [Investigate an IP address associated with a Microsoft Defender ATP alert](investigate-ip-windows-defender-advanced-threat-protection.md)
|
- [Investigate an IP address associated with a Microsoft Defender ATP alert](investigate-ip.md)
|
||||||
- [Investigate a domain associated with a Microsoft Defender ATP alert](investigate-domain-windows-defender-advanced-threat-protection.md)
|
- [Investigate a domain associated with a Microsoft Defender ATP alert](investigate-domain.md)
|
||||||
- [Investigate a user account in Microsoft Defender ATP](investigate-user-windows-defender-advanced-threat-protection.md)
|
- [Investigate a user account in Microsoft Defender ATP](investigate-user.md)
|
||||||
|
|
||||||
|
|
||||||
|
@ -60,10 +60,10 @@ The **Most recent observed machinew with URL** section provides a chronological
|
|||||||
5. Clicking any of the machine names will take you to that machine's view, where you can continue investigate reported alerts, behaviors, and events.
|
5. Clicking any of the machine names will take you to that machine's view, where you can continue investigate reported alerts, behaviors, and events.
|
||||||
|
|
||||||
## Related topics
|
## Related topics
|
||||||
- [View and organize the Microsoft Defender Advanced Threat Protection Alerts queue ](alerts-queue-windows-defender-advanced-threat-protection.md)
|
- [View and organize the Microsoft Defender Advanced Threat Protection Alerts queue ](alerts-queue.md)
|
||||||
- [Manage Microsoft Defender Advanced Threat Protection alerts](manage-alerts-windows-defender-advanced-threat-protection.md)
|
- [Manage Microsoft Defender Advanced Threat Protection alerts](manage-alerts.md)
|
||||||
- [Investigate Microsoft Defender Advanced Threat Protection alerts](investigate-alerts-windows-defender-advanced-threat-protection.md)
|
- [Investigate Microsoft Defender Advanced Threat Protection alerts](investigate-alerts.md)
|
||||||
- [Investigate a file associated with a Microsoft Defender ATP alert](investigate-files-windows-defender-advanced-threat-protection.md)
|
- [Investigate a file associated with a Microsoft Defender ATP alert](investigate-files.md)
|
||||||
- [Investigate machines in the Microsoft Defender ATP Machines list](investigate-machines-windows-defender-advanced-threat-protection.md)
|
- [Investigate machines in the Microsoft Defender ATP Machines list](investigate-machines.md)
|
||||||
- [Investigate an IP address associated with a Microsoft Defender ATP alert](investigate-ip-windows-defender-advanced-threat-protection.md)
|
- [Investigate an IP address associated with a Microsoft Defender ATP alert](investigate-ip.md)
|
||||||
- [Investigate a user account in Microsoft Defender ATP](investigate-user-windows-defender-advanced-threat-protection.md)
|
- [Investigate a user account in Microsoft Defender ATP](investigate-user.md)
|
||||||
|
@ -41,9 +41,9 @@ You can get information from the following sections in the file view:
|
|||||||
- Most recent observed machines with file
|
- Most recent observed machines with file
|
||||||
|
|
||||||
## File worldwide and Deep analysis
|
## File worldwide and Deep analysis
|
||||||
The file details, malware detection, and prevalence worldwide sections display various attributes about the file. You’ll see actions you can take on the file. For more information on how to take action on a file, see [Take response action on a file](respond-file-alerts-windows-defender-advanced-threat-protection.md).
|
The file details, malware detection, and prevalence worldwide sections display various attributes about the file. You’ll see actions you can take on the file. For more information on how to take action on a file, see [Take response action on a file](respond-file-alerts.md).
|
||||||
|
|
||||||
You'll see details such as the file’s MD5, the VirusTotal detection ratio and Windows Defender AV detection if available, and the file’s prevalence worldwide. You'll also be able to [submit a file for deep analysis](respond-file-alerts-windows-defender-advanced-threat-protection.md#deep-analysis).
|
You'll see details such as the file’s MD5, the VirusTotal detection ratio and Windows Defender AV detection if available, and the file’s prevalence worldwide. You'll also be able to [submit a file for deep analysis](respond-file-alerts.md#deep-analysis).
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
@ -65,10 +65,10 @@ The **Most recent observed machines with the file** section allows you to specif
|
|||||||
This allows for greater accuracy in defining entities to display such as if and when an entity was observed in the organization. For example, if you’re trying to identify the origin of a network communication to a certain IP Address within a 10-minute period on a given date, you can specify that exact time interval, and see only files that communicated with that IP Address at that time, drastically reducing unnecessary scrolling and searching.
|
This allows for greater accuracy in defining entities to display such as if and when an entity was observed in the organization. For example, if you’re trying to identify the origin of a network communication to a certain IP Address within a 10-minute period on a given date, you can specify that exact time interval, and see only files that communicated with that IP Address at that time, drastically reducing unnecessary scrolling and searching.
|
||||||
|
|
||||||
## Related topics
|
## Related topics
|
||||||
- [View and organize the Microsoft Defender Advanced Threat Protection Alerts queue ](alerts-queue-windows-defender-advanced-threat-protection.md)
|
- [View and organize the Microsoft Defender Advanced Threat Protection Alerts queue ](alerts-queue.md)
|
||||||
- [Manage Microsoft Defender Advanced Threat Protection alerts](manage-alerts-windows-defender-advanced-threat-protection.md)
|
- [Manage Microsoft Defender Advanced Threat Protection alerts](manage-alerts.md)
|
||||||
- [Investigate Microsoft Defender Advanced Threat Protection alerts](investigate-alerts-windows-defender-advanced-threat-protection.md)
|
- [Investigate Microsoft Defender Advanced Threat Protection alerts](investigate-alerts.md)
|
||||||
- [Investigate machines in the Microsoft Defender ATP Machines list](investigate-machines-windows-defender-advanced-threat-protection.md)
|
- [Investigate machines in the Microsoft Defender ATP Machines list](investigate-machines.md)
|
||||||
- [Investigate an IP address associated with a Microsoft Defender ATP alert](investigate-ip-windows-defender-advanced-threat-protection.md)
|
- [Investigate an IP address associated with a Microsoft Defender ATP alert](investigate-ip.md)
|
||||||
- [Investigate a domain associated with a Microsoft Defender ATP alert](investigate-domain-windows-defender-advanced-threat-protection.md)
|
- [Investigate a domain associated with a Microsoft Defender ATP alert](investigate-domain.md)
|
||||||
- [Investigate a user account in Microsoft Defender ATP](investigate-user-windows-defender-advanced-threat-protection.md)
|
- [Investigate a user account in Microsoft Defender ATP](investigate-user.md)
|
@ -44,10 +44,10 @@ Alerts are grouped into incidents based on the following reasons:
|
|||||||
|
|
||||||

|

|
||||||
|
|
||||||
You can also manage an alert and see alert metadata along with other information. For more information, see [Investigate alerts](investigate-alerts-windows-defender-advanced-threat-protection.md).
|
You can also manage an alert and see alert metadata along with other information. For more information, see [Investigate alerts](investigate-alerts.md).
|
||||||
|
|
||||||
### Machines
|
### Machines
|
||||||
You can also investigate the machines that are part of, or related to, a given incident. For more information, see [Investigate machines](investigate-machines-windows-defender-advanced-threat-protection.md).
|
You can also investigate the machines that are part of, or related to, a given incident. For more information, see [Investigate machines](investigate-machines.md).
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
@ -77,6 +77,6 @@ You can click the circles on the incident graph to view the details of the malic
|
|||||||
## Related topics
|
## Related topics
|
||||||
- [Incidents queue](incidents-queue.md)
|
- [Incidents queue](incidents-queue.md)
|
||||||
- [View and organize the Incidents queue](view-incidents-queue.md)
|
- [View and organize the Incidents queue](view-incidents-queue.md)
|
||||||
- [Manage incidents](manage-incidents-windows-defender-advanced-threat-protection.md)
|
- [Manage incidents](manage-incidents.md)
|
||||||
|
|
||||||
|
|
||||||
|
@ -67,10 +67,10 @@ Use the search filters to define the search criteria. You can also use the timel
|
|||||||
Clicking any of the machine names will take you to that machine's view, where you can continue investigate reported alerts, behaviors, and events.
|
Clicking any of the machine names will take you to that machine's view, where you can continue investigate reported alerts, behaviors, and events.
|
||||||
|
|
||||||
## Related topics
|
## Related topics
|
||||||
- [View and organize the Microsoft Defender Advanced Threat Protection Alerts queue ](alerts-queue-windows-defender-advanced-threat-protection.md)
|
- [View and organize the Microsoft Defender Advanced Threat Protection Alerts queue ](alerts-queue.md)
|
||||||
- [Manage Microsoft Defender Advanced Threat Protection alerts](manage-alerts-windows-defender-advanced-threat-protection.md)
|
- [Manage Microsoft Defender Advanced Threat Protection alerts](manage-alerts.md)
|
||||||
- [Investigate Microsoft Defender Advanced Threat Protection alerts](investigate-alerts-windows-defender-advanced-threat-protection.md)
|
- [Investigate Microsoft Defender Advanced Threat Protection alerts](investigate-alerts.md)
|
||||||
- [Investigate a file associated with a Microsoft Defender ATP alert](investigate-files-windows-defender-advanced-threat-protection.md)
|
- [Investigate a file associated with a Microsoft Defender ATP alert](investigate-files.md)
|
||||||
- [Investigate machines in the Microsoft Defender ATP Machines list](investigate-machines-windows-defender-advanced-threat-protection.md)
|
- [Investigate machines in the Microsoft Defender ATP Machines list](investigate-machines.md)
|
||||||
- [Investigate a domain associated with a Microsoft Defender ATP alert](investigate-domain-windows-defender-advanced-threat-protection.md)
|
- [Investigate a domain associated with a Microsoft Defender ATP alert](investigate-domain.md)
|
||||||
- [Investigate a user account in Microsoft Defender ATP](investigate-user-windows-defender-advanced-threat-protection.md)
|
- [Investigate a user account in Microsoft Defender ATP](investigate-user.md)
|
||||||
|
@ -30,9 +30,9 @@ Investigate the details of an alert raised on a specific machine to identify oth
|
|||||||
|
|
||||||
You can click on affected machines whenever you see them in the portal to open a detailed report about that machine. Affected machines are identified in the following areas:
|
You can click on affected machines whenever you see them in the portal to open a detailed report about that machine. Affected machines are identified in the following areas:
|
||||||
|
|
||||||
- The [Machines list](investigate-machines-windows-defender-advanced-threat-protection.md)
|
- The [Machines list](investigate-machines.md)
|
||||||
- The [Alerts queue](alerts-queue-windows-defender-advanced-threat-protection.md)
|
- The [Alerts queue](alerts-queue.md)
|
||||||
- The [Security operations dashboard](security-operations-dashboard-windows-defender-advanced-threat-protection.md)
|
- The [Security operations dashboard](security-operations-dashboard.md)
|
||||||
- Any individual alert
|
- Any individual alert
|
||||||
- Any individual file details view
|
- Any individual file details view
|
||||||
- Any IP address or domain details view
|
- Any IP address or domain details view
|
||||||
@ -49,7 +49,7 @@ The machine details, logged on users, machine risk, and machine reporting sectio
|
|||||||
**Machine details**</br>
|
**Machine details**</br>
|
||||||
The machine details tile provides information such as the domain and OS of the machine. If there's an investigation package available on the machine, you'll see a link that allows you to download the package.
|
The machine details tile provides information such as the domain and OS of the machine. If there's an investigation package available on the machine, you'll see a link that allows you to download the package.
|
||||||
|
|
||||||
For more information on how to take action on a machine, see [Take response action on a machine](respond-machine-alerts-windows-defender-advanced-threat-protection.md).
|
For more information on how to take action on a machine, see [Take response action on a machine](respond-machine-alerts.md).
|
||||||
|
|
||||||
|
|
||||||
**Logged on users**</br>
|
**Logged on users**</br>
|
||||||
@ -62,7 +62,7 @@ Clicking on the logged on users in the Logged on users tile opens the Users Deta
|
|||||||
|
|
||||||
You'll also see details such as logon types for each user account, the user group, and when the account logon occurred.
|
You'll also see details such as logon types for each user account, the user group, and when the account logon occurred.
|
||||||
|
|
||||||
For more information, see [Investigate user entities](investigate-user-windows-defender-advanced-threat-protection.md).
|
For more information, see [Investigate user entities](investigate-user.md).
|
||||||
|
|
||||||
**Machine risk**</br>
|
**Machine risk**</br>
|
||||||
The Machine risk tile shows the overall risk assessment of a machine. A machine's risk level can be determined using the number of active alerts or by a combination of multiple risks that may increase the risk assessment and their severity levels. You can influence a machine's risk level by resolving associated alerts manually or automatically and also by suppressing an alert. It's also indicators of the active threats that machines could be exposed to.
|
The Machine risk tile shows the overall risk assessment of a machine. A machine's risk level can be determined using the number of active alerts or by a combination of multiple risks that may increase the risk assessment and their severity levels. You can influence a machine's risk level by resolving associated alerts manually or automatically and also by suppressing an alert. It's also indicators of the active threats that machines could be exposed to.
|
||||||
@ -71,7 +71,7 @@ The Machine risk tile shows the overall risk assessment of a machine. A machine'
|
|||||||
If you have enabled the Azure ATP feature and there are alerts related to the machine, you can click on the link that will take you to the Azure ATP page where more information about the alerts are provided.
|
If you have enabled the Azure ATP feature and there are alerts related to the machine, you can click on the link that will take you to the Azure ATP page where more information about the alerts are provided.
|
||||||
|
|
||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
>You'll need to enable the integration on both Azure ATP and Microsoft Defender ATP to use this feature. In Microsoft Defender ATP, you can enable this feature in advanced features. For more information on how to enable advanced features, see [Turn on advanced features](advanced-features-windows-defender-advanced-threat-protection.md).
|
>You'll need to enable the integration on both Azure ATP and Microsoft Defender ATP to use this feature. In Microsoft Defender ATP, you can enable this feature in advanced features. For more information on how to enable advanced features, see [Turn on advanced features](advanced-features.md).
|
||||||
|
|
||||||
**Machine reporting**</br>
|
**Machine reporting**</br>
|
||||||
Provides the last internal IP and external IP of the machine. It also shows when the machine was first and last seen reporting to the service.
|
Provides the last internal IP and external IP of the machine. It also shows when the machine was first and last seen reporting to the service.
|
||||||
@ -81,7 +81,7 @@ The **Alerts related to this machine** section provides a list of alerts that ar
|
|||||||
|
|
||||||

|

|
||||||
|
|
||||||
This list is a filtered version of the [Alerts queue](alerts-queue-windows-defender-advanced-threat-protection.md), and shows the date when the alert's last activity was detected, a short description of the alert, the user account associated with the alert, the alert's severity, the alert's status in the queue, and who is addressing the alert.
|
This list is a filtered version of the [Alerts queue](alerts-queue.md), and shows the date when the alert's last activity was detected, a short description of the alert, the user account associated with the alert, the alert's severity, the alert's status in the queue, and who is addressing the alert.
|
||||||
|
|
||||||
You can also choose to highlight an alert from the **Alerts related to this machine** or from the **Machine timeline** section to see the correlation between the alert and its related events on the machine by right-clicking on the alert and selecting **Select and mark events**. This highlights the alert and its related events and helps distinguish them from other alerts and events appearing in the timeline. Highlighted events are displayed in all information levels whether you choose to view the timeline by **Detections**, **Behaviors**, or **Verbose**.
|
You can also choose to highlight an alert from the **Alerts related to this machine** or from the **Machine timeline** section to see the correlation between the alert and its related events on the machine by right-clicking on the alert and selecting **Select and mark events**. This highlights the alert and its related events and helps distinguish them from other alerts and events appearing in the timeline. Highlighted events are displayed in all information levels whether you choose to view the timeline by **Detections**, **Behaviors**, or **Verbose**.
|
||||||
|
|
||||||
@ -163,7 +163,7 @@ From the list of events that are displayed in the timeline, you can examine the
|
|||||||

|

|
||||||
|
|
||||||
|
|
||||||
You can also use the [Artifact timeline](investigate-alerts-windows-defender-advanced-threat-protection.md#artifact-timeline) feature to see the correlation between alerts and events on a specific machine.
|
You can also use the [Artifact timeline](investigate-alerts.md#artifact-timeline) feature to see the correlation between alerts and events on a specific machine.
|
||||||
|
|
||||||
Expand an event to view associated processes related to the event. Click on the circle next to any process or IP address in the process tree to investigate additional details of the identified processes. This action brings up the **Details pane** which includes execution context of processes, network communications and a summary of meta data on the file or IP address.
|
Expand an event to view associated processes related to the event. Click on the circle next to any process or IP address in the process tree to investigate additional details of the identified processes. This action brings up the **Details pane** which includes execution context of processes, network communications and a summary of meta data on the file or IP address.
|
||||||
|
|
||||||
@ -173,10 +173,10 @@ The details pane enriches the ‘in-context’ information across investigation
|
|||||||
|
|
||||||
|
|
||||||
## Related topics
|
## Related topics
|
||||||
- [View and organize the Microsoft Defender Advanced Threat Protection Alerts queue ](alerts-queue-windows-defender-advanced-threat-protection.md)
|
- [View and organize the Microsoft Defender Advanced Threat Protection Alerts queue ](alerts-queue.md)
|
||||||
- [Manage Microsoft Defender Advanced Threat Protection alerts](manage-alerts-windows-defender-advanced-threat-protection.md)
|
- [Manage Microsoft Defender Advanced Threat Protection alerts](manage-alerts.md)
|
||||||
- [Investigate Microsoft Defender Advanced Threat Protection alerts](investigate-alerts-windows-defender-advanced-threat-protection.md)
|
- [Investigate Microsoft Defender Advanced Threat Protection alerts](investigate-alerts.md)
|
||||||
- [Investigate a file associated with a Microsoft Defender ATP alert](investigate-files-windows-defender-advanced-threat-protection.md)
|
- [Investigate a file associated with a Microsoft Defender ATP alert](investigate-files.md)
|
||||||
- [Investigate an IP address associated with a Microsoft Defender ATP alert](investigate-ip-windows-defender-advanced-threat-protection.md)
|
- [Investigate an IP address associated with a Microsoft Defender ATP alert](investigate-ip.md)
|
||||||
- [Investigate a domain associated with a Microsoft Defender ATP alert](investigate-domain-windows-defender-advanced-threat-protection.md)
|
- [Investigate a domain associated with a Microsoft Defender ATP alert](investigate-domain.md)
|
||||||
- [Investigate a user account in Microsoft Defender ATP](investigate-user-windows-defender-advanced-threat-protection.md)
|
- [Investigate a user account in Microsoft Defender ATP](investigate-user.md)
|
||||||
|
@ -53,14 +53,14 @@ The user entity tile provides details about the user such as when the user was f
|
|||||||
If you have enabled the Azure ATP feature and there are alerts related to the user, you can click on the link that will take you to the Azure ATP page where more information about the alerts are provided. The Azure ATP tile also provides details such as the last AD site, total group memberships, and login failure associated with the user.
|
If you have enabled the Azure ATP feature and there are alerts related to the user, you can click on the link that will take you to the Azure ATP page where more information about the alerts are provided. The Azure ATP tile also provides details such as the last AD site, total group memberships, and login failure associated with the user.
|
||||||
|
|
||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
>You'll need to enable the integration on both Azure ATP and Microsoft Defender ATP to use this feature. In Microsoft Defender ATP, you can enable this feature in advanced features. For more information on how to enable advanced features, see [Turn on advanced features](advanced-features-windows-defender-advanced-threat-protection.md).
|
>You'll need to enable the integration on both Azure ATP and Microsoft Defender ATP to use this feature. In Microsoft Defender ATP, you can enable this feature in advanced features. For more information on how to enable advanced features, see [Turn on advanced features](advanced-features.md).
|
||||||
|
|
||||||
**Logged on machines**</br>
|
**Logged on machines**</br>
|
||||||
You'll also see a list of the machines that the user logged on to, and can expand these to see details of the logon events on each machine.
|
You'll also see a list of the machines that the user logged on to, and can expand these to see details of the logon events on each machine.
|
||||||
|
|
||||||
|
|
||||||
## Alerts related to this user
|
## Alerts related to this user
|
||||||
This section provides a list of alerts that are associated with the user account. This list is a filtered view of the [Alert queue](alerts-queue-windows-defender-advanced-threat-protection.md), and shows alerts where the user context is the selected user account, the date when the last activity was detected, a short description of the alert, the machine associated with the alert, the alert's severity, the alert's status in the queue, and who is assigned the alert.
|
This section provides a list of alerts that are associated with the user account. This list is a filtered view of the [Alert queue](alerts-queue.md), and shows alerts where the user context is the selected user account, the date when the last activity was detected, a short description of the alert, the machine associated with the alert, the alert's severity, the alert's status in the queue, and who is assigned the alert.
|
||||||
|
|
||||||
## Observed in organization
|
## Observed in organization
|
||||||
This section allows you to specify a date range to see a list of machines where this user was observed logged on to, and the most frequent and least frequent logged on user account on each of these machines.
|
This section allows you to specify a date range to see a list of machines where this user was observed logged on to, and the most frequent and least frequent logged on user account on each of these machines.
|
||||||
@ -85,11 +85,11 @@ You can filter the results by the following time periods:
|
|||||||
- 6 months
|
- 6 months
|
||||||
|
|
||||||
## Related topics
|
## Related topics
|
||||||
- [View and organize the Microsoft Defender Advanced Threat Protection Alerts queue ](alerts-queue-windows-defender-advanced-threat-protection.md)
|
- [View and organize the Microsoft Defender Advanced Threat Protection Alerts queue ](alerts-queue.md)
|
||||||
- [Manage Microsoft Defender Advanced Threat Protection alerts](manage-alerts-windows-defender-advanced-threat-protection.md)
|
- [Manage Microsoft Defender Advanced Threat Protection alerts](manage-alerts.md)
|
||||||
- [Investigate Microsoft Defender Advanced Threat Protection alerts](investigate-alerts-windows-defender-advanced-threat-protection.md)
|
- [Investigate Microsoft Defender Advanced Threat Protection alerts](investigate-alerts.md)
|
||||||
- [Investigate a file associated with a Microsoft Defender ATP alert](investigate-files-windows-defender-advanced-threat-protection.md)
|
- [Investigate a file associated with a Microsoft Defender ATP alert](investigate-files.md)
|
||||||
- [Investigate machines in the Microsoft Defender ATP Machines list](investigate-machines-windows-defender-advanced-threat-protection.md)
|
- [Investigate machines in the Microsoft Defender ATP Machines list](investigate-machines.md)
|
||||||
- [Investigate an IP address associated with a Microsoft Defender ATP alert](investigate-ip-windows-defender-advanced-threat-protection.md)
|
- [Investigate an IP address associated with a Microsoft Defender ATP alert](investigate-ip.md)
|
||||||
- [Investigate a domain associated with a Microsoft Defender ATP alert](investigate-domain-windows-defender-advanced-threat-protection.md)
|
- [Investigate a domain associated with a Microsoft Defender ATP alert](investigate-domain.md)
|
||||||
|
|
||||||
|
@ -36,7 +36,7 @@ Delegated (work or school account) | URL.Read.All | 'Read URLs'
|
|||||||
|
|
||||||
>[!Note]
|
>[!Note]
|
||||||
> When obtaining a token using user credentials:
|
> When obtaining a token using user credentials:
|
||||||
>- The user needs to have at least the following role permission: 'View Data' (See [Create and manage roles](user-roles-windows-defender-advanced-threat-protection.md) for more information)
|
>- The user needs to have at least the following role permission: 'View Data' (See [Create and manage roles](user-roles.md) for more information)
|
||||||
|
|
||||||
## HTTP request
|
## HTTP request
|
||||||
```
|
```
|
||||||
|
@ -37,7 +37,7 @@ Delegated (work or school account) | Ip.Read.All | 'Read IP address profiles'
|
|||||||
|
|
||||||
>[!Note]
|
>[!Note]
|
||||||
> When obtaining a token using user credentials:
|
> When obtaining a token using user credentials:
|
||||||
>- The user needs to have at least the following role permission: 'View Data' (See [Create and manage roles](user-roles-windows-defender-advanced-threat-protection.md) for more information)
|
>- The user needs to have at least the following role permission: 'View Data' (See [Create and manage roles](user-roles.md) for more information)
|
||||||
|
|
||||||
## HTTP request
|
## HTTP request
|
||||||
```
|
```
|
||||||
|
@ -37,8 +37,8 @@ Delegated (work or school account) | Machine.Isolate | 'Isolate machine'
|
|||||||
|
|
||||||
>[!Note]
|
>[!Note]
|
||||||
> When obtaining a token using user credentials:
|
> When obtaining a token using user credentials:
|
||||||
>- The user needs to have at least the following role permission: 'Active remediation actions' (See [Create and manage roles](user-roles-windows-defender-advanced-threat-protection.md) for more information)
|
>- The user needs to have at least the following role permission: 'Active remediation actions' (See [Create and manage roles](user-roles.md) for more information)
|
||||||
>- The user needs to have access to the machine, based on machine group settings (See [Create and manage machine groups](machine-groups-windows-defender-advanced-threat-protection.md) for more information)
|
>- The user needs to have access to the machine, based on machine group settings (See [Create and manage machine groups](machine-groups.md) for more information)
|
||||||
|
|
||||||
|
|
||||||
## HTTP request
|
## HTTP request
|
||||||
@ -63,7 +63,7 @@ IsolationType | String | Type of the isolation. Allowed values are: 'Full' or 'S
|
|||||||
|
|
||||||
**IsolationType** controls the type of isolation to perform and can be one of the following:
|
**IsolationType** controls the type of isolation to perform and can be one of the following:
|
||||||
- Full – Full isolation
|
- Full – Full isolation
|
||||||
- Selective – Restrict only limited set of applications from accessing the network (see [Isolate machines from the network](respond-machine-alerts-windows-defender-advanced-threat-protection.md#isolate-machines-from-the-network) for more details)
|
- Selective – Restrict only limited set of applications from accessing the network (see [Isolate machines from the network](respond-machine-alerts.md#isolate-machines-from-the-network) for more details)
|
||||||
|
|
||||||
|
|
||||||
## Response
|
## Response
|
||||||
|
@ -108,7 +108,7 @@ When accessing [Microsoft Defender Security Center](https://SecurityCenter.Windo
|
|||||||
|
|
||||||
6. You are almost done. Before you can start using Microsoft Defender ATP you'll need to:
|
6. You are almost done. Before you can start using Microsoft Defender ATP you'll need to:
|
||||||
|
|
||||||
- [Onboard Windows 10 machines](configure-endpoints-windows-defender-advanced-threat-protection.md)
|
- [Onboard Windows 10 machines](configure-endpoints.md)
|
||||||
|
|
||||||
- Run detection test (optional)
|
- Run detection test (optional)
|
||||||
|
|
||||||
@ -123,5 +123,5 @@ When accessing [Microsoft Defender Security Center](https://SecurityCenter.Windo
|
|||||||

|

|
||||||
|
|
||||||
## Related topics
|
## Related topics
|
||||||
- [Onboard machines to the Microsoft Defender Advanced Threat Protection service](onboard-configure-windows-defender-advanced-threat-protection.md)
|
- [Onboard machines to the Microsoft Defender Advanced Threat Protection service](onboard-configure.md)
|
||||||
- [Troubleshoot onboarding process and portal access issues](troubleshoot-onboarding-error-messages-windows-defender-advanced-threat-protection.md)
|
- [Troubleshoot onboarding process and portal access issues](troubleshoot-onboarding-error-messages.md)
|
||||||
|
@ -30,14 +30,14 @@ ms.topic: article
|
|||||||
In an enterprise scenario, security operation teams are typically assigned a set of machines. These machines are grouped together based on a set of attributes such as their domains, computer names, or designated tags.
|
In an enterprise scenario, security operation teams are typically assigned a set of machines. These machines are grouped together based on a set of attributes such as their domains, computer names, or designated tags.
|
||||||
|
|
||||||
In Microsoft Defender ATP, you can create machine groups and use them to:
|
In Microsoft Defender ATP, you can create machine groups and use them to:
|
||||||
- Limit access to related alerts and data to specific Azure AD user groups with [assigned RBAC roles](rbac-windows-defender-advanced-threat-protection.md)
|
- Limit access to related alerts and data to specific Azure AD user groups with [assigned RBAC roles](rbac.md)
|
||||||
- Configure different auto-remediation settings for different sets of machines
|
- Configure different auto-remediation settings for different sets of machines
|
||||||
|
|
||||||
>[!TIP]
|
>[!TIP]
|
||||||
> For a comprehensive look into RBAC application, read: [Is your SOC running flat with RBAC](https://techcommunity.microsoft.com/t5/Windows-Defender-ATP/Is-your-SOC-running-flat-with-limited-RBAC/ba-p/320015).
|
> For a comprehensive look into RBAC application, read: [Is your SOC running flat with RBAC](https://techcommunity.microsoft.com/t5/Windows-Defender-ATP/Is-your-SOC-running-flat-with-limited-RBAC/ba-p/320015).
|
||||||
|
|
||||||
As part of the process of creating a machine group, you'll:
|
As part of the process of creating a machine group, you'll:
|
||||||
- Set the automated remediation level for that group. For more information on remediation levels, see [Use Automated investigation to investigate and remediate threats](automated-investigations-windows-defender-advanced-threat-protection.md).
|
- Set the automated remediation level for that group. For more information on remediation levels, see [Use Automated investigation to investigate and remediate threats](automated-investigations.md).
|
||||||
- Specify the matching rule that determines which machine group belongs to the group based on the machine name, domain, tags, and OS platform. If a machine is also matched to other groups, it is added only to the highest ranked machine group.
|
- Specify the matching rule that determines which machine group belongs to the group based on the machine name, domain, tags, and OS platform. If a machine is also matched to other groups, it is added only to the highest ranked machine group.
|
||||||
- Select the Azure AD user group that should have access to the machine group.
|
- Select the Azure AD user group that should have access to the machine group.
|
||||||
- Rank the machine group relative to other groups after it is created.
|
- Rank the machine group relative to other groups after it is created.
|
||||||
@ -63,7 +63,7 @@ As part of the process of creating a machine group, you'll:
|
|||||||
- **Full - remediate threats automatically**
|
- **Full - remediate threats automatically**
|
||||||
|
|
||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
> For more information on automation levels, see [Understand the Automated investigation flow](automated-investigations-windows-defender-advanced-threat-protection.md#understand-the-automated-investigation-flow).
|
> For more information on automation levels, see [Understand the Automated investigation flow](automated-investigations.md#understand-the-automated-investigation-flow).
|
||||||
|
|
||||||
- **Description**
|
- **Description**
|
||||||
- **Members**
|
- **Members**
|
||||||
@ -96,5 +96,5 @@ Machines that are not matched to any groups are added to Ungrouped machines (def
|
|||||||
|
|
||||||
|
|
||||||
## Related topic
|
## Related topic
|
||||||
- [Manage portal access using role-based based access control](rbac-windows-defender-advanced-threat-protection.md)
|
- [Manage portal access using role-based based access control](rbac.md)
|
||||||
- [Get list of tenant machine groups using Graph API](get-machinegroups-collection-windows-defender-advanced-threat-protection.md)
|
- [Get list of tenant machine groups using Graph API](get-machinegroups-collection.md)
|
@ -81,4 +81,4 @@ For example, to show data about Windows 10 machines with Active sensor health st
|
|||||||
|
|
||||||
|
|
||||||
## Related topic
|
## Related topic
|
||||||
- [Threat protection report ](threat-protection-reports-windows-defender-advanced-threat-protection.md)
|
- [Threat protection report ](threat-protection-reports.md)
|
@ -20,9 +20,9 @@ ms.topic: article
|
|||||||
# Create and manage machine tags
|
# Create and manage machine tags
|
||||||
Add tags on machines to create a logical group affiliation. Machine group affiliation can represent geographic location, specific activity, importance level and others.
|
Add tags on machines to create a logical group affiliation. Machine group affiliation can represent geographic location, specific activity, importance level and others.
|
||||||
|
|
||||||
You can create machine groups in the context of role-based access (RBAC) to control who can take specific action or who can see information on a specific machine group or groups by assigning the machine group to a user group. For more information, see [Manage portal access using role-based access control](rbac-windows-defender-advanced-threat-protection.md).
|
You can create machine groups in the context of role-based access (RBAC) to control who can take specific action or who can see information on a specific machine group or groups by assigning the machine group to a user group. For more information, see [Manage portal access using role-based access control](rbac.md).
|
||||||
|
|
||||||
You can also use machine groups to assign specific remediation levels to apply during automated investigations. For more information, see [Create and manage machine groups](machine-groups-windows-defender-advanced-threat-protection.md).
|
You can also use machine groups to assign specific remediation levels to apply during automated investigations. For more information, see [Create and manage machine groups](machine-groups.md).
|
||||||
|
|
||||||
In an investigation, you can filter the Machines list to just specific machine groups by using the Groups filter.
|
In an investigation, you can filter the Machines list to just specific machine groups by using the Groups filter.
|
||||||
|
|
||||||
|
@ -3,4 +3,4 @@ ms.date: 08/28/2017
|
|||||||
author: zavidor
|
author: zavidor
|
||||||
---
|
---
|
||||||
>[!Note]
|
>[!Note]
|
||||||
> This page focuses on performing a machine action via API. See [take response actions on a machine](respond-machine-alerts-windows-defender-advanced-threat-protection.md) for more information about response actions functionality via Microsoft Defender ATP.
|
> This page focuses on performing a machine action via API. See [take response actions on a machine](respond-machine-alerts.md) for more information about response actions functionality via Microsoft Defender ATP.
|
||||||
|
@ -74,7 +74,7 @@ Filter the list to view specific machines grouped together by the following mach
|
|||||||
- No sensor data
|
- No sensor data
|
||||||
- Impaired communications
|
- Impaired communications
|
||||||
|
|
||||||
For more information on how to address issues on misconfigured machines see, [Fix unhealthy sensors](fix-unhealhty-sensors-windows-defender-advanced-threat-protection.md).
|
For more information on how to address issues on misconfigured machines see, [Fix unhealthy sensors](fix-unhealhty-sensors.md).
|
||||||
- **Inactive** – Machines that have completely stopped sending signals for more than 7 days.
|
- **Inactive** – Machines that have completely stopped sending signals for more than 7 days.
|
||||||
|
|
||||||
|
|
||||||
@ -85,13 +85,13 @@ Filter the list to view specific machines that are well configured or require at
|
|||||||
- **Well configured** - Machines have the Windows Defender security controls well configured.
|
- **Well configured** - Machines have the Windows Defender security controls well configured.
|
||||||
- **Requires attention** - Machines where improvements can be made to increase the overall security posture of your organization.
|
- **Requires attention** - Machines where improvements can be made to increase the overall security posture of your organization.
|
||||||
|
|
||||||
For more information, see [View the Secure Score dashboard](secure-score-dashboard-windows-defender-advanced-threat-protection.md).
|
For more information, see [View the Secure Score dashboard](secure-score-dashboard.md).
|
||||||
|
|
||||||
### Tags
|
### Tags
|
||||||
You can filter the list based on the grouping and tagging that you've added to individual machines.
|
You can filter the list based on the grouping and tagging that you've added to individual machines.
|
||||||
|
|
||||||
|
|
||||||
## Related topics
|
## Related topics
|
||||||
- [Investigate machines in the Microsoft Defender ATP Machines list](investigate-machines-windows-defender-advanced-threat-protection.md)
|
- [Investigate machines in the Microsoft Defender ATP Machines list](investigate-machines.md)
|
||||||
|
|
||||||
|
|
||||||
|
@ -92,7 +92,7 @@ Create custom rules to control when alerts are suppressed, or resolved. You can
|
|||||||
|
|
||||||
2. The list of suppression rules shows all the rules that users in your organization have created.
|
2. The list of suppression rules shows all the rules that users in your organization have created.
|
||||||
|
|
||||||
For more information on managing suppression rules, see [Manage suppression rules](manage-suppression-rules-windows-defender-advanced-threat-protection.md)
|
For more information on managing suppression rules, see [Manage suppression rules](manage-suppression-rules.md)
|
||||||
|
|
||||||
## Change the status of an alert
|
## Change the status of an alert
|
||||||
|
|
||||||
@ -117,11 +117,11 @@ Added comments instantly appear on the pane.
|
|||||||
|
|
||||||
|
|
||||||
## Related topics
|
## Related topics
|
||||||
- [Manage suppression rules](manage-suppression-rules-windows-defender-advanced-threat-protection.md)
|
- [Manage suppression rules](manage-suppression-rules.md)
|
||||||
- [View and organize the Microsoft Defender Advanced Threat Protection Alerts queue ](alerts-queue-windows-defender-advanced-threat-protection.md)
|
- [View and organize the Microsoft Defender Advanced Threat Protection Alerts queue ](alerts-queue.md)
|
||||||
- [Investigate Microsoft Defender Advanced Threat Protection alerts](investigate-alerts-windows-defender-advanced-threat-protection.md)
|
- [Investigate Microsoft Defender Advanced Threat Protection alerts](investigate-alerts.md)
|
||||||
- [Investigate a file associated with a Microsoft Defender ATP alert](investigate-files-windows-defender-advanced-threat-protection.md)
|
- [Investigate a file associated with a Microsoft Defender ATP alert](investigate-files.md)
|
||||||
- [Investigate machines in the Microsoft Defender ATP Machines list](investigate-machines-windows-defender-advanced-threat-protection.md)
|
- [Investigate machines in the Microsoft Defender ATP Machines list](investigate-machines.md)
|
||||||
- [Investigate an IP address associated with a Microsoft Defender ATP alert](investigate-ip-windows-defender-advanced-threat-protection.md)
|
- [Investigate an IP address associated with a Microsoft Defender ATP alert](investigate-ip.md)
|
||||||
- [Investigate a domain associated with a Microsoft Defender ATP alert](investigate-domain-windows-defender-advanced-threat-protection.md)
|
- [Investigate a domain associated with a Microsoft Defender ATP alert](investigate-domain.md)
|
||||||
- [Investigate a user account in Microsoft Defender ATP](investigate-user-windows-defender-advanced-threat-protection.md)
|
- [Investigate a user account in Microsoft Defender ATP](investigate-user.md)
|
||||||
|
@ -76,7 +76,7 @@ Download the sample CSV to know the supported column attributes.
|
|||||||
|
|
||||||
|
|
||||||
## Related topics
|
## Related topics
|
||||||
- [Manage automation allowed/blocked lists](manage-automation-allowed-blocked-list-windows-defender-advanced-threat-protection.md)
|
- [Manage automation allowed/blocked lists](manage-automation-allowed-blocked-list.md)
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
@ -196,4 +196,4 @@ From the panel, you can click on the Open investigation page link to see the inv
|
|||||||
You also have the option of selecting multiple investigations to approve or reject actions on multiple investigations.
|
You also have the option of selecting multiple investigations to approve or reject actions on multiple investigations.
|
||||||
|
|
||||||
## Related topic
|
## Related topic
|
||||||
- [Investigate Microsoft Defender ATP alerts](investigate-alerts-windows-defender-advanced-threat-protection.md)
|
- [Investigate Microsoft Defender ATP alerts](investigate-alerts.md)
|
||||||
|
@ -66,6 +66,6 @@ You can define the conditions for when entities are identified as malicious or s
|
|||||||
|
|
||||||
|
|
||||||
## Related topics
|
## Related topics
|
||||||
- [Manage automation file uploads](manage-automation-file-uploads-windows-defender-advanced-threat-protection.md)
|
- [Manage automation file uploads](manage-automation-file-uploads.md)
|
||||||
- [Manage allowed/blocked lists](manage-allowed-blocked-list-windows-defender-advanced-threat-protection.md)
|
- [Manage allowed/blocked lists](manage-allowed-blocked-list.md)
|
||||||
- [Manage automation folder exclusions](manage-automation-folder-exclusions-windows-defender-advanced-threat-protection.md)
|
- [Manage automation folder exclusions](manage-automation-folder-exclusions.md)
|
||||||
|
@ -46,5 +46,5 @@ For example, if you add *exe* and *bat* as file or attachment extension names, t
|
|||||||
|
|
||||||
|
|
||||||
## Related topics
|
## Related topics
|
||||||
- [Manage automation allowed/blocked lists](manage-automation-allowed-blocked-list-windows-defender-advanced-threat-protection.md)
|
- [Manage automation allowed/blocked lists](manage-automation-allowed-blocked-list.md)
|
||||||
- [Manage automation folder exclusions](manage-automation-folder-exclusions-windows-defender-advanced-threat-protection.md)
|
- [Manage automation folder exclusions](manage-automation-folder-exclusions.md)
|
@ -76,5 +76,5 @@ You can specify the file names that you want to be excluded in a specific direct
|
|||||||
|
|
||||||
|
|
||||||
## Related topics
|
## Related topics
|
||||||
- [Manage automation allowed/blocked lists](manage-automation-allowed-blocked-list-windows-defender-advanced-threat-protection.md)
|
- [Manage automation allowed/blocked lists](manage-automation-allowed-blocked-list.md)
|
||||||
- [Manage automation file uploads](manage-automation-file-uploads-windows-defender-advanced-threat-protection.md)
|
- [Manage automation file uploads](manage-automation-file-uploads.md)
|
||||||
|
@ -27,6 +27,6 @@ Manage the alerts queue, investigate machines in the machines list, take respons
|
|||||||
Topic | Description
|
Topic | Description
|
||||||
:---|:---
|
:---|:---
|
||||||
[Alerts queue](alerts-queue-endpoint-detection-response.md)| View the alerts surfaced in Microsoft Defender Security Center.
|
[Alerts queue](alerts-queue-endpoint-detection-response.md)| View the alerts surfaced in Microsoft Defender Security Center.
|
||||||
[Machines list](machines-view-overview-windows-defender-advanced-threat-protection.md) | Learn how you can view and manage the machines list, manage machine groups, and investigate machine related alerts.
|
[Machines list](machines-view-overview.md) | Learn how you can view and manage the machines list, manage machine groups, and investigate machine related alerts.
|
||||||
[Take response actions](response-actions-windows-defender-advanced-threat-protection.md)| Take response actions on machines and files to quickly respond to detected attacks and contain threats.
|
[Take response actions](response-actions.md)| Take response actions on machines and files to quickly respond to detected attacks and contain threats.
|
||||||
[Query data using advanced hunting](advanced-hunting-windows-defender-advanced-threat-protection.md)| Proactively hunt for possible threats across your organization using a powerful search and query tool.
|
[Query data using advanced hunting](advanced-hunting.md)| Proactively hunt for possible threats across your organization using a powerful search and query tool.
|
@ -60,4 +60,4 @@ Added comments instantly appear on the pane.
|
|||||||
## Related topics
|
## Related topics
|
||||||
- [Incidents queue](incidents-queue.md)
|
- [Incidents queue](incidents-queue.md)
|
||||||
- [View and organize the Incidents queue](view-incidents-queue.md)
|
- [View and organize the Incidents queue](view-incidents-queue.md)
|
||||||
- [Investigate incidents](investigate-incidents-windows-defender-advanced-threat-protection.md)
|
- [Investigate incidents](investigate-incidents.md)
|
||||||
|
@ -26,7 +26,7 @@ ms.date: 04/24/2018
|
|||||||
|
|
||||||
>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-suppressionrules-abovefoldlink)
|
>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-suppressionrules-abovefoldlink)
|
||||||
|
|
||||||
There might be scenarios where you need to suppress alerts from appearing in the portal. You can create suppression rules for specific alerts that are known to be innocuous such as known tools or processes in your organization. For more information on how to suppress alerts, see [Suppress alerts](manage-alerts-windows-defender-advanced-threat-protection.md).
|
There might be scenarios where you need to suppress alerts from appearing in the portal. You can create suppression rules for specific alerts that are known to be innocuous such as known tools or processes in your organization. For more information on how to suppress alerts, see [Suppress alerts](manage-alerts.md).
|
||||||
|
|
||||||
You can view a list of all the suppression rules and manage them in one place. You can also turn an alert suppression rule on or off.
|
You can view a list of all the suppression rules and manage them in one place. You can also turn an alert suppression rule on or off.
|
||||||
|
|
||||||
@ -46,4 +46,4 @@ You can view a list of all the suppression rules and manage them in one place. Y
|
|||||||
|
|
||||||
## Related topics
|
## Related topics
|
||||||
|
|
||||||
- [Manage alerts](manage-alerts-windows-defender-advanced-threat-protection.md)
|
- [Manage alerts](manage-alerts.md)
|
@ -59,11 +59,11 @@ Managed security service provider | Get a quick overview on managed security ser
|
|||||||
|
|
||||||
|
|
||||||
## Related topics
|
## Related topics
|
||||||
- [Onboard machines](onboard-configure-windows-defender-advanced-threat-protection.md)
|
- [Onboard machines](onboard-configure.md)
|
||||||
- [Enable the custom threat intelligence application](enable-custom-ti-windows-defender-advanced-threat-protection.md)
|
- [Enable the custom threat intelligence application](enable-custom-ti.md)
|
||||||
- [Microsoft Defender ATP Public API](use-apis.md)
|
- [Microsoft Defender ATP Public API](use-apis.md)
|
||||||
- [Pull alerts to your SIEM tools](configure-siem-windows-defender-advanced-threat-protection.md)
|
- [Pull alerts to your SIEM tools](configure-siem.md)
|
||||||
- [Create and build Power BI reports using Microsoft Defender ATP data](powerbi-reports-windows-defender-advanced-threat-protection.md)
|
- [Create and build Power BI reports using Microsoft Defender ATP data](powerbi-reports.md)
|
||||||
- [Role-based access control](rbac-windows-defender-advanced-threat-protection.md)
|
- [Role-based access control](rbac.md)
|
||||||
|
|
||||||
|
|
||||||
|
@ -90,12 +90,12 @@ You can also do advanced hunting to create custom threat intelligence and use a
|
|||||||
|
|
||||||
<a name="ai"></a>
|
<a name="ai"></a>
|
||||||
|
|
||||||
**[Automated investigation and remediation](automated-investigations-windows-defender-advanced-threat-protection.md)**<br>
|
**[Automated investigation and remediation](automated-investigations.md)**<br>
|
||||||
In conjunction with being able to quickly respond to advanced attacks, Microsoft Defender ATP offers automatic investigation and remediation capabilities that help reduce the volume of alerts in minutes at scale.
|
In conjunction with being able to quickly respond to advanced attacks, Microsoft Defender ATP offers automatic investigation and remediation capabilities that help reduce the volume of alerts in minutes at scale.
|
||||||
|
|
||||||
<a name="ss"></a>
|
<a name="ss"></a>
|
||||||
|
|
||||||
**[Secure score](overview-secure-score-windows-defender-advanced-threat-protection.md)**<br>
|
**[Secure score](overview-secure-score.md)**<br>
|
||||||
Microsoft Defender ATP includes a secure score to help you dynamically assess the security state of your enterprise network, identify unprotected systems, and take recommended actions to improve the overall security of your organization.
|
Microsoft Defender ATP includes a secure score to help you dynamically assess the security state of your enterprise network, identify unprotected systems, and take recommended actions to improve the overall security of your organization.
|
||||||
|
|
||||||
<a name="mte"></a>
|
<a name="mte"></a>
|
||||||
|
@ -46,5 +46,5 @@ For more information about licensing requirements for Microsoft Defender ATP pla
|
|||||||
|
|
||||||
|
|
||||||
## Related topic
|
## Related topic
|
||||||
- [Validate licensing and complete setup](licensing-windows-defender-advanced-threat-protection.md)
|
- [Validate licensing and complete setup](licensing.md)
|
||||||
- [Onboard machines](onboard-configure-windows-defender-advanced-threat-protection.md)
|
- [Onboard machines](onboard-configure.md)
|
||||||
|
@ -41,7 +41,7 @@ Microsoft Defender ATP adds support for this scenario and to allow MSSPs to take
|
|||||||
|
|
||||||
|
|
||||||
## Related topic
|
## Related topic
|
||||||
- [Configure managed security service provider integration](configure-mssp-support-windows-defender-advanced-threat-protection.md)
|
- [Configure managed security service provider integration](configure-mssp-support.md)
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
@ -37,7 +37,7 @@ Delegated (work or school account) | Machine.Offboard | 'Offboard machine'
|
|||||||
>[!Note]
|
>[!Note]
|
||||||
> When obtaining a token using user credentials:
|
> When obtaining a token using user credentials:
|
||||||
>- The user needs to 'Global Admin' AD role
|
>- The user needs to 'Global Admin' AD role
|
||||||
>- The user needs to have access to the machine, based on machine group settings (See [Create and manage machine groups](machine-groups-windows-defender-advanced-threat-protection.md) for more information)
|
>- The user needs to have access to the machine, based on machine group settings (See [Create and manage machine groups](machine-groups.md) for more information)
|
||||||
|
|
||||||
## HTTP request
|
## HTTP request
|
||||||
```
|
```
|
||||||
|
@ -34,14 +34,14 @@ ms.date: 04/24/2018
|
|||||||
Follow the corresponding instructions depending on your preferred deployment method.
|
Follow the corresponding instructions depending on your preferred deployment method.
|
||||||
|
|
||||||
## Offboard Windows 10 machines
|
## Offboard Windows 10 machines
|
||||||
- [Offboard machines using a local script](configure-endpoints-script-windows-defender-advanced-threat-protection.md#offboard-machines-using-a-local-script)
|
- [Offboard machines using a local script](configure-endpoints-script.md#offboard-machines-using-a-local-script)
|
||||||
- [Offboard machines using Group Policy](configure-endpoints-gp-windows-defender-advanced-threat-protection.md#offboard-machines-using-group-policy)
|
- [Offboard machines using Group Policy](configure-endpoints-gp.md#offboard-machines-using-group-policy)
|
||||||
- [Offboard machines using System Center Configuration Manager](configure-endpoints-sccm-windows-defender-advanced-threat-protection.md#offboard-machines-using-system-center-configuration-manager)
|
- [Offboard machines using System Center Configuration Manager](configure-endpoints-sccm.md#offboard-machines-using-system-center-configuration-manager)
|
||||||
- [Offboard machines using Mobile Device Management tools](configure-endpoints-mdm-windows-defender-advanced-threat-protection.md#offboard-and-monitor-machines-using-mobile-device-management-tools)
|
- [Offboard machines using Mobile Device Management tools](configure-endpoints-mdm.md#offboard-and-monitor-machines-using-mobile-device-management-tools)
|
||||||
|
|
||||||
## Offboard Servers
|
## Offboard Servers
|
||||||
- [Offboard servers](configure-server-endpoints-windows-defender-advanced-threat-protection.md#offboard-servers)
|
- [Offboard servers](configure-server-endpoints.md#offboard-servers)
|
||||||
|
|
||||||
## Offboard non-Windows machines
|
## Offboard non-Windows machines
|
||||||
- [Offboard non-Windows machines](configure-endpoints-non-windows-windows-defender-advanced-threat-protection.md#offboard-non-windows-machines)
|
- [Offboard non-Windows machines](configure-endpoints-non-windows.md#offboard-non-windows-machines)
|
||||||
|
|
||||||
|
Some files were not shown because too many files have changed in this diff Show More
Reference in New Issue
Block a user