From b2a7fc3bc9e14094df5a9113f08a0638a2ca4c91 Mon Sep 17 00:00:00 2001 From: ImranHabib <47118050+joinimran@users.noreply.github.com> Date: Mon, 13 Jul 2020 11:07:10 +0500 Subject: [PATCH 001/915] Link to deployment of PKI page As suggested by user that content is missing in the document, I have linked the page with the deployment of PKI certificate. Problem: https://github.com/MicrosoftDocs/windows-itpro-docs/issues/6360 --- .../hello-for-business/hello-hybrid-key-trust-prereqs.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/identity-protection/hello-for-business/hello-hybrid-key-trust-prereqs.md b/windows/security/identity-protection/hello-for-business/hello-hybrid-key-trust-prereqs.md index 5a7e9bb20a..898d43aaaa 100644 --- a/windows/security/identity-protection/hello-for-business/hello-hybrid-key-trust-prereqs.md +++ b/windows/security/identity-protection/hello-for-business/hello-hybrid-key-trust-prereqs.md @@ -76,7 +76,7 @@ The minimum required Enterprise certificate authority that can be used with Wind * The certificate template must have an extension that has the value "DomainController", encoded as a [BMPstring](https://docs.microsoft.com/windows/win32/seccertenroll/about-bmpstring). If you are using Windows Server Enterprise Certificate Authority, this extension is already included in the domain controller certificate template. * The domain controller certificate must be installed in the local computer's certificate store. - +See [Step-by-step example deployment of the PKI certificates](https://docs.microsoft.com/en-us/mem/configmgr/core/plan-design/network/example-deployment-of-pki-certificates). > [!IMPORTANT] > For Azure AD joined device to authenticate to and use on-premises resources, ensure you: From efe389ee3bf4f59a53bd47737fa6e2fc6c2ff778 Mon Sep 17 00:00:00 2001 From: ImranHabib <47118050+joinimran@users.noreply.github.com> Date: Mon, 13 Jul 2020 14:45:26 +0500 Subject: [PATCH 002/915] Update windows/security/identity-protection/hello-for-business/hello-hybrid-key-trust-prereqs.md Co-authored-by: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com> --- .../hello-for-business/hello-hybrid-key-trust-prereqs.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/identity-protection/hello-for-business/hello-hybrid-key-trust-prereqs.md b/windows/security/identity-protection/hello-for-business/hello-hybrid-key-trust-prereqs.md index 898d43aaaa..1772e4de58 100644 --- a/windows/security/identity-protection/hello-for-business/hello-hybrid-key-trust-prereqs.md +++ b/windows/security/identity-protection/hello-for-business/hello-hybrid-key-trust-prereqs.md @@ -74,7 +74,7 @@ The minimum required Enterprise certificate authority that can be used with Wind * The certificate Enhanced Key Usage section must contain Client Authentication (1.3.6.1.5.5.7.3.2), Server Authentication (1.3.6.1.5.5.7.3.1), and KDC Authentication (1.3.6.1.5.2.3.5). * The certificate Subject Alternative Name section must contain the Domain Name System (DNS) name. * The certificate template must have an extension that has the value "DomainController", encoded as a [BMPstring](https://docs.microsoft.com/windows/win32/seccertenroll/about-bmpstring). If you are using Windows Server Enterprise Certificate Authority, this extension is already included in the domain controller certificate template. -* The domain controller certificate must be installed in the local computer's certificate store. +* The domain controller certificate must be installed in the local computer's certificate store. See [Step-by-step example deployment of the PKI certificates for Configuration Manager: Windows Server 2008 certification authority](https://docs.microsoft.com/mem/configmgr/core/plan-design/network/example-deployment-of-pki-certificates) for details. See [Step-by-step example deployment of the PKI certificates](https://docs.microsoft.com/en-us/mem/configmgr/core/plan-design/network/example-deployment-of-pki-certificates). From d46766bceefc57e2f3024b2ba5237f36b127dc10 Mon Sep 17 00:00:00 2001 From: ImranHabib <47118050+joinimran@users.noreply.github.com> Date: Mon, 13 Jul 2020 14:45:51 +0500 Subject: [PATCH 003/915] Update windows/security/identity-protection/hello-for-business/hello-hybrid-key-trust-prereqs.md Co-authored-by: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com> --- .../hello-for-business/hello-hybrid-key-trust-prereqs.md | 1 - 1 file changed, 1 deletion(-) diff --git a/windows/security/identity-protection/hello-for-business/hello-hybrid-key-trust-prereqs.md b/windows/security/identity-protection/hello-for-business/hello-hybrid-key-trust-prereqs.md index 1772e4de58..d595c23de0 100644 --- a/windows/security/identity-protection/hello-for-business/hello-hybrid-key-trust-prereqs.md +++ b/windows/security/identity-protection/hello-for-business/hello-hybrid-key-trust-prereqs.md @@ -76,7 +76,6 @@ The minimum required Enterprise certificate authority that can be used with Wind * The certificate template must have an extension that has the value "DomainController", encoded as a [BMPstring](https://docs.microsoft.com/windows/win32/seccertenroll/about-bmpstring). If you are using Windows Server Enterprise Certificate Authority, this extension is already included in the domain controller certificate template. * The domain controller certificate must be installed in the local computer's certificate store. See [Step-by-step example deployment of the PKI certificates for Configuration Manager: Windows Server 2008 certification authority](https://docs.microsoft.com/mem/configmgr/core/plan-design/network/example-deployment-of-pki-certificates) for details. -See [Step-by-step example deployment of the PKI certificates](https://docs.microsoft.com/en-us/mem/configmgr/core/plan-design/network/example-deployment-of-pki-certificates). > [!IMPORTANT] > For Azure AD joined device to authenticate to and use on-premises resources, ensure you: From 8efa046a314e4ba3cb053801f1771fdb1ebb2c23 Mon Sep 17 00:00:00 2001 From: ImranHabib <47118050+joinimran@users.noreply.github.com> Date: Thu, 30 Jul 2020 08:15:55 +0500 Subject: [PATCH 004/915] Added certificate deployment Updated certificate deployment for WHFB as suggested by @mapalko. --- .../hello-for-business/hello-hybrid-key-trust-prereqs.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/identity-protection/hello-for-business/hello-hybrid-key-trust-prereqs.md b/windows/security/identity-protection/hello-for-business/hello-hybrid-key-trust-prereqs.md index d595c23de0..1ef40f8957 100644 --- a/windows/security/identity-protection/hello-for-business/hello-hybrid-key-trust-prereqs.md +++ b/windows/security/identity-protection/hello-for-business/hello-hybrid-key-trust-prereqs.md @@ -74,7 +74,7 @@ The minimum required Enterprise certificate authority that can be used with Wind * The certificate Enhanced Key Usage section must contain Client Authentication (1.3.6.1.5.5.7.3.2), Server Authentication (1.3.6.1.5.5.7.3.1), and KDC Authentication (1.3.6.1.5.2.3.5). * The certificate Subject Alternative Name section must contain the Domain Name System (DNS) name. * The certificate template must have an extension that has the value "DomainController", encoded as a [BMPstring](https://docs.microsoft.com/windows/win32/seccertenroll/about-bmpstring). If you are using Windows Server Enterprise Certificate Authority, this extension is already included in the domain controller certificate template. -* The domain controller certificate must be installed in the local computer's certificate store. See [Step-by-step example deployment of the PKI certificates for Configuration Manager: Windows Server 2008 certification authority](https://docs.microsoft.com/mem/configmgr/core/plan-design/network/example-deployment-of-pki-certificates) for details. +* The domain controller certificate must be installed in the local computer's certificate store. See [Configure Hybrid Windows Hello for Business: Public Key Infrastructure](https://docs.microsoft.com/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-whfb-settings-pki) for details. > [!IMPORTANT] From 451f1109a41731b78a5a0f15a3c55acf9044ebbb Mon Sep 17 00:00:00 2001 From: Beth Levin Date: Mon, 24 Aug 2020 11:27:34 -0700 Subject: [PATCH 005/915] acrolinx and new section --- .../images/analysis-results-nothing500.png | Bin 0 -> 28058 bytes .../images/atp-download-file-reason400.png | Bin 0 -> 18534 bytes .../images/atp-stop-quarantine400.png | Bin 0 -> 33150 bytes .../images/atp-stopnquarantine-file400.png | Bin 0 -> 21044 bytes .../respond-file-alerts.md | 87 ++++++++++-------- 5 files changed, 47 insertions(+), 40 deletions(-) create mode 100644 windows/security/threat-protection/microsoft-defender-atp/images/analysis-results-nothing500.png create mode 100644 windows/security/threat-protection/microsoft-defender-atp/images/atp-download-file-reason400.png create mode 100644 windows/security/threat-protection/microsoft-defender-atp/images/atp-stop-quarantine400.png create mode 100644 windows/security/threat-protection/microsoft-defender-atp/images/atp-stopnquarantine-file400.png diff --git a/windows/security/threat-protection/microsoft-defender-atp/images/analysis-results-nothing500.png b/windows/security/threat-protection/microsoft-defender-atp/images/analysis-results-nothing500.png new file mode 100644 index 0000000000000000000000000000000000000000..65918144227d37a69fd7bdf29a4e2de4787273e5 GIT binary patch literal 28058 zcmbT7Ra9KT(x^$W1Wh2gg)`J0FnDgxS?gcx z-v9AF?Cz@G-CYmed#|s%s=`&3WiZi*(GU<2Fy&;W)DaNg-29Ut-=X{~HOm^5|5a~X z)MX?PD#u9=|0zfo;!5HO2sN?j&&J6A^!JXk+AatPSbhI_-Xt+%ksu)0vC2t_13e8+ zS5bdt%J|;DoUfgo-mZDWvcTtK3AQ7v&BMs1vTxr9i%I;TX0<|keIKCuwr^u?hqg?& zV_tAItCCm$yknlZ=`_p2!92r6mjh*c8_vFUcX&O@Ir03xakLuXETkY~=&wZcP4~Xg@koVaSo3TzU#VIeXn|IE{sF~Ri8)G{7Z+E}v z5yOkViNCRAB??abx}JCYGQuOG45mU41vy>@k_v8EzNQ)zvoa2)kibXsM2jO{B@8ar z87q_grkLk}Hxnz^`_Jfq2Q2!7T!sFJ_TDlvkg$ItsR;f>#+5=d}Gq@$h?+ucVRh4 zlRF$@_?nZOn-`I8`owP_(jD0HdIC1bMyynw-tHChepJHk(BzvV{JrjTC!$fIBli-n zAIv(Qf8xqM=4OsTk{@lVByw|OG!6tOhztW)u7Hh}E1 zx594%+jO^ER~jkgO$-0HL+<@^`x|CzD4lkPU&B-Lc98xCuIy|4wcb}DmE%&@Izax) zNah~<-Ra^`e*#0ojK!30`b2*%Y33U_VCJ%ly%%EzE}#&F-_veTd6>jIO_VNh##=cd zF{9Va2xID1V}QwEhjgX)VI}g0zhDZESM#)?o%wNUmelj7KEYCI7gySwL~N%{$rB$Z zx}pYOvr(nun;Ve`mQU)_JOe8ypIpy=y|`Bt?aMabj`*C`!BxF?v=!+YFV0xD$6jOz zU4O>oZ1#V26Y)wqEi4*vbe#7CFGKlsSLEk1wFx_1`HDv~g_;uq1oC0o+!^^VRg)|0 zmBm$THp(Fa=TxLZPFPhJuB4~P7>~57+Q7<67Y2SAEF-wHqtUsaj&u}tu)w>h92xId zT~Z-kG1p-xiRX4<$cvI>#ciKmd#Fl!`N-5FB7e@9}sF|*GyZaXw7l999+*`(j({H$@ey8>`N*tiH;rVAd$SKroq=sy0CKXhhtes~{wAiv21wWAW}##)^I+bmqEI^7er@T+fvxcD*%t-(!CUq$@u=tnzW% zD|0gybES?lF>v_1o`Lk-N;R^kB$3@XJ6hzE*TqyDpZAGSZ%{>jte49~LF@;dt+A^I z`ulIiwN|G>F`3N9mjk=yZMQ5vO1?nXsA_nUe!2fmovlvkTMc7$m{)%}_+aLqYj^6b zeSo}4Ud7qx9ikoc^SsKs(dN}Isppmq=@Oi);m%SbG-5FYFp_3k5~f|9Hkmzh!g_RP zTTW$uhm+v5?0Kj~Q^Y{Hw5{=B#XCDQ{fz{UMGc>D>b?PAupr4x&jB-EPf|9Eax#3< z)rwW}&5#*Q@U)J5Kx6zHgH^x47KP*w8xC|L(l1`e(Uxj$%6?XYEkojFBq?=^i#UhX;J zQS|R872A!9;(BZ;Xi6z}aQbgQK#h3$UU+I(jeAQqGf-*jzT3YQ5iusbIlnR7N?9K{ z`OR*?4_@KiZ$d{?C}`+-o6#HIDFOr=k|th(AoM2(FH|A6 z&+0|X1paugRkebr_k@@XB9Ax+vmzoFR9v&6Q}NqT>r5mBY5jduY248cD? zL%wa5-4*SQ+=OB&%d4DF8}If?JuLJ4?(uEo(lRxAG%yLB9H|px8r6J8u&Q8k?V6DssNt==iLFN?Dn?PqhE4FZaTXJh{-R`xqhS&Z$ zI$~C}+!Ij|TPIYSQnJPu(fUjNo#AUJt9twSH?*aYRo!+vNdynyJ=Xh^MnPb@(DkR3 zk?^&VpRf-@B^pI#uh(3rvV4>x0!h5mD9gk26^DIh4Q%Evn`ETWWTNn#wy>|FtUe&b z*-fB7CeP^jyR&9<7WkSsYj4p$pZ?7L;x-7JGzMd<+agt z5(l%jb}!pjb9C+`GU~$Oxau1N2^44ka8hZ@u->=swNoHyzxsRu8J|f@ zprZi3ft&DK(gtwfuj2m)+y9b**UlTmFpGlyHRyQ)JLj|O?aP7y+M@pk6NF^0=CHfX zQphiOyJTWx5;dNjU~_FE^IIfg?YG3Ul5Ief-RARDZ)Tg8+)Dmf>b2o^xTZ3@w|K3$ zzLKM-P{6AnbxD8oy0ns_Y?eVT)4~P9u8iT1#d0ik*q?jz@;%al>*&%wq3?dqPMZGy z<>fUc6U(oy#6k8@n(eCT%wNPs&a-0H>KJ|j@ksoSUW`o%>BD*(|2F^S8}{5T7PDVzEV2q9a!`xd@=z{U#P!FS5X8$-BF(i2ltma?e-nF z*Y9Is`#g{o7L9J%#5&~NIE(l~DH|U;yFT~KO35jqQi@C8K)W5C2LW7<6&rxal6CRR zSh+6?bD_d~N!m4e&?XT>GEEsz36#tD_l2dlXEpciyn@-2&8}OLzH$aNX`AU9_FBnu z7Gvft8m@J>jbnYqq(e2ix}Lq$Yf=AQWV zbtXfYQ}p4aH=2~S(eWwzTF7OiXNZhR`!7O3C&k57z(1H&tj{x~$u-1I!Hsl7%Nj>7 zh`kH=O&5>8{EN)tv><5x=g3btYx&c`QgG$88=gd1Y+}@|UkC6r{PwngAD3j5yLDYS z)du(het8*h^p7(AssA^7PE3k!)~`!@#JucHY`mr-J$ZgSVYHK>48He`XYC(D&}fUS zqB!t=;$8BOvLD0RsB8(yrvHbn6x{C*{)4s{pVyrU{t4gT{g3`e{~cv;>YM*<=>LUW zvA3=NSePC0;H>>xc|HIURVeY_B*FKEi>+>DH~$6UwEyWNEB0Rl2>)LO{@37(cx2a- zkzKD_KfUvo?2*Hp_Ew&yN9EgzqPu-({q@GKByZ7qXRNLa_(TbI3JRQuLhW(&;n3^F zulU;k5$reVR8o~_u_f8odHuBECYt`7zSpyP|897r>fz6H$=!DI_|tKE>5Ctb|9)Ao zqpHDYa(Jn#ZSHw$IHwH*IzO+cX}RydN(bK@p1qy(m1s|~!8*Xo_&L0#r<~0vxnDiR zIp51O9yvkYbM+=E-MlnS6FUpUn?hFCUzuc9j?c*Qgj6MZEd;=th@kjwPqYMk^uqTR1<0Ibssyk}`HzIs@K03Oud3K*%Nu5a|4zW&{pCo7T~aIyc4r3x7; z@Ug1v@kOZvlycv%@I=_)+uQ+5&MvVr8|K{I8Qy)1GN63)<`i1 zg73hU7-6R@GiO8Kd)3-CzF{a6x^3AOz@(ALCwIpS+qBkLm|_ZIqV{eQ1Dwua zxwjN5y*9C9gw87ZBIH1}@=e=Y)Z5ToncH534|izUmEaWb;ilO{tI3+ZQv@6$9kQyxgu9(u;jT!F+rd0m z?{?eb&>H{xW+^>`h&-dPqakfAz$r@H$yUE9DvxpSVRJ?X_N-$7zVccMwOjF=FPUsB zCOja^E$Yn9dk<18{jt8hCZXURDzJ92oaCS)$xamloU7~%=!dXtjnR78fK94X9tXaU zW^bGUqvIs2L`I6B_$LfX9Tm*8y!9sDnydL0Gb>su9_L|CLYX|AV@jAe(Uxz9`xlI` zZ2Lb+%Y6Rm1f^2Roktd+aEvU@J>YcZcm%j+Tj%Hiyww zFmKve6tsQj=u?JOlvAXa2YHQ-$dUvpv=DOK;`{+1>f4cp0li}5DZBz^t%q63?=~g9iX<71F~q`ZNJu~; z(1)1}K?tL8w~hA%8;_N-vuiMI(wW+|tEppdUG(1FnIR;XnE~_mRtY0kx%6S_p^U2q zZe{Fg)R%RRbxiGU%4L%>K97cA$E?KF=mybWI<&S?H*bb(zRht{ZzE^uk{&xE7C1aU zFK#OtBr~eNa^BlPPPW&Jv2l&7ykjZn5zKO-c{C_5N8fS8+)+|w(s)x+#UUo&i`S#utmSB|h=_{~ITK3#8$FsIfa*PKmx-mGZK=zbgP&}LYGH=6Srr%Yl-U;J|BEFH0GKpd~ehycD&U*5@tpr*IxJ1 zH1Xsl10+u#wPvpp)~wmZ>qN3vYhGV)wyY|ef0wFo4K{TJI7of2>Zm6Bn`(*1vKRkp zzxOQvJI9OkP(_-_X1OYK`1nt1My1a3{!seqgo^(KE&X9Y=6Dt5a9ajC9^wIQ1|Jv_ zf)|OuQIxGut}m_D#W;Giy)ZBbjvLGH0@$=bw(U>ur8qI7P{)3Y`6Dd*bgT z7!&8nWJ(K-oZ#5JD5!Ww5)P=V;ep|BGRlE?7&cr%Q#SKcI__AyVxLN4NvS@6l>*J0 zy3T?=CW)l9&d^ogBeUf#F}?o>gf&K6S4AViv`~4M`t(|H!%VVWS1k#mPG|Am(0FJ* zdN8#a?v{m7epk2)jW3h-hu)UVkzmO8JQXv(2a7AV$3s5fO%8PYaq%kkwF+WG%z{oN zT@pUEX{F4rpS}BK;qNXf_YdCZn>>5D8)D^+`(>{>1@wJItx!AXFhs#S z(|6dE`wQ=JEG({j64$BNZRq3k@{T&I)t%`>f9zneocrO~STe+ntHWHlH@O$(+=-8EKv{BC-?HV87< z`yW0Xg<7o)A3L;*OF5(M5=@w0Uga6;=O|b4F{otseLRUw8TnJQ`otcB0swe^^fuzU z#iJ>l$d>VT`xqd14Knx%dHOS?E11)#$;?}JRmq774Uwln1(DOC-d$fE%18A!oV2Qb z%d85|Y;|(AYssu2@3(+Pa>BkR_&lZEs1&iBbFtvrP3-?-ckpX$J;QQ_pMIYel;sx6 zOa+$_P4<7_o0GC%Md-XU7|(Q|>TU|6i-9E)9p)F-BeRCKS`3G#=45SjR=J=0$Nvic z#Imbz{5sqpjQR*QaOAW=YtyQ6<+*(*ndO%OBzVN9-oH~OW9}K8A5I&&WlB%UyXukC zwIdQvM#y|A(h5>Pgs_@wNHc}Tra+!5VwaTB59w0E$<>m zJr?7Tok#*6yx=vo-XoSocg2nOU$znTU6 zX7p>X;4eM-m)zDKzdm%W-kmO2y)eTkgZZC#3p_a0JwseTWY9~&)r2{4)>2vZAI0Pf zy@7OdbV#K=9g|Re5u?Tj;$P!S+>BwDpa8Lk?+v%xiPK>bDs(jb@rCzNI6&kA?izgt zeuzs-wdbym#6ii!Fy5T)V$T(xO&HdVJB12vMyf>MBSGOEe-;|d2Y?Ira$gB&d?uub>Scuo|SsFTX178Z|s&|$v96pp2DZHlqw_G63tmt0wX$urACKh znF^t#{_QL@8&NZQ~k;j)j)DbOj}oWcVH$dc?GIPm+`^t8hP zpcDH!5nB6rnNjLEA|xxVY{!^II9q zcQ%?;X4}bQu6Q1C3HY+U+QI@!9stO-cAW`L8Ns-z9vLkUOGwnLD^B9oEP#mKCueW_?g+KeF+35Z(Lw&%(I2h-h2uXpj~WsA}gD7=%3Ke zSDw^O+W&cvx>?@9kl;BHTS|S8EV7J zi{+LBgFbZyg$(cn-a^Hp73Jep^z89F^;~WakiEQ;axC5*wHaP9g~1QfK@qvujUz>8 zrb+&q#6Z?|C&$)jh5+M_OxYPq3fkNim`9z?r6?V4fqPJAYZ9G<q6{Sx%~G&6 zSzf0BQwD{Kk_`z=Slny?wGBR_l_hD@cGM4Feusf(E+_qA`FdH4TgFWY*y_^@3>utL z_Wz5d#xPbRcgS#hDTRzNGX))PXo8Xk-y_TuPU>UaxKGcBD(hMEQ6=KzoKSs&HI-#F z2GGMYvr`WW^NNysYDY$Of5oKCC28C+e1L-WmAoNc0&qj0Aa>hC{5lfd2<;~7k-M@n?7 z|LPkWHq~1buyk11yQ1pqz?ergz0SO52W+?PP{l^||!_ z%)mS5#i7{PS1vOs;ui423W7aQPmJ}jv-d{`I?#;H{iz7#RjcM%)c+iy09T9(zY(gK|i5rW?72*7`Ry<)|moT|L)7?A_U zHF>u*vIaHnFL^h@2z}lXQBeHO*HHnhY}~0og@@&oRjSaE@Yn&9z85a(;L&u6p|o9F zovB8brsKov-fQlD3FJO@FzSbT6|!o{&!q9bSLkpOP(m@Bc9Z<24=JgHq}|uc;&9-* z^tQScN~vh}y^3!x9HUvPA9k!*Qc~&d#%^kQ%j<~EO`o$IGl=5M+~}$A7Up$E&`T1d z;5{?|rjv;(lb1cR3L1U2hHVvmr-#P!W7E66J9J+RuYe{YZ=1xe1% z@&dHAWKR;PeYWeg8$QSEeQc9=NP9BPXM`FPr;$SL3W&cRiBkAey&%pwpq9-sO8=Fz zU*U*ddVag~NLsFj87vmm%305GqFjx2et2-M9NGI_JvxRM8p(=VZyDpA9qa$~a>}Y) zuPMH0gurxmxN{_ilPz4O!cf9XjY`B%9OD)fhj@EzH(x&e2#uYHpygV!>W%^@OIfkJ zHJNwi_sZgthzo_9;2x}XBdcAVAWdxfbFV2r_xgr`=E%fGm}fg;&};`d=tyf+ZEVZx z>`5(a5GFK#N0iQ%vv5JkW8WFTPZVz5VvU{=Vnuvq`f^2s)P78S2=XnQd5Zf*Jjw+7 zx?F9K_&$Jk;GG350R#4Va{JtZx~nxUunB zH8J&6Uf8V$`5&yJcF3UbOBRE}zI`)#6-0#g#6S_sAu7P5d^MdBev?sH*AbG~qBJ9j zyCwX8-LsvKaZSsZDiEOjWvc}`AdS3BawC(Hmc}8*A6}SblcYj~s$hg zmz22tSP1?qje-K&Js7NBtOUDL)&R!}6|*Y=|!}!67I! zvkPHXCSm`4qPA`4Jn(%>olOc2VL|@_%(gX(<@?W+@lH{$O{Mr3NODBl!Ke?-Gs6GQ zehl{?IXG~wG=<}8=nJeJN7JzmB33z+?euX2KGxhrBRE#prS*f3qJwGTvIyl2E$XZl zQ)Nen^Y0r{E)2VVes)V7AC}cjT6O(a&~ZD*TgAC?M8}rGn8Vu zazl@~W*r*fpl8p|Hm*=eP2zj%kKKQ$?1Ot0~ZgLNXT37ZdWOHC#*(p>f+9P{!M zaaq4NKA2GX5(1vk0KB`U453RMv%GwYhT7yWesWTwPl;LF=ubNcJf=usm#!mycxi}r z2->fJqo~ZAMxH57p?)S<+wEm-%Q}smyb|D{inx*o5xthv3F_@ITTC2HIdFI@!&Eqy zEm=L``gy*y?88U$ifK{BDC>GJ6Dnb5(1H&RXd~+jp8(pmY!%vGyjF;yOmsVAh>#<@9GHi_WHF8U@)DV~RMgh5f&O(hS3Pcq!J zp`gW!_u-Vnv|_ulfK|;IOeIRc)wv4YD&bsz(t%b6K5z|I+3IkDTN9fhNROiAnRlJ~ zwbG7SX&#RvV&rf`ev=(cI>Ro9ulRJ?`-PZ;`-{99_M#eM8q_q4tY8(ofk2(7)m_J zUEZ?6_47)%o3Kr;un5T9kTZuF3pPwxf>!Nj>oL8OU;I*01R-_@*NQLXEqYP082^y# zp0TTo{M0VL!K07!c52e^3vk}aH^`VgL`Wd#mQJ%agSk=$E}$$yW**`vrNt*e-^Rq#Uo^Dx}(&H7Pqn?gda=9ubMo zAqB1bL8x5Q3l*lo*#^(zwe?vo3Vs?Tu33BzGjQy0GYT3}xJQ}cTI`5`qP^N_=s5hJ zi)1NfP?=mnUd{@+pP%1VxAL{xG~KQ?C(>;-`^T$D0cjd|(Ia1;Ok2j%bBEhMWJOI= z!VX?4m`mW%>2JPSugebv4z?E6g-1mI@k|68DAdF}_)ESDIRy?G3Vyqul=(DyN_%(K za^r4(cbw@?60JG>N6!a+1MyX7Wk1qB!ze!Q-Eq>pb%YFUO^9C?(?c;gb` z4@>z|-L7^mX_08Y>3GoZo;SLoVwwzH>Tw>$V*Qf;W%kzQOV>rmbx);lO+$HDj_3nd zlIGE&oz3&=+t#tdx8P{O+weK zcncu0zji6&B~)xoI1?U6BK3`ou$vAW)e@WS+$plj65Qe!0V=KokNes&nZC-S-4V=r z{K+*XZ(eCe@2&|rksdT##O?2W4>XP=V-){W=r}Ja}H;6-8q);b1REThx&R# z)j{Y*NwXf&@i&8sthZxD(n(p06lPXuX zzl3y1yvsh?{vAH^3vd5pd}G{a3RV=|%4!*I5ebu-!>r9(Zh%wBs_- z8O8X8JOj;1Ao*6d#@0GP^-V`oT zhFGvu1Y?i^(|DMZVP5dY)XYt(w3fAeyR}7&WmWs{ZqpP?Tc%z{XO_+&5UFU^VA35+KH}-g zf_G}jqkudMZ=48Y%*-IROUnk%crJCi%Uyy;QPT7E{yT*dwd@5#hD4hiz{b+Z9a3}=IsJX8?wDl8x1sPnpjn;-mT2ijVjqs9h$-1hf ztc~t<)E;$s9gcM|Ah0&lz4}DxiehwXO~*x_z7+GOR^qnZ?S^f)zaf~$qO^UcbI6ts zzVMM{&+zvSo}A&OHp>nuzNEN-gJ4qEFQUK#m}XZ=&1AcQLTX6LYsQjho{?J~a5^eF;zkO4Bha@W)JB7m_!M#!Pccw2<$1EdMk zaUD5SDMx8Z`1>re;GECuxZ75TL_67S4!!KNqgF6MOU8+UdGgIy-}~-F3wl;&8cLft zekf#EFc(2@RsHQ+oYs$f?q_WSjAPtf#+=0cEBdNKN`8@G zD%7;=* zsvO)JQh+o)qtP?{t*piMk&WNW>xlfCieBRh6r9M&k4$JP!S83pi$~MYH&BW>nBN-I94tG2vaTWrVjjB{W?HBY5ld3RU5%c-gAN$)YLD;E z$K`kgT-3J&KYDEgvjRuc0porN!6+7)-@l7|n{8|&^8?7UbAK&r1*24RUhG)Izn(6_WIgyL30kTz; zcjSHwtD)S4fkFHoe?dp-M}O!~KGQGsxm2Cdvhf7%XjR0xs(S7rS-7yU9bxqAW%OR6 z!+s@Y4&o&bn7N1y0)-1<3L$;mqtUl8uom>AcQ$Sb%cS+KsfI*wn=N)jQjNo3tE6OW zxC+KLCKah5IJ+lZApdPv`^9wGfn;KCSHL#i_>_>TMe26+&h%(a0pSi8Rxvpaq`f^u3$5uufbeUq94@#y^+ zI#Gq-@xvg!!QUJ#id3}uJ?jtdWu^ycW37um;AI{h+tZt<&KZ;1XxEFmeo|T`(_fGu zKm&u}lW32tG}JSfzcHMqYhZlyZ%{M~q_TbqRa<;)p~mP}7gPv+o7kKZ+y!o@>!e+x z`v5Kwy-s1W=q)Az{C}cLX|rS8 z#(L^pV=0q@qw~U@LP(BF&r{DXxga6p!>!9+JKdq$aioEUKjPy9+=oG*bJ&z>t!M1Y z)9{q-j$N_WMZbjOUGLRd4@ta5d`VTub2L6vbHgA&hN?RbOweeoj}_&AryUq*QC0tQ zgQ%^CfrVZ6*TeXqBhog@WZKqZ#tz%@Z>u5;Btio>O(^H)#@zZZl*7S(_f(|{=3&>y)UhuL%vL**<-mt$a4^k<^m<6Aa%zM zHf4|I$cqu?u=;*o0f)%95kzX1LqA)zd5^P{pc(C&ul)TZX{%jFipb+mF4EWRm6<$^ z)`}wIghc1^_XV4Su~ZTihYXG5;S_<|r%nqfnkF)}Zhp5nNS26Zct&Op5_&%1nPZvj zoH{r2G$Jfn?fE6Jx4L}RyQl*pHsv2(^&x?;xzT|m_w`YdEC@i=9lL9GLY_~w=?dtC zX{lys!(%>o0p^*4oU8J8?<2l%_SiPsY7OpOOuCloW?771ZoA$oag>6al9*?D-C9YN z13}mhddRCi5on`FkK?P=KLzK$$NdX<$t%Vpf4z|`HxxQQ_4qj2yXuOGd^y>OswF_D z#?3;<=X1rDh-(ToD5vJ?$!J|;mxpGgrV#(x_`^nkcGR*9z`i(G)opP;qdx7Rin?n| zC}2?HP3lAl%C6~Dz9Jp~P39E(R_7G6hlQ&%OP0vp;-DW=|(CCURyJO3Tm1<0t#n$;4Oz8 zvRQSR-e+xDXYGK@HQ&CMx;_Jtm8Ppw7vtQzK_s&~J+|l#;W2;-Do#9XiY+STK8Zkf z{+eoHt%bZF`7gl2vPwijPMm%So%b>=^xR?>3L6Ds&ccpfg-Wk1ddjb^Bt90UuyQzD zORjkQ)#wSVjPWuu8m}#4(yfbU3mOwbA)sn|)N zwSq~fDfW^3j8AJV#nvbW7ip>kI^TK8ap$B9fWoxdfPX*=E&l2!QN+<2v zc_8P)a-hf2TM*oK!0-ib0blzQ-hoO)$~gm5R~#x*K>A)~x*U}Ah0_>(K@!d5b9N96 zDl!k`CvgCpGetYw-F%IfhjztI2?KA7tS7W^q3zf=_1hW0`cDdt47_)Py?tUDLq;;& z9K-MNnl3IHRXADKQa0b8Y7;9eNQqWFML60_7VXEi3jbBq1Ay7YZBB%3p zUN82ML|?XJ&e?`F>H30rKM)J8o$*Rhv1CZSaXel4sLlwPt_B-1U!=GFvY3lLjTc=^ zDM$YBWgHY>lg@r9*?d|l^UkS$BQb95`CFuR-Pc~S>iX{Cw?Qv3U!h!LKXYg{DW&-? z_^k5<1MZd5Z7RVRygh_-8s#Vgk;KD?7LoA?6vZUPrjuPQY z(OacYAZQ7nJqLRp19RjW#lB+|+7fP5TE_|^lU|W;FDD3j6_vs(s>Y`_Teo**NaLPztU{32H3ThfDiJ8xH)&ye*@OLeA1LE7bf&1aW zfTF=(*7K|Gd1sF3-;u8EO62oro_k&|NVfG`kF~#ShWA&7bzD@_!t)aclK$riwAV;V zG%2MNv0E`pWyM|3+jf02St&e(qpqsi#qf~uJggWzpz~7)`~yL`c|l~~{U;P+;_7C` zJWQd-`wAUfuImvYA-Pj5FPqR#%bxYMQ3n9;j2*^C+-vnt!>x_CQyS3#+#$%< zl@oVCXy17)@_KUZ-bi27GPlG4-4k$oL<;^pm%#%i|2wPEazX5MQr8pLNHQzs`KVm+P1;!v>MRP9_ac!x z-db>L;~Pq2+m=%U5xA!Rgs=jz3Up}0Qq)b}cd9#Y3}g=d#<=ftGO3-AVBz%I_kORk zD{;53o~sM6SHI4F?tA=M_q=WJMc4NfO&7+^0YS6SBU#yLS{YheE_MfnWOjy25w*5V zThek*D}V;hZ{w2)0{o=m9YskC)umtU+bl@@A9nqXl#Xti-%2}BC`umrsli_gp}&fm zB+o+5{}f8X-e}5rsJ6Gu$qwyxhLUfN7(Sp_L3z2$15bk)(A{B2S6A-MgLW$8dILe& z{vlnjNBh7Fx2b}_U+x`ank01R-6PAfC&&t(JDmOl^W-f6GVe$7nFGYF`;`I@)#fKq zD_w*0R^ir(@pIjLwYgWZ1{3>%FRaB9ajew9)rP%gHDJYM9{;Tn71EKfq}Ja0H#vQ5 z1&(}rLGQpHG$di_4PIu7I8Cch9}J(jG}BUW3eOCaD3+S9de41IHW^s6a#|_sIi8fs zIFS3(}CC6XO#)`ghB13UV>o&?AdmkOiU`>SiUhto1*m7t?XtJ@BqjW~nVNGSPS zBgkt{{b>#bdFE_vQq0Z4MiA(N7(}(;c`WR6Hqq5*SN8qm2Jg#HaaIotsTUBu=I#VB z8qyV0;D)>63ui`Z^Y1#}Ca;%ya<1p$IuB;REr5<<-`=%UY6+&h!i?{4NEtWx?6besB(fOy`@+|m9F6D~i?sJ7%;%OAhKHrzaOb6Fvys<5Xx zA^I%96-5vGGdsP$&MPk)N3phclnxP^yc#iKZ_BZ}z#^-2@C)7*r#j)gdBt9Nbeq3V zZaY#79>g)D*f{A|n03WscX;K14O{O$?=q+-ms1JTB88$|K{ox6q>2)4N%x=oNBG|6 zrwP&}-bHW%d2SOj8wh(Z%%$C&&ble`w+eu3$REkbe~cX&g@%3}{8_1QE5l0Bj z+G5Yo&&!BEnfKArK@7B+!YQTkK6Plf3n|=+O*j_0EC_Qf!MerjO9W~92g=aKzS)|5 zlK%TaV^nVUV5rX3!v?XR+H{g(z0~uuOa%a3RXlpei>gm%H@>E$7fuR82x|43nJfzl zagasY4AA*KD~-lEvmp8{KQU+=HiLp*+EK|FC!#AGMi)!%$Q?JRc>38eK*F1iB#=u@WnzUN7E~*PpQnJ zEoB*m&Az|jB(ICQ0N#&23((vpQ^vCv=gA1V;ZG~-_y5_y;-TZB4U@@+{y0D zoyM)2&XA95BB*&!e=|$qBzOBtP^B+Z{!~YTD93J0syTRz7NIKKs;FTW?DW`&3`bx; z;sB^E%WAqHZld$lI(IXn=%CS;TGO)dlZm=fg!cEB=}v`HvPBeGb(0FZyzlzsnUJ9V zPF*;0q0jOJnm?k51xjj*Y*Em3DxywFjxk`;s6$H_S;hONr_S_qKXzJxuYZ7<$R;&4%@*&H@?$F|QrQb1kjl7!Yw?pFpZL>n>Jbgr5{AFjyLP>!>bn5+ z4H3ULuAn6L11{+2Y-wwgFMHi0dsSM+#9cgS5e!1+)OZdcwLz#s+nQ*El%b$GCRtxu zJzf7Gl-z)~2yd5Z!BOx%C3O1s{TJZvRzboRFkmu1IZN3az#md=ww1{|OI$aEkqHby zFzG2qtk-z3>R9gcY>2k*KX{Q02X>gY_5RKW)eW^drVD`P_RUJOI~cM%yEpkz7=~K( zl(in^r+eu5k^oYDncSlaF=oSO-@s5FYooWGZeil-qAE{6UgM^&ZX z0B*}!ZsjmEwT7Uqh|IcKc=JNFG4l2IpU!8a+9-+)ldSp!MytqZBS*5S9Z{bFjQud* z!XoO#bn>!05@j7djJ3oLy+4foyh7Rk@@t(RMv0{LI-yZTanNx&n-iIkZ;ppsUIJhy zhK~0PY2btzQ^y56sevL~V-g@{5RDXa=_9O2)0|ZzDco_(WY%faE|ayK+I$hytPjc5 z4a~{NECG{q?}7Q2L_-NbmL5@=#(7^brKDg-CNt+>ZLwSHde6G4XznhGl`o~Zx2N_2 zpDSLtVh>gvT5PCF``;1S0mnP;Y)V=J1@j^s8X*G(=i#R^xj!;Q=l*w3!@ z!I-i-Yg%a-C>b+1YHtWkXF(_7t#BR8vdQb%eU*U=-dw)Y;!)Gp-0&L3>itn-H}ia!&Y$XzQ)tphMJ4cy)#hzppI?ec2hEpz>3cZkSDhZ~f)$@xNWOetg{i(=|0XWnQ(K|>zT$J1&8EoF0jhq(kQCBv|0stF-^|M|J@0v7%W7AcX~Y# zGfqwlwaCf`w{za5`zw}j_hRUR92nK5J=-+gN09Uj0Mz}8{&}Dt!5xD=!J3@U*m5Fd+=NIW&UXT87OX!_9#sSOHlFsV7*^6EM1QAQt!dUJhI27+c zS@(TaZF>$af+eFn`a(+fQ+Ou%&-}iX!F$=_KBK;w0*R4SpQ9WNQR&tMWX+#Gs|B$5 zJ@ny55#@(tr*0iwZr>>J$%aK2^897mM^_*uCZcs&LwmdadKmJbxhv=0Fqvl5(<8Yp z@jYx;rQVs6G9H?*w)4g4F;LR;rvutzjA{>uQd0to+5%huPi@~B)npf?`}y%97C;dZ zkR}#TdXr8-K~Sj@dI?CC8fs{Ph)R2wFGTZ}i*vP|e%Zbp5TUr0WcuXceE(&w z#zs6Q{@b=A2SKDnwz&9b%;{3Vt5S4lAzUJ7!mTu^N4$BSJ?pD!{N zUH^wz#(gIJ;y=Y2t1Wqp@tAbjkoy@@ZQ)iY$F&t8@B550Q`ccecDJ<;b?m+~$#-k}M9=%;*xvJzf_@q|Xb1rH>I=(V3 zx9z9YnBOzJMBlU2Twe(G#mS}+uCGE^_qW2*T(0Ei%yA8TEtMBx80`OPrcu{z@==}J zNBG!F5ER3D2-m?y&9Rik&|!bLq5H>uPmT@OEAsrb*!;R6xTTnT8nPL+W-bl-O|G51I!_g%|&dig@{FuY6VGZB0`koQLWb?WlYKb;%!V9<0o$YPT(y^vff3K>g7RlHz{0(R^n77k;H?Q> za${(*5maZ~Vdux_H>BKg?=E)E%w8T@y+z>jE(re3T=Ri$?-rB8;VrSW-!WwMnGj)lDymV6mn7FZpP?fyzGR<#-As}joYs*38#s}Y`m@QR zHf$dU)*S%^_rLBa`8=5uwBz6;YgDrX*v^#6s2^N`e^Ib<{NgWOMp|R&OhuW{d3cVtmHHFcw||VqV@KQ6Qzp-W z{Gj1BIUVH03t{E~=wl6?(YIv+F*bW?xqfjw^<5S^L`5 zIylE=UB0@E42(*1f!7Uh0~7It*v3;0$l9j}Oz>;e2zI~$@wEZGAO$}@b6s9GL`8flva3le_l3^` z05heZ>9iDqXHpZXEH%EM_Zcq2Rxc_NQ)&3TKvBLYq-&?I+R24AGPF6l5Wkv1B=gJqD2jy&pTh^ST#&KOmr|>6I}7w;FrdN);lI$69evVWEcTA0PSB3WWE2 zB6QQP9(sH$OG=!Ez1WGfe-K;$6Dk|9>30~hQ(LqnPZ;6c^oVh*EaCtfD$Jh}U_7P$ zKlSV%X=Cc21AiN9eX8-RhNH`3a3{m_tI1%H0Z?d)PaC%bJ2ec|#C|v%>h-JCgWHdn zQ!@Or0Nl?f-ZKEE!QA9)Bj#Bph0%tvJ%MZkmzc~zGBI{rVAEX~f&OMmKpk(yu#XzO zZQe|T?zC9wIPnR|(IC#~g){OzODS7yiLk8Pyz06JYuUSV4X}Ghan>)*T=5t{GdI;m z0Li}`DB+zrY&|7ykvYCp9f`!|kHc`WimTmN60_Q2V^6G)L)){R*9DQ_AaoEX^vIna z&4ep%Ib#zdq|59^!j|%>?2p$_1-91|I!oSN%%E?$l83GQ2XxvtpKm>nf&l_q($icr z-z=KOD*lveX<6P;lE{CzINpLc2Am!X50AjA!lsalE<|<`~uQQp9yPciTep;zh`2ZrvXkHlyYBs?un6(Mki-kN5zCq!XSKpE@hpBw$S zEYOgfzL!ONM?uR8!yR-?N+fNy1cs$$Z3M2apQK{F*DTOav!ki6qJ!rUDeWR@{J4~whm2s0duR1Qa8g^Z z%0Q~-r=H=36^W?1L4EJ|;4;7Ud3}!zGy@;L*J%BheJhUsrQ@JGDoV??CNEa7D}sO4@0FO z8CGxd(&v1dLgWGtqGtlec|KlKK(&6@{HNe8zKTrZH92fj8hv}~H%CU$j(yZW{r1MS z5xFs+HNfG~189F&{}p}-F8>?qD`K~(V|Ux(R2fYo?Kw0x@k}n?Dyo2w@34D8ysQo+ z?th;3RLlpxhOS;kEFX4p@!-ub^h|#luSe3-r@P5;;A5jiAIo$X^%HOe#N@B|cehY! zmaK2=*5Fs6=rJZd{;=Hb4EjUYdqh&xe=G%E7WD&0yjoO?>z&X?&8@rW>`lG}l_I6? z)54JW?~x{MG{MmgNBQ;ivVt7guTmGUGi`6B4l&$dinbRYGMq*A+@w0=es%v@7;t#7 zN6C<%2l2e|WPcL4vQ#cSS1Ku<5SI}JJeVV%+?MeuNR}J3(ZIH67m9_&mp{>f$mRCb z&*FYaQEJhC*W}f@g@^Qh?svFem3d03#y*xCipD_1= zM{Zw04X6KzpTI=Qdq0d79j*-fT+Uh+fX$}r{ zdAIPkJ)d_)+Dd=<=hW(sE2&wF1Hmn?E!$*Qo~~K9i;8}9v3k3Axj1?Ad(2`q=%6PP z?&)R{=H~$Bz6M>q+Ma*w3D`&Y_wQHjYGGn|e_NT)j<$lWvFgGVXJ?A`E)WrhN333> zBchY0+8Qeb2aO;drzIUUtcD82vxv)~s;`=GDxIMx5!(HC z#3V8%@*ev5-*z(Hz;fLY;0awF3g6`Z|qvy1FDkqqnIrQ}+XDt>ub2_+; zN61BJrkBRrc{fHVD6|QLkH0(zp%rb^gQQ%poU+;AIeplY;-GJ0kQWp^4Y z?#%zYUK|RrfLbzqf8ad}Z zWuS2bH2z9dK{Aw#>_en~G#2ayRl!q^Y|!7IF|a3V`hSRDA35k#|FLu>y_ZyJgceHC z*3qHOiGN)UI7=2#zhw22s|Ohy7}{O(vYyyyQ)=`y<@c9N>YU3oIKxuQy@IN!YQw>4 zFt;^GtivxvCD$2!)dKoqM28BgQf{f0Mig`aHwp7ImvXCQdX{!8<;^~|F_Bemig>Tx z(n=yWt2o<8lm!1BV;EKT=G84$QHCRx_UoI)$k((yf_yrUz4}IO!FktoFFfwghHlQu zNgoa2^o*>1z3SpgstS|&i+q`qCcS*piOFg~AVE)Xb7X6bI=e7pX^}?Ka%4j<+xiM( zQ2M9$dwF8JxYsdiX)Y;(y&G(wC5xyrbrhm8NalJJ@f!1j_$lev2MwM8M;2U6E`FgR zL(m2NTTM~p6NhR2;DNcteSU5&bK_zq=LW>*CgAznUn zez{w%!BlYLKLG1om}4vKl=eJ|ybja&O-8<=(He`2%}zi-mH!x3A{zAWb|Al!4~ zE;X|}3V+n_c;d=u&J9mnnzi?jkO=pG>s9}yKfj$xO6LQK>PtExCnQ0 zH&^f?hu=I~Bon2Ac3Tv`phwhG6maH3y!2tpr`~?(H)hhA^arSo)Uh!jZp7bkt!}Q$ z**}n(wNNsVT{g4G!onikWf_i5%{}#&uJpsaI0wPn2>^cnt?5|6NuK@wsnH|p_}&D{ zWv?yQy_zo{*(6K4W(<21wVRdP9WLkYI~i3wb7%J_cNeecl*q>_6AzaYf26d#N$-w` zX9x&~rFXt#H@=rqmcGp=%=s!Q&vs_K@5MKpjxQN(`8=(LdhE+1SCA>#~k@eHG z8vDL!9`tn8|C-p9Ia~TY?U3JR-642w|GO|O+S@p2>N8~}+Y#TkuB=~(?}jc$!jMwU zdvpTSrLQK%pJ@Vl8{lNod15KqhET^Jr5#l_o|%+{KHJ)13z-DO%#NVM70*P8v6(s5 z#ay|wPu}d`=<`ly<=n{e5Q*t?<043!s9>F|;W87df0&0#kZ|CLyUp56^65< zhjd+_C3_Uc(rpOyC;lWosxNt4GQ1&j!gBcvrDV4|8UBjjAz}lHDQy{$A}?|sCzFo= z*NUFwi%tt=OEY*ZS9ATgvuKPGWH|Dgpzn;Nx>`5HbAL^FFwTKdQUbY7qr zKh37Ud*IJB(=?}5DS97{g6$w`t%IddnMJ#OOq4k|!oB zx$Bmz=GTB_%ejqbXe~JGB>BEeP{v!IyUj~?unWD7hiJ|L=EoIca+Bf~e{3VW0XHCL zPD9VWtI^EG47_!fo>0?W1+S0Y6woF&_5o}=&~9I)e68`43tkg$o3t#It3p+oSN5l% z=_aTWh^2&owt*o|FVqpD#;YZW z;K5a8cK%*qrT5m@)<#z09n4l30&$2U>{ynFvINfHs=gHO4Fzb^ct#&eHrY4V1SnJ$ zgA_UX9y=b7QkVjNeyQeiX)!5l_Ll%_i;Oo0)SY9^-0k|gKe9*dT)h7sS)#X;I1QZz zfd{?j1!BrA!er{@eEi$M?%VCAQ;a&W!p}c}64BBMK&(q`@w=gFO6bXz_C5g^z*6PQ zqj)!(nr4ILK!Y;G>s(osCrRQS9u(WM_hWT|Jez!`v&&_KN~u@VgW;oRT5%<%r8zZC z@u7zx0)C|Zx_4C-t+p%+=FOM7?DzF2lFp8kE6=Z0IZiHoNNSq{`6#!_PlW*_l0Jq1 z<^1{8?UDVl0q&~4HYFc9O-+udSiG+3cx(Fz-Wn*ltgJC*W;9ZreTydNcaQ*3Qa0`O z8^;~J7lHPs=}48tDf{sSe8qI`8HQ}tt*>TetVOd(#|}P#!9ZR zUJdU+UJmL2Y0&Q%o-T=3e49vCL{>`CVhE+CVd8WXaxv|SwC-4|lQsZZYu@$!z3^`d zz)!|`B7;HFrW9x{q(eAtW;+0GHe7-l$s)dpne&d{ZK3D9tC~M;3R` zUK5wq?=9)$sS3QYS%%*!U1!m7zL3oR-_+)Iozu8USUG3!goyX7b>%A8qM0&tDS-I* zMWl3~`Kf%%7E8>YDb^0-X~pIuj%6081Bwv-l2>akEQpV(TwoQ*NbX2`@InGI6|V98wU*;u#MF;)>xOGqX&C?;y(#At+<@g3^AM~OfCCV( zQO&IT$@7D{cR&6hN)w!ZQ`te2!=4`d{kO!xCl}dKrefLHPr;jq`AfytYb;pK&PB$Kr3b0b&C9AiD6?<+i061;M*WUD z_7)?grRk$(wDXX-m=Qp3_J2*t1@p^M7Olncw;VHselR<)Or#6{aGG~bFhn8OjlT*k0IMT$a(wDeZ#Ggs}u+G4XY=8akP zC*S$JnLc@p2F>xUTf3j&87LxH%>1{zpC4qG&ac43V1GLdJcXiXl@iDggI-Mvm^3H- zs-?Xp07CuPb|W~-3M)vJ8Yw|H<;O~9l)}k)fRuptYN|!^zNS8O;khL^@aeJt*e!~~2bheX$$KSV-2r+CXI}ZWS*3hB9N@R;B~5XFYF|NgqguJZ z;w6x2Kf$8~BAv1B1saZ3)t}ywCj$AG^-8O3r|PH98b_Mv0PqugLtLd&k-`uC>6-C| z7^lIp1GjwJsphJ{0=i1xih|{-(Gst9I)8$Pi>b>zCa{31(#vACtk8Q@-UT6)JJmv* z^>yJW-8jt~H%xXwLH~{29$+d^*}|*xxal? z*SwZhsI*3phL4+wjK66!yy}6a*ELxfDpbm$ej0tNs0tNVwNXQrW)H*cDD+BTEKBPA zqXpW`uA7RQ!Aq`^K)yZE~SRJ63p=ITOEpj>}^8$ z2o6^hbRGPC-ooj3;p2|x1X;(MRExryqeKYWgQF+iz~9g9|PkbP=@{z0vzjoQPvm>-^`Rm89g zpT)^^DXt$(;!wZac|7S!EDta^Ptvw`DI=1S4tCVI0!PG;=lZCk8xz2brCd!67GNs> z_fqkfH}I>?5u(-{_vn(>SveL4*#e}!NCH``k>OYOmv-5-aVI73^{S?g>mR<4`B5Ri zH{zKgo%mjR+d1JWyZqiPZ=TD;C996>`ne!p$g%1>ylm)g;oZ*fPe>;ozUb9icDbM{ z)6HxL;^@go&eC!tpp5mM$FRA9)Cu*2V~|ZIMY_r0JUGpT~h!j#o{shXQ6?+fgK#A_fuG(<^vfmKnq*4iQ|UT9q)tpq}~=X z%{4(BI=UhnbKfDSbINx|kKcm023s?=2#9)*!dli=eS*&3I6IhcL0Tx3bywt27F<-^ z%u{Kc4a!;*6_8Wn@%pjmQt|kE@IUEeeNVC9m9flfdG3EZwF=zL5yHWQcWfs%ZSpGO zLB#vu=EEzc*oiJn^{YspOVQ8o%Sc=ju5v*a6j#C(!jZCClRE!QUOtmB0}Ld#9LbQ0 zxE;Lz&;pkfV)8|nBb)G&uKn=P$R<5LEx%fJO6}t0=_dd7gipp<8~;&f|AX(i>n#(_ zh*y!w|NWWQB2$siyPxsMTf7^V&gp!V2Z_7E{5OOx=aKdoFXOU${6DuzM-BNvhX+X^b@Im*h#$L{u5gh8CNDd!ZQsm- zdXt#uLy3q&jGA|wjAwZY_vk%(`pb9aZ5b}_*gwh#XE!uOyz2>_PkWnQBeXhcuU#Ir z6#*gYYxTHmzNBHg=v5n{Yko@S-)TxDIo}I{OG$tdns@7{s~0Z)Tz#F zZs3ifg8kK(tYRCN=;(drj{eBT2V(~0uwER}Zmr_SZ5l`gGlw@Fn0=nd0g|HJ1(C%R zMtC+3mt9vvJ%4GmcR-`vR{RxEzyAYL>2T)w!x5{SQD?p$u1JVW4Bf~5Q(Ifzn&w4n z{(7mZ@hGx1f5+-@+l#RBT${0~n5y00&XO(Vjskx~4%&d!v{MO*j+1v1a$meK!As-7 zLEyP3$&KW^ynBPVcg~X!&WM_j{W_EXAcmd!qw0Wgh)Gw!G6i6muYfAvr2iM*dRU~Ab z1X1MgMdy@*%(=$0ZV4q-``HC)s7@W#-`opC-ikFc?j|dL7KWf zbeGEaw14*IFA0-wKMo9gjYz{e^3749;okS^j99jB^nfSVg@|K z^=ss~59WJQ1tYfIwlCtqzH(7a(QiY(7c-%eGW@nBJES~r^@GNz3Ty1;#;*yxHI)@k z)XDFA3R_*egkBGB zN};+D0XcN%(O$KF&Cv{0*j6;{%b1+J$z*`2N@X|Ik7QEEp;_{BdpQsqjU10#D^G|im5@me=QyWqS72(=O|6a8 z_ZiK4TEtp-zY|(CP=(@>Qmeu9L4n}9u>Psmy9jkXFD=5W=_`jK*PB18flUW+asy(g z5?M2ibP|p(~)n(J>MfcW-7h;!z{=T(y@L~0rr}EGu^TuQSb+^`-}VNU3p5g zB7t%P<>>ORJuu*9kgbfGH*?0V`J^Q+PN{L&fUaH&x0M=Se_fMcD5~Uq)r$b9q!Hl0m9Tf zWD?^GOq5#k{vH_%Q0(|_sDHh0T06;=A$`rays))BtuC@|IcF6Ql2!|}7L@S|*eDVF zidtVulKOazw^u|yUrev`I*9YMjWPwB#qj55A0 zckueSlM#V2-y-e`jT1bUtS;BMn0HXB4{l!rH-ubmI20Y7f4-;{t?7p^ykaC`Y0yZ8Qeb^Q~nLAM6pbo&7cQPxsn@|qHqeI~5NQ0nNP@Z50I#^CU7z8)ftjDJpW z7q&K))N8-KRsVGHL*yw+q5C5n*t(YV(7P(PPCoVLsZZ&J$k9Lvid}7#5XJFyKJx9| zPkahB0cb-)0&D_>B4HEfBr?GTZZK>J63bG6P;6as!7)vSiC?gs$o{+hiuscz@72e ztk$heD&bf!NW->)#>sWOqnOAqW_<8b0a`^vPar4%(ceFBTn@itZTof8_=I|)u;#6n zHWW&`=rAde$`}R?7X|`_@bt`*$&r^UOw=xiYj&uu+E-%bf}Lk_?zQHvHbnxvuH-p5 zcep+d`0QWHt}#j4H5?Z(GN&P&y;}|kHj(n&z|fy|72d9QXUfFhlzXT^BEF{TOKiGwV<{*p^`Y0rdr~$;&rQ6oWNA;k zWPWyWR?JF>)9!6Hq*{`C<{Y!IH(dzjm}+}W6XwR3G2jpibu$b*&!!E@u!ovl8}#=+&VwQ2{luwSV8f~7N4bp8NE zi5hUqNUv9Gl*AP3)cBt3beHC)ss0^MRk&X>as`bRvAee1DQB=(!39H*0QVNp;P$D7 zch=@=lH-rs-AGTZF6~9G7C51{srB)X`JvyRLkYTx1d9Ucifo4RiI+PZAC$lz*hk!8j#L zFIh!VG)6{B4vC6hM1gxUvKqF(@us8*O%Yn>h(JBj=zI; zkz7M|bV!SS?I_yem@n0udgFX4wK|HN^$v83r&w&oGW0Rvgmb@#?fDDcHI_tGx6=!b zC*CTm&)jj<-i^BzWb}c!`Am&`#LS2bIDW2Y619%zujI-{Uw=c19|I@d}MPA;-UJRhERs4D6@}XVWMZ!an%|Zj9UV7r?dWhc zp8??G=dpAxCzsQoYQ1(f<^QP*|NkS3E;;sF&%MpVDlw@5M932cu6CNj`}xj0Fb%=O zf+#rhKsfCeSSla~;HTQ65N65cr+gkI_GMFh{fYT0TKE5ckmxNCB`MSt= zlfXiUguYWtb=~YEl=l;gdO4(PN}BT}fd?=WCSu_bdp=2NvGR8>9^Gbf;94u6MUsv? zFE!HnyQVPx(#&sWY4j4%yt*&3W+182T&|VrMX@{<<9%H*7L7Nl+CL%`?PIe2lLoU`C`}>P<>@zaqjx_H*r#m%`yo}E)6V-e?z0#Pt4@iE1vqI zKa1QNxMGh*{_fMFUrOy?bT(q|_{<{QnPZ06o=El3;sR2}bObyMxV-*-G<%!NZDFg_ z+PFw~G9p;TIA@(*Y;RVKf4)hSy$KYSyjlKU>r|?^*883LDr1ViPOQ%Gfu{Agu;j4V z8+3G0bd%-EIpPGs*dc7H(xf~8%#m!u z<4o$!c{o&A(sZ6T;nh<8Q&kLDwD~4YSskm;|EnjLqB41`9JEQ3BTum%VHfq*dDAIj z$^_fNxBQ_6l!s7CPP>zr&hP$MpZSS3fi~^sl`a99&(|WSVb@ YK#l95QZ-6HwZC3G(^4sUYWePe0JRV}_y7O^ literal 0 HcmV?d00001 diff --git a/windows/security/threat-protection/microsoft-defender-atp/images/atp-download-file-reason400.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-download-file-reason400.png new file mode 100644 index 0000000000000000000000000000000000000000..fd74c7c48779e5b48f95d6e19044beb7ed0a721d GIT binary patch literal 18534 zcmeIa1yIyc{4c6B5(}b)z)}J#4HD7~ihvk2ONSCm*Ahx2EeIkdqJTZbS$uR zcP-63-2c3p`=9yWH}}oldH2nm$IJo?8)wh&oNs*Mgul>GA-i?&){PrC$eyYyzPxec zW-Pd+5D|dCta-LUz>k|QFID7k6!bEzf;)KDa_Vw7ZWPCmoSWi<`^1i_dM-C^P_tj( zZa#f^f9J*xm9wXca<4sMn`!t+#^LHpOcmGDu-e-m0SO0l__uWIEzzLRj#KD8Gd?0f20AEQ|mHYY2QwaB?Cr^kwDdcS~HT~jCt*v@W^!6`DYptx* z3$oQytY9uZ!W=;q@~IDT2}p|!8718RZVdf;>b>1)`+nXU& z_!x1mxSgN7^DacMnzv9`7-FX}1N}<#YS8a8;)+yi-+yAF-1bxErPO$xZ;J4{p^j$> z4@`w^N6M_zFOnAfGGwZCz{I#qW1$_ENk&#O$TR5r)E|#7E-|0uqMmf&?hrD1E1_)7 zN`+3-0y6rMvmzb5X8G5@!nSsO=~8uRhsEY?V?Un8Z_G3XcD~>&b(#;E zp^Pf&&r(5yEA`2Miho1IvSsKqWb)H^j)~kjHv9c0^~Q*2TdIMA>SWN- zk9WE3CdZ0Jo+Kxo>@P2_;1}C>erkms1(VQB6q~nyLIhFF&CNwRd><_|?n^Ax-3qyz zbv~9AGlBHl&$C#`=Yt`~E-$g1=jp9Sn-Y1N+c4?L)`5Cs8N}Hp@2|tgKtgnl+xq#X z{PL)AB}C@D;nrPVI})0|*jd4#hm4VKSCUIJc ziQ5^Uc(*`L){Uk7#;TmMq>je2cpnAdqA7`yKJCyhge{&85NjkY^1W!-Tkc-=>NIAq zhnP}I*NVl~^TJVdig3G~*B{Y4rV5*bnlhbQHsG^h(u8iu;^5z!*qW-nNWVdF@%v9< zN$qxZyMDO?BQm}=|4p~Hh`1*axO7CYb_WUXgIokVDPpnDxIroO@Mq>StPmy@v%fQ| zaMXY+Q?8w_KaRp)bYS7=iXN=?HdE|ITsCxSa=C~Rb~0Nk`j3B zy#i^9yocY3rdL;)e){1Q-{zoNZ7mB)H_fweJRbdR)Q(EB>`ol-O_P|KNqY3AE9RGR zy&QjA@P$X+zcW6g)7vz;t|NIcd*OE@s=c(A z&!yuiSeDz4YCtWuf2dOa(MEYY^FT=y=qPh(U@I1VgfXk-qpKW2giQGnJNy0WWsMFQKoD(Sm@6-O` zRUFqx(bmwue)^6yPCJq&0hc9G#QARfIehWa=P5QEMSOv0nr!!!&*Xzv3aaLw)h;F) z_*Nf|pf_e^F2;Wo_Njr{5z(mVeQV+9RCFPLicoV$ElP4!`i zgBh29K_HN3@}5g0YoL1M`*f9C^nfnFpv3bjmmEBwDv{m{@UGCHPW#49FgvTKN^{)Zw((`JtkFfeXg4r5rX69{?#W@*% zT@E!TR$Q-hV~6t%M!j9P9fYi&gN=CHpk1K9+8)=J0>4Z|9SlUkqTdc?k0ZA0=0)r3 zi54t3zY0sc3QHvT{`)33QobJQeOrylN$XRNJ-Q-hl7Uo^U$ND^c(PE;dm*>H7MXT2 z6Y61*ENJ<%Sq`6sy3BpEU`NGCrx0d8{70u!V!Nih5_h)ibL~(R50>lO0eg~en#l$j z)y%rr-qNA(V%KL0N_b{~cCndKAMV_XUoY9~mtR)Gr2c5<*YFtCv_vyWIAE&xHE77A z=izleUQ$fzDZ-^(fnjkvTcymNQS_n};F8r6Hpjji{yi)S8|WZE;bX!h*$%FXpy6|P z6F?ZG^9HFa@P}frO)5#m9zC%;?`hQ?sGC>^!@F@`q?=7sX(ubYTk9WDdK|C(u9>k zN9>5>gTq04HRF=)zB&sC6HjuoUW__lAjr7;3SGFJ@4jhTBV{lRrKziz2gg30)Vyb( z#G;EhnMhXagDK>FynaZ=9?a%ssl-_6X&R5w@I2X!NfesOfF@n_R>+(=v)Y+S8R_0< z0Gs$ym6#~xq$7^4?#GohNLqZWX9F~t#L1+(AMJ6vVQl&u3<^~V{1n!Y&R3HjT&U_& z#JS$*00qM098SP)6sgO7TJBJC#;#otcZGC)O*B(*RH8!YZMAm>uFnPS9z`#lCUb|8 zt!B_pJUhR8{j~T!*_RvM4jvJ1XMEG;MO>r$~cPwyQZ1Yc;uF-ayxzE2BW_R-BhMyO`lGIx&$ zuR_?*YT)Kl)jTjkrV zq)XPNv1=YP^8B*zWY>>Ld{B3Q;ha-PL#Yqm%Um*{Kea2V-8TteRGjF)-O2@~>O4+K zcJdo%)LwF!;=89LDV8jCWnzPsDsQXBm><+Bn!1Q_gtBw?$HrdI4vS8EG^0=kV(Ur0 zTpA-2?AbkwE1A$Rg&%?89q+CD%T$n;6?a=p zn7j{`u8%a4>N_G3m4n3S|D#BZyG^mBd0mJdZHzM}N?pFhbWk?i?|u&!acLtpsC8Et zwCDw)v6bLpJH=1}n`cnjoBcdF)v%kci{EQcaeZ%u{*vHqylJ;Nl&qYLUgUnIk3hC& ziq*P8-8{d;1}(bI*T7jFqyfp7IL8pmj_6j-gUrV@;2^64}@hBh*notixUm*<`N*6kpF`uQ^b|O26W-kXT9m;3rimhez0vykdHuw4ao%WY|4tKaC z0tj0w@(n6ZPd_z(GZKCbbBl(vpqC?A|Hb@b*zt!Hizp8H4_jS?BsLm%jRE|M4 z&~-3MXu7KTg3BL<7&e#Co|hD2^X zyY3_&7hDnZQ&)6}rHeD1KcJDnq~2?vTEuJMzCopfy|ZSM7${)TSJ6=6uCF4tR-psl zd$c{oRBhv3pSkk1Hz!0~S1A6xs0$eWV~nZs9U2~#_E{+^w;O)+qj)GvK)%#__z|Y! z-S92Z)Af;pVx$n3t}tDzqxnZS^ZRg~9v6G0n*6=^KmqtPvU(G;d$2t^svY7>FY0iB zbi3HWrHRpNG(a=pS-hn9HePD2m(>IUDsyHP@r#NL9v6C*&v(h@97eY25>=F#i1Thxy{2Ws!oZs?U- z)#M`kPlRa#P;`iRgyxGXM^mPnWEy0c_;^U!-crwUfSloApw?#ph56Y|AojdYt%W|# zxH4HNyILmz+yDEGZA__KN`*A{aQ5aRuOlMx!_uFi#XusZ1yCFZf3O5aznr9guzAGT zXB}gEwItqML1Bl$RBjt9^feI4GBm^ZWt{I@35CVlUT5At&3K3VmOpejh0aU&ZZcBYyrnyF652 zl;Wj!5MdLqzwA+Pzc>^<{Xz>ROeda6qtNO9uH>snPb!MjNWVWWN3>ceG=z7C-Ncr# z-20J1Zbt1zaz35GpuuLBATl^9Wb4@a@opeZMU&Jg?MAMzLe>>`A!b_KVb58&xQAD( zUf^r8ek6$rw{H$1cboOfork09s7}UGe)B>2Ac{mzH(g3vCGe}8WJr%zK%4biS2>zC zuEry-7xZHrrP8P=iX<)_-fCek{9Dvz_k`b#HC$fUALPbKw*)@ez|>>fV(8aH=-3dg zpLHf?v(=x{jXrww=Tu;kD*=1B;b>R7#Iq3(ow9!|mY9>t3m@gJ7Ui0(tUee} z^QE;N>Y%LfYxc%W|9C63ex}Fdf7|{=2W~qX^`t>3RZF>I=O^j=+7-{ogH%&-6c@k3 zD=O2aWOk2#RW9-9>x0T|GX9>BcNr+}hP#cWh`PRgz_t6EtHt{oqlsXKguq| zg;lrxMhS$i6OP33K04R%9|-5SYiA2{P%M=}>GWnb_9OLzVw&QtTp7?Oj6JQbsGC8! zF+@U9yGtPl0l_32i3ScmX2{YcmXCb*Mp)AyT)KWoDq2Pk^#00g(G+VclDXCG?pGSK zspZYN7L~HyE=78xrWqf6JXlG|`%x2w@5d#`@aW8EG>`_OZ2H&C&l_jtenb#DBI!?d zk}kOW1t`6mi~B1M99tly{>2*iw8REX>7Cf1o>HW4Mt)wk@sYMif{MFN+=`Z+8VNK_ zIXP*s^rVi&kHqi@ma9({I=Y#56D7XZiq%98MZ45R#~cX^5P3BVzQ5U6TF zngmD&majN8H450rP>4#@)ilC=W2|_Ax>S#4G60{%ZZKQ@XsdR6VyP!3-@o3k6J<;e za$X6qQO($Fb7;K5oXh#K)7kO7Lxsoo^g?1OC=;Q2Yiwy?vFK$;qb?Yf>@amx(<_rF z3GEFa^5(fLkD>}NzF0=%tBumW^RdBVn|{_5F(!h>8 zSbUr*NS@CM*qNga*GD-=Z*Pp3wnxEdn}Rn>x_L|48gt>}HNw@{{bV8Q-sO938zu*% z`9|yh^$%#Vp!iQ8`IZr_K0D_6p@Zm9#Cbs#6EdsvV(_7E(Kit0#+*TaG3hKwBnLM5 z<`!a$*lpsU^K!4ffxKjkhqxGIyf2wT-eNgHL6>&eYk$dmJJs^^;H?7#c4K_Ajfw5C z_rZg8OnpY7`3gXqtO&{PBfo%vUrYJi8oVIX&xzkI2Zv4PyCN}3qChqKY^&WgvXcz` zk43?5C^t?o$YHrRZ6wD7j@7NO8=pI25V9&GqvdZH$u~$Mb;I#Kz&*uQt`27Zj1;lF z?-1QcV&*$NSzX6u{!t)A_>WHQ7>{AqKdZiUOI$+ogU5rJTWv8+8Ncb7w}aTDF3zxL zB6|W4>{6)r;ut00Ysy@-faY&)*DF~$red}^1YdL4A^_9Ci{V#Gpi0Rs&U^(3a0K#y9QD=-7q1&(VR4G+r~`F zC_Z%E#G~m*1qpaLcUYApX=mFwg=o{CHpXfsi?`mQd1MFoSTzH?u>=fa{A{~EL-2WP z1Wl!WxvfFzQV-~cUmnd8GI>H!>M0^e6MqUlFWD%nuHh&BP~RYyn3nxE`m}ucmHbLj zJk=l%6C()B0*F`>jHbN@$vm*oDWe-O;%WVYokAGOdjxgX{tIbxqm%OlKA4@4!fw@8 zI4?dcWSZmk?PMP*wbrCbsFWA)F(@nYIoX?-YmK-#4g;W<{?Ct}1D5|a^tDE=4(9s> zwro?fg&-~oAomv9+=n`}+=t)j5Q;uvfyMF}OaIZSuN#J_fjDeb#hTTJiOY=s6+z9T zA0qBOtRxm7$b8FFjHQT#ZW;f>k`JFz%@8PlZ;Rg@v~M~luImYA3Hqgtsu6xW(6avi z^q#a&6$!=LPw=h_WgCeog)c9Es-2zIZX?aXY?KG!-_osgV5;U+Nh4P^FJY-Xe(FN^% z;4HT}=IjzuLTfGg3BZ~9<0Y0xkzGlA+pKai>6xW!0UzL_1!>p{+u?#m1+`EJV}*7; z+LNxE!2EggpV8bc0@TZ&&(dQ$*u-5|zAcgk$fm`%@l;N~vmGrsG>7?L2qT1u?&2WD zJq7a(DofP(P>*T*taueyU!bM=V ziNa2ol4VZQi`dzW8oH?OffN$l^$;KL-B9kV)F1$U4Z0Ka?S{MFG}11*D5!4>3(g#L z>@W4qqnqM$`m#D4Q?}DJhWLBPwn$$c^+|90c zV?1*?wQ4)oSL{K6ua;qv2V8l~iWe$#HXe9XslwzE*zLC`=e-a(eY)DPvxK)ix66#9 z)P$ii_7PCYN@Lvfd`r>GnSNaB<~@tQzIP;{UH)!(VH!`%J5{tRhGGhvb(a4shh}4V z6jo^fujSd0a;nQ*&dJbEt8v@N=#w-D58ty-jmYIC-;kMEUZ%M^$?)UN@ZYK~x+_T-%s24IWv4Q8w1HGaR{cMq0YHWLCV)A?SF|gEyN_{?Ygo{y_aqkXktj`y)yhK z3HyG1=$EbiL|FyEeGTgCeC-T8%EJq zWjhK%Va0_E&L_E{Pn?77(KW;S0gW6yTN(TbcRyf@ZATqM-2(|Bdr*GmDy#gjmj^VO z5}UWaH&fhJE{9|K3{`g@)Bfht*&48T{zTzoh_r40vkr{hZE(=4_X}OuG^^*mMFogo zDnx>X0br;{2xU@;z~eI0<`4@~;@tU*v!jz(Q;YX50cXNfHEty7v)X@N{`?rxy!?R@ zKK%PL>To0lmgL)f@{9&LKri4^b+|S@IPJA;U%U4Ek5Aa!iLzfKwH|zhR0EbPA2}Nz zaPB6MOy6lv50s}Hk0F}1i5etshZZ-I3^jOQ|K3A(tm9azofGe2 zeW>LzI}Wb0IJb(zSFh$>J2vk2;RKsD^@ z+j5}&_^$SSOQYj}Mjn_5#;5HE`~M+Ozz3YC+P4k0#f zFKe-=^I{FjRdfg22{ZYe(t&g6MN6N^o*JX`^K{8-1;70>Z||CO4Vgj)g*ul#ez3L( z7{y)1Sgx6@mgIoWUHp)J#p)A@DI-nNi|DFc>PxTuw(al-guqVDlD?W|q8sjpO ztrqX4MMsow?85|5NPzv3S+g_$ZR@uCvwSZSyI_Y=Z}${>iaB}zaQ%c8c8cKlaf^Z2 z2z+41Nn*_YV?9vsPxz%HHs%AUXU842aRRh*D$~i8li0t?2?rdy;-7efB0mu zMP)YYcpxUG1L~o%K3*xOfo63;?kZ>Wru7w>8J03($E`CgPnL*xixw2U#aHXId?{D! zXP-Cii6X>I(%4yV(eO~7TZx|`wo#(x=~6v|t?WTno}Ggg_GlG{x)ZCb=MOOrVvIiZ z0S}u`jtER%PkYXjU7bIG;!QuzQjR)58}sQ(=t~!TBWgU=JhPWk6+XNCo;_K zU!aTkpNiQI?MoJF-|xjLe1AJkeAYK*>Uf0UaF-*)+kSE^ zM=598`(S0(D@XcQ3Me)HVdHhAL%S<-(!IN+*yry1)-AOs;heM)!tP+`SYrBQu8=uB z#Xd4Yg?uli_d?$DQ{BWon@xF;suHr3TPy8*>N&~nV-vwACVg=*c-gAFRwN&M3kG&% zJg^)iwTrBhcE`k`%Qr(Ck4+-`he3%Rc$itKmF2}~Cw zAZaG>$w_&l&q_hRWP3f{DK6Pu)lmHT?#h}EeCIdQZ=xLc!gnvfzYv+r-e@r@v3QC} z)VMF1z$T^MH1Es*S|ujECj6U2u0%+mxX0FpS9D0+fIk&4NEiOUbfkxZUa-~4oOEjD zDTd$Hlg$1i7ljPBQ3tc!*zz6=_D36fV2VAin3LbVjlSIP1{CL4%c1026Vk)vV{f_rzJwhJr zCaR`XUDx0+=q|scN;MnkKl}#5NT^%ZQY~KYUU>n@dL=q zRJnf1t9!LlJ#mWMV@{@C>7QS(OoZgWr&P z@n&EKFJ4Qt_+cA7+B^+2M56G5v|k{v#TyTRk4$Ebj>ai zz4NS{A&RBDeyuZ>PC^-H467J+87lr6$(Ef6<8xNGZ6JE+#dqZprr*XVRZx&TbZsUR zO)dAlk$xAdvT*krC{@JSyW12yQRsL0XRszb2e)uO9kJEvYo-fBq>E|EESJ{&1zgxhvse{3Q2(%fx_lb?=kH-XGP-25d0rwOS=e>=gwC znJMxAPQLFy%{?nSb0~zV0yJDd6G7`gcCGzbiDl`eux@LMqTieiy|MwoP3bhsdpunV zk%z!;xdWQeBCOOL{CVWC83LppJt8*$n6E_)zNf34dUFPKKGo{9GSb!V?i8AZv3&qO z;H+#375BNiz?!uW1B?P)>j8J>;kwr2Kr^92LPGHdy*#B>y=AMjscDc0xXaFmYr~y9 zG~|JVp+5QgpAFCE7=R4uI`P@hNASNL_(4)q$Lf8!@fILR&kBq@Ei5cRyE$cs&g8?{ z^c^e86hVySEhP4Zn%hL6E8&_BPlS}C8B8^$PJWOvh+X3x_Mq=A0XWZnY&zm4j-bbu zq3DbHtBdVC(BX+Vw-6P&l46saI#=oL4P;y%SpPAqt$35K-9vT>lsD$|bs$UX_2>(u zoE*r_yDM3YnxJJa&SBXK=^Ph6izN`=JH@EeX z)`Ipv^U(sM3YX>Hg^45xV<4Cz_EBC2fKb~3!d<<<*GbHHeI);)Da2OA2IIQH`?`vw zFW4!2um+G*3lpoE4xG=w%($=ZtBz#~KY_`VwSvx?9gs+X*((8J8~xRRpYaA7J-`2X zWs;i=X7^aLce#$_Xr#TXziMX6Q;xcq4pVMRcQo3579xgSc#E#sWD~{sl+qNvEw!4a z04SY``?zINwOpobZJ?7LmEwEAel0jDh=A7Lkoz z_n`RPCV zquwv~P^Tbund*UB`0ZAyE5wn7r^K93e+4y<;mZ0sM}~yQRuOo6L`_-TisxGFd923( zBS88p@q67~kFI~(q{c0IR2Ida`8Od@oC6cjsktY~ZJf@p-=gX30<(FwF)udvP1+{D zOlacqERiOfR>D29(x^#GIhv6PX%<8m_^-yz7H%vHv*Ao_2f&>dLuwAAL`Chg2Aaj8 zOA)ak>EzHARH1SfG55`Wi_}f|Y+gL`qCbS=IW5xw=3cL<5=4#R$D2o~LS6h;2Q~(b zdy4l`MB%sWzb9nWPStuK{8sQNM-yKpwUk?SFTE&u_UlMlWqD^d$TSP(R4^LqGW=aB zV(8>&v%+>#QK@y`-jQ5&RfUMd*vcYH)b2dhDDLWjGUDj`v7wO5`S~lpv4~bR>YTOD z^JB^eV$i+)X~eeog-(HC>w3_Bkw`++&e(f^hlIFDwyNL*DVOEugi%}xy)0)w=$w(! zHs(W=_MhE*q}L>B$Zh!4lANX3*Wz5-4i#ZyeXp{gA33H*{CbrgRP%LtbInsM=2{ds zmsv*~I@9w-U`oW4kV{9SRnwcv_aLs_puliE79$KDoqWLrSSm6%-M0PrMl+Ikc=TJ) zg7+u(EK(RYoPRnNh!uF|zAAXwiyzRW+5>crlH8;41P8+!!q9m|^>iHGqV9Vlq-1sx zq7JgxC^`p4uOt*Cr046hungAZ^Q1V|cY-OmEe&;>&r&^EgV(hf< z=txjR{?qvEBdwi@fzXGJGNKNXCOigZWsQLZp%Fec#x@|(5ufDQ!s~WJlFrI?jDgbW z&nbReaH2-}Ok@9h`ry+AGZX*MkKW|THsVN62FG0sEhmdiQej?;mW7CW?Dd^}-{f$O zbWL_<8r>f}9?xrg4JD#Qa>zA^748psTRh$X2=oa&@;(hduOI>7VzvGH z&01IkZw6(em`mVw{o~hd+-+qszw<8{I?)+aE$>O9t7-uryBrZwVq8^ZQ2uW5P}wUy z9_b{V?!RRW!y2m6egpB4&DHzfX|RGH=GN{|p5EZc;6p6NAA@e*?~`F7RsT7pq$08K zg(K?Wz9CIrI2EV2cUYTw%w^BIgh%cfM4n-2x&HFdE*Fc^E_5)0LjZ^YefuU~zo*94 zt2?S?y|8{Mt>|A7l6#fHAEY~EDruiHFYT#ewex3TGW&4K8h>f#&z zr@uJu)%efLVsx6l7QV_6+0@%Apv=SQ0uH%Ou1-?l!x51KGhk%REiOQ;mMB$ZS zFqKKh-u?T#R#kP7p#8w&t@G1$ZE@Op>c&J9`l_RMBYD?)yj}9=+ta8#=iI9rmhHm& zqjz%*(%95Dg<4a6B%9%m00ut9FnO#~Pw3&&+$>NRFS|HBaxpbOV9m+2RLs}TpP2P| zjV)6qbTYb)7a_jz^`{C`qt`t#et}4k_sRB7*9LPcJ+!}y+ByKJ&4a$5ITc~I@TpZz z5(YVwbryzh&iWj#4z|zZ?7hs<*nDApD1Y&qX!H1e50RJ6P?eSqrxEH^ zQ#mzvy)a4IMNExf!XqmCWD(D|xuajp-;FOgO65PJ-}~{ZfkJqZwJ;Uq(ztv}wYD4W z)mN<5tjr6o@;0>4l-#YtTCD6UI^Lwd^;xNp!(%INtxZXD@nSzi6CKLrW5T7A=gN*Z zhbgiAW2|ehu>qp)?S$8RTE$Y^Mm$wa5WaKp26-elX+ z+0v0RM18@~77&rH9*$yW+AbtK{5WYxgJFEWr#@C`>HfS2UqvTIUT~83#S!w}?n=>^ z{il$nQLUT#wCYQ>BSoG~NA&#LbI*@D#=hmt!33&w4_>)fd5VU*{^D$cc}yL4N?Bpf zmqeSZtA?ToUC}~a<|ugRz0bU&~_t6@gQ?;c4UR)Q8Ue4O_wP8)8$+9aXVhm{UXwS`$8jxe8&poNp{sO9gZG^Ls&@ob zX;Xd=|0dYgw^In#-;oW%@;*^ZnJFeE%yyK<(RHF_Y7B?!9_Q zWYedK@D@+C{U)stj>>n6Vk@Gp-S)#G99E{#5M>hca24H*v2y%KS8G{ocigiXG7>w zWYc#FJj9=7jC!$8!+qxIr$1!p5fN?PGSK_u&I9M71gu!GM4gLu6|@UskaM9JkkFwf zfNkp_S>8CMcW@N=MJ>)y779e(HDZ@iW0)tILQ49ST6D)LQcQ=|wA{1=M~vj{ zW;QdjFOGap#Pe%gc21PiK4OQKr`49*dC0Vq<07U+!SC%Ma+=ZbEg{ZQ3 zTO{3dM9WzJ%2V8xCuZ-NYYL0u+u^&XHo9zF)#qk7-dc~n!}b~kw0vW!EnB|4BIs>g z%rtM_A+uzW0bw2PuXtq(4m22HO{*V$sm`20`)EO^=4#hhc+pSwRQ|?o;tx-_L@7}d&*_Ezmh4-!iiE|gB1_ZP)u zD!kC7XfbM4t`foqzXFtXy6;G#>Dq6T4*}CpI*6m~nZ#xLLR>DJBKRh*F6--0y&}9< z%7zssq=eH84XaDbY(q*08@ZVKw9;f>r@K;&DakPud1*1q7Et&P6?{L6uajYvtl!wx zE_gYfetbrCVS*4YQ-sSj}v`?s1R*epRin%-P@2U`Mh( zJepw3?(?Ta(d|S(0v-Rw?%rDY>9}9zS+eZQ5lJikcYpuXw(x|XRCK3W2SBqK$L?EH ziZ50lNGU*a1rGwB>qY9=1( zJJz0I*R26N?g9T{wt^DCQ#haW$h2-$I^J!c@}ZaiOb($i!BdX8_gV0MP5^9bPAS4S zmou(?59Uv_&)JB}28q0BPPDozXdxdHm6;{<0in1M2;+1+WSTYeJsj3KHzbF+X$H1L zoN||ubV-^mge}B9X{Mlt7&=OlZ295Q43&=>S)&k#q*AMw(B(HeMw@P0;;E1=nSKSs z64$3;oc%XvV3bg{%}}T`!7sE5)5$KW(gI$)6cbXe?c-a*Nw$v-sxNq>+s(5pRbygd zJk8{!jjZ0Z2Hx>uIBtK77!?xYIW%ucU1*{1+c^EW5lVf6z_w_mDfi;{4I$ z^_|B$bkEu0txSpt+<7~p*u5Z2Yu3<|=t&|%!IOhlFNCj}FLbm?97pKwoFdkws;^%v zArLA(&A%DO!W%N6j}Q5%z)+R_pbZ#euXnu;4@ z7(>`^9<~iG@$Z})?&Y@5@3PTumHN3i98@9dQ#c-seP(PkY zb=bk?PqxUj(fnbxA{s%r5boX@%fi^@I@^Ly6*E15+MG^FwkGNb2@?DygLnRX#%FJV zt=%c(^tHTC#ljlkWjT1w@M!Kz;XfkFQc^1Ig;PI@-|og@pN)|3hb-{Q<%#9F9w^L8%p7(o!5KLgX}q>>le57eV?R!~CZ)!|=EA2Ty} zeV@+S!(ER&xmp{o*Rbcr{CIk*g|wSL&Lz*y$({P4a7nfJZTglc!}#D&J1vxQGvo*1 zf{-{SwRr`p-tTXkjBRB8`?EmX zD|)6HUltzk)}?y3sJqt&KYFF2RcmVSnvX%#h;z^Bfg88w&%b#t3};zKiPII|1qB&; zq@s;4_mU2XkV4JUz1FX3!cQ^l{^1#}s)6<`Pp6cYLy;=>@gmCJ3<^di(8U-GMOuoY zSGD%7Q@=f0BNfViryqTOU5eu!*01>}wN6(pIi&Zx#Ot&6WviJV@j0_A(3U%VYE8*#On8o@7S>%Mhre)r#fWE)6c|XL~n5o94_TS0yH7?3ww> zieJBz$C$CvrN`$0?%z#Hz*4=~WCkKv^40MfMkugR-GP!HINtuwFtU%vaef?e(?LwgFo|4B)*;%M$W69y ze+ll}z3<8*4@nBu_zo*leP5YzS=2U~79Uas^kiXufh^o^5b#^eoEl~9-@h$U{Fmtu zgBGK(D;&D+-&0;r;>{8Ck2jIscX;nRHM<0LV+QgxVdIbQO*XtF_v}a+`Lf-%`%Y$~UZDXdATICu@K_^Xc&gDWH2BkAG|spP{7qg^;-Xu~ zFIe}aN}p*~7%U=vd>Q{YMA{RR^VQ_?7wE*iXeC2&@Ne_Y@Gnzt-zL?p|1Hhu%<>$W)zEG79MM4HDe2V|;k>ZB$qPS2mm*t4%#I!Xtum~8 znfy1jGMsVYVKn_6B$^>FM3%VjN!om?r)YakCHb)F@f~CWXdoYDAfsqF*gT2DSLbSh zpjepzl56?^8<(ZxtDo3nC{lf%?*;p0u@>p&vaA=8$a7(D4D+5q*;Z<@H*|k`KDyIH zl6Kx&1q_78R2rmcflUHF+D#e9hVE`x0c5NS_WGtByNHx2sm|01$ zE-?PPZ*Kr*b0g;UUZP{od;U@NUygqRWv;48sNrsc%eUc2f)@=5zg|gQ1#xMY8ae>dYG+~M(JN

_(UpFv|Hp zibmI6*k_DU%FWqp4_uD-K@Z+OaHw9?KD)%$Z!Z!__)LVa$(0QlhusEF6?`1$2^Q|` zt%etZ^IWfBCc2f|V_WGs>4ei=zho6X>zQ{sEa#$LOi!ju*;eovS4HWr*9XnpQl&n zAK-U*^8*i0&LsOy`fD?dY=Gw1nEo8SdeI&&odyKZ|0wWaCT2&S8wA{f9ZwpO{Li&L zuVujMjq{DnO9!7QLlWS3W+->dhEuCure>@|t9@yg8XE*TDdNAGPA0#O`}K46Pzc{Q zof-Bw03rUx?EUQhxu*H=ljC}2j&a+|5;uu(VI+NWLc~mq%!QtMS6Gkw{qtCVtK^GK z_*M6Qpy*@&X`c+|0I#1ErdDq)yYQ_NEU9(Y{N`GS^*B`793(00h-X#_<$grd-D*aF zOI7%Bh=N*5KU>RMu<6!aE>F#*&dYS)r3{B$|I2;j;}#!M%3WW=^hC3lbsZ56|7P8G zP&c-iEG#w-P5CN>+@4_B_`j!#OTpPxNGnI|C#rN6f#4IZ6f!L~`(^EGPSmxv7C7pl zWKcrv<6|=hGcNur6*epSdbnmsN^uo>w zQ@d#`^k^SYVVC{7=7qd{p`__*KuLJ68#3~R_%7uVZ17JZaxT4l(_?b>F!IJ-pd(uk zoPAUm)gTp@n6Do?uSV};Cy;EgKzGgZ1+j3W!l5&DMDk%(j@uz`Cr?BO{+%sD$p`&+ zcG-Y_*qcfUKm9M0-xUIo_m?xfAG3gi@R@p8UOW) zQ^IfKizSEXEf8G*Blz@EJeizPJe4ArO@%zg@|ir?KleM5>SgyvJAv&6JZSE@oUAJ_ zuKZ6Q)9@ebxK)ot)ygUxoc-{;`-vfVne`66`f$I46)g#$V@GH8RFYeF9ym@su?GK= zXB$ab@w`^f1#Nu*-~KO*w5g&upLp(k%hxS#0vh`ze~+z6FO7_qui|dM0b0!i2EE~}-d&dd7WWv4pa*`c#UuJCS)xb|Q;Au6`Mf47 z?9V!SL@}v`7e3KUGF#o_C2)-NwN%Fl9G;<_rA$`4@JY=MNaVGDKD)cUsriM!F=`5w zdjRQ|7x6py9((iy`Qy19TuC4uvadD==!|Wbo0-TZ4=z`b3KD9^16#`-aA?A4> zD5^_Xl|JeM!Hqq*iI@YkWVQ3p&%8zxfQ(#THMhZTW43pJ*Ff}8o@uvq^Y@>EJ;{QWfQBG}sU27cx~lmd z{qe&HwV0uapqM-nA(cUAu{>-tKi@S}4R!S78<*34mdL%Trg0XI+xIb3?2=W(_~-kD zz6{Kf)kcpqA0b5~I9Nju8zXa6^Q|{?b1}&PWY9^r&ao8J!5q!X?MbgBuzJvyeP5q+ zQ~xzKNi+8EISK&_BBd{eN}fop5U1%M4S^jHGDvd=?`F6Ebw`pPu|R3qrzyn1c2K$kuzO|rX_WKa7X?+1|aOS=+~Dit&F;o_#m&$gq%sS$O+;Lq2d`EalK z1ucx!iE7J`RH+r84Gs3B6z@`;-j%O=)`7{mJm-`EPSXn@H8Doag|{22Iv`h- z>BTLIqG$!0f`gos9%!)+>G|=|n0=M;zgc^6ghmZ+Z@R+_3L`>zpaZe!sCHgNa1E&$3y*JX?r`trD za>bw=9E~dVyLIi8{`X23#8I>OKkl0o$$#mApcov(6VIVuas}!6B>f~k?wAFf4RqtF Ml7?b|yh*_S0Zgt-hyVZp literal 0 HcmV?d00001 diff --git a/windows/security/threat-protection/microsoft-defender-atp/images/atp-stop-quarantine400.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-stop-quarantine400.png new file mode 100644 index 0000000000000000000000000000000000000000..9bdf843bfc7c2949198253672848dff666f43392 GIT binary patch literal 33150 zcmcG$bx<5_7$=CkyK8WFcL?r;;I4t7A-KCkaCb?96JT%{9D)wpZ6pL>4Pl?bJn#$JT}xgX zs%C=h5Lke-l~R?0f~rqMeKv;&mXTc)^xdJL2=T|hwv<0{HZ>3Er(=E0kN z{6jc|>G;LdQ%Ru(=21YhUQ$U)T3S*{N=ljp&OVjhzO?<{k9!=n<;r)35(03zwpS^PYRP#y!6jc-RZE) zox>dGuA;as?j?4bgnwt5`Vmc!#yO2m*>W(hsIZVqDW4|XpTVsX1~_By0g(4K{mbow z>0F7ex>6Q1ezkGqU>B~?f7jI^z1rmw`v^If|L{Y%Os7he`NI#{gUN!5rAC|oXYWzb zxC|OE2AK%mR?1+{^S8m~`=s+js|>|@B6q0^hl{3KQmsH-6?K2I!d|;#rdTfa zZ*M5#T^?bmar;-TrXL?p8tYnpA?(!#ty=lmHf!shzH)lv=VYQ@Ny|;2ujj_Bb_V0W z5l*198vIJ~fgH&}Lqq?v9KtwSEb27+h`0AZr@7sKr>Ow!_>Hb(fgbe>SQ4e35+;$z1f)t^#)Iq#@>0 ze>Cn~i!+)h@+_z2|4ngWzX%k>olZBFdLy6e}G)stc!tz$d}?Nm}y|G z-L^Uu=x_QJ2wN}>huh*;^<923Q_I-hrJ9_ zjTax&*&-RlJqnP|EwiEO+Tj?-4{e?^w)6GQ9I!UDgKllPfO1B82t4X&W+Ak6t80q$ z0CTXM+tHk2vsPFAxq(V1XMVX#7VD70N}F6&SqUq~wO8R;3=#)u^(3tSNOS;ZL%q6uDDJb^r#`jdFYQ zFUzN|mjWI~rZ~VU&Zyqxuux>`dy_=StG9P?vcxl&fIk!z+^xOTGTMM+uf9-gN(dbq-EQ+cQ!4GJ zPFdH>qxR)CUFC-{-K(eFDYHy8^VgX!vG!B>mh;u})0O5Cu~N&|j#iygJI$j%KLtKK zc5t&a1UM-ddDd<)s;_s<{q&^#bamSD{kvFHgJcFHaEr+oKOUvDZKFS>iLfEU&KD zO4>{V*&c3|Yzw9{xk~n0u_gy%3H6eVl8U~w8@ErlH68C7%RgN0Eops{^1j-|4%{0} z%dov`_f)_0`tBbbewW7bQ3(C?yL(1WF;ya&5Y1r__tGFrp<&CJUoGnCN=sron;|oV z1|=0cpMjTgC&2&7McBF51%NnjioNr%f}eO?9ycRe*nBatKh zELBX=awMpW#-S@tWzrsL@@Ad;sas9&e5+ldrs~{z%WplL6bxU;7flG~IuMh_2-M_M zdR3CgzdMOcir@OFBdpLeq0mt1zn(1m5rof_E3%w3qlL%f60!`1XC-d{fpX)*xJL^EbAsjz4GW-c}^xhHCxYe7zihQF}RvQo!)4;fo zHcDsJKfEd%yE86caNEP_EufK8Lgop4h4IUk#>2aN#jwT``AViqU_V=)b|Zt`rxi;f zhH&6%5!36sxs)Vd6g&frVzL8ggVAJKMAR#8n$@CGu45bA<{#WPzZJ5$t#S6c1J)j0 zs*@6`kbdgC8a1a&yx5tdlQIrl7@3r-00mVhqt>Ws$1#gJ=IRQI2|lF$_U3R_yJEt) z(xmh8ifdG}UH*9Ych)SPh^`}c1j4;P+kyjkDO{oBHwI<;At(s-JIaVlR2rmCHFA;B zsXr>s26ty`GQm>4-7z83Trz4l_iyhENh;Lx${m*)qOk;I6S2isJ>jBL-nn94hP@96 zA9w|8bE>K3i}rfYDMsYjOy<)mP45v2%4FxNJYhPe$MYU{5e9h~ie8w|+ug|+n7)8&!#CEI;bhv~1=~6!aItsnKCj({*;0Vh z+F%z6|9u&SFba{H%wnDp2fJ~Hf`IdCoiSs~6*q9{7CmFyXv80CP4d#&Ol?fj>1}@N zu|`pf-MP>BLe8Qk;jre^icr{1yQJ66^$>Y%R5Cnqs{>y3BZ@}T{aN}&V(Km+fy3z$ zEhl+kfmHwI5()ZC9M<0IbGq$9g^8Wd`5wsmuhA(b&KZQ%-7C?25L$5$3qf)S9*!1a7rR&b% z)@v~e0R}6JV<1GkTd&?i^SgjjYv15}3cgjj!t0=sX6iwX0uz?X(=l9#kW=nZU^pxb z9g`v9lb#^SRJ(D#AAB0CzS6|`Y8TtiLquOBhU?^QD%$rjgmYy#t4a0{LRY7y2BEME zj709Tv8bT;t5BWCz#y;3LN|oUVAcPY&S5xlXyjyC-{ZbxJQ_*q$2iL4am0H?vA5dl z-i%soEaEx(dS-0e=5gGNhDzOe|8V^1(K|^@(qW{Q#a;HCjU3`XTdrDM^{V=fL46{I zhQ!^J*yorXr9evii1l@b(6VSe(~8$hioWWdF`Lp?=ou z4o;vDVdk)coGhuLciX?Sd}(o7FCI`PXvBBb7fHq4c0f_d!x~d;f?O(*5S^mlF^?JsqnhuhECd<>3ZC}O7#t=Y3XzzU#cwa?i(N`gjlqaN%QLT;X$MQ`RNDS0{^sk#L2_5+}-u z3Cx-xVBDu*uZpaxitBp06G6rW6G5hNF^^y1R%NElkyxcd;Ajdd z#Ql224)Io3y6JSIiFNB|T(zp;I=;yJ)Op2lJjoesQ4*k=C`2N{@rH2+yo6J;#2xOu zC|4Ua{oPR)$5w{62YYlh2IKThk$-!E{)}qq* zQ2;5~#{Q2$;3aCn153qTVgCyT5+nZ~y8l18DNU7Rxq8lfbkeyBgxl)V9A}alU@Er* z&{i{QtiwW$=3BrEBPZun*VW{M|E6Tym&0%VcV9qWmozUkHRNj@-YN7dnLS&kr2qt* z9!X*NOgK8be^DgEYjt7v#OjtSibf|Xi5CDF6 z`u%ndrnlf0O+Oc;>4Oq}cKetxV-s@s|UL&=%@flLCxM-G=eyc@~nQ-P@*q-PJhKD{~A zuAz@7UGgko=X3Bo+{XCfe|PmwA}}E1<9dg;i0%)a5nTp#DkZ#E%J6h{V`+F)g3{fQ z6y@53{^*^Xg;XY9%R#i!42}Z9JYf%JS5WcR+r2*(xtLq(y4Mc+CFVrFm@=!E{n=`3 zD!(d;Qr}9e`$46CV>xg9%Q~c8UAscH4485>vwzv!vlt31rqGpuTz9k%)bi}^FU)^g z44^z-^r3utdF0C$v1PwKT8phN{jO6is~7`Noqky1uP2fNu^ELxeVhhLZly+%G_U(U z+Ew6Rbyx%pGYFmC*#3BG4|rb_#*=Y{=w(icb^BV}8g+lo zLm^~WQBG$qr;WtC=JD8l&Y3XxQ>!*;-gOa}8H^{bR9R}k13<)blLO)H@k$22yPwJW zda8)0)2EekzIY107z_$Q#>vgSJ?n~0JCXw#h?BAXpC2E->|Np4<1DymYtjdWXZI5l zVJWm;?-ngJ+Ro;Qv$H6#j=`pl09i}PcVAu?hf4Lj-?lhmeK(lnth6+~b44z2r*81u`yzTefrySpq_z3E7QGHEHE%z;dYeSEY)nJO>V`?-X&q zkEwP)sa?@4@3W?Ie_(#Riap}By(1e<;wk|hj^8>CZ%XyYNFKF+pACY?QOy?AJo2o! z7^qxu7Hh>gN#|x9Jz%8WC0@ol!W57+81*n4njpV9$mCkBK^fu6xdZSw%=Zl79ZbJS z4jgU)xQuqyV!hq$V0UhJ$z zKIy~sam&WL0*VKTVgTMHPv(it0b|9W(T6YXZ4*)Kw{bW=I^xq z=dw&W{CA}Vv*Iu& zmgmohCMD}b==o~xoa%_d8`Sq!U~T&4Gv$I$oGe=48;Grz1WgzmRy!_ z3jUqN=8c95-^t`O=k}tGVY$|}na}T|kIxc7zg4%L?9%4h$cnWq;A8yPAG*IUW`)mf z7wKcpyu?^jtNT6(e_3hW>f9x3q%(DBR{`@GrDQztp<0JT1 zBi!Vm7y#5O?W+X*uy#>qzx&`=_{3BJ0gVwEC*B%V!YW~n_W6(Ox+*xBl0xpVX*=o? z5B+?B>!Kp2hHW6)oyU4PcW;}p=wFbt0fOOdzU_dgyHhu3c!-52J0b>|%ZF`IY2uT` zdgGZe3d@wicw^T7QgNDd68_3_i=w}6fp1;0;XfQE^Vf_%whg;ehYm6I+#CH zG5XFa_K?#PqAEwjeje0YWo4x!(-p5lKVDGI_kR<6cZqlUwjYago(67ob#h+?+3u)?gEqSSbHaM_ zI6m&Yk1stn-uAiKLfn(lqhi#)2XxAsV}hqz({l%=7E7bEq|X2%`BSASbA@j``>h~8 z4Wp&jR5srYagERMuLiQipC4)8UM*MoFFGno*;?05_S~%Zj+Yy(W9QVvaEZs}am|9C zcQXFcDWzjMymMY(IGov2#5AF#E4Qz>bx^D_C>un=kEEIMngh1MMneKO2{tOc6ec7#TZ{zg{(<%Gu-(*5?5=(O7L&~l!@nVyhuK-?Sw<M!WD1SXRT;hT6|NZ7Ibtd=%tj z3DQ7Q$5M$Hc09z7qAG_Q7CdHINvXIzfH&74c%y|3moi3eZ)`{iu=oyqmvX0S# zwyQHy=Lfyn;R=U^T5Zy1PW|t*;jx6J32$QT7DeFsd$RALzJjj+SYC#N2zj1W&GGG$ zvO@0~ds&U-X8ri^Q;AgvP&0;k2&{g>SjSifzD3@^55dP0>cTJ%c%VS0&nDcATnGsc zm)xXZODOIi*J%mL`$xl;8wUEwxrF`hH9!Hqz|f}m)iY^vUc))IxZIZ0$r(dQm#7+v z3VI%V!aIYCF5B{J3At~y8Kd`}Dsv}nn>fX=hE}F%K)DST5wQp!iYAq3#lCsQT}n?$ zAro?sY4UsgOvdt~ zY2D+&JFF}5rsDr}TLCDM3Pe~SFSGgVFZqeReTbM=&XTk{`Qc=g;(mI+rSAFAiQy2! z@%#=!NnEM8cto-VA770k#;1a4V3-F1&B6|N{yNn@9^T@cZ^IieqDX{ben0}!DUybF z75V&#_GzUiZ#58Sb+Tw@s48YcjMW|uD<)Bp5=8oL0o^6`IT#szHqDpKjl3^(snI&a z(&eqIAQKd*nzyfOr64dv6#C+ZSpfgX!xfb}G6D^Qq5&*ZCOhDf&Jt9J$fd6+Stp%r zj?|CE7gK`fxVMAb!$PC)+|z%%kr60l7z#E}MRFnz3n1N8t@aXeTQRCWI56Ly zOGrj=z2!5~$aXnA=FRm24|4XOSplHnRE%tB@EW5g+VQ%@0CG1pS&PI0?a_NPv!GPh zp9O}~QP{NKy<-Ws5idPlPLW@kgGoWhc&` zNEZ`%>D>!!i+#p0Mx+!Ba5OukrVKTb(n>u3^K;T8fP37uE=m0HuVw3-=R1X@Bop6L zz7gks5sO^~Pw&Fen4)*PQbP&k)wa9$?@pUZ`wKYDX#xfjwVXMtD0Ss$cS-T+w@Jkv z1y%F-^L!wOq{XLU2(ME`z!f#+7Kr&q;Jj0zx`oR-1nB1UigPzxo&eeypc^@BnGUIE z5?L_5ZO}ZYM#^-6E=%h}?O1g<%aJY$y%sfgm3n8kAlqBNgz+fD9wS0)As0u(dmGxZu0CHkKgk?d7ieGs+84J6|}flQoc zXJVf?aF+rOj+`~_yz4Vf8Vn4)Q}^>WD!}VfkbEtn`}cWis(bn)T@olI=+C$!-cDOK zM)+<5avG>WZ1F3_8okn2HOQ7zYi%ACUH(rBMnr^P4G=xgAGI8GCqR)9j7l9k<+M_a z+>HfLq+w_^?lTEI#FgXo@~`dlldML!&-1_aZ{RD2QVH)aci<10))V81xTFW;s0B;p zV%f!h60KrG4a3ND5;Y!$1;3O7t-7$U%OtqTdb=nEN6t=cmG*9g@Es)+@XND4TmJa-W~}B zZqLc)b5IbxTwH@V(v>(Sa}b5T=ODHG{m&9wXEineLr2xxPHyNe{=#edSYwpFE_P%o zDnbFftvV@oexAdZ;^~A8!i7u1i0kZgd#kdLdl;YvgMDEbxRScRb`3`3emugyBK5r) zy$pbTHCv-x>@L7R>cB#&w41iL!hm<;cV1_8rQuL+-`fl3 z+}|AMcb~P(RWNiL&_)r?7v8%*TDbZ1d}gw#%KVl9OyFbfeH`7-($A#fHk_By9h`)X`^-8on!k9^zAiaX3l2FO&1biti=f_6)Bwl+QZ+6&i zz5vdds}Y6*Eirb={uZkdoDr53=kk}H#9zb-CH!Nuq9Ut_R@S;rpZJj9u1C`jccXDF zu&JLZ#C(**`^W>3V-x;#tKxOQX8m)+e~2oVyPQ)qpmsbzR2Nmh#b}ni*J^d!D|3^; z?D=#w+fLZ@RMv?^Fu*evIymWfNh2g5OsAEH6}(9XZpIJ z*LjuH2R})I7VTjfi$?$zfu3E*hcIh=nQP@ZBChBiRGK^V_mnw?q4Gc7OO~YRpO220 zsQLev!SY*S4lj>uzZ^`EKb;IfOH2P%>;o)Jc}kYdKVB#*(mR&3cJ!-GE|x) z4}Wmkn}mcR@3{x4Bt;;@7h#<}-cNCK|4Knd;(CGexdg^R3E*mJ`*wBNoRVB!#V~8L zIs@cJTmy_~@Y$dxeFWQd@~I8!6uU2Sx_msx?!K;wdo4VR8@AgrvVE6~Lmc6!c02!g zE>|87gCc9nH)77MEloA`3N`XQSTU8=$dR+(vH?)DRKIh%`ux$mi{1cg@=(d7->}P# z4p)wSAOB+9=_4mT*C!v7nQnFlc%P5Q54*6GVX?MDyf>~p17*DSGcy1>+of$mC*@ZN zFqa;JjHRVuZaS@ZNOgZbXQ$*xC%Hi!&lFb`&kX_hzHGoeJLBUZ|qxfZ9&ekAgy z%d>L(S8n_DdP{lh;`R-nI~Q_b`hGTZs|!WM7!I=p6qGNNX4Ir74JN!rtI;bPgd>r|C$CC#J4FK9dAsE9~^(H9m9iX7RJY%JeU z%*+(TvA2ch&|YkDdTDexG7XH*Y4bQ5-gN+YP6~kG#Ey>UtA8Fp-a6Ev;ESjFNrN&) zF(6#Xl-n|km}eWFr>m_pXO=WVyOiL^LO-E|^I{c@NaWX~?#y>sj;kQ4yZ`$}V4E@@ zjNXy}o~WtM3LqgSeV>&B0^RYOBDg)hvlnaqsY&mWJHm*Ku+Nj(Khb zu%siEOS**EkBNM-<9IboGqZr!gUbxVrj+ls=xs+*;S1t5S3twXYv4{c3B3LE$11;k z>YPRVb=NX$hRSfhin|)Q9KDAZDHH7+u<&?YBm-MEo=yn0yDYQQWTSD$c70tfh6sK_ zo2@hd_D_kbW>=|BkPG0skp0bkC$D=HNxxaa1&og<~uy!m&Pe#2-THa$rn zoQZNedx;=xA@%0SYa2f9jB2)MINed*rnT}>Zv_R1l^lMC~jb&JO5%S2eMZ^R=RTEZN$CNS@YrC6KFjR@m0RHx6?2U!4 zD%zxZxvnV3zJS|=bEs`k1a&1KJ8LH918fGvd>kXxT`fN-NK*g6?012sJ>b-EkL{;O zcJY2*j+_0HBitY@=5bV7byN;mgQ9>n2r~v9OKA?nrxFz<_jTFx?{Meq#$oKyA8Tfm zo94XhBeP(-RbRXdh4P8PxihSe%o9}YPD^R=xLZOd0~G@HWq|ShW{mlsu!WhjXbu+R zA&##U-`imKiWGAZ*06^u50*VzuK7eDxFdzIs<})H?I^7Q$-Um5V_p zXjTy3FNADu2LwT+Tb$O4iFs^>Pk#S*x(30LL1w<+l8{kVqA7@o6abgL5Kyj`Khh2Y z^0bGTYYrgRPyMo=wF4AYw>S?iW}V8-{CV+WB6vI!qZ~d5UC^FkwE-WHuS#abJkYrX z_Ua@1Nzss%%H!s*W)>z3kYeB-cm(VRyMu|me@gTr`oZt4l>PA>hFFmz+c>dwH!;8a zIwTQRD)_fdl7QhP>R(Q4!dYNZ>(SJkgMz>rKtkLT1&|ZY0l+=1FX?X5WAT`1Mp0cq zFEz;7gvtum;s6q9lKrM~8Z+J4Blv0&NZSAkz^#n-!w*!s8!;Y*oCNrhoRu!A}V*&)qLEDeaSjB$4`K2_;A&H!EnT|g?s zsK-K$aq(2$GsoGnRZh&+ry#n|w11W-^Tk-CY1Q*ZX#}Bs8uYO16jSK&Xy2n@8`zjL zR+T~bMl_9~|6M9RK%u@nYd_ZlVo!9eXrHC1d({Co)^S0WGVr+`soc5i;r%@EWI9_8 z$onAA(+-dVYImmyBA|*&lbwlX+ze0=F)8rMf<(ccKpJDoGm777mC-x4gE!WcO}{}l z6>an!xH&o?7xU3H7D9g@f2KtNWZS-ng}c=C;E%5C3b86NdWIo-)@E~mO#PUrz?9_w zbk}OTGr$E$SOtF*2Ea~w8B#21C~0KL;4lh|V3^?ca8$w>fZ)qf^@MMU>NgB?RT1A*nhu!b>6vJBY3vsDPT{ad0UGD%Oa~(+>=lb#3|{fyBC8(2jr!*W zSfJBvaiAGlkA0W4FfPoG50ZFNz;T4aKFstBn73C?(gr1+tz>>0e(?P z5iVMwnHM|(Oi&XHXI1#0+g!6uSmmuQ$hz;`FMI977wNhWHAebyIB?mxH(#(ZSBb_D zWekY!eDEVx3aiYe%qU6p&}+M2+jd#_OI)B+g;-^)@SX9*u5RK5*0EaRN%+1sgzUjs zL&d`9g&H({3MVF%Gy?8?iA*Gh_stFpfLn}co-yFWRN`taqi8*j=4iY)OW}@Tx@!QQ zzyn-bVuS4@JD6OCoakeubuwT{5YrB23a4VN7f5olnRMty)Li7l!Ju}Z1e^868r(Rc zXRsT8+xqbjh9)5gNWoFxZ$(mexuL-6!ljRdHz5{IQG;;lRTw#XF7uJR!%VHrF_p&| zU3NuMug})n%bqnTfN`DSN#+F!>lhMYO~oF?*h3GGhme2QD*IL>tH)=P=t&Kv^in*{ zDhaWTLrnnFld=OgdhT1Z`Q?IX;D|5wjVwASqW&uq5diu2_Go96mm}bP8j3zL$*M1O zlz#YUuBrh#0+V5L6`F^j_i=U0?n@Zpk6v9}9d!ol0)Nj(`Cs~`mx?kPGpm|=_`KF}T-}Q1X&wc{; zkCs~oaFm9=Lu|eG-&`(C!CdxDXT)))w)a$mpZWbL*{wbilU);7Nl@nh0WU|QC~RRw4&a zH^SHgLxUymzdU({g*x0X5*P4?5x&Nvbio2Z_?hivtx+<^da%88(Q+wPz*C(Q$aw`L zl+-tgY-es+f&#P$4+fu{qT8-Yt{tSq_J&!1?sX*sUs=|%>u;?vI7wG<+_Z||tP~*A z3W^^y-+e`MDzch6e)okWo>UY!RpFwwjP>)!`HdtgWO`P}x^VK&kQC^yClL`J$d{mMzyoPYk%<0ofXBUIj0GV+f+QYX3fSKH8Tun<4x_jgbFo zaT)%+-kcvv>utXA!LfP|KXGIK*6pzgECG#%%b|Fi}efuj#ZhqaJ;II6iFq`mm z6MX$l{r7L%_4!T6ixZ-UX&T6fM z*dM5r!a!bIA-@yp(4!{v&_~TkV%NTsEygRp3OWgc!TSVPiz^Fkzs0Re{AO&B$eWi) zH+h*Mg|1l3wbVC!ErDU5$y;69@B-bSx3W9;Xzo{+NmUl9XYHQho`(D#z4E6fZ62B+ zR~up0;QEC67BDJ?0BhAn2&5;BdNiY@Qd3oM-UB!H@=7l&yYqDFZXe-nv)>2d7+Lxt z^jefxS5%j%_W%Jo{$)#0ko91{zm)ue5jr+Hgqm2Rvrb<*aG7B)bbMVl}CsM3+Sq2mPal!JC#Pd>h z5j1Eb2oTK%1$hwpQNW0horKmE6)j6+9q8Uu@6;hVWg;z+S9E$7@RWN}uv)=ZyQtP} zj~|U>U)=Y%S?3LN1xc`|&e!{!ozkg+_yb%mO#3L^FyVbPDm?_qu0| z=Nj5Ko{iNbPbme7pdtBtE@L$tH6f|Ng6p>3E#S?cP%Ygp%6c`+7gr!brBDI=wW~IZ z=vB<1U$53d8V==3EuI+aEx*s&gpAMm@ zC!FjsT6mj$V^5;S{JSxXsH}u>_E$w{b?b<_&i#D9lb+vkvRtjTds^#S zv%bSO2sZl^z=&l_yDf1xh@uk86_2g=xu2IAiw?B4stQT-q2$Jj|-s^ok`IW<2$D=mxuKZZv!rso+>Ec0_uYt~Kg z;&AYu%uu{aMuc@8PK5kQCD$`JxL4_&tn)^)8g40m#LI6tCuCKTT`Wac2@cb=yj3~j zDwnG9J7<2uozC74UpI`#rQqmxtbotX>9}L$uh7W)uZB)}2?OwV`+A)6%_7j|R}*2D zEYnkySaE4iBZeam7?i#uwQPh0=>oV26V;q~qkWEg$h=mf9P}Dg$p$mJ-T}RBEP5`e z97h+im^ub3D+zR;xc-QjTXX2u6{?IS{y{VUyxQiWJdesny4r_cemFGum|0A2R>V}r zjciW!dFo`(NkOHrj^vwAdbb-H$?Wd5MzHqqFh}f(*U8sfR|KiS zk<&+f|%2C36s|G+VQ&C?nK~%(8QZ3cNam8cO91|38$P^jcJHsO-PR7k<#@9 z!i@wXjbRbd$CsVZ2MtRBtnfYNR8^c{IpOiCoM`zPS~L;SSBKB{90!6;XQa~ka&Rmi zF1=!cQle4X+l_CEBvs?3LvE1}qYCBYAptMB~&8 zq^Kui|B%+-%J%>3#X2-UyGXj7+~DF^2jlH-5W1hQNZLc;@Yumx3FEEU6D!1+RNM8a zR22s(*Ge3S1jtp`t3yA&5yc!W)E2P9h0C?pJ(}6o{U~yGWkefNIA{8i!CO_ic-`u; z))wh7PjPk`*UOM7~4VX9(NdN zSm>7=!Q4rFx9hJPn5``@%Lg_x`Z>pgffs|2+%wfjFZYUt=ai0LeO3}6+dT>JpohG8 z>lmFN`<$_3C9d0Vh^n#6)6RH|gq6^USpVk)I<;$2dNSMG4qMNC@n=DZ8|K!cuRCVW zTn<)F8bzyZ1)>?HPt?8Kd;DQ#7+tJi5m{CFiQntg3OUQw3)D>gF8^gcXVzFy&{HP? z)^oyBb7O~P$7&~Qv*U1PX&=^$&V27PJYFsPyA>N_;&?y1)4M%9+7&l~lHlt+1^T?J z*qqI?*#1W6(xh2IB-XdPCM*cKE3xOk=xY2926oNq5Lr8XG7@DZIK9(f{p`Bcf1C|Y zZfSXP(3hqA)OL{I=pj!@sDB@6r{4E&pH&%hy$Cbg*&m37ncY0!O9V>e( z*2Lx75YQ-MJ?;~fadlR3Da;>Q$!u7tFXnYpO+iEwXPDJna1t`^eX!5_lD80VxQP+# zZ6voWxc%!ntFFpi%$+^jT!myH@pRJc!PgIV@cZ6^k1p*y>GOIq0*s0QAroh_g}dOU z49?v-VZw|H1`%9}tKY(eC!PNEdWW1_diLM2PF+;*d&m=1|GKv*-@C5MWcrPWhPLA7 zsu|VS#E^bHA*eYM-svKx$AJNFq3iupI(G)EOBlR1Z;;HkB0KtM#B~NN}N*a>*uk zXO+@-U1Z?bUCs@_5-`xYEcEuVdNl5nz+~Q}r6~3wxkloN6+(_^B&2c1# zMo)`yTVy(+L3d$rQ^>Dpy{(aC5B5Md6%rS?bNaX>!P+d&ydknKGOk2G9~J4OS8K$? z|Eds2xfIQE{NROZU2k9_^Mr|TiNKPOG!(H}N7E%FrAP0WnsKY#wdsD`b-GBu%d^z? zu|vwcXM0FQ@g+&ayQ~L7&7D=eW>DqtvcrY0?qmG5&sBitDL*A?3r;}ifQz4Z4vR?O zN&pW;$jt8k$-8mpIBqD~{{9SiP!M@5QlLV8EOxI~v{sX3e{q#ZZ_*kr8NY_dkww8a z)6FVx%=DgLPyWK`H1r&92jdUimVlliFdy8sGcNk`8jygvIX7!={q6{g z*NF%dEw_0?Rv*TAwQaE?mLfa1OkDg1t8sA?pTlwzRquN*!~7^@T*!1EEJN`_G7gBk zeDwck#1sxM>W|pJ2x_WA@&9OWiy{m_LbbdGl9LsEk(etVUx_LG?x{a~*BTJl2EGU0 zE+YbiQLATd)&4aC9nM$h?C!V^m7sIPKu%Yb1!_ziW&Y!2{ix2to5x4{q}%hqAy@|Jg<#&qYHYF$Zm%;4bXc#aIytJr=z&zTN>c{&6l;hMkf)`9a5 z#>A;dF&(e%Dz+K#YN=(8!J)_#@htbc+#V6o1G-TN{x!RZzdgI_ljEW?;4|wCe|>Pf z0K!AU9!Kv^*E=Htzn^~L)BL^GJaR90)92;pvM+}-Be$Oqp6zbtkLUJI;qdrSrce4H zhkcIqj1iuA2JVm0ryVEiXzcQO0mntKa$V=X0Sg#C8vBDSKzCnOaz7p3ufJI z6~~`p!pLG@b0*8;pAZMApzzs$fm1*U=LHnT(JUSYd=8VJ{Y=S(m1~^jpNu4{S01*m% z&--MNi>U;NyG#LEU};IvK{$L8n<2k2kOpR*(Wx~NYekTYX?oQzRiMT#0)mGI<@Df6 z@Y8uWhk5g-KT6v#45EJbLI31ePp6F{1Ecea0tt1tz{ljaugC9QxBJuX(Iv)3r+dI-mKQI8uUe2IH7f_A)-SeE%5!#Ui<*vIpjJG)KUBNGXkZDZ_+J*PZU= zv?V_k$i+OC`TI`4+N_zYxBLqf?f=%d8_)jp%i_U}*`Sn>PW5PM)nJn3MrqoN>V%qX z+K$pi-5%%x{N=E~u8)kaWCOh2T9>mG>gviF>}g{8Cof`h0=3M9Ib{20f9q-ZQ> z3@$^0o*EFf&G5b6A5ZbZegh(fa*Rb)m#Z3rUi6LoA~Uh>{pc-Go&SM>Vp#@ory-oh^0#3?SxWxxnhpbXFp1_JJqg!)vr)?1IPQU@?&8m1afm6%B!b@>_`MG8=G;zvsvrU6Xeakjk_khh`9gf`#pe&iTRiLO*q zVH6GKN?Q#w-@B7!K@DBI5=y^|V353Dr38@$GeE26*ixIcLB1$gWRqdPiq?xL7?e^o zXTRhDVPuv()?d^vmrhh=ajL0|x;piu=>=Yr);xoynN^&A&!Kk21s{jgf;!B;brhmm z#-4W+$ry3C8*sAZHTm&(CLyboY1d<$h-@AqR3W@i<~4NNd2eQ0kMh ztkEb6(PO~saPEF-=C#SSTtt{e4n_%whK}iw<-k~=B0~Fn2s|qlpT8Q?fG2 zSnNK&Sc6EgU??zQI(Zlvcz5Xhp+d+VWMq1`NK#2>Vz;;%rIBcVC&k@U$pTQ9T?tkR zaT3bhQWBFF&^2`$tQ5T|kO=z2Ig5s|2*6=x!G(Q5+XrDPL6{`aj=0wMWjOMmz1e}~ zrJ?6VA-dA7YJL`6vE_!Us$oVIPt22jeL=32*@L68nfykZ%^4tiFw5ry>4cp8oWwu^ zQgbh<;t#tioC^={yNY08;1R0W>ml2#Gi@!1deV6n9DouipBj$v*(9RVUP(9CrS#!p6W%>X)k!M&IqK{Hu7RR}e zk=(rU*iNVb!R&INyBO$$4?h(#5A_Lo4DnYg)9h9 z7)Cass*Wor-H+-{dCBiEuj1o~(2p(V^F`Bw$SLR|qG!;3Q<(K#kc$gOEYu{ff!>yI z82pUYv!veEk{Q#M(DW2G0)LQ8VH77X{FF9=f&?7S%+s3Z#)t;e)lk?IYwtCcaozUa z`HK4Im0#uqZL#msDA^z2oS)rYGr7OI#geXzg%>+IYtQ2k9VG6e5|yT=}V<;>B`odMQV!6+O7ji;0cJiW z$F%R=b3BkAd?-5nwbNP~zpNOvEELmax1lm?}wQ#z%kk&-Uyz4^^MyYue6v$HchJG=ZT zgXf&*JkNFC_x1gLKNrz;Bu=9d+_&31p=%D&Ho3+lYM0At1?b^a&KDG&RsaF03Q)@n zq_O)j1j3@@f>`7~FM7#ePIlhk?f?VlX7*!u#PoL^rgT9c2T*phWZZm>$lBNmHiUo`LEp0c9@*?Jvq zEDSyhpB}mOO{;J()K0Akh3cKS2Ix!|TlB|Hw%ISfA1>i>yV5!)oS5}+D9rGeZS}q? z^1VK-?K6|vTrx<1<%Ry;tgO(dVf35%A6<0sxYStcC5>4}#5n4eD@b;#OTWhO;09jS zN?k_f3LP1*C8^(ql|Zw{m>gWO`egYvMu|m=!}NC*pL75m5cXMRjYVMU4;%&Wh77})TkCP>gFRJ+c=BJW!#!D=@m_0ei zEsl;sCQf_dPoc4tV#@8Gc4aArKjkfow{4QUg}K;_N{W1{C~UHOqjT6|!0hd2M-~(~ zRm`jwtGl^%pjNfbr8tn_HT6{nWoJAHVR|j4e!5MD ziYCdawH{IPyTP{K>FM5$y={<=aWWdzkyr&F5W=%#X9 z;JcyMk0DvrE@!g(+`OYE&UUxBxYML$kS#}T733s zJUQlv?PK2ojK|n|Fj>HJa7VZBbSjV1&~|&&p8w;CQS;+?jy5r;@<3u=ArTw#dO{l8)sUw}Ifi)u3LeKcbOCgGjTi7Zu1l=iL7-)_`|4HanI4Xgzpd49CdZ z<7@GVoSK4Bw<&CMf6vvy=Uux;XASMWv(O+9wPmDg>ED73FnTyq_74BB#vj^-(^;ve z3?KCSgg&{Eh>ACy(Ooc4fPQ!Jwk0fmSgH-8U6oF2& zYHAW6anY5f3Ju%!@3Xv;8jC5Bqjsh#d2;i9B}K2ZKY1O`NVbMdA|Z8F@$5?YtlEu{ z{rkGl8#hOJOX(0 zJZ9CJSh<1+7JXxEuTw|%qEKX%-Ux%&Sys2@LEIsdlEM$zs2;$pKt!GQjK_<(rQP&r(U*rg`8mUC; z1wvRNM~H|95j^`pD}j2Bhh(ZolBHaf`w|_FFQ>@#5tUxA{JqNvo8HH?zUK}b{S9~G z8m8e!x-P2ov3;Leeoefp>9?*l6Og{!oG)Jq5<|rIj!#`9YGn^af(tZo9f5>u(i}&R zEXh<++PQX%dFQ5bkPISA6Su0|1!Kb_wc7R|2{MWY@`eQz5SVpP-bv?nXSptX8lH?c z@HxRuRU@^Pd%H@llaaA4_39XkWfh&~hR5jLQ$l}?bLA9qPCJ6@E1%m*$2-+Pf8Z41 zxk|mQe@R@nmKRHlV=5+;gXhm9CS;8qE+NXtF5TGeN@wDHb)rrVBci>BrE7@vXJg^>1S1Fc+;v}QX(Mui?O=Ze> zNphQKA@Lir%SDHW%cFHh%GY_GnB$e}x8ek2mo*7Rkgig(@#oX7Q6aME#bgM%78%Ll z;9=ulFy^zTdGHLuE=er<6vOrnXag))Q6e z!b2(2)q6(sPE`c@8j0344z%YLsZWv1esxlMCy)|Lr`Hs)!Vqf=eZg@t#EURrL%W&fZsBf;A4D8s`n< zug3dq=%|>vIBdFccHn56R2wyR@kgMaHLVJ`BHq!_+)Z#-i=!mxAn9Wuib?UmL{&g_ z(>KKZyt5^(lq(ofnpPu;%TCJgz;E3sAeozAY{iazj!pa5B;elN;2wvqGY=)I8knhQ zXUJz(0`Xx>%+1YH9ljOUPtixjcBj0Gn?=Rg z@5)uJR>#`IEJtMa)u&*V2#xU$atVL(pEnN)@H40+=TBHXz&t@-j%M~LvXI`h6)dpJ z({u4P4}FsXJ{Wx{$lTs3F#H*EiwlnSi$!GBaE` z8Oo!6Eind1+CDPoRIWz^GV=JDdq!QNu z(8QDi|E(d*DDP;I<>3UuXP%^fgAc`G!`N?-8Si-1tuLbaX6luia-Zi@q8PzfHSC(f z5C1QSynyJ69)dDMpDSsjPv8qoblE9iCxJome*fl?2hEbPB!70n)1wS z<&dZw2m>rDnfny`C~7<^Xp-CN!ySUo!)S~A!xsvz?V1lvGk+Db&DA{IC~%=HImaD- zFqUj2bOf`EQ?H}@s{&WTW`~x)K;DxJEDQ{fG(*B9$(>lwinZm&eO7Y!-ghVHOUfU_ z806$jw9BGv`E23jyW(PJX1Nv(*wahtYRH zNPhY$gBtE~|8E0YxZJ9|0}16q+lk8K$?JShvorqhb5h{DW-U@r$G~Mm?;9tC0Ni@+ z1GvNIY=~l?KB__ZKN(2r9DOZBQ-I zP+@wlUat}>lZ=Ilb#);-#Wu!?H!A3(_HQP7jUG1+jRhTL1BU~G7h-Np=GLuAh#M{R zbFKVawRfrBW_!T{8b&CM;k^9ps{Z+$sm(U)QkhOD5>DIa2)K-= zOPE9HwftVux2QufoA<}QJG!**U>xi;Jz=qEhoH+dQx?i;Th_v#8(|lYJI)8rWM5H@ zfNPZ!oOrmfcI@*#P(NQ3Fb}pzR7O>{@SCE-$>7ZCdNB{yN&WwUhY|S=K26N$<*!oX z=)LJuHNZBjuM%&k*j>p9zPmr*d$Oz9;;|s{THLrjVfn} zdMr~UJYxUMQR9^W4Z#M7LVGN-xi?SXkK(ZZox&iFl>92i8-Bw(vlA;-gPCWto zo3_WRQcrpCg?f9o-YD`2|Bom1l)|2YPrRsyk32weNDIdySHAK+(gHpF_dCGc>M=&O zw^%GlDdC*yvNfm%A_D4wSxBEFBJLJ=4~~vm0P@4Rdl5?lJv3=ioSiAp^A+>f{A@X} z+5B{z9ee)rqka!Z9KAxU<{#CxfyKqeHuD^+GmU*6AMp*a3LWfDgDz_T=BokVlI8i#gg9i$^`Pb0^IC1RFPoNjj}=xbO3;EnU>El^|z ziHDv;x~^6{H`E}+9Aw1|XdvtG?v8ZX=Sb`_XF|O0=dXH>UgfOxN#C1NKXCKNdA*g@ z4+5sFg{zmEIcWa))wcQ)fTH>KF8PZ^M-*edIIaW?kN_nPydPGTitTq z_`{p!!m75fN;-@hMfC^%cy=!U9&sIoSZ1lwdFvHWGHT68F=ry0h@%B@1>YG#Mh_** zHG`7bjpAfWt?~mvJ!*s8ZdyZ`vKZ}mN~3X z|FEKyD;f0D;0cxqG5=rlZ1C1ncD4@@<8lJx{D56QzXh`=8ZSw^ALlyAQ?^6p9F;8& zj@)qyWqw1G(02lyVe?xE%SCq;uplq0$LQ1xh!m&r(Oy5%Ia_2gS3dPyAm#tpYWcs( z&k=o%w7$Qu@}%Ltv|rE!KJ*=6X$3-Go%h9ubY3fnA2B9zCTIqrUSD6&107WV-Bkp& ze_W&Y)geb28wfw7aqceAfe)y$S;~UT&T|X=tXiM~lmN5vIpA#$HPd8k*MBtls#lQ? z{;wGl+v$?{a{5#Lj^+c^;g*&F358}M&lOG_?ycE6(H3S z28nqb8i6P|#z>BY38HXu6u`QvJTVhNM`R)#i~Rj`iPn?veK1QzaIL!^IN=9_^#J81 zU%+l={PJM2)U-3$ZEu=op~eEmY9K+b>uvqVG>WU;sR#gyVb#OC3*MitngUPZF1UH0 zs2fk9t|w*A4WM045Rg!#(e1ubi+oZ&yeB9u0TrU9W@BB36~;_Pb95fMK?#FOQ3nM`LpAIjXo?PY_*g1Ubz!Vsm_JS zonykT3?7Sc=IrAxAcuRs_WFR1C{0cL%==Cg9U0XR(+((P(Lk`Go2|EBlm|;={&cC% zkP|_96sV(-48cC2F^=o;tlJ<0n=&Df3DYkP==M|yKrDlam6Pf7X!0|uXW}wAgL2>0 z0BVKzQR@}p?^yG)hx5xL79bF#vloIVbl^Dc=>a^MCPYOPhN1coOn*_p@dk!|OHcG* za%rk=H4y8|M?}Mqw1O8DbX+cISoT&4eE_#rsY$y(FCyRsu{=d7^ogn!!2_-UY@+#K zl~FMQG?_RL767!%2ZFJRK57H#te-wGyle4%TCaehNK~ki^NyVyvuw?8m?_71T~GYk z$rIQ%w$5sZkr=y@R!tFQxs>J(kSQO(m?Qx@R?A0GlDZR6@nK-G;y{;wDv_UBj_Xd$ zchHWQpL(by5!=#105;6KaShb7gq!n2HO`cwwzI!Gb9rJQj2J0@TsNA=x7c>$=JoHG zR^V|hg8OVK3gEUr;;n&Ljc(b@o9T^NlTtuQ+T7TXF&6g72g=nP=Yz=8iWf^QVx1EP zt*YYs-5y{P+YcpI0BUj4Mr5^XKQ`HTdye0wB`(UkORyb~ZQ{L`Z?^T$S341!+B_%d z+Vnz(_I;ZD_LGe;qNM`vq%s8UYsVf$j*Y~;KNkf)yX_(XPY}|q`|TzR!u9D8*Fixn zy;>0!lv*N|)2NZAKQE2PPnaWBVnv+(LwD_;RAWcL(Ub#>tvnEN8Bgeq-dacuWZwl4 zF~7_6MyChSi-W~}V~NpBA+;61McKWPOZ&ymg=qN#Pzi=g;^}R7CmA*$f95#+ZdP*L z9?fenQe9Ifshx?T5)0=mqkclG_GzRlVv+F|_*~sdqqYIrMEhXDeJ9}YHV0hgHpdxV z*0&(RRSE#d+A!uZ|26y`=yn-s?SmNd!kZjU&ChLD(&*LI`t=`KI1HPo#eH}U8yw7# zv@-zGGac-(R6wdJ#Rlz$oZ*7~{p6TM-}JaDE(VF5en^q} z-5juj?+~B>)(vJGb#P@9!5XkPS;*$)%aEy!;W?b0|At?p`ImITE zX1Az%hxzqG*^dj2@h+{&(O}V$KT2U^n$1QO&iD7f`de4r4eC}YsJm|GicTorbh9Z( zuhjhX)niF{)+Kh&A9UynB~4if*>xj<>qi}I9{(dQ2z;1^1&0gZ<0W$%NPll?Sj_ez zeRz1_x8Ku!+u%S6OhVBge6Nurt{5sXt>Q5$#&hBb2`-Rm=Dx6PksyR?1-wg;1ibp;+kRHH=?Sol`T?{oPPt%^(V+gre6{Ks?*-5|C#3n~=u|ZVQ1J)B>db zFXV!iLnp?gUnbZa!2yCHn8@pF1In@41d?;)`6zxn<5EwGJQgKys`Y3lt+R;GSZk5B zT6^NVNwAz34*PF4;_3m^^kOADNDE5-0%-DZti7oRzuN+oe;nI9gYE!hylzdNf|h+> zmM+i(X$40O_r1Azvgs;?Bv$`ReX(>=uLOQ!Socr7ZieMCw%3^P9w}TVMWvbBAWId0 zLqtj{>-y^PgndQOj?wC~CkR`y%!VJ=Nh^lRL8;o6Db%jhK!A-tS*o?FJ$YMNJa$b~ z?mCuQaE4NTIF&~(YW14Sq)pcA^iNVVN-qh>*A1r87f+KjMKt<8(ZkdE9sbr=YjPH~ zb@8s$TGir!)mFmk1-WyDm%0@&d??{lIT)4sQEy);7;|?xTXkeH z7IXS>gfe2CK}8#^{{^Gww;>hzlfXcPaHC#;VKb&R=J31cNFcUdrHWJchm`#&PJY>& zs!8A$kOwY}m%#EAed*lP4j=)#UzD*%F(kZy+81hF?41*{O>|=?B4v%GXEOFcg)a$a zHDFVu4l314!XA5y{ZQ(ZPyF7~if>yy@sOOwhciSpPEqV<&o=?!6Rlhwrx@=#9D50l zc;VGbqcZ{#msV!=;e>g;WL)3OQjwNM{0i_<#j7KplG*MpSCsuk59C$ws~B-Mw}iVW zF`TVTn0dl+NB@yfqyR>TT(I?qY=xe??~K389ywmHtJ3OM&td_G5|`M2noN^LYAV10 zuzeHq((m12t0JIrOEPbcrD(86fIs{x;OOYc`q+tL9wi(4lz3;ZR|gwK4tS#HQQ3z# z?)$rJhe&`&4RP5Xu=r6gX+?Urt z0+%JQDY5H@EBQ7!EaP`R{(QuHQy;o62z*;^JzAw&cps)qXs?$2Zv!T25a1DZ;NB!Z zARteIu4Ene5git#VMSGLs{90%p8x1tHsH~2Hqr2ZQGjxuY@}(%(>`lADliN8{t5P97lijX)bYI@sc*gix6S2L{r%rEJm4B!|U(WhWe#_){Vuf|6 z1Wo2u@MT5_{dJfUXDtqUeMZc&b0vYS<;{u1|LXh(;AC0!SVOU39jml5wjCWSwi`t; zlehpP%e)QNmPG8Z#AlpCG;eT`T*l5e2XycqvGi&|d9F9s_tGkKAp#~i`Sa!5BiDyp zoysMz7hJ7hyi{86H=rw}=NW}h+S2CZxXI~Dc5nz{bT+M_DDa@adMEN}PgW)ZYpXdU ze9tLc?@!|gm-#Q0qz+4somnY5uvbd>UfCJ!G#mZVTvz6Rs1n?dCd>pdF`G)#IKTE?snFvRuel@Tl=rNE24b-B}70Xc;6T#`U80lM)kIFE04Ov zp{7zI5u7ee8&rm6)q!!_K!$qGgnMH0I)5#jHBbR=k4!Ru{+MMsne+~r(DiHqc|A`O^^?sX`L@rFe z-$dXOHYE(%_o_Pzhn5E>CyBE+%jE&9H2N8Xw((Xxn- zL3XPJ$y)0igA1f93)kPzz`f;L9@~Nnp01u~YG}SI6dg!0e<{);XrcN>o_Mst3ORF( z|0vjn%kMB5`e!ta!(w1`tr(nfC$t?%FB%&#)`I1|Z-#BP7-?RA)ul!63zSb0R{OA< zmYZiY4AX+4d)B$x&i8NojIPlX*c`TaEs+AlVyE;~lDd@#h^n>nt$c zG9yRia2gAruDkY_v19B0gb=a0WRK*P2HeY84J9YpnK=VNxuJG2i%qbf=){BEGrTk8 zA&zPVoFN;#`tw=YErEZ8LwRh#LoGx3`I<4wDVFpB@SM)0zh{MqH_KaF6@x36Lq+5V z-7UToS07ieo??}y5F9Az9Su=kyC#Ytt_6t>C3BQ*n$bC=&Q_WvzB>eajlx-+yfAMd z!BvN0{D~Go%nLr(dtAq;r}NPPR!JFshrFQUJ3v9zZS(ayl;SEN9MFlRLDtkO)h4O{M(gK|HpKRI*5U}4MiHa+b)cpzuaz>#gBI8JNQUZBvQLgR zmytA-nas+#v)7A&hwi7~31pdY4(v z?;o(54#Itz-W2^c{APBKT(hK{%&PR`>hD@}ws`2Od$5fZ3TiILvNNhtk4d#D?cvYS z!qm*--Rm?yOGPe966S*O+?M0=lO{@&CYQ8I7sIjmspjzQNFuhPZw;G9v5^?|Y_Iop z-I9`&^(qaYaP4l%>{WiTONyQIkehY7BXKJe_hJA(Zxv4jffogMt( z!UjV=Jn`O#zKcmWnLr?(+&PfJ?O1}MV*kd4*QGl@#UNpkJ~N0U|5RfTX;!+nROY=A zBPhoWPOCv|eU?qoJb30bz?X2q?CjP$F__QWMl*|om)5`tCVfRjC=^afd+ggJ8384g zx<1|BX4B)^?+CijkK;~G7xVc90s9_QkMld8nHZa~OrdC^$Pgp;a-PiyDopkyFkb)) z<}ysu)LWXyZp>p=BR;h#V|M zN%;;(5FqqAg#@%ng`s%I#E=QbzawI2IlqHAJ;x&D4n&%V;kFim?W;By@i)*qfRRj9 zHy_s$`A?iF9N~FgsoY+=RQTOuPiE9r54|{-2}elz>_<3kY%=r})wmbe(&4btS9gs* zieyGNnH`!ki(HTE=t3DmJ}u+fGMp6)*cHj@J(b3KUU{*vq^bz?Q1n~91=xCqwO;}Z z0B#`y9QXtVO^$)T5HaAk8hoxCqRRLTg};B8CElNgc}?WY$(1tL*gbcLcR)Gwo34<< zAc-Q6OPY#U7D2>^A+7_OaD*R7mBR7R3^x&!GgS1)W-&bEeO$J*vj=AMTB`y4tgqD! zB5tQ#x_7Oovb9ymmT@DtataH5_ZuPCHb&dK6_KObt@`k-@L%(8 z_`P_zE-wf?xOt4whTv;aDKYiKnbavrhOk_)Wz6RdPBw>9OqLrMG?I-L1pT=~uqifm zAK5*lYgD{d!@vZc8J>l6uWWoQMZi4Z7yQ1V$iI+$$yX=QtGNADOQf z9L8}*GF*G>yr*^>nSz3Qt1*T}QNMXKn*Uu}Mh}0Zxu)gJJssqM3W#683`!d@_}N5k zHH9SSb@_|kA3x#YPV%==q7hq5E$=93)HCPkWQ)}9qcH>%dt#`rqBfWsrOKZ&8v~v- z68&M$Z>jYtFo-$hNLq1Gt3Qv+1hYinb-Lz=c{htjng8-xxi0L}<*-2w@kAMj1mtf%X8-oFd|zy`(sn8e z7MnuQas7=QmPBA^{||{UyIuL$*Y!`J$*Rp+tnSiiq>f5p1^=j-jO(J=g?qdcX*!py zTe^x2^{M9lA|J)-6`0Mi9D;;|tfl@#5IuoWO&WB@t@r7Xdt-?V`;xWBOuce9jwckT zhcpLZ1BshLni8rSB+^te9;B?jBCz>7Yo%)%U({DHYW5E0B=MAQt6{GQx9!-U#Y1rk z+i@sK)Kq>X%7%(^zUykl0F5~5^cx5q0*}azoyyvvxHozPRy#CN_6o4xiH6o zSKxl>yi3~YEaBIl3zB})wq6mqX`hxx!L7(;p;Kh8hS^HPAxH~!S_(!#i6(^;jZR7b z%>d!lb}ZW-sF6063JgtD1zXKYIo<6_fKL*i$EW{V>)LDl9cbavTtl#x@}vvFo?_+C zD<43J(rFCQjb60Ya-gp$a1E*tY$*j6#}-+K$%6c8TZGA2voE!dNlD&;)UGXOhd&5` zbDorSaLiVYyhlV>)a0W-vM4&@ zc_a^EvX~A_m6w2;_qNS9EgC5?nmju?3|8itBhERqR9}`74IIe-ao%$bsyp0&l^b*e z2)pfUeM~fYytX(9Mp+_ID`7*Dgrv@rkA*owF}6pxYt&9}#g7Aq*A!Ffj+uSfGQwNfKznYVwc zt<~qCY>dj6FVGR~IKw`0CBs6P=xzo~QgPgwEjKtD4r6R1H)wD;2;eODqrRCuwHUJP zxPhDYw6^&0s+HDW=ttP4@q)rF*HN+IRY?13+Zu@?WwJ>j^&gXD`;pSfk>gv9SD(6b z-mI4GVNt+lV0P2e9+dI z@iKc^F=Omw5#_eW_#ws*``H&=odyB~w2JN@cyzw*E=j2(U#W^Hp#)W}O=b zgzz#z)C+kL1Kj>t-iEj%-J=N0@?PFSH&lN?s}ZB*9lB0p`_wQe_olRagK%TGCthcp{r#GtF?9X zxxJuQ_#DS&ZdSNzw*|5<6Xj`jmX&0DI5>ewpjV*}Y%j^aoe-{4vtOplw!SBRJIA!w z38W|MDsNTc{Kt;63karkQn?~ekc0{1H?>uYwuo?U#Xq^V%t1z6fZMdoD&$2vQ_63t(dBq z-@ycI^@LsbF|(Td!a0|kB%QzX7Y-}&>V(Ta@42tI#hq@`{h=uh=?%UnySiKCY?7`j zhA7osw``o+opX=Nsl;AGOtb69A_lFX3KK2)PN~q6-rymAi$~+ZBvE9Bm<_cM!Ic6v zn|sfI=$Cco3r>B|LopYv8n>FCY##{Uj&%_c_q|?urkqGaHX^!8581?IgGkId?y5S! zM?EUrR-r*>b{tHF{n8`!xDR=MnD^sc?g4Q+;9hMI_DY!2#_rE{?;BfelXgFe$iCXs zdG`~z-s4#1>wnKNnH+C)>bz2HseTM~o2@r3a{W+dnhW4n7hLBtYIniFvX-6imJ?0Ob5WYGM^fJ? zDl-g39XwNS=xS3mJNMQz#$R^RjWwz~JkFD{*VWv%2?gwt4TJn}ughM4SpY=6zvZcW zaAz+;{4)$NfH_@R%|66@YQLjPWHetcjV9sx>4vEWsGGJD+*g=~3P4mcrQ=gIgpu8}MU6nWO1#1VMBADIb1Dp9Mw|2fs}TsY z#eQ4=q4#j+r-Di9F*bOO*hi6uqsZI{^B(?@gk-=4RzqM)t+#w$6y|X9MRngPO^|t` zBT(|BF8ge)?_&R((;9qDGq+mT-s>{USjOS05U)n=dDB+mMA7AgO+RqpqSiWGG#F;twwN1jmff@Qn(np~;$_u{}#nJr0AxIg?k;|GmI>nVaO6uNq1PHcjRP`)}mDDkH1mJ4Ln3MqWi{^D}ODe}ttTJKIE}s0}^IaX5yQLUYFTo;)RlML$q_8HJ50N9z9MZgap>`VT%vSB{hwh zJS`UEiv}x2N&RoMn?rXk(~kcvv1%@OsqvM~S{k0!N7_b+Hb z8}LjQ0w-FSel{MA<2HGCZZTKN&p-^9t%As+^A6;o2gyj~J9`29+U?pf%mau`0m@IRs2O4N{WAM-?qgYE5uS`{b32pHV`#;3f+QBER0rdahfe1#2eb)6p!+4rVj*2<%GlQ$%s zF5p^o#5n!Z+1grUcH7s&4}wdiM;lMY5l>*`e&OlKs&q#hT`yt<1+1@#i3gox{Y`p5Ft^DkU$ zHa%y>D^G>Hc7ap=n3WBg291B(wrwUGRYSToNrJ`~7sW4!DzySX;BE1egLms7VF;ey=p4 zs5huTy_dY-Vo}vg>2`Qn2%#k5w6$w2gLSet8&4ENx|q?vGH|H#{QUpvShxS#q!P&t ztUexU>HGuY;5|l>l8@bJJzfa@txJiR)#)qvf`~S*mGss78k^g?W`aRt|dQq&ENet(uG_Zfi((pxYF*p;w8*(SpV7A*Y|IoO~li?d2r8{ zrTw5y$Ak6oLcm_wCx@8wqVR1P{(=X+eCc^jsnI2X!F{8y5Osz+NT7Z@5?xsWG+!XJ ztGWIe&I8oa31Gd-Zmy<&`H>We3nSt_pLRTeVbN38vJGJ%j+;#FmY4E1sZVm{4f5O@ zj^!cZ6i8vT926b|FLQ8=+esvIwqm)InT&(qf7@E}TkzS1ySQa$D1?y5G*`9BgNOJ_ z`{h5)CJJX3I77yX*8K4_L+HE4M7nV1@~wWqgSm(7;(JQPAD<4G zpDa}Qau}zV*!AhaaHsqP1P(<18zUfCqxHu^67s6@ET03V**aTUhMl71;D~2+)9fR_U9KKl@|MU z>M5c^vG?HbLRP!Q$RXknMfT5xB=npV%~&OB3F`?D#a?SeU09e|RlXK}{QkGmDd%P8 z$rneJ7kOagI5`_epv9?2ns~L8C&<^Am$R%o2-(8ExS!J1V3Ju}7Lk!T5l{=$YDtzdm9C#0A zp#m2Ly_PB|ddQDQ^ryM)cl(*G_mR9zv3-VakU@0#0yW$iDx@Z6u_Gz|wjdu)@$ktG zD$fn?R|(2XE~I08q!2LdN*L(cu|Nc+)$0MB<6R&aq^y+z2*Uy=2QZbhbnDW9J{}=1 zE)CaO9&>PTa1VaaR)V18yAR{JK@^W~o(4j0nQTw~e)fTTpAPGqpGd7TIhj#UO(kry zCtps%mxX|hC==%&z;{@b!5wkFV+6K#88B)%A3Sc+3=@E9q6H5el`s$Tyb1y)z*i{( z!@q~PiI)pIv`dYeYV{cbT_7Kb3=5o(g%ihH{vo<Ilv@DF^vCSc#IHJP|UJ7 zXe81N)jLz>rwra|vlf+Pc-=q3t6Yj_OArz91}>#nf7(tEvQeUu2jL)aT<`{oJ3gF^`J4#C~sEkFd9;O-h6f+Tnd?oJZiCAho0)403C9=^XncBgi> zc4lg7YpJ4Ax6|FX``&Y2`8>}{*n4Fe)Yk;Bp`f5p~I!RWBaN8soE>nd|Nx7t@y3P0l1UcX^_^S!F>ts9-*;u3Y8L|M>k{GxC3 z&!r2RAW=Ix!kZSJ5pPE~H&^g;d^?;pmxh$U?_w!4mM!%SLmbgV{Zok!{o3Ai@qQwk zQE>J5m&b%W&bNM@OuLCAl0)popvi+U*0J7z{~%}nA3N}`^VkT!WMZwgTdHWjm3Vmr ztk$2jD#qve5sr`(atB_bhT)l+&sRrtObfMkKg~wcclkyC^EA;oI#tNe5#a=J2Kijsn7?uV`7C1gZf*%t!pw{X%IR?;@$cS_?9b#G_l^5^ z!n_wnBoAtmoGetOmK&#XygI;_i($``{7y7Ce}?;?7yFA=;@k-~{cFlI%%O2SZHMFY zgxHH_grdR)VTj8@VMIONU-cKK@NDL=n^5}%z^dh2^YOXtaQbmXU=lx+eIg&^r5HPrxAmB1!+DF4Q$w0GmmRvoE2=udcpc(~6D^ zoFo8)S%-ID+aRE%zz5 z2zG=J2@z#?T?!f80JRFoDS4~Iea$k1=EWA@5iP8~1eT1>?>GZmuNwtD&LnHB=O~(+ zo2LoDf)aBWh@q4zwVe8``J>J0bX{uhpH(fV&GZKvrBo^$ky}X$$xs6uoYSkT_#_U~ z-oYdePTgtix!fMN6$_`SBJ~2}=O^zo!@gK{lQSy0Xx6OGaD4S^?PlvF#Z*?Y>0(_* zbW))>@UneR6%`eH5!=+dMwys$qwe0{zy44K&(V6EK^lbUFzQeVxqE|7HxwZ!1#0@Vbl}Z z&(aaxAJY-C+4=-?2HC~#i=(ehr|jqK$(6c&|7o)A@&5WFolxo5{=~5yrFlgx0at4w zc(6=M!-)m1hA5)F@57o0q${c&XyT4r|AqgTs~BjBovK1>bW%?^}17jTAiyjtN7COn$LdKk7QwKNp}WYy!WfhQiBU|X^zDG zRpg(~rF++4y$Qgh;H|RiH8YQ-a}BUrj7x^FJv1CB4iQWdg8)$;PZVj_d;~c;Ibq!& z=5MxMnm^rHld$^HVHngkRxa^1Bq}QENWFf18@dO!BN)|%NW^DQ>kb)vlb3+YdiCV& ztYZ2>sskRCsMdCA{FrW~P?eI{_o4hlf_C*oyCJMZOW;rnH=lGkUdc*CFR$mt&G0Ft z4_jBS!oA$+V3rMf+gx%&^`F+qkT6Li5RF_XOFm8*QeZAgBa%O(gT2#pI*$lBS?h4T zJ)?e%GR-zq$>(9-rHU|A+?z=|TXhYD5Cmrn;>r}&ecYhj_ zSyq|H(y59+qAe;teJ<6hj(_EJaKje1`c~{*R1Z9NJkr(9j%6vGMu~t)ggod$*4Z{anfeyQsW@_PUuPRdLAr&Zi5w9B_pTq&u9IiHDv;%t${ebP|e=YnF8@-!m z44yxI{rHH<8KtF(y^;eF=y$x1TZ1NfQ2tUQ^&KloCu{8psV$EdvxPC8;k(bGP|3$2 zb38|2Fo}?~33;5wRo!IgT_LZkSDG>veJF~3sPBGeo6)Iv95CF7NeS(q-@gR$L3=n= z7+V&DMA*w*@U9VyUX99XC?$r^>1{+nz;}i2@FXg5bJUu>zWG&rE>ip0b#ffbW+W|_ zE+{1`eB*UBx9v|sC60LOODPF`dcsSdRB7z9Ta-=2=hQz}xea-^JwMwu%jm1I(KeZ{ zDyr~#=r!#Dqtni$&oGUZ@$GiX%jQAO3i1MG$PSLUUsvN!7^UX$7_3qwr zG?&#Uu;2?(@C7xdi?#oxt*PfLPScbIz#;dk1j6s0f<46;2#f$qClKa|@*m znnL+{m+{o^U+hNR&O$wT3JJa74*#7D!Z>@D3ynI>Zh=x^p_Ywq)!IN0cY3%vrM6w< zjeV!d4l+lyPJ^>%Myx!Bh`(`PtQ2J!2%o)O3b;~=_5m(r-gnMeAgvtMh7!`2qzb!e zktFWqh=2QjCKiVENnf5fY@MX*;OEEda{rzTI@MKN%ot&_5}oz8!cD1sPSRf9kGZ1$ z0b0%0bCvt*s%FX=+?c~Kl(1cwss;yvIk^f6%CA=%IUovuZ=6~{H z9qdbz4ORI6*+J9wtM%<|TC?HQ7+e-T4Xb6+5}kSq9^1vTc=3b+m5lEpJxCr;5B1ZV za_Hz*$Y6c{;=zipciNH-xjM|#U8rIAyfC*qY=lNx&h&?YtaXG;Cnwaq?8k=_@QtVH z6YgGol)3eu=dAaAZm#A!sIZ)p*Q~WotG;lp^LcD=-d)rLF^yrh@=KTFOS&6td8E

z%Zlk5ALwJw3IG+Tl6OhU2<^;A$#R z3@Li-PZk+5{Uat3@yVU3xlGW9_d44eVhqEkjn@y3ik1w+(xyiue?A81KjAi16mUK; z50@3D*C@**U|QYZw-Ow???#^La>H^T&ykLZW7chy`$?ljt&%RNR%dT$v67V&cT<)d zPQ=zOkI#M5;6xieLkcRO$0nP_r5xEvB0d;laIUe-EQfdEy^RWW4KDlqrh|!wOz`kZ z0!t09zerYmSuDnL%cs8|%vURPM-Vc8Ry2+klzL77xg_-i2nf@q`n0|!x9VO;x3Zmx znA9@EL~5ma-eLG0`GaW!GPcW2^tNkDkex9~f~7a_G-Pv<=~S~d_@2Ak;gF3%hLi4W z8gzBD7@u5e%@Fq1iV%jiSy>i($$j)-(R13&E1rub(W)fVZ4amYM8u?&zdD#R*^VS; z_v(}l!(oj7)hKelJu*|__3W+U;N(;}eHY06{B|fs?s(ao3WREQ^HEWJc8D1g>9W34 zfpQX9TkgMabpCmM%vVmMm>KltOfnfxm71@zvC6KNWp{)i_9b)u`Kwj0hI*nB7}A@_ zma{ooq|RW#_N6mAlDH-IO+Lx>@rv1a@wg)ipQA>)pa+9VfBdicYAY*_#TuK13!;tA z2*wrfnT~gMICSoh@Tewz>s?wrwwM&XptM%v)03^SubBF zX6W)a1*!K#dHN3y@Lhjlc7#|}Va923S@o8-M8qR*;eoKjGvl0|KJg71*Lb`$Y~5my z(h<_D*5GUb;=7}$E~fah$S6BGM)YUHY?Pj}%>iN;%NfUax(%I%;lE3KPuIV7;3$Rm)Q*4-Iu_goQq86`YoWGA)L2R zt{-*W?DSW=_ERlF7asc%jD_35?2)<2na>#{tOHN4hZcvCm;0~2U5$`49<&2zq5g`) z&52>pMo$zm@qDe@yF`(d(~~uc5Vq0CUyPs4J#&%eOG$m~-)XR}Xn7_w8bB?su5>L;BE+CNCQ?`9d&z{LZSZW~L3p|Jf3$Ci z^tF4e#D=g~N=&A%Bj42VHvz@S!0pMKX7U0@Ah{KD>nP(|IU_QHi_*`7EM{L)EgBn za_Zf?6g0=bf9XQBP+)@nSZTj!t!5@(Zj) z)VHl3a6R^Fa^-%?gRoO&$H@Esc*S>xay8KEhGA4CXg`I~&9?abCcgyJ<7lCFL|zQh zL*FBZI~WC@Lq3XRMIo)>GWT;SX%#&Kol3g!ug)+mO@*gcKbgok^sR^;_I%iUj&D4! z9_p(va9y__FLql7ZqK)?lX^7Ft^TyMxx()rue1~p--ThdEcPLH5E8N0EbA>#s~NoC z0;O=GQCIaeY!v1fw&hwp7M&WqmHh5E?OTfZib=(GPw=(pJS(ALc#!XXqyhVjl^6?% z5gg`NjlRc2>4?bllGl(^Bc_oJ+Nh7KR+EJ!Cv#06KLx$7Cgt(*I15nmSXozpGHG*L z4Gd&PMiL28T<%Yy_7V(hIw@3RWBv9lU1$RQrF!okty^4I z*f(+LBJb!06gy8&+F-1P^ojT!C2g0QZNe=aBbWn(r;$fUGE0ruvcH`ftu&9<*a%>M z{OBVGn<|j;{BW*fBk)ingKjaJnU$-QFg%YXh(YJ2)8;D@a^>N5)>pu8J<9@}u_7H6 zBmV96JuS+s{vS_-_t5xI6Y7BNaT$!shwK)G|-+E%wmn`M; zc=7o40;cD^RAyR0_I2*yX^% zmJA6+43rK7_c00s4)z!}oRmke!F88{Sim)Ut;07aUnyBWe=w=~A7OBz)eLimf?htNwN6W2n{Ig$uf80v-82G_9t*CjD8q4kq&+^JV zHbdE2QArt1O)1lZL-C#|S%O66DQxa5>-R-@ds^}7Pa(X*d|3YxAIqt!hRT zhB+{eWY)ugZ>QOn*eK$2Dy8eDZ zJ4WU+Oh%@3*Rm-gGTz(V@(BS#CBm+%c zF~Y$D9@zfHph^EwKCvni>5p!|yrO59fUr`&g#WklT#Ww#LDp>B!lQG18EA`yDTN#&V_?GVnLfHsXM&>3NNF1llnifODEtJc+UUi!8$22Vz9Y> zqpMBp`(?XVH16%zLFE2@zlYO>2w5NM{;cx0DYYqpMl%C5+t1)rn_cs*wBzbjvOAS8pch2g42G zvshhQln(GGl8hz>l<-;G*Kql=PS>m5t3wDig0++|>LSJ(YJK&R5ij%pFul^=M zXZx&oB3T&Qq_7z^l%(*xe4i}RRY>Nxct>K|h`vXz>i$xh^={kj+=rENc%Tr!0#X{olG*3ME`z&{A0=l zZ+f&?Z%HK`NmRsv1~Q1+)=&y9pk|+7g6OT;a>!_M`vIGKr(L6H2G^Mxc7q1vzXLmP zJ9Co)QXAkrHq~)ZuuAV?k;v+pt=>4*mpVW72@B;=r+2_ z4JNX=&`1sjAfC2AY19d{>>G7T#lE%nLAeF$@0<#kKhITFyl=0R z;^<ASoi#9hb6&q zj7N5_AkA9MeZou6ol!B5i<6i)^lFm(mXp1h?BjU*Jy9f9%SD6r0)cA>e?Am3O#S|x z@FRbaG=biVqJdBvQ&Ce%H;==l?OimV)7In#2HoKM*(MLFv#dgb$E>#q_`1 z-^0vVhfd3~B)D`VQ~8Xq)0bi?WrqE3r9TzxWL47Dn4f-AOyU3NxZOv&AF<)EHE400 zDT!39q8KGOfruNw(e*P&Q;{uO7IU7Hrp(4zu*;a7gPdHSt%%KB5ACN7V#hh2wTF9G#=hC;< zQ6vU;OEle3M!$9Zo-srt$igwZ--U^Vy`hhdC+?nEJ5k^8dYDzE*Dgu59Z6zLC~B!p zR*4|sav}CB6c=4u%8>`P76c-P4hoe6o&fl)Z!q>Jt%SN-D{elcBN<6`@QE3^zT-^T1V#I1V8G=9$YSYCOE^;g@y{pA2R$i3K_htPbRzHt zwI62pr;8agyw1Xg`y!5S$~(;G41}7#gvtY&%{i}8Wga6qz?5>rFf)0>Cx>xBX9Do5$^UcTPs~0FU2=WR`9*pNH035);b%jwo zN@Y5zaW*DHn!=vXw!MxcE2`H;flW-!+1;#Bz7B{&l65D`=c7eSh@rt@65P^a`;X%v z2`SBF{61T=5+P6Tkl!-1?gnIpVPrR2oYNFpQhda_op;&W^E#FK{^pm*Ij%V@`$K|Z za*h7;6T8{44!sdkB#0++%#?c7`;%ifV*Ys9N&BE!Z!hS1A^XqN zJ+ejyX#{6B+W=-GfQHRE{`u+t7<^@1oZo2OU#q)bdyuO@P-9x%LO;kFkj5?9Zr3^p zH!uA)_LWgb%`Q0Y&XN9b#x2Tc)b+h+QxtY<``R-L@pX{FY*|(;g9}5^r((}CJ^o>r zRllbf!Y6lohI2tctr({PI+l_JyX881i}C!aWpxLNd7z{ETC{BTa& zMM;qwJQ{^`9ov-#rW9_Q*m2Td@d;Le7-x1M6=fD7#Yjx#E9C)ZqE@2ASEN~)?{&MG zaJFFAqFMBS&uZZ3Ws0Kli{WFHCPYcJ5{m+tQ!Wb~Zb%PWkv%scER@+0EgenoyIytvQ&NstZOku2;DkI(jid${OxaTD`v zZ^-|>ev`deJc~Z_@?RW;nPYVk% z)534#%Z2M4XK!J=WcU}L$bH>gWD!zPfBs|1ev@0-vaoHE(B+ZQ5|~CCP7?WTbK7*z zxNt$$6fw@`&FPXbx>@Q7`ewyG$|aB8vd$rL>x4tAa6W3}kB4&7yjwe@- z7`MLIysDy6c#q5(K`-~`J4xLvpEA<3cDFd3=fj8h%6~hWHKdoJc29{d%27>V#rBDI zqY;F;UF#1wD177KEK;wjgMx(Zp(Ng5U~!AlI^Ln+|IMpKzN0+3NVYjaBB$adBO~WF zj46{d4?_@Lf$IVbhUR~bg0|D)A!5SFe}Nb(=1T_jEDSIj;NgZNZLO_kWmo|{C7L!U zdNlAA*6WM?8I|9kihq-$`0R+pPp-iH^dc7a(m*KcOl5$W_JzQPZlVPm)Wp zo-s)ibwkwfNQk8|a&E-E0L=O=QDRi+;Xap$y9sa(e}-KAJ56V@b{GUSSQNcbxva87 zU6b=ICH|z(qixif{)UNnfShPsJcI6 zoVfY&TJOR|6p;)uO~7rMj*2c+o)ww$Y_`#@R5|3wMWWvy^Rettzugk-*E*7VnX-W7 z^KO*ZHI?Vb@86ky_G4dm&yDocwqYgiu*JpEU(3?@o8sc#0Wi9!=!1c-ShNVoA;*vC;%D5q&J$}5r|$m zMQ%73+d8d-KN#Z&;`)BR@&*x}8Zg1nV<z!;=RVWSXN)up8(&Rg#JwCE98)4|lHG)DyF7g`h zjQ9II51=3_Z>Z2{l@a`|gkdRAWnvZuEQgp#}O7`tMbr^GRM z+0mdGw$uez3t?FHCNj`t_jK~@vTy6VfE|0^&k;1)@PfuC45LKf>d($0eOARl1xt7@ zy6iwk?-hPcjF8r4Ug1faY;{6{oct($_g)YY zN&A0orvlyMzZEj@-MbZxYR%=lqoeKN#;`~P4C z2z!qm4KU_DXP#Kwo4>O_dW0;|Ou|B1{b4GA1TCt9DFjk(cN8g$N`^4NNa$A{R|iS? zJ+!>!ceH}OPdeM!&$O9}bd=ySv|w4jQmeN7$me>H_!pGZ5r=^Y=&;8r0FA!~ZIn%( zCw?eGX8~xJ#*5TxZ}AQ>z-HxIY57rGTWh`Cq}h_e?;?M9xqlt?Efn;9 zAH|hK7nhdu95%Xv5^6G6W${xnjsGJkC};sJj<;WH*DTV5m-dA8#;E=I#Dvf9T!=!* zt;lZDPxWG^5O6!{JzS{eVu03Yb~{clX#{FX3CxYp{xs9+>8YxicxBSLqdgfz`FRg= z98}N6+1a?a!ywr31AvZHhXV{5Z90@J2UI*xthQ!Xe!pir!tpODrKP1MAS7PH)dB!@ z0Rm!jH69+`ly5*vO3I7u3hGS?06Aj6<1p?uM9lA>Ogk@C#BTYhH7>0(kz5LQ@z%MU-)uG-B01GNHrIpM zQSaBtdN;Au3b`)((+osA*dA%LXdU4@)aG%qf*y`VpG(s}6uuV&n?Gk+c--rx4FNDy z!bhLAb~vs(*3}iC`(jS82Z1T5=zgY9RRRE};!PwpylbGx$S1LzeDJzDTKXeC1!Pnk zWyX)c;{bKm#iEkUTsI|jA;MmtthV~RJ6BmC&4R(^$6jkSquh1W8$;O;36=&fSQ?|& zpnT%(15E7=-Fwjp5sFtAK{86~i#d1ANMk0AME2Y~9%&$yn)UV-3Z6i5I~nw>h^+k`V+S&&A#Zp-1i#Nv-)q z{guIw_67JFhX3)<8`B#DP!;JyB*bL@g7R%s^&8X5$)6O1Tl5oJ2{`5 zHH5?5?jGC7fb!te8dT@^_Ti43{TAv|arElOp!44rsMhPS0tDusP>y;l~`nLr>7$ptdF+ud5{?5xA)1mNUm8RQc1-rtcuy1(Nnv;Yl6Gb2cxL-k;` ze5y641x`=o>Kl0!Ax{Yj!sA=>Gx4}sz{KjmUYGb(m=0MIt3tq@biCaAI7B*zeI~Qb z8-zS$yVEP9NoE?#NhTR;9gXIp+vKi#-p04Efbl455Y2PuD5Y^g_X9(`9SbjlXA(B3 zi5SqE=(1j`5GPu|boAi^o)8kcFyugmOgCgoZK_z;jWmQ=dJ9DAE70#E;znc)twfIjb#+)5~9#p5A{qpYg&k z!edaDaqNrPi2eQ;Od^Q1Jo_*}hfl8xZocvmK~xoGebaNXQqcF}%xLQf;s4wXB()E+ zsV`~lV5Ro6*U?>}zc=B~~m8ZQ?d*-uk|J`bvH}NOq`zxF2>D77*ls;00gkavX z91ewqcVp+>4hDY9&Mm8WLU*+@&6`o4EiU`{fc=9-5DUo23r-3)O5$_~n4Su_J?A=} zi3k_GDG-~kUFEYksI*>iozn7z%TFgsG-}>@pY`f!=5l`;uHh5!^+r#mrouB*;;Yr0 z)98T;vuj(;TG!%gh+Qa~iKwgrL9i4u?%u4elj#Web@KBA_j4SOItM^A_cyPl2NYh; zla^;bnCo6-e?FDOz0<6aAN$fZIcu<308Ayl>s>#b{|V*Z0zTs$-v;>kzIoM2qJ5=- zAYHi3B_!+_V>^AO6amFFv=EMRr5(?xOac+T`}Y}eRsbx`E#fB?%cd^9!KOboX1&JM z@wGGYvqpCl`7FYU_tDbCai!T%EU&{xp9wY_F~9qJKr()-un}{v*ey3@4dDGizSp~M zDhWuSRUuJ=DHn9!iI&#J>1cnWnM!|-yGOLG&)D!v2zs&QQ z*`{&#&iXe8u$HVtpxZQbLHwSeW6I}48^+lLVv|E=c@NNn{$__@`q$blm}d8$^YgPy zOAaS9{o(WZqTc)nav4sT-7v!L6~4^s*`|UPDS-K`yA`|K+g``XPP3MhgA?b!B_mU% z+4IB51qRvoC{5cF9XIwQ!iWWugBpER1ex{Ugkk8dcgvZdUH<}1KAB&@Dl$#W>v$S2yfCAAo%aUbqVym;%ND%QEs$f zI0ni)uFXc7T~f=I z{CRSfnM(v7?;l9N$tmaA&gLu1=g0R(r2oQvfo1L=(*s#{GN~Mux^x`2NLfY*%2*Yx zkn-;=Vov+aMVQZbt@>OO?mlMZ~6#00H){=SLBI##jaa15y*nJOvWQo1|BO)_9Q9|OdJhx+#IyZ*U zJUq`?J25mmbthUX3||Hk5ZotP9{J_d3H;l=Xh#fqhxpnWYk;4xI*drg{C0aVskkTn z4ShBnl&bT4Sv(#**oRE=P!JWy&(;OY(DztCFY5^J6L-_>ygR)TN11QEST{3y?=)B8 zQjIxOfYpH)=JF%Hw*h}*(tVIa?__sk&A9ULp$$g$N9b}??z$+QLf8a8) z--pbcb?ezb(bcd4^E1CU_$O-&AiI=$h5mr$+*=1vIohw3emguNTqVTeV>Vh?QTj_U|`*rymrSg~_k|6I1%GEU%L2 zI^gx@hsYigmcq>yllYY=BM1p^1CFG?ZsOs zPa{%(FIi?nm7Q|7ofkjIc%D4mSpe%ZLikR$6!H`u2zNTdj|Ut=%KdTlN?Ok`-ls6H zLX>>EzT^JXp*dp!7B_4C^$QyX|A&_AvdkIoQgk~bJ}smBXjQ=9t%lr zVd~?ci61w4Ex*)&LmhzGxPLEbJe{p?JUWy>LKd!Z#s>t^g9fk0lW zYNG4(Y*?>xx=zDhXOf*yrPg$VpjIXdO-xU4tqnF1*O#7ZA&+s1Qkar9?~SP(zTY4E z)RGaTEvENl_^b71inW4w2^=!fSaHNb3d-}keXT`87zfwWB@{cDst*eFJjYE220B-7 zGRp`%3co6giCsrz_3aF=yQ1Zvb)>Z^bluF@L@b0=WClm+Z}OX0N7v39i*Of>>Ow}@ z{k~R&)}zUwk&gAgnn7_%WK*ZX2?utGei>44DmSIa6%JBJNRQCkmFP(`@Mvy{Eu)LS z#n^b9KM!n7A}xq0V6(&@j36Rnjl9WftrRok5S7Gu!${BS`G9yBX(LIF z=FuRH1jniQUUAx;u4V;orbUzp(n_a6&N^W2Vw`9Jrfs;K-MQ*n1USC1Kz zt9$^)ZRy;-Kjt(5yVT%CVQ%}A;&=A#M}8KCg_7{vStXA^!Pwf6!FmIksgqMbH+mF$ zUlmCD4BEX9RHF}2MzwCoBz=bA{;0{az&~Q~lVpq2!qCUP#!aVQ9>-?cuddZVT;u*> z_Oov)cVgn7LbfW6m3*58QB@4TatRKJ;`!>wi7E@L5?z!z8w!@xO787M_Epc-I%qwk zGY!Xw6RCQajq-Q;%~JmcLg_c;r6~IW*X4k(ikYNSm6k@mkyA4np^ULP4I}yZg(j5o zE4TIgoQ+W2A-vI>@d@|BL>cM`Hck-&biAI0daImgVLPa7E*&dQtF`$Lg&L|19}4Mw zlg*(%@0Iht4gbSYH+@n!mYy-s3uo`{vop0o)RIBqg3+mYV|s-7kS-6--y>nquU`Mc6_lGxHhKPU3NxQDPvasa)OLj-2$sf@y$kCicU)6 zaWQ3;H(GCyub7K@+?>1+$&#Zn>oYy3XqxEN7itcTf#$dOp1j}R;HO&(#=Yq1!J1(c zhC3CgrBxmL5?%wpJ-jtS-Pqb%JJ~wTa4gp!#WZ#)xLnQiEl)~{4?XCwR}qBFu87js zYviXGXuRLf0Z)&o#|?Sgp8!=}r>pQquHag=&HlTbP+XSgt-uYSV9JvSdlr%;9V6=t z(ZHHaY$$1}2=Zx2oQB*zu0S?Z%EW2d*c+lKoH3-S1oqU4u-!;PvJ zSV53l%TTxR!kpJ&=pu33tX0+oOB8{(x=#091^0FYd zo|z0dlepC)+ICA^i;zmvnkz3fSyXyXumY_)grhw{3rIGsNkd$^74BgNte8*~P2Eb# zy%+csQ})?Dsw;`}xGqTL{-NJf8X?~gnFD(w;=FFp6l$#b@+8|9E0z&E0;GOi==JJ0 zmGR}*zTt@ZV(p|NI$3EvU^HBt3ydFgsUx0!KabUmK2fxUC-SPMxUv&UOxrtjYa(;i zf_M5mP80AAvzzF_Ly5RUv;2PaM7w<=61ZLy)=9m{CX|Bg_aO8((4zIwPaXBGE)vFm zo_^}iE4(I&lZU-)9rONCKDdi8y%UB+u=?j>RlyBXK|h>2a;9odQ~lEngf^BF(Nr>=G*N^oHii?87idqZ9btpYrWBK*cbjm zH#GcB%I>&~pZ{|5h!I>0e@P;JE4Z9_*bjL$={#8*uhA9Y;taxgr6-UThuVZ7*cC)W zaVZWaWFGX-yCssy-bjTI1L`jxin>7ce*=U6yKK=-IM5zv>tQ-AZo29B@ag<$>mq0EWhLQ^i+aw~srMy!I@L8;VB~AXBL^QTO)PHAL(?p&+&8%CYgNaV=r;C)#@S`%WnxYE<>MnHz)=Ng!-nm=Rc%jdp~K8JUkU9|La&E-%c1ED zSm(V?2WHm33X_4V+x~$81z?n;lL$fkxUo{_U<9y!q`Nyv6AusPBkZPwcrWzEd2jNi z@dfl-83&9k)w`d5@xve=$`lLC1qI-ErJ2f$jPAk-u6~yPz^hm$Rc@T`kDspYj6N(bE>h_>I5UuC0_pKC11z1Ekbzef`{T?>9tQb}vs_|mx&l62Lftg*tBXKjm~m zdeCxBRk_j%i#kgHY^Ky@x@zdXEwLJM<_8|CIf!-9-;dDUMpLoRhMWzOT``J|+jDqjI5C);(@2|H< zCf*(=km8^7&tq$WXm=#NBAdX73t%1A;Q*N5!@9EH1r z@~IOhGm7ft?+^c(r7H^^c(sm_-WibD#57)@!U9YV74cx_2T3ibPXVTO=KJ4cYX6&* zhX2=q(iG$8?%~k~++rqx|5gC|NWH^GFfS3B)qdl*jEsy_fv*4r*MBKSYFupg)>cmA zr+*pTOCAM26`7da%iV0(1==V9{m$R&bEeTk&Tr zft_g#?BrmYRg+ThoO3=5lOsP@Ic>gwj+FBdWk*Ex#ZbOj?=3Uv(F<&@CMT;I;U`PK z+GzSu>c4&lOgP`;>2^DV-F#J4=!%%q8qB4=NDLbFx0NmfZ!d3nZ04!HDmJ`KEM-fE zK^AOvshzgoy$n4%DT^c)9)!LKLob-=@&57`oV0NUn2^-0G~wuW%6q5TBpJ_i-ytcW z5^?G_rGblY| z&zI5ESYZixp^P9TEcw`6Ig|CyFc4@>`+hMdJe>BZy^MnnCJO65v2LowzpJNGPSpSd zCCrVkhjCNVc&0EMV%Az7D16XDUS_O7z+(JKqx^n*71v40;UACfEEyP* zO#t$a<@t2dgjp__G^w!Mly^#lPqC_yW;gCFynMZ#9aZ!bd|5;-89?c%^u5N$`H=w* z2XlkvW}VV`)jZJ0x^%9@cU5%!KO`t7X08<|j&T9@&Ma+JxFLTX_YL zy1?kjT*EUE2dgX&gSSzQoCgRTZgr(zcbkv4LaPT#{Nq8_?da%?goq$txrL-Ht+bR$4N^h>{FYcv$2j49Kv8 z*knL~hyC$RCiZCtb4VsnJ|Uhe>}R355a$fhWwrYlMW1yLg;(9lc;)sr*6;%k80!gs z5|q4_@!5_r&jszm04a-}VA1E6<~K}QAEfZmB*3++Dzf^HIl=F;Cp-O4Gf#how0hW+ z(2UaS=0q!lq`QwSD9Bs74q)ae7)&uM3f~`aSWFg{r?PdA+e$pI24Yz% z{!ZSZ1G6#}OL)#^UwXnQ3sllR<)Bc86vDJ>c#l=&O%{J1fsm?G!r*<9lvhgT2J<}o zvOY$u0gh|yQaJShLlm{Pg$Bb83zT4rAkO4Rq=dH$qR~mDH+gVjL4oEwVL%!q;hk>w zW|Q}RO^FQbWW`5DCiG^&&pRdEZmB&lc0e$up?{z0m+zFHj+yseI+N4wj))|j;q?D#tWO6ez&Ixvu${&B#fbo08<^dM!}i|dQkK<``w5iG z@~<<@IJqyX7zbTReL{T#(1vJNt`CZor6=--UP-BfEFu^BDs~ocvbbBlCS%b5a}uke z_~n=Fp%g|w$F0drv3ig5e1fn8KF8iwa*;pe{Prh))l;OLfo*jQkK`}J+@*$Wj<{zw z(%B&bv%C9MoN$cUws^^x--Yq<`rUm`& zZ{FnLj|eEysvydxH9zsc_nGB3SQW*o9bWM&rhv!vcv`Qw^}VCANBBo;)E5B=N)VIKhMx9Nq_DV7VfxijJnL z6{(p3SD7IY{?Q_&Puw@bK=Wn?x`HJq7EyZo%;vy!ajyPK^I702gP}E$adY68CMMK_ zQHdEqvi{rwO$k(&5q6(NclyV%p6=PZujzz5w$U%7+Xq<^-u$gYw;{@7y^~qB2vh*h zi_K$-bLDy`>+lK`wAD2aQa~J^Go^y2c9(Yl{`u*zhkBVuieh69>QK_UD)J_vBamY(J~d;T zPxm$2JUGS|Fva?{deRX@^xt0NPKTP`U950 zDmz25kP=U_Dk3Po@sC`qFzNrj{rG$9k4E_yD|L7jqNk2~X%h1zSrZhlWZJUu=D?F~ zZNTVaxpm`M^!5JTT<-kk35a3;$N+|r>rYQotX9HM&%R*>jWNG3^D`cd(>#Op*-*sX z%#)`8@W!MKp^Nz_NcJj;-R#o{k+_Nm&H3xfuq(^}?DZ9SGZc_Db zP043>B9CX~Ty9vWp2}w4nIRxl_WN5#h9pJ&GU1mYVNOj)Ig|cK_RQUb+jFzn4)>+G z!E&eVz8vBSwumvw?aKHGMEX12Y^fjl-ol|8?54ei=nTN^pvaz5L5VsHed))ZEdt{K z1Oy3z3F0jlhjpsE)_`+$ZFBKPkNx~y*(C9lR{H~M&B|n}wURW5$w2&6;8V-5h>=Ht5CV}zqCr>A|p03lV0y{;L*aw&?TSSm##LfE{@fH+mcM>*c0>& z--#Wb#J>xyNZydp$d-yQEzuWal35n?sJ>;+=WAj3_U`sx?qtt3i z*_{BH8-V$&m}1=ULC+7y8u)yhthX)o;g_Xa?@6wn+?#N3*OmfT&pNpUeSSQeUS9k@E8sg~Yj4ehoAu0T%}I?=@WxHn_H{$J81ZR)-jJR;E#Bi> z7UQ?{Y9D$k?@oJ!fn$YvuE`*F&3G<&F!;^NqO4xXd%vQ6VZw9%k4nxfs;O-Y!$?zlS2&?J6@)`a zn)D(_S5bOVP#}PqNUtJ-M0!z*p!6=%BM=l7IDk^5g9xD`QboW(?#y|H31(ktvEfBzgT^sw6cwZrh>he%81bhFVJQYv~sn@+iDwxQCd06E#992Tn~i}((9cFca9i&cr)Kq}sbjY^g2+2$!1BYF3)2CX42 z3k(Ath!xI|M#JH<%p&yKb>G?d0UT#BO^A1W>W3Ny;fi10`Vmb!5p;o`Ez-w*iaCXb zX<}l6WcW}gGF`Ho=|;a9BWGIXR$vWmfV&fik@+A?tTcvB@GtISySEKuyzmSZhMOaN*OIuNW3VYx6y0OCC2mc{9|6n}tJdF^Y_9+79;<(T%btil^%0BU&`4sx9 zt=U`$lW{@4Zm8U+zmk&e_GXHWhnrP24ty8T{u!Lo&Tt+YK=HJj@o_5BvzS*+HD5dT z5Z}VW7c?cUb1OztD)?~4vKVEivxI%46!tSa-bWS2Ku@J0eJFYL@ z|J3r?820n~PQ3z-QoCxnjh8*JIUOKszMD7T45GzfbE-H`FV6%nnM$E=p@-v3zH=Y$ z@mQ8Sb?6mk^H3BWee7RmuFB(QjYCEi-Y!p{NR6h!W{iKdJzr^PTp`-y!PHQ0RTv zov(4*;PqIW!2^xwJGW26gAlhU$Y@1|hcfooo0mVx36EbZ5fy7*!sqAjIfo{FZ#TdJ z79^+FQV*UN{j8Wsm-UHyWgJ!bnS`5c(lsMcQAY7#WM0wJE60io21_wfw^u|edbg>@ z4ljsjpt}fgM^-hWKt@v2u>bH9<}w^uAICdTJ&^%sS9TnGyY^Psv)MG$I{)m=epl%$ zBd8G_A!c6s{P@5p+)9RdC(h6aeBjX1)##VTm>_!}#k+F##(itEvypG2>6O6<(2J_N zVcMR|4nB-rd@<&V2A~IgX_Pvc#jD;<1kg?aYcx%YxX_ z6rEVMwcn(A1EuLXZ7kH1au_IgJCgZUeGYR}!h{$Qa$gAo3NfxyH`65EkRGRv`5^vf zRA=xC8pEPn{AZHV)YPes*8gAw!ECQ8u-CK6aw0@87?VNB+LZqG`>|OFlW?78R;Uk> zNMxU<(-PVsvYw)Hz4u|r^>ZJ}Kiu(PdjW!;mvq*`V%IC~z>@LY&zj`AAoxX%5BNhs z85Qzh8gPPFDJc`ioyX{dr4-m9#QdFL#>U($8tM)poR9%37wlUMBpup3C8(&qzf|9-(E{op zloywHMK@rhDpBkDB^icn-O&sPR7l3>nJ)MH-yriEp{XU`-T^ciX11mF`O#l1t{E-q zhGlt9ztIJ~!d>{Zxq6Q!ljdF8hyX-|eXAktS41H=O$XCN7eLw-5)gTLF}qR$OSMiq z4v->H*qTB2&BF^Wi~b;>WWFcki#6>P;6n@jaxYmFUE%WRn>=Z3<>ke)8`PIsKVM$0 zyaH;n0IO5A#^m@Q_f9mkps(W+W0X7ASGF=mfp!ZON zn{^2D%6J~Nvgn|#SGptC1B|YmR#`AOS>5jC8WJ&{kdpx!6&J9itY^J!VTHSvbZ4q5 z_KMsZ;FuTGGrPz;dWHBL)YZ3ILZ`X&E9*Rmt$(kpJLUl$**Ec19QdEK2#Q0aEEwPo z&Uec=&!6K`d{Dvid~$p4k$2wgDg--4M`r=RQk;`A3Oz#BVG!z?v>aldg`34D)7b5I zC;1H4mC=O&iqEgI`9KJ_-j zSYs}szq~Q3W18YYh9&r0g_29 zgRMMylDMBF__R_aJLTWA2}Fhsv0n6@j}bOV)PTuUMGpjM8G!Ni0H=&rx|nz}vzTQ5 z%8;~6_1~JiY4eSnDIsNU^Zp%m2Ei9iTXXIXr00_3eMNXUG(e3qN|<749>ZM{};^B#|(_!~E!Sipqi$n*~4F7DCBA6}HJ1 z)I_-($NMg&^$UFizRElb0o&}blc?2Lf`FSS;$)%G9~`wPo~0t{u2E|NhCAWA$psMd z@!Ey0Psk$;$>CCE%ng)7+{G^s7R=%C`D?SS`C*iTHTOEGyVGQg0W>vejF>-fv5d!_ zk+ki<9h15vd_&3iRz|s1RabY)G0VyLm4FUQNcqZm2xmU$j=EmZQ3H+5pq#zEJ(e+N z7b2Zxp~nf!hdAv|7_R!>m=}pmg8VvK@Kj$vl|mjVT2zhuDU5~&m?^F;|1glyg zs?@r&j1-}b=F2MU^*;NH|AKX$+3N5w(_AS{t$*p`M~g*m>c=HH1I1sm)Ax9kR|EaG z$Nny5$;zc>8t{{O?VWq66|MKtNAyrL6Y@2qQLpJ+-@{M11|jdltU7qd*bP}EX5Z5E z85`5Gbxcjk_y@F5H#6mtuMQ+^o6JBiR?vwOwY@m+9nzUwpGWLFTclJSh+ezg$+#|` zYvK^XQL^%sS?k#2{cxqtsI_c2r!# - The file does not belong to trusted third-party publishers or not signed by Microsoft > - Microsoft Defender Antivirus must at least be running on Passive mode. For more information, see [Microsoft Defender Antivirus compatibility](../microsoft-defender-antivirus/microsoft-defender-antivirus-compatibility.md). -The **Stop and Quarantine File** action includes stopping running processes, quarantining the files, and deleting persistent data, such as any registry keys. +The **Stop and Quarantine File** action includes stopping running processes, quarantining the files, and deleting persistent data such as registry keys. This action takes effect on devices with Windows 10, version 1703 or later, where the file was observed in the last 30 days. @@ -75,10 +74,9 @@ This action takes effect on devices with Windows 10, version 1703 or later, wher 1. Select the file you want to stop and quarantine. You can select a file from any of the following views or use the Search box: - - **Alerts** - click the corresponding links from the Description or Details in the Artifact timeline + - **Alerts** - select the corresponding links from the Description or Details in the Artifact timeline - **Search box** - select **File** from the drop–down menu and enter the file name - >[!NOTE] >The stop and quarantine file action is limited to a maximum of 1000 devices. To stop a file on a larger number of devices, see [Add indicator to block or allow file](#add-indicator-to-block-or-allow-a-file). @@ -86,17 +84,17 @@ This action takes effect on devices with Windows 10, version 1703 or later, wher ![Image of stop and quarantine file action](images/atp-stop-quarantine-file.png) -3. Specify a reason, then click **Confirm**. +3. Specify a reason, then select **Confirm**. - ![Image of stop and quarantine file modal window](images/atp-stop-quarantine.png) + ![Image of stop and quarantine file modal window](images/atp-stop-quarantine400.png) The Action center shows the submission information: - ![Image of stop and quarantine file action center](images/atp-stopnquarantine-file.png) + ![Image of stop and quarantine file action center](images/atp-stopnquarantine-file400.png) - **Submission time** - Shows when the action was submitted. - **Success** - Shows the number of devices where the file has been stopped and quarantined. - **Failed** - Shows the number of devices where the action failed and details about the failure. - - **Pending** - Shows the number of devices where the file is yet to be stopped and quarantined from. This can take time for cases when the device is offline or not connected to the network. + - **Pending** - Shows the number of devices where the file is yet to be stopped and quarantined from. Cases can take extra time when the device is offline or not connected to the network. 4. Select any of the status indicators to view more information about the action. For example, select **Failed** to see where the action failed. @@ -107,7 +105,7 @@ When the file is being removed from a device, the following notification is show In the device timeline, a new event is added for each device where a file was stopped and quarantined. -For files that widely used throughout an organization, a warning is shown before an action is implemented, to validate that the operation is intended. +A warning is shown before the action is implemented for files widely used throughout an organization. It's to validate that the operation is intended. ## Restore file from quarantine @@ -132,7 +130,7 @@ You can roll back and remove a file from quarantine if you’ve determined that ## Add indicator to block or allow a file -You can prevent further propagation of an attack in your organization by banning potentially malicious files or suspected malware. If you know a potentially malicious portable executable (PE) file, you can block it. This operation will prevent it from being read, written, or executed on devices in your organization. +Prevent further propagation of an attack in your organization by banning potentially malicious files or suspected malware. If you know a potentially malicious portable executable (PE) file, you can block it. This operation will prevent it from being read, written, or executed on devices in your organization. >[!IMPORTANT] > @@ -156,11 +154,11 @@ To start blocking files, you first need to [turn the **Block or allow** feature When you add an indicator hash for a file, you can choose to raise an alert and block the file whenever a device in your organization attempts to run it. -Files automatically blocked by an indicator won't show up in the files's Action center, but the alerts will still be visible in the Alerts queue. +Files automatically blocked by an indicator won't show up in the file's Action center, but the alerts will still be visible in the Alerts queue. - See [manage indicators](manage-indicators.md) for more details on blocking and raising alerts on files. +For more information on blocking and raising alerts on files, see [manage indicators](manage-indicators.md) . -To stop blocking a file, remove the indicator. You can do so via the **Edit Indicator** action on the file's profile page. This action will be visible in the same position that the **Add Indicator** action was, before you added the indicator. +To stop blocking a file, remove the indicator. You can do so via the **Edit Indicator** action on the file's profile page. This action will be visible in the same position as the **Add Indicator** action, before you added the indicator. You can also edit indicators from the **Settings** page, under **Rules** > **Indicators**. Indicators are listed in this area by their file's hash. @@ -170,70 +168,79 @@ Selecting **Download file** from the response actions allows you to download a l ![Image of download file action](images/atp-download-file-action.png) -When you select this action, a fly-out will appear. From the fly-out, you can record a reason as to why you are downloading the file. You can also set a password to open the file. +When you select this action, a fly-out will appear. From the fly-out, you can record a reason as to why you're downloading the file. You can also set a password to open the file. -![Image of download file fly-out](images/atp-download-file-reason.png) +![Image of download file fly-out](images/atp-download-file-reason400.png) -If a file is not already stored by Microsoft Defender ATP, you cannot download it. Instead, you will see a **Collect file** button in the same location. If a file has not been seen in the organization in the past 30 days, **Collect file** will be disabled. +### Download quarantined files + +By default, you will not be able to download files that are in quarantine. + +However, you can turn on a setting to backup quarantined files in a secure and compliant location so they can be downloaded directly from quarantine. Once this setting is enabled, the **Download file** button will always be available. + +Go to **Settings** > **Advanced features** > **Download quarantined files** and switch the toggle to **On**. + +### Collect files + +If a file is not already stored by Microsoft Defender ATP, you can't download it. Instead, you'll see a **Collect file** button in the same location. If a file hasn't been seen in the organization in the past 30 days, **Collect file** will be disabled. ## Consult a threat expert -You can consult a Microsoft threat expert for more insights regarding a potentially compromised device or already compromised ones. Microsoft Threat Experts can be engaged directly from within the Microsoft Defender Security Center for timely and accurate response. Experts provide insights not just regarding a potentially compromised device, but also to better understand complex threats, targeted attack notifications that you get, or if you need more information about the alerts, or a threat intelligence context that you see on your portal dashboard. +Consult a Microsoft threat expert for more insights on a potentially compromised device, or already compromised devices. Microsoft Threat Experts are engaged directly from within the Microsoft Defender Security Center for timely and accurate response. Experts provide insights on a potentially compromised device and help you understand complex threats and targeted attack notifications. They can also provide information about the alerts or a threat intelligence context that you see on your portal dashboard. See [Consult a Microsoft Threat Expert](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/configure-microsoft-threat-experts#consult-a-microsoft-threat-expert-about-suspicious-cybersecurity-activities-in-your-organization) for details. ## Check activity details in Action center -The **Action center** provides information on actions that were taken on a device or file. You’ll be able to view the following details: +The **Action center** provides information on actions that were taken on a device or file. You can view the following details: - Investigation package collection - Antivirus scan - App restriction - Device isolation -All other related details are also shown, for example, submission date/time, submitting user, and if the action succeeded or failed. +All other related details are also shown, such as submission date/time, submitting user, and if the action succeeded or failed. ![Image of action center with information](images/action-center-details.png) - ## Deep analysis -Cyber security investigations are typically triggered by an alert. Alerts are related to one or more observed files that are often new or unknown. Clicking a file takes you to the file view where you can see the file's metadata. To enrich the data related to the file, you can submit the file for deep analysis. +Cyber security investigations are typically triggered by an alert. Alerts are related to one or more observed files that are often new or unknown. Selecting a file takes you to the file view where you can see the file's metadata. To enrich the data related to the file, you can submit the file for deep analysis. The Deep analysis feature executes a file in a secure, fully instrumented cloud environment. Deep analysis results show the file's activities, observed behaviors, and associated artifacts, such as dropped files, registry modifications, and communication with IPs. Deep analysis currently supports extensive analysis of portable executable (PE) files (including _.exe_ and _.dll_ files). -Deep analysis of a file takes several minutes. Once the file analysis is complete, the Deep Analysis tab will update to display the date and time of the latest results available, as well as a summary of the report itself. +Deep analysis of a file takes several minutes. Once the file analysis is complete, the Deep Analysis tab will update to display a summary and the date and time of the latest available results. -The Deep analysis summary includes a list of observed *behaviors*, some of which can indicate malicious activity, and *observables*, including contacted IPs and files created on the disk. If nothing was found, these sections will simply display a brief message. +The deep analysis summary includes a list of observed *behaviors*, some of which can indicate malicious activity, and *observables*, including contacted IPs and files created on the disk. If nothing was found, these sections will display a brief message. Results of deep analysis are matched against threat intelligence and any matches will generate appropriate alerts. -Use the deep analysis feature to investigate the details of any file, usually during an investigation of an alert or for any other reason where you suspect malicious behavior. This feature is available within the **Deep analysis** tab, on the file's profile page. +Use the deep analysis feature to investigate the details of any file. Analysis is helpful during an alert investigation or for any reason where you suspect malicious behavior. This feature is available within the **Deep analysis** tab, on the file's profile page. >[!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RE4aAYy?rel=0] -**Submit for deep analysis** is enabled when the file is available in the Microsoft Defender ATP backend sample collection, or if it was observed on a Windows 10 device that supports submitting to deep analysis. +**Submit for deep analysis** is enabled when the file is available in the Microsoft Defender ATP backend sample collection, or if it was observed on a supported Windows 10 device. > [!NOTE] > Only files from Windows 10 can be automatically collected. -You can also manually submit a sample through the [Microsoft Security Center Portal](https://www.microsoft.com/security/portal/submission/submit.aspx) if the file was not observed on a Windows 10 device, and wait for **Submit for deep analysis** button to become available. +You can also submit a sample through the [Microsoft Security Center Portal](https://www.microsoft.com/security/portal/submission/submit.aspx) if the file wasn't observed on a Windows 10 device, and wait for **Submit for deep analysis** button to become available. > [!NOTE] > Due to backend processing flows in the Microsoft Security Center Portal, there could be up to 10 minutes of latency between file submission and availability of the deep analysis feature in Microsoft Defender ATP. -When the sample is collected, Microsoft Defender ATP runs the file in is a secure environment and creates a detailed report of observed behaviors and associated artifacts, such as files dropped on devices, communication to IPs, and registry modifications. +When the sample is collected, Microsoft Defender ATP runs the file in a secure environment. It then creates a detailed report of observed behaviors and associated artifacts. Examples include files dropped on devices, communication to IPs, and registry modifications. -**Submit files for deep analysis:** +### Submit files for deep analysis 1. Select the file that you want to submit for deep analysis. You can select or search a file from any of the following views: - - Alerts - click the file links from the **Description** or **Details** in the Artifact timeline - - **Devices list** - click the file links from the **Description** or **Details** in the **Device in organization** section + - Alerts - select the file links from the **Description** or **Details** in the Artifact timeline + - **Devices list** - select the file links from the **Description** or **Details** in the **Device in organization** section - Search box - select **File** from the drop–down menu and enter the file name -2. In the **Deep analysis** tab of the file view, click **Submit**. +2. In the **Deep analysis** tab of the file view, select **Submit**. ![You can only submit PE files in the file details section](images/submit-file.png) @@ -244,9 +251,9 @@ A progress bar is displayed and provides information on the different stages of > [!NOTE] > Depending on device availability, sample collection time can vary. There is a 3–hour timeout for sample collection. The collection will fail and the operation will abort if there is no online Windows 10 device reporting at that time. You can re–submit files for deep analysis to get fresh data on the file. -**View deep analysis reports** +### View deep analysis reports -View the deep analysis report that Microsoft Defender ATP provides to see the details of the deep analysis that was conducted on the file you submitted. This feature is available in the file view context. +View the deep analysis report to see more in-depth insights on the file you submitted. This feature is available in the file view context. You can view the comprehensive report that provides details on the following sections: @@ -258,16 +265,16 @@ The details provided can help you investigate if there are indications of a pote 1. Select the file you submitted for deep analysis. 2. Select the **Deep analysis** tab. If there are any previous reports, the report summary will appear in this tab. - ![The deep analysis report shows detailed information across a number of categories](images/analysis-results-nothing.png) + ![The deep analysis report shows detailed information across a number of categories](images/analysis-results-nothing500.png) **Troubleshoot deep analysis** -If you encounter a problem when trying to submit a file, try each of the following troubleshooting steps. +If you come across a problem when trying to submit a file, try each of the following troubleshooting steps. 1. Ensure that the file in question is a PE file. PE files typically have _.exe_ or _.dll_ extensions (executable programs or applications). -1. Ensure the service has access to the file, that it still exists, and has not been corrupted or modified. -1. You can wait a short while and try to submit the file again, in case the queue is full or there was a temporary connection or communication error. -1. If the sample collection policy is not configured, then the default behavior is to allow sample collection. If it is configured, then verify the policy setting allows sample collection before submitting the file again. When sample collection is configured, then check the following registry value: +2. Ensure the service has access to the file, that it still exists, and hasn't been corrupted or modified. +3. Wait a short while and try to submit the file again. The queue may be full, or there was a temporary connection or communication error. +4. If the sample collection policy isn't configured, then the default behavior is to allow sample collection. If it's configured, then verify the policy setting allows sample collection before submitting the file again. When sample collection is configured, then check the following registry value: ```Powershell Path: HKLM\SOFTWARE\Policies\Microsoft\Windows Advanced Threat Protection @@ -279,7 +286,7 @@ If you encounter a problem when trying to submit a file, try each of the followi ``` 1. Change the organizational unit through the Group Policy. For more information, see [Configure with Group Policy](configure-endpoints-gp.md). -1. If these steps do not resolve the issue, contact [winatp@microsoft.com](mailto:winatp@microsoft.com). +2. If these steps don't resolve the issue, contact [winatp@microsoft.com](mailto:winatp@microsoft.com). ## Related topics From 143c826d79fb65a3c3fe19e5aab6792931cda05c Mon Sep 17 00:00:00 2001 From: Beth Levin Date: Mon, 24 Aug 2020 11:38:44 -0700 Subject: [PATCH 006/915] added space --- .../microsoft-defender-atp/respond-file-alerts.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/security/threat-protection/microsoft-defender-atp/respond-file-alerts.md b/windows/security/threat-protection/microsoft-defender-atp/respond-file-alerts.md index 807fc343f2..7d61280521 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/respond-file-alerts.md +++ b/windows/security/threat-protection/microsoft-defender-atp/respond-file-alerts.md @@ -89,6 +89,7 @@ This action takes effect on devices with Windows 10, version 1703 or later, wher ![Image of stop and quarantine file modal window](images/atp-stop-quarantine400.png) The Action center shows the submission information: + ![Image of stop and quarantine file action center](images/atp-stopnquarantine-file400.png) - **Submission time** - Shows when the action was submitted. From 9c2eae965795aa97d89750164d050187ae30e403 Mon Sep 17 00:00:00 2001 From: Beth Levin Date: Wed, 9 Sep 2020 15:31:22 -0700 Subject: [PATCH 007/915] response actions --- windows/security/threat-protection/TOC.md | 2 +- .../respond-file-alerts.md | 40 +++++++++---------- 2 files changed, 19 insertions(+), 23 deletions(-) diff --git a/windows/security/threat-protection/TOC.md b/windows/security/threat-protection/TOC.md index 0ec64812e8..d589a2de66 100644 --- a/windows/security/threat-protection/TOC.md +++ b/windows/security/threat-protection/TOC.md @@ -325,10 +325,10 @@ ###### [Response actions on files](microsoft-defender-atp/respond-file-alerts.md) ###### [Stop and quarantine files in your network](microsoft-defender-atp/respond-file-alerts.md#stop-and-quarantine-files-in-your-network) ###### [Restore file from quarantine](microsoft-defender-atp/respond-file-alerts.md#restore-file-from-quarantine) +###### [Download or collect file](microsoft-defender-atp/respond-file-alerts.md#download-or-collect-file) ###### [Add indicators to block or allow a file](microsoft-defender-atp/respond-file-alerts.md#add-indicator-to-block-or-allow-a-file) ###### [Consult a threat expert](microsoft-defender-atp/respond-file-alerts.md#consult-a-threat-expert) ###### [Check activity details in Action center](microsoft-defender-atp/respond-file-alerts.md#check-activity-details-in-action-center) -###### [Download or collect file](microsoft-defender-atp/respond-file-alerts.md#download-or-collect-file) ###### [Deep analysis](microsoft-defender-atp/respond-file-alerts.md#deep-analysis) #### [View and approve remediation actions](microsoft-defender-atp/manage-auto-investigation.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/respond-file-alerts.md b/windows/security/threat-protection/microsoft-defender-atp/respond-file-alerts.md index 7d61280521..301fb51363 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/respond-file-alerts.md +++ b/windows/security/threat-protection/microsoft-defender-atp/respond-file-alerts.md @@ -129,6 +129,24 @@ You can roll back and remove a file from quarantine if you’ve determined that > > Microsoft Defender ATP will restore all custom blocked files that were quarantined on this device in the last 30 days. +## Download or collect file + +Selecting **Download file** from the response actions allows you to download a local, password-protected .zip archive containing your file. A flyout will appear where you can record a reason for downloading the file, and set a password. + +By default, you will not be able to download files that are in quarantine. + +![Image of download file action](images/atp-download-file-action.png) + +### Download quarantined files + +You can turn on a setting to backup quarantined files in a secure and compliant location so they can be downloaded directly from quarantine. Once this setting is enabled, the **Download file** button will always be available. + +Go to **Settings** > **Advanced features** > **Download quarantined files** and switch the toggle to **On**. + +### Collect files + +If a file is not already stored by Microsoft Defender ATP, you can't download it. Instead, you'll see a **Collect file** button in the same location. If a file hasn't been seen in the organization in the past 30 days, **Collect file** will be disabled. + ## Add indicator to block or allow a file Prevent further propagation of an attack in your organization by banning potentially malicious files or suspected malware. If you know a potentially malicious portable executable (PE) file, you can block it. This operation will prevent it from being read, written, or executed on devices in your organization. @@ -163,28 +181,6 @@ To stop blocking a file, remove the indicator. You can do so via the **Edit Indi You can also edit indicators from the **Settings** page, under **Rules** > **Indicators**. Indicators are listed in this area by their file's hash. -## Download or collect file - -Selecting **Download file** from the response actions allows you to download a local, password-protected .zip archive containing your file. - -![Image of download file action](images/atp-download-file-action.png) - -When you select this action, a fly-out will appear. From the fly-out, you can record a reason as to why you're downloading the file. You can also set a password to open the file. - -![Image of download file fly-out](images/atp-download-file-reason400.png) - -### Download quarantined files - -By default, you will not be able to download files that are in quarantine. - -However, you can turn on a setting to backup quarantined files in a secure and compliant location so they can be downloaded directly from quarantine. Once this setting is enabled, the **Download file** button will always be available. - -Go to **Settings** > **Advanced features** > **Download quarantined files** and switch the toggle to **On**. - -### Collect files - -If a file is not already stored by Microsoft Defender ATP, you can't download it. Instead, you'll see a **Collect file** button in the same location. If a file hasn't been seen in the organization in the past 30 days, **Collect file** will be disabled. - ## Consult a threat expert Consult a Microsoft threat expert for more insights on a potentially compromised device, or already compromised devices. Microsoft Threat Experts are engaged directly from within the Microsoft Defender Security Center for timely and accurate response. Experts provide insights on a potentially compromised device and help you understand complex threats and targeted attack notifications. They can also provide information about the alerts or a threat intelligence context that you see on your portal dashboard. From eb5cd097774a044a67bb993376864361ae4b78c5 Mon Sep 17 00:00:00 2001 From: Beth Levin Date: Mon, 19 Oct 2020 15:40:31 -0700 Subject: [PATCH 008/915] quarantine updates --- .../advanced-features.md | 47 ++++++++++--------- .../respond-file-alerts.md | 10 ++++ 2 files changed, 35 insertions(+), 22 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/advanced-features.md b/windows/security/threat-protection/microsoft-defender-atp/advanced-features.md index 16e7db9ecf..26b9e17ce1 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/advanced-features.md +++ b/windows/security/threat-protection/microsoft-defender-atp/advanced-features.md @@ -30,7 +30,13 @@ ms.topic: article Depending on the Microsoft security products that you use, some advanced features might be available for you to integrate Microsoft Defender ATP with. -Use the following advanced features to get better protected from potentially malicious files and gain better insight during security investigations: +## Enable advanced features + +1. In the navigation pane, select **Preferences setup** > **Advanced features**. +2. Select the advanced feature you want to configure and toggle the setting between **On** and **Off**. +3. Click **Save preferences**. + +Use the following advanced features to get better protected from potentially malicious files and gain better insight during security investigations. ## Automated investigation @@ -114,22 +120,6 @@ The integration with Azure Advanced Threat Protection allows you to pivot direct >[!NOTE] >You'll need to have the appropriate license to enable this feature. -## Microsoft Secure Score - -Forwards Microsoft Defender ATP signals to Microsoft Secure Score in the Microsoft 365 security center. Turning on this feature gives Microsoft Secure Score visibility into the devices security posture. Forwarded data is stored and processed in the same location as the your Microsoft Secure Score data. - -### Enable the Microsoft Defender ATP integration from the Azure ATP portal - -To receive contextual device integration in Azure ATP, you'll also need to enable the feature in the Azure ATP portal. - -1. Log in to the [Azure portal](https://portal.atp.azure.com/) with a Global Administrator or Security Administrator role. - -2. Click **Create your instance**. - -3. Toggle the Integration setting to **On** and click **Save**. - -After completing the integration steps on both portals, you'll be able to see relevant alerts in the device details or user details page. - ## Office 365 Threat Intelligence connection This feature is only available if you have an active Office 365 E5 or the Threat Intelligence add-on. For more information, see the Office 365 Enterprise E5 product page. @@ -159,6 +149,22 @@ Enabling this setting forwards Microsoft Defender ATP signals to Microsoft Cloud Turning on this setting allows signals to be forwarded to Azure Information Protection. It gives data owners and administrators visibility into protected data on onboarded devices and device risk ratings. +## Microsoft Secure Score + +Forwards Microsoft Defender ATP signals to Microsoft Secure Score in the Microsoft 365 security center. Turning on this feature gives Microsoft Secure Score visibility into the devices security posture. Forwarded data is stored and processed in the same location as the your Microsoft Secure Score data. + +### Enable the Microsoft Defender ATP integration from the Azure ATP portal + +To receive contextual device integration in Azure ATP, you'll also need to enable the feature in the Azure ATP portal. + +1. Log in to the [Azure portal](https://portal.atp.azure.com/) with a Global Administrator or Security Administrator role. + +2. Click **Create your instance**. + +3. Toggle the Integration setting to **On** and click **Save**. + +After completing the integration steps on both portals, you'll be able to see relevant alerts in the device details or user details page. + ## Microsoft Intune connection Microsoft Defender ATP can be integrated with [Microsoft Intune](https://docs.microsoft.com/intune/what-is-intune) to [enable device risk-based conditional access](https://docs.microsoft.com/intune/advanced-threat-protection#enable-windows-defender-atp-in-intune). When you [turn on this feature](configure-conditional-access.md), you'll be able to share Microsoft Defender ATP device information with Intune, enhancing policy enforcement. @@ -178,7 +184,6 @@ When you enable Intune integration, Intune will automatically create a classic C >[!NOTE] > The classic CA policy created by Intune is distinct from modern [Conditional Access policies](https://docs.microsoft.com/azure/active-directory/conditional-access/overview/), which are used for configuring endpoints. - ## Preview features Learn about new features in the Microsoft Defender ATP preview release and be among the first to try upcoming features by turning on the preview experience. @@ -191,11 +196,9 @@ Forwards endpoint security alerts and their triage status to Microsoft Complianc After configuring the [Security policy violation indicators](https://docs.microsoft.com/microsoft-365/compliance/insider-risk-management-settings.md#indicators) in the insider risk management settings, Microsoft Defender ATP alerts will be shared with insider risk management for applicable users. -## Enable advanced features +## Download quarantined files -1. In the navigation pane, select **Preferences setup** > **Advanced features**. -2. Select the advanced feature you want to configure and toggle the setting between **On** and **Off**. -3. Click **Save preferences**. +You can turn on a setting to backup quarantined files in a secure and compliant location so they can be downloaded directly from quarantine. Once this setting is enabled, the **Download file** button will always be available. [Learn more about requirements](respond-file-alerts.md#download-quarantined-files) ## Related topics diff --git a/windows/security/threat-protection/microsoft-defender-atp/respond-file-alerts.md b/windows/security/threat-protection/microsoft-defender-atp/respond-file-alerts.md index 5496856283..a5a70ec6b7 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/respond-file-alerts.md +++ b/windows/security/threat-protection/microsoft-defender-atp/respond-file-alerts.md @@ -142,10 +142,20 @@ By default, you will not be able to download files that are in quarantine. ### Download quarantined files +>[!IMPORTANT] +> +>- This feature is available if your organization uses Microsoft Defender Antivirus and Cloud–based protection is enabled. For more information, see [Manage cloud–based protection](../microsoft-defender-antivirus/deploy-manage-report-microsoft-defender-antivirus.md). +> +>- The Engine version must be 1.1.17300.4 or later. +>- Supported on devices with Windows 10, version 1703 or later, Windows server 2016 and 2019. +>- Microsoft Defender for Endpoint is in active mode + You can turn on a setting to backup quarantined files in a secure and compliant location so they can be downloaded directly from quarantine. Once this setting is enabled, the **Download file** button will always be available. Go to **Settings** > **Advanced features** > **Download quarantined files** and switch the toggle to **On**. +[Learn more about advanced features](advanced-features.md) + ### Collect files If a file is not already stored by Microsoft Defender ATP, you can't download it. Instead, you'll see a **Collect file** button in the same location. If a file hasn't been seen in the organization in the past 30 days, **Collect file** will be disabled. From 3aef331ebadf79b44fc14ee681e038833b6d0d6f Mon Sep 17 00:00:00 2001 From: Nathaniel Chin <22572406+nathanielcwm@users.noreply.github.com> Date: Wed, 21 Oct 2020 17:16:44 +0800 Subject: [PATCH 009/915] update kms keys link --- windows/deployment/upgrade/windows-10-edition-upgrades.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/deployment/upgrade/windows-10-edition-upgrades.md b/windows/deployment/upgrade/windows-10-edition-upgrades.md index e2806e3c0c..ff9c6ae451 100644 --- a/windows/deployment/upgrade/windows-10-edition-upgrades.md +++ b/windows/deployment/upgrade/windows-10-edition-upgrades.md @@ -93,7 +93,7 @@ You can run the changepk.exe command-line tool to upgrade devices to a supported `changepk.exe /ProductKey ` -You can also upgrade using slmgr.vbs and a [KMS client setup key](https://docs.microsoft.com/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/jj612867(v%3dws.11)). For example, the following command will upgrade to Windows 10 Enterprise. +You can also upgrade using slmgr.vbs and a [KMS client setup key](https://docs.microsoft.com/en-us/windows-server/get-started/kmsclientkeys). For example, the following command will upgrade to Windows 10 Enterprise. `Cscript.exe c:\windows\system32\slmgr.vbs /ipk NPPR9-FWDCX-D2C8J-H872K-2YT43` From dd5a5ffaf2748dd59b6a1239aee3cba275fc06de Mon Sep 17 00:00:00 2001 From: Beth Levin Date: Thu, 22 Oct 2020 15:25:13 -0700 Subject: [PATCH 010/915] added content --- .../respond-file-alerts.md | 20 ++++++++++--------- 1 file changed, 11 insertions(+), 9 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/respond-file-alerts.md b/windows/security/threat-protection/microsoft-defender-atp/respond-file-alerts.md index 18fbac4675..fdacf2e946 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/respond-file-alerts.md +++ b/windows/security/threat-protection/microsoft-defender-atp/respond-file-alerts.md @@ -142,20 +142,22 @@ By default, you will not be able to download files that are in quarantine. ### Download quarantined files ->[!IMPORTANT] -> ->- This feature is available if your organization uses Microsoft Defender Antivirus and Cloud–based protection is enabled. For more information, see [Manage cloud–based protection](../microsoft-defender-antivirus/deploy-manage-report-microsoft-defender-antivirus.md). -> ->- The Engine version must be 1.1.17300.4 or later. ->- Supported on devices with Windows 10, version 1703 or later, Windows server 2016 and 2019. ->- Microsoft Defender for Endpoint is in active mode +Turn on a setting to backup quarantined files in a secure and compliant location so they can be downloaded directly from quarantine. Once this setting is enabled, the **Download file** button will always be available. -You can turn on a setting to backup quarantined files in a secure and compliant location so they can be downloaded directly from quarantine. Once this setting is enabled, the **Download file** button will always be available. +Users may be prompted to provide explicit consent before backing up the quarantined file, depending on your [automatic sample submission configuration](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/enable-cloud-protection-microsoft-defender-antivirus#use-intune-to-enable-cloud-delivered-protection). -Go to **Settings** > **Advanced features** > **Download quarantined files** and switch the toggle to **On**. +Go to **Settings** > **Advanced features** > **Download quarantined files** and switch the toggle to **On**. [Learn more about advanced features](advanced-features.md) +>[!IMPORTANT] +>Requirements: +>- Your organization uses Microsoft Defender Antivirus +>- Cloud–based protection is enabled. See [Manage cloud–based protection](../microsoft-defender-antivirus/deploy-manage-report-microsoft-defender-antivirus.md) +>- Microsoft Defender for Endpoint is in active mode +>- Engine version is 1.1.17300.4 or later +>- Devices have Windows 10 version 1703 or later, or Windows server 2016 and 2019 + ### Collect files If a file is not already stored by Microsoft Defender ATP, you can't download it. Instead, you'll see a **Collect file** button in the same location. If a file hasn't been seen in the organization in the past 30 days, **Collect file** will be disabled. From bbf1bff0771821a4d0ab178a6d454a0e91ebe9d5 Mon Sep 17 00:00:00 2001 From: Nathaniel Chin <22572406+nathanielcwm@users.noreply.github.com> Date: Thu, 29 Oct 2020 08:04:13 +0800 Subject: [PATCH 011/915] Update windows/deployment/upgrade/windows-10-edition-upgrades.md Co-authored-by: Trond B. Krokli <38162891+illfated@users.noreply.github.com> --- windows/deployment/upgrade/windows-10-edition-upgrades.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/deployment/upgrade/windows-10-edition-upgrades.md b/windows/deployment/upgrade/windows-10-edition-upgrades.md index ff9c6ae451..033f0e0e0d 100644 --- a/windows/deployment/upgrade/windows-10-edition-upgrades.md +++ b/windows/deployment/upgrade/windows-10-edition-upgrades.md @@ -93,7 +93,7 @@ You can run the changepk.exe command-line tool to upgrade devices to a supported `changepk.exe /ProductKey ` -You can also upgrade using slmgr.vbs and a [KMS client setup key](https://docs.microsoft.com/en-us/windows-server/get-started/kmsclientkeys). For example, the following command will upgrade to Windows 10 Enterprise. +You can also upgrade using slmgr.vbs and a [KMS client setup key](https://docs.microsoft.com/windows-server/get-started/kmsclientkeys). For example, the following command will upgrade to Windows 10 Enterprise. `Cscript.exe c:\windows\system32\slmgr.vbs /ipk NPPR9-FWDCX-D2C8J-H872K-2YT43` From 7a50041df629f60dc99c10698dbc7504c1559df0 Mon Sep 17 00:00:00 2001 From: Beth Levin Date: Fri, 20 Nov 2020 11:24:05 -0800 Subject: [PATCH 012/915] new sentence --- .../microsoft-defender-atp/respond-file-alerts.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/respond-file-alerts.md b/windows/security/threat-protection/microsoft-defender-atp/respond-file-alerts.md index 9da5a9eeb3..ca7bd263f9 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/respond-file-alerts.md +++ b/windows/security/threat-protection/microsoft-defender-atp/respond-file-alerts.md @@ -142,7 +142,7 @@ By default, you will not be able to download files that are in quarantine. ### Download quarantined files -Turn on a setting to backup quarantined files in a secure and compliant location so they can be downloaded directly from quarantine. Once this setting is enabled, the **Download file** button will always be available. +Turn on a setting to backup quarantined files in a secure and compliant location so they can be downloaded directly from quarantine. Once this setting is enabled, the **Download file** button will always be available. A quarantined file will only be downloaded once per tenant. Users may be prompted to provide explicit consent before backing up the quarantined file, depending on your [automatic sample submission configuration](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/enable-cloud-protection-microsoft-defender-antivirus#use-intune-to-enable-cloud-delivered-protection). From 915542fb1350de920c3e95e94817b8c4fff80f76 Mon Sep 17 00:00:00 2001 From: Lovina Saldanha Date: Mon, 23 Nov 2020 09:57:16 +0530 Subject: [PATCH 013/915] updated-per-4650392 Rebranding update --- .../deploy-windows-10-in-a-school-district.md | 2 +- .../hello-feature-conditional-access.md | 2 +- .../hello-hybrid-cert-new-install.md | 22 +++++++++---------- .../hello-hybrid-key-new-install.md | 22 +++++++++---------- .../hello-identity-verification.md | 2 +- .../hello-key-trust-validate-deploy-mfa.md | 2 +- .../hello-planning-guide.md | 6 ++--- 7 files changed, 29 insertions(+), 29 deletions(-) diff --git a/education/windows/deploy-windows-10-in-a-school-district.md b/education/windows/deploy-windows-10-in-a-school-district.md index 280778ccb4..3a2d13b9b9 100644 --- a/education/windows/deploy-windows-10-in-a-school-district.md +++ b/education/windows/deploy-windows-10-in-a-school-district.md @@ -678,7 +678,7 @@ The following Azure AD Premium features are not in Azure AD Basic: * Allow designated users to manage group membership * Dynamic group membership based on user metadata -* Azure multifactor authentication (MFA; see [What is Azure Multi-Factor Authentication](https://azure.microsoft.com/documentation/articles/multi-factor-authentication/)) +* Azure AD Multi-Factor Authentication (MFA; see [What is Azure AD Multi-Factor Authentication](https://azure.microsoft.com/documentation/articles/multi-factor-authentication/)) * Identify cloud apps that your users run * Self-service recovery of BitLocker * Add local administrator accounts to Windows 10 devices diff --git a/windows/security/identity-protection/hello-for-business/hello-feature-conditional-access.md b/windows/security/identity-protection/hello-for-business/hello-feature-conditional-access.md index 73e734e99b..470d856d45 100644 --- a/windows/security/identity-protection/hello-for-business/hello-feature-conditional-access.md +++ b/windows/security/identity-protection/hello-for-business/hello-feature-conditional-access.md @@ -32,7 +32,7 @@ In a mobile-first, cloud-first world, Azure Active Directory enables single sign To improve productivity, Azure Active Directory provides your users with a broad range of options to access your corporate assets. With application access management, Azure Active Directory enables you to ensure that only the right people can access your applications. What if you want to have more control over how the right people are accessing your resources under certain conditions? What if you even have conditions under which you want to block access to certain applications even for the right people? For example, it might be OK for you if the right people are accessing certain applications from a trusted network; however, you might not want them to access these applications from a network you don't trust. You can address these questions using conditional access. > [!NOTE] -> For more details about the way Windows Hello for Business interacts with Azure Multi Factor Authentication and Conditional Access, see [this article](https://techcommunity.microsoft.com/t5/core-infrastructure-and-security/why-are-my-users-not-prompted-for-mfa-as-expected/ba-p/1449032). +> For more details about the way Windows Hello for Business interacts with Azure AD Multi-Factor Authentication and Conditional Access, see [this article](https://techcommunity.microsoft.com/t5/core-infrastructure-and-security/why-are-my-users-not-prompted-for-mfa-as-expected/ba-p/1449032). Read [Conditional access in Azure Active Directory](https://docs.microsoft.com/azure/active-directory/active-directory-conditional-access-azure-portal) to learn more about Conditional Access. Afterwards, read [Getting started with conditional access in Azure Active Directory](https://docs.microsoft.com/azure/active-directory/active-directory-conditional-access-azure-portal-get-started) to start deploying Conditional access. diff --git a/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-new-install.md b/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-new-install.md index e5664fdeb0..ffbe59648f 100644 --- a/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-new-install.md +++ b/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-new-install.md @@ -100,12 +100,12 @@ The next step of the deployment is to follow the [Creating an Azure AD tenant](h ## Multifactor Authentication Services Windows Hello for Business uses multi-factor authentication during provisioning and during user initiated PIN reset scenarios, such as when a user forgets their PIN. There are two preferred multi-factor authentication configurations with hybrid deployments—Azure MFA and AD FS using Azure MFA -Review the [What is Azure Multi-Factor Authentication](https://docs.microsoft.com/azure/multi-factor-authentication/multi-factor-authentication) topic to familiarize yourself its purpose and how it works. +Review the [What is Azure AD Multi-Factor Authentication](https://docs.microsoft.com/azure/multi-factor-authentication/multi-factor-authentication) topic to familiarize yourself its purpose and how it works. -### Azure Multi-Factor Authentication (MFA) Cloud ### +### Azure AD Multi-Factor Authentication (MFA) Cloud ### > [!IMPORTANT] -> As long as your users have licenses that include Azure Multi-Factor Authentication, there's nothing that you need to do to turn on Azure MFA. You can start requiring two-step verification on an individual user basis. The licenses that enable Azure MFA are: -> * Azure Multi-Factor Authentication +> As long as your users have licenses that include Azure AD Multi-Factor Authentication, there's nothing that you need to do to turn on Azure MFA. You can start requiring two-step verification on an individual user basis. The licenses that enable Azure MFA are: +> * Azure AD Multi-Factor Authentication > * Azure Active Directory Premium > * Enterprise Mobility + Security > @@ -115,7 +115,7 @@ Review the [What is Azure Multi-Factor Authentication](https://docs.microsoft.co If your organization uses Azure MFA on a per-consumption model (no licenses), then review the [Create a Multifactor Authentication Provider](https://docs.microsoft.com/azure/multi-factor-authentication/multi-factor-authentication-get-started-auth-provider) section to create an Azure MFA Authentication provider and associate it with your Azure tenant. #### Configure Azure MFA Settings #### -Once you have created your Azure MFA authentication provider and associated it with an Azure tenant, you need to configure the multi-factor authentication settings. Review the [Configure Azure Multi-Factor Authentication settings](https://docs.microsoft.com/azure/multi-factor-authentication/multi-factor-authentication-whats-next) section to configure your settings. +Once you have created your Azure MFA authentication provider and associated it with an Azure tenant, you need to configure the multi-factor authentication settings. Review the [Configure Azure AD Multi-Factor Authentication settings](https://docs.microsoft.com/azure/multi-factor-authentication/multi-factor-authentication-whats-next) section to configure your settings. #### Azure MFA User States #### After you have completed configuring your Azure MFA settings, you want to review configure [User States](https://docs.microsoft.com/azure/multi-factor-authentication/multi-factor-authentication-get-started-user-states) to understand user states. User states determine how you enable Azure MFA for your users. @@ -126,12 +126,12 @@ Alternatively, you can configure Windows Server 2016 Active Directory Federation ### Section Review > [!div class="checklist"] -> * Review the overview and uses of Azure Multifactor Authentication. -> * Review your Azure Active Directory subscription for Azure Multifactor Authentication. -> * Create an Azure Multifactor Authentication Provider, if necessary. -> * Configure Azure Multifactor Authentication features and settings. -> * Understand the different User States and their effect on Azure Multifactor Authentication. -> * Consider using Azure Multifactor Authentication or a third-party multifactor authentication provider with Windows Server 2016 Active Directory Federation Services, if necessary. +> * Review the overview and uses of Azure AD Multi-Factor Authentication Authentication. +> * Review your Azure Active Directory subscription for Azure AD Multi-Factor Authentication. +> * Create an Azure AD Multi-Factor Authentication Provider, if necessary. +> * Configure Azure AD Multi-Factor Authentication features and settings. +> * Understand the different User States and their effect on Azure AD Multi-Factor Authentication. +> * Consider using Azure AD Multi-Factor Authentication or a third-party multifactor authentication provider with Windows Server 2016 Active Directory Federation Services, if necessary. > [!div class="nextstepaction"] > [Configure Azure Device Registration](hello-hybrid-cert-trust-devreg.md) diff --git a/windows/security/identity-protection/hello-for-business/hello-hybrid-key-new-install.md b/windows/security/identity-protection/hello-for-business/hello-hybrid-key-new-install.md index 51e6922080..958991988c 100644 --- a/windows/security/identity-protection/hello-for-business/hello-hybrid-key-new-install.md +++ b/windows/security/identity-protection/hello-for-business/hello-hybrid-key-new-install.md @@ -110,13 +110,13 @@ The next step of the deployment is to follow the [Creating an Azure AD tenant](h ## Multifactor Authentication Services Windows Hello for Business uses multifactor authentication during provisioning and during user initiated PIN reset scenarios, such as when a user forgets their PIN. There are two preferred multifactor authentication configurations with hybrid deployments—Azure MFA and AD FS using Azure MFA or a third-party MFA adapter -Review the [What is Azure Multi-Factor Authentication](https://docs.microsoft.com/azure/multi-factor-authentication/multi-factor-authentication) topic to familiarize yourself its purpose and how it works. +Review the [What is Azure AD Multi-Factor Authentication](https://docs.microsoft.com/azure/multi-factor-authentication/multi-factor-authentication) topic to familiarize yourself its purpose and how it works. -### Azure Multi-Factor Authentication (MFA) Cloud +### Azure AD Multi-Factor Authentication (MFA) Cloud > [!IMPORTANT] -> As long as your users have licenses that include Azure Multi-Factor Authentication, there's nothing that you need to do to turn on Azure MFA. You can start requiring two-step verification on an individual user basis. The licenses that enable Azure MFA are: -> * Azure Multi-Factor Authentication +> As long as your users have licenses that include Azure AD Multi-Factor Authentication, there's nothing that you need to do to turn on Azure MFA. You can start requiring two-step verification on an individual user basis. The licenses that enable Azure MFA are: +> * Azure AD Multi-Factor Authentication > * Azure Active Directory Premium > * Enterprise Mobility + Security > @@ -124,7 +124,7 @@ Review the [What is Azure Multi-Factor Authentication](https://docs.microsoft.co #### Configure Azure MFA Settings -Review the [Configure Azure Multi-Factor Authentication settings](https://docs.microsoft.com/azure/multi-factor-authentication/multi-factor-authentication-whats-next) section to configure your settings. +Review the [Configure Azure AD Multi-Factor Authentication settings](https://docs.microsoft.com/azure/multi-factor-authentication/multi-factor-authentication-whats-next) section to configure your settings. #### Azure MFA User States After you have completed configuring your Azure MFA settings, you want to review [How to require two-step verification for a user](https://docs.microsoft.com/azure/multi-factor-authentication/multi-factor-authentication-get-started-user-states) to understand user states. User states determine how you enable Azure MFA for your users. @@ -135,12 +135,12 @@ Alternatively, you can configure Windows Server 2016 Active Directory Federation ### Section Review > [!div class="checklist"] -> * Review the overview and uses of Azure Multifactor Authentication. -> * Review your Azure Active Directory subscription for Azure Multifactor Authentication. -> * Create an Azure Multifactor Authentication Provider, if necessary. -> * Configure Azure Multifactor Authentication features and settings. -> * Understand the different User States and their effect on Azure Multifactor Authentication. -> * Consider using Azure Multifactor Authentication or a third-party multifactor authentication provider with Windows Server Active Directory Federation Services, if necessary. +> * Review the overview and uses of Azure AD Multi-Factor Authentication. +> * Review your Azure Active Directory subscription for Azure AD Multi-Factor Authentication. +> * Create an Azure AD Multi-Factor Authentication Provider, if necessary. +> * Configure Azure AD Multi-Factor Authentication features and settings. +> * Understand the different User States and their effect on Azure AD Multi-Factor Authentication. +> * Consider using Azure AD Multi-Factor Authentication or a third-party multifactor authentication provider with Windows Server Active Directory Federation Services, if necessary. > [!div class="nextstepaction"] > [Configure Azure Device Registration](hello-hybrid-key-trust-devreg.md) diff --git a/windows/security/identity-protection/hello-for-business/hello-identity-verification.md b/windows/security/identity-protection/hello-for-business/hello-identity-verification.md index a5a6d5a9a2..97593c468b 100644 --- a/windows/security/identity-protection/hello-for-business/hello-identity-verification.md +++ b/windows/security/identity-protection/hello-for-business/hello-identity-verification.md @@ -41,7 +41,7 @@ Windows Hello addresses the following problems with passwords: * Windows 10, version 1511 or later * Microsoft Azure Account * Azure Active Directory -* Azure Multi-factor authentication +* Azure AD Multi-Factor Authentication * Modern Management (Intune or supported third-party MDM), *optional* * Azure AD Premium subscription - *optional*, needed for automatic MDM enrollment when the device joins Azure Active Directory diff --git a/windows/security/identity-protection/hello-for-business/hello-key-trust-validate-deploy-mfa.md b/windows/security/identity-protection/hello-for-business/hello-key-trust-validate-deploy-mfa.md index 6377afa5a8..ce54bf0ffb 100644 --- a/windows/security/identity-protection/hello-for-business/hello-key-trust-validate-deploy-mfa.md +++ b/windows/security/identity-protection/hello-for-business/hello-key-trust-validate-deploy-mfa.md @@ -19,7 +19,7 @@ ms.reviewer: # Validate and Deploy Multi-factor Authentication (MFA) > [!IMPORTANT] -> As of July 1, 2019, Microsoft will no longer offer MFA Server for new deployments. New customers who would like to require multi-factor authentication from their users should use cloud-based Azure Multi-Factor Authentication. Existing customers who have activated MFA Server prior to July 1 will be able to download the latest version, future updates and generate activation credentials as usual. +> As of July 1, 2019, Microsoft will no longer offer MFA Server for new deployments. New customers who would like to require multi-factor authentication from their users should use cloud-based Azure AD Multi-Factor Authentication. Existing customers who have activated MFA Server prior to July 1 will be able to download the latest version, future updates and generate activation credentials as usual. **Applies to** diff --git a/windows/security/identity-protection/hello-for-business/hello-planning-guide.md b/windows/security/identity-protection/hello-for-business/hello-planning-guide.md index 3fff407e34..9f8e5333ee 100644 --- a/windows/security/identity-protection/hello-for-business/hello-planning-guide.md +++ b/windows/security/identity-protection/hello-for-business/hello-planning-guide.md @@ -104,13 +104,13 @@ The built-in Windows Hello for Business provisioning experience creates a hardwa #### Multifactor authentication > [!IMPORTANT] -> As of July 1, 2019, Microsoft will no longer offer MFA Server for new deployments. New customers who require multi-factor authentication for their users should use cloud-based Azure Multi-Factor Authentication. Existing customers who have activated MFA Server prior to July 1, 2019 will be able to download the latest version, future updates and generate activation credentials as usual. See [Getting started with the Azure Multi-Factor Authentication Server](https://docs.microsoft.com/azure/active-directory/authentication/howto-mfaserver-deploy) for more details. +> As of July 1, 2019, Microsoft will no longer offer MFA Server for new deployments. New customers who require multi-factor authentication for their users should use cloud-based Azure AD Multi-Factor Authentication. Existing customers who have activated MFA Server prior to July 1, 2019 will be able to download the latest version, future updates and generate activation credentials as usual. See [Getting started with the Azure AD Multi-Factor Authentication Server](https://docs.microsoft.com/azure/active-directory/authentication/howto-mfaserver-deploy) for more details. The goal of Windows Hello for Business is to move organizations away from passwords by providing them a strong credential that provides easy two-factor authentication. The built-in provisioning experience accepts the user's weak credentials (username and password) as the first factor authentication; however, the user must provide a second factor of authentication before Windows provisions a strong credential. -Cloud only and hybrid deployments provide many choices for multi-factor authentication. On-premises deployments must use a multi-factor authentication that provides an AD FS multi-factor adapter to be used in conjunction with the on-premises Windows Server 2016 AD FS server role. Organizations can use the on-premises Azure Multi-factor Authentication server, or choose from several third parties (Read [Microsoft and third-party additional authentication methods](https://docs.microsoft.com/windows-server/identity/ad-fs/operations/configure-additional-authentication-methods-for-ad-fs#microsoft-and-third-party-additional-authentication-methods) for more information). +Cloud only and hybrid deployments provide many choices for multi-factor authentication. On-premises deployments must use a multi-factor authentication that provides an AD FS multi-factor adapter to be used in conjunction with the on-premises Windows Server 2016 AD FS server role. Organizations can use the on-premises Azure AD Multi-Factor Authentication server, or choose from several third parties (Read [Microsoft and third-party additional authentication methods](https://docs.microsoft.com/windows-server/identity/ad-fs/operations/configure-additional-authentication-methods-for-ad-fs#microsoft-and-third-party-additional-authentication-methods) for more information). > [!NOTE] -> Azure Multi-Factor Authentication is available through: +> Azure AD Multi-Factor Authentication is available through: > * Microsoft Enterprise Agreement > * Open Volume License Program > * Cloud Solution Providers program From 0ffaae4be566479e8a4b0ccd0e2ff6066a0f1bdc Mon Sep 17 00:00:00 2001 From: Beth Levin Date: Thu, 10 Dec 2020 17:24:54 -0800 Subject: [PATCH 014/915] enterprise only --- windows/security/threat-protection/intelligence/criteria.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/intelligence/criteria.md b/windows/security/threat-protection/intelligence/criteria.md index 77a3c4e33d..277e105a69 100644 --- a/windows/security/threat-protection/intelligence/criteria.md +++ b/windows/security/threat-protection/intelligence/criteria.md @@ -171,7 +171,7 @@ Microsoft uses specific categories and the category definitions to classify soft * **Advertising software:** Software that displays advertisements or promotions, or prompts you to complete surveys for other products or services in software other than itself. This includes software that inserts advertisements to webpages. -* **Torrent software:** Software that is used to create or download torrents or other files specifically used with peer-to-peer file-sharing technologies. +* **Torrent software (Enterprise only):** Software that is used to create or download torrents or other files specifically used with peer-to-peer file-sharing technologies. * **Cryptomining software:** Software that uses your device resources to mine cryptocurrencies. From 7b738c749ef6904d5120a5e674826fbb1a7a3dd2 Mon Sep 17 00:00:00 2001 From: ImranHabib <47118050+joinimran@users.noreply.github.com> Date: Fri, 11 Dec 2020 17:44:34 +0500 Subject: [PATCH 015/915] Command Update There was an issue with the command arguments. Made adjustments in the command. Problem: https://github.com/MicrosoftDocs/windows-itpro-docs/issues/8721 --- .../threat-protection/microsoft-defender-atp/linux-resources.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/linux-resources.md b/windows/security/threat-protection/microsoft-defender-atp/linux-resources.md index 3b12f36855..7a265a8e8c 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/linux-resources.md +++ b/windows/security/threat-protection/microsoft-defender-atp/linux-resources.md @@ -97,7 +97,7 @@ The following table lists commands for some of the most common scenarios. Run `m |Configuration |Turn on/off cloud protection |`mdatp config cloud --value [enabled|disabled]` | |Configuration |Turn on/off product diagnostics |`mdatp config cloud-diagnostic --value [enabled|disabled]` | |Configuration |Turn on/off automatic sample submission |`mdatp config cloud-automatic-sample-submission [enabled|disabled]` | -|Configuration |Turn on/off AV passive mode |`mdatp config passive-mode [enabled|disabled]` | +|Configuration |Turn on/off AV passive mode |`mdatp config passive-mode --value [enabled|disabled]` | |Configuration |Add/remove an antivirus exclusion for a file extension |`mdatp exclusion extension [add|remove] --name [extension]` | |Configuration |Add/remove an antivirus exclusion for a file |`mdatp exclusion file [add|remove] --path [path-to-file]` | |Configuration |Add/remove an antivirus exclusion for a directory |`mdatp exclusion folder [add|remove] --path [path-to-directory]` | From 0afc459ed3c77cf47406db586ee904dd5746d1eb Mon Sep 17 00:00:00 2001 From: "Trond B. Krokli" <38162891+illfated@users.noreply.github.com> Date: Fri, 11 Dec 2020 16:08:04 +0100 Subject: [PATCH 016/915] Use escape character before meta characters (pipe) Had to suggest this additional change, seeing that the vertical pipe divider characters (logic 'or' in parameter examples) becomes interpreted as cell dividers by GitHub Flavored MarkDown. - Add the backslash escape character in front of all pipe characters used as logic 'or' between parameter choices. - Remove redundant (and unneeded) excessive backtick characters from inline encapsulations, only 1 (not 3) is needed. --- .../microsoft-defender-atp/linux-resources.md | 30 +++++++++---------- 1 file changed, 15 insertions(+), 15 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/linux-resources.md b/windows/security/threat-protection/microsoft-defender-atp/linux-resources.md index 7a265a8e8c..969ca9675a 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/linux-resources.md +++ b/windows/security/threat-protection/microsoft-defender-atp/linux-resources.md @@ -75,9 +75,9 @@ There are several ways to uninstall Defender for Endpoint for Linux. If you are ### Manual uninstallation -- ```sudo yum remove mdatp``` for RHEL and variants(CentOS and Oracle Linux). -- ```sudo zypper remove mdatp``` for SLES and variants. -- ```sudo apt-get purge mdatp``` for Ubuntu and Debian systems. +- `sudo yum remove mdatp` for RHEL and variants(CentOS and Oracle Linux). +- `sudo zypper remove mdatp` for SLES and variants. +- `sudo apt-get purge mdatp` for Ubuntu and Debian systems. ## Configure from the command line @@ -93,15 +93,15 @@ The following table lists commands for some of the most common scenarios. Run `m |Group |Scenario |Command | |----------------------|--------------------------------------------------------|-----------------------------------------------------------------------| -|Configuration |Turn on/off real-time protection |`mdatp config real-time-protection --value [enabled|disabled]` | -|Configuration |Turn on/off cloud protection |`mdatp config cloud --value [enabled|disabled]` | -|Configuration |Turn on/off product diagnostics |`mdatp config cloud-diagnostic --value [enabled|disabled]` | -|Configuration |Turn on/off automatic sample submission |`mdatp config cloud-automatic-sample-submission [enabled|disabled]` | -|Configuration |Turn on/off AV passive mode |`mdatp config passive-mode --value [enabled|disabled]` | -|Configuration |Add/remove an antivirus exclusion for a file extension |`mdatp exclusion extension [add|remove] --name [extension]` | -|Configuration |Add/remove an antivirus exclusion for a file |`mdatp exclusion file [add|remove] --path [path-to-file]` | -|Configuration |Add/remove an antivirus exclusion for a directory |`mdatp exclusion folder [add|remove] --path [path-to-directory]` | -|Configuration |Add/remove an antivirus exclusion for a process |`mdatp exclusion process [add|remove] --path [path-to-process]`
`mdatp exclusion process [add|remove] --name [process-name]` | +|Configuration |Turn on/off real-time protection |`mdatp config real-time-protection --value [enabled\|disabled]` | +|Configuration |Turn on/off cloud protection |`mdatp config cloud --value [enabled\|disabled]` | +|Configuration |Turn on/off product diagnostics |`mdatp config cloud-diagnostic --value [enabled\|disabled]` | +|Configuration |Turn on/off automatic sample submission |`mdatp config cloud-automatic-sample-submission [enabled\|disabled]` | +|Configuration |Turn on/off AV passive mode |`mdatp config passive-mode --value [enabled\|disabled]` | +|Configuration |Add/remove an antivirus exclusion for a file extension |`mdatp exclusion extension [add\|remove] --name [extension]` | +|Configuration |Add/remove an antivirus exclusion for a file |`mdatp exclusion file [add\|remove] --path [path-to-file]` | +|Configuration |Add/remove an antivirus exclusion for a directory |`mdatp exclusion folder [add\|remove] --path [path-to-directory]` | +|Configuration |Add/remove an antivirus exclusion for a process |`mdatp exclusion process [add\|remove] --path [path-to-process]`
`mdatp exclusion process [add\|remove] --name [process-name]` | |Configuration |List all antivirus exclusions |`mdatp exclusion list` | |Configuration |Add a threat name to the allowed list |`mdatp threat allowed add --name [threat-name]` | |Configuration |Remove a threat name from the allowed list |`mdatp threat allowed remove --name [threat-name]` | @@ -109,7 +109,7 @@ The following table lists commands for some of the most common scenarios. Run `m |Configuration |Turn on PUA protection |`mdatp threat policy set --type potentially_unwanted_application --action block` | |Configuration |Turn off PUA protection |`mdatp threat policy set --type potentially_unwanted_application --action off` | |Configuration |Turn on audit mode for PUA protection |`mdatp threat policy set --type potentially_unwanted_application --action audit` | -|Diagnostics |Change the log level |`mdatp log level set --level verbose [error|warning|info|verbose]` | +|Diagnostics |Change the log level |`mdatp log level set --level verbose [error\|warning\|info\|verbose]` | |Diagnostics |Generate diagnostic logs |`mdatp diagnostic create` | |Health |Check the product's health |`mdatp health` | |Protection |Scan a path |`mdatp scan custom --path [path]` | @@ -152,6 +152,6 @@ In the Defender for Endpoint portal, you'll see two categories of information: - Logged on users do not appear in the Microsoft Defender Security Center portal. - In SUSE distributions, if the installation of *libatomic1* fails, you should validate that your OS is registered: - ```bash + ```bash sudo SUSEConnect --status-text - ``` + ``` From 3dea206d17ceeec5c5b6ac752c605ebc4f4a0b1b Mon Sep 17 00:00:00 2001 From: Lovina Saldanha Date: Mon, 14 Dec 2020 12:50:52 +0530 Subject: [PATCH 017/915] updated-task-4620497 updated task 4620497 --- .../advanced-hunting-shared-queries.md | 2 +- .../microsoft-defender-atp/advanced-hunting-take-action.md | 1 + .../microsoft-defender-atp/alerts-queue.md | 4 ++-- .../threat-protection/microsoft-defender-atp/alerts.md | 5 +++-- .../microsoft-defender-atp/android-configure.md | 4 ++-- .../microsoft-defender-atp/android-intune.md | 5 ++--- .../microsoft-defender-atp/android-privacy.md | 4 ++-- .../microsoft-defender-atp/android-support-signin.md | 4 ++-- .../microsoft-defender-atp/android-terms.md | 4 ++-- .../microsoft-defender-atp/api-explorer.md | 3 +-- .../microsoft-defender-atp/api-hello-world.md | 5 +++-- .../microsoft-defender-atp/api-microsoft-flow.md | 5 +++-- .../microsoft-defender-atp/api-portal-mapping.md | 3 +-- .../microsoft-defender-atp/api-power-bi.md | 5 +++-- .../microsoft-defender-atp/api-terms-of-use.md | 3 +++ .../threat-protection/microsoft-defender-atp/apis-intro.md | 4 ++-- .../microsoft-defender-atp/assign-portal-access.md | 1 + .../microsoft-defender-atp/attack-simulations.md | 3 +-- .../microsoft-defender-atp/attack-surface-reduction-faq.md | 5 ++--- .../microsoft-defender-atp/attack-surface-reduction.md | 5 ++--- .../microsoft-defender-atp/audit-windows-defender.md | 5 ++--- .../auto-investigation-action-center.md | 3 +++ .../microsoft-defender-atp/automated-investigations.md | 7 +++---- .../microsoft-defender-atp/automation-levels.md | 4 ++++ .../microsoft-defender-atp/basic-permissions.md | 1 + 25 files changed, 52 insertions(+), 43 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-shared-queries.md b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-shared-queries.md index 0daf0cbfda..25d3f6f796 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-shared-queries.md +++ b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-shared-queries.md @@ -21,9 +21,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) >Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-advancedhunting-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-take-action.md b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-take-action.md index d535b139e2..305f3fd9fa 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-take-action.md +++ b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-take-action.md @@ -22,6 +22,7 @@ ms.date: 09/20/2020 **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) > Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-advancedhuntingref-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/alerts-queue.md b/windows/security/threat-protection/microsoft-defender-atp/alerts-queue.md index e403e8465c..a15bbb44d3 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/alerts-queue.md +++ b/windows/security/threat-protection/microsoft-defender-atp/alerts-queue.md @@ -24,8 +24,8 @@ ms.date: 03/27/2020 **Applies to:** - -- [Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) >Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-alertsq-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/alerts.md b/windows/security/threat-protection/microsoft-defender-atp/alerts.md index eaa7c56c2f..72b1f1b8fc 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/alerts.md +++ b/windows/security/threat-protection/microsoft-defender-atp/alerts.md @@ -20,8 +20,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - -**Applies to:** [Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) - Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/android-configure.md b/windows/security/threat-protection/microsoft-defender-atp/android-configure.md index f9f5d899e6..7b866543f6 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/android-configure.md +++ b/windows/security/threat-protection/microsoft-defender-atp/android-configure.md @@ -25,8 +25,8 @@ ms.topic: conceptual [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] **Applies to:** - -- [Microsoft Defender for Endpoint for Android](microsoft-defender-atp-android.md) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) ## Conditional Access with Defender for Endpoint for Android Microsoft Defender for Endpoint for Android along with Microsoft Intune and Azure Active diff --git a/windows/security/threat-protection/microsoft-defender-atp/android-intune.md b/windows/security/threat-protection/microsoft-defender-atp/android-intune.md index d899f7568a..fe5cae5c07 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/android-intune.md +++ b/windows/security/threat-protection/microsoft-defender-atp/android-intune.md @@ -24,10 +24,9 @@ ms.topic: conceptual [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - -- [Defender for Endpoint](microsoft-defender-atp-android.md) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) This topic describes deploying Defender for Endpoint for Android on Intune Company Portal enrolled devices. For more information about Intune device enrollment, see [Enroll your diff --git a/windows/security/threat-protection/microsoft-defender-atp/android-privacy.md b/windows/security/threat-protection/microsoft-defender-atp/android-privacy.md index 66ec2fa838..32be21bcc2 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/android-privacy.md +++ b/windows/security/threat-protection/microsoft-defender-atp/android-privacy.md @@ -20,8 +20,8 @@ ms.topic: conceptual # Microsoft Defender for Endpoint for Android - Privacy information **Applies to:** - -- [Microsoft Defender for Endpoint for Android](microsoft-defender-atp-android.md) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) Defender for Endpoint for Android collects information from your configured diff --git a/windows/security/threat-protection/microsoft-defender-atp/android-support-signin.md b/windows/security/threat-protection/microsoft-defender-atp/android-support-signin.md index 34959bf022..4b7d89d0aa 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/android-support-signin.md +++ b/windows/security/threat-protection/microsoft-defender-atp/android-support-signin.md @@ -26,8 +26,8 @@ ms.topic: conceptual **Applies to:** - -- [Defender for Endpoint](microsoft-defender-atp-android.md) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) During onboarding, you might encounter sign in issues after the app is installed on your device. diff --git a/windows/security/threat-protection/microsoft-defender-atp/android-terms.md b/windows/security/threat-protection/microsoft-defender-atp/android-terms.md index d8dd335aff..5b9ded6806 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/android-terms.md +++ b/windows/security/threat-protection/microsoft-defender-atp/android-terms.md @@ -24,8 +24,8 @@ hideEdit: true [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] **Applies to:** - -- [Microsoft Defender for Endpoint](microsoft-defender-atp-android.md) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) ## MICROSOFT APPLICATION LICENSE TERMS: MICROSOFT DEFENDER FOR ENDPOINT diff --git a/windows/security/threat-protection/microsoft-defender-atp/api-explorer.md b/windows/security/threat-protection/microsoft-defender-atp/api-explorer.md index c75879bafc..5b1db3a730 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/api-explorer.md +++ b/windows/security/threat-protection/microsoft-defender-atp/api-explorer.md @@ -22,10 +22,9 @@ ms.topic: conceptual [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) The Microsoft Defender for Endpoint API Explorer is a tool that helps you explore various Defender for Endpoint APIs interactively. diff --git a/windows/security/threat-protection/microsoft-defender-atp/api-hello-world.md b/windows/security/threat-protection/microsoft-defender-atp/api-hello-world.md index 0dfd7bfce2..1cfe7b3511 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/api-hello-world.md +++ b/windows/security/threat-protection/microsoft-defender-atp/api-hello-world.md @@ -21,8 +21,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - -**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) - Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/api-microsoft-flow.md b/windows/security/threat-protection/microsoft-defender-atp/api-microsoft-flow.md index 95525bbf97..d45668f5a3 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/api-microsoft-flow.md +++ b/windows/security/threat-protection/microsoft-defender-atp/api-microsoft-flow.md @@ -21,8 +21,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - -**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) - Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/api-portal-mapping.md b/windows/security/threat-protection/microsoft-defender-atp/api-portal-mapping.md index 2170d310c0..ed503a7088 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/api-portal-mapping.md +++ b/windows/security/threat-protection/microsoft-defender-atp/api-portal-mapping.md @@ -21,10 +21,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) >Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-apiportalmapping-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/api-power-bi.md b/windows/security/threat-protection/microsoft-defender-atp/api-power-bi.md index 605b0f511a..6575464267 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/api-power-bi.md +++ b/windows/security/threat-protection/microsoft-defender-atp/api-power-bi.md @@ -21,8 +21,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - -**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) - Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/api-terms-of-use.md b/windows/security/threat-protection/microsoft-defender-atp/api-terms-of-use.md index 9c8c96f2ea..78cdd47953 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/api-terms-of-use.md +++ b/windows/security/threat-protection/microsoft-defender-atp/api-terms-of-use.md @@ -20,6 +20,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) ## APIs diff --git a/windows/security/threat-protection/microsoft-defender-atp/apis-intro.md b/windows/security/threat-protection/microsoft-defender-atp/apis-intro.md index c105db89bb..efa466e67c 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/apis-intro.md +++ b/windows/security/threat-protection/microsoft-defender-atp/apis-intro.md @@ -21,9 +21,9 @@ ms.topic: conceptual [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - -**Applies to:** +**Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) > Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/assign-portal-access.md b/windows/security/threat-protection/microsoft-defender-atp/assign-portal-access.md index a8bf456da1..b8ebc6cdff 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/assign-portal-access.md +++ b/windows/security/threat-protection/microsoft-defender-atp/assign-portal-access.md @@ -27,6 +27,7 @@ ms.date: 11/28/2018 - Azure Active Directory - Office 365 - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) >Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-assignaccess-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/attack-simulations.md b/windows/security/threat-protection/microsoft-defender-atp/attack-simulations.md index 74cc0538fb..0d3c296111 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/attack-simulations.md +++ b/windows/security/threat-protection/microsoft-defender-atp/attack-simulations.md @@ -22,10 +22,9 @@ ms.date: 11/20/2018 [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) >Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-attacksimulations-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/attack-surface-reduction-faq.md b/windows/security/threat-protection/microsoft-defender-atp/attack-surface-reduction-faq.md index 27c2c2db47..5d12d0551b 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/attack-surface-reduction-faq.md +++ b/windows/security/threat-protection/microsoft-defender-atp/attack-surface-reduction-faq.md @@ -20,10 +20,9 @@ ms.custom: asr [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - -* [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) ## Is attack surface reduction (ASR) part of Windows? diff --git a/windows/security/threat-protection/microsoft-defender-atp/attack-surface-reduction.md b/windows/security/threat-protection/microsoft-defender-atp/attack-surface-reduction.md index f5e542e2f6..e13e833985 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/attack-surface-reduction.md +++ b/windows/security/threat-protection/microsoft-defender-atp/attack-surface-reduction.md @@ -21,10 +21,9 @@ ms.date: 11/30/2020 [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - -* [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) ## Overview diff --git a/windows/security/threat-protection/microsoft-defender-atp/audit-windows-defender.md b/windows/security/threat-protection/microsoft-defender-atp/audit-windows-defender.md index b442dcb82a..e374abe630 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/audit-windows-defender.md +++ b/windows/security/threat-protection/microsoft-defender-atp/audit-windows-defender.md @@ -19,10 +19,9 @@ manager: dansimp [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - -* [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) You can enable attack surface reduction rules, exploit protection, network protection, and controlled folder access in audit mode. Audit mode lets you see a record of what *would* have happened if you had enabled the feature. diff --git a/windows/security/threat-protection/microsoft-defender-atp/auto-investigation-action-center.md b/windows/security/threat-protection/microsoft-defender-atp/auto-investigation-action-center.md index 0a77813dd2..f4e0f7e28e 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/auto-investigation-action-center.md +++ b/windows/security/threat-protection/microsoft-defender-atp/auto-investigation-action-center.md @@ -24,6 +24,9 @@ ms.date: 09/24/2020 [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) During and after an automated investigation, certain remediation actions can be identified. Depending on the threat and how [Microsoft Defender for Endpoint](https://docs.microsoft.com/windows/security/threat-protection) is configured for your organization, some remediation actions are taken automatically. diff --git a/windows/security/threat-protection/microsoft-defender-atp/automated-investigations.md b/windows/security/threat-protection/microsoft-defender-atp/automated-investigations.md index fea480df60..70b3eb03b2 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/automated-investigations.md +++ b/windows/security/threat-protection/microsoft-defender-atp/automated-investigations.md @@ -27,10 +27,9 @@ ms.custom: AIR [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] -**Applies to** - -- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146806) - +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) Your security operations team receives an alert whenever a malicious or suspicious artifact is detected by Microsoft Defender for Endpoint. Security operations teams face challenges in addressing the multitude of alerts that arise from the seemingly never-ending flow of threats. Microsoft Defender for Endpoint includes automated investigation and remediation (AIR) capabilities that can help your security operations team address threats more efficiently and effectively. Want to see how it works? Watch the following video: diff --git a/windows/security/threat-protection/microsoft-defender-atp/automation-levels.md b/windows/security/threat-protection/microsoft-defender-atp/automation-levels.md index 9fa9ebd762..cd0bb6f7e1 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/automation-levels.md +++ b/windows/security/threat-protection/microsoft-defender-atp/automation-levels.md @@ -25,6 +25,10 @@ ms.custom: AIR # Automation levels in automated investigation and remediation capabilities +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) + Automated investigation and remediation (AIR) capabilities in Microsoft Defender for Endpoint can be configured to one of several levels of automation. Your automation level affects whether remediation actions following AIR investigations are taken automatically or only upon approval. - *Full automation* (recommended) means remediation actions are taken automatically on artifacts determined to be malicious. - *Semi-automation* means some remediation actions are taken automatically, but other remediation actions await approval before being taken. (See the table in [Levels of automation](#levels-of-automation).) diff --git a/windows/security/threat-protection/microsoft-defender-atp/basic-permissions.md b/windows/security/threat-protection/microsoft-defender-atp/basic-permissions.md index fed2ad3911..fbbcf28bc8 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/basic-permissions.md +++ b/windows/security/threat-protection/microsoft-defender-atp/basic-permissions.md @@ -25,6 +25,7 @@ ms.topic: article - Azure Active Directory - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) >Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-basicaccess-abovefoldlink) From 7608b62532913aef122d6082c143891a53a48e9c Mon Sep 17 00:00:00 2001 From: Lovina Saldanha Date: Mon, 14 Dec 2020 13:14:01 +0530 Subject: [PATCH 018/915] updated-4620497-batch4 updated --- .../behavioral-blocking-containment.md | 2 +- .../microsoft-defender-atp/check-sensor-status.md | 2 +- .../microsoft-defender-atp/client-behavioral-blocking.md | 2 +- .../microsoft-defender-atp/collect-investigation-package.md | 4 +++- .../threat-protection/microsoft-defender-atp/community.md | 1 + .../microsoft-defender-atp/conditional-access.md | 3 +-- .../microsoft-defender-atp/configure-arcsight.md | 3 +-- .../configure-attack-surface-reduction.md | 3 +++ .../configure-automated-investigations-remediation.md | 5 ++--- .../microsoft-defender-atp/configure-conditional-access.md | 1 + .../microsoft-defender-atp/configure-email-notifications.md | 2 +- .../microsoft-defender-atp/configure-endpoints-gp.md | 2 +- .../microsoft-defender-atp/configure-endpoints-mdm.md | 3 +-- .../configure-endpoints-non-windows.md | 1 + .../microsoft-defender-atp/configure-endpoints-sccm.md | 1 + .../microsoft-defender-atp/configure-endpoints-script.md | 5 +---- .../microsoft-defender-atp/configure-endpoints-vdi.md | 3 ++- .../microsoft-defender-atp/configure-endpoints.md | 4 +--- .../microsoft-defender-atp/configure-machines-asr.md | 5 ++--- .../microsoft-defender-atp/configure-machines-onboarding.md | 2 +- .../configure-machines-security-baseline.md | 2 +- .../microsoft-defender-atp/configure-machines.md | 4 ++-- .../configure-microsoft-threat-experts.md | 2 +- .../microsoft-defender-atp/configure-mssp-notifications.md | 3 +-- .../microsoft-defender-atp/configure-mssp-support.md | 3 +-- 25 files changed, 33 insertions(+), 35 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/behavioral-blocking-containment.md b/windows/security/threat-protection/microsoft-defender-atp/behavioral-blocking-containment.md index 05ec75c8d0..b9812f96f1 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/behavioral-blocking-containment.md +++ b/windows/security/threat-protection/microsoft-defender-atp/behavioral-blocking-containment.md @@ -26,8 +26,8 @@ ms.collection: **Applies to:** - - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) ## Overview diff --git a/windows/security/threat-protection/microsoft-defender-atp/check-sensor-status.md b/windows/security/threat-protection/microsoft-defender-atp/check-sensor-status.md index bbff2e68b9..8805dc3930 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/check-sensor-status.md +++ b/windows/security/threat-protection/microsoft-defender-atp/check-sensor-status.md @@ -22,9 +22,9 @@ ms.date: 04/24/2018 [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) >Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-checksensor-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/client-behavioral-blocking.md b/windows/security/threat-protection/microsoft-defender-atp/client-behavioral-blocking.md index ef5d153836..bc4df2fd36 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/client-behavioral-blocking.md +++ b/windows/security/threat-protection/microsoft-defender-atp/client-behavioral-blocking.md @@ -26,8 +26,8 @@ ms.collection: **Applies to:** - - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) ## Overview diff --git a/windows/security/threat-protection/microsoft-defender-atp/collect-investigation-package.md b/windows/security/threat-protection/microsoft-defender-atp/collect-investigation-package.md index 0d6949ea0b..7353a6bf79 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/collect-investigation-package.md +++ b/windows/security/threat-protection/microsoft-defender-atp/collect-investigation-package.md @@ -22,7 +22,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] -**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) - Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/community.md b/windows/security/threat-protection/microsoft-defender-atp/community.md index f68dcdeab3..133d2cab9b 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/community.md +++ b/windows/security/threat-protection/microsoft-defender-atp/community.md @@ -26,6 +26,7 @@ ms.date: 04/24/2018 **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) diff --git a/windows/security/threat-protection/microsoft-defender-atp/conditional-access.md b/windows/security/threat-protection/microsoft-defender-atp/conditional-access.md index a0ace30f14..2547e77520 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/conditional-access.md +++ b/windows/security/threat-protection/microsoft-defender-atp/conditional-access.md @@ -24,8 +24,7 @@ ms.topic: article **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - - +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) >Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-conditionalaccess-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-arcsight.md b/windows/security/threat-protection/microsoft-defender-atp/configure-arcsight.md index aca0be0b19..026974fa1b 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-arcsight.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-arcsight.md @@ -21,10 +21,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-attack-surface-reduction.md b/windows/security/threat-protection/microsoft-defender-atp/configure-attack-surface-reduction.md index 736ab0b846..c19655f2e1 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-attack-surface-reduction.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-attack-surface-reduction.md @@ -21,6 +21,9 @@ ms.topic: conceptual [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) You can configure attack surface reduction with a number of tools, including: diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-automated-investigations-remediation.md b/windows/security/threat-protection/microsoft-defender-atp/configure-automated-investigations-remediation.md index f8d91cd3e1..572a80986e 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-automated-investigations-remediation.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-automated-investigations-remediation.md @@ -24,10 +24,9 @@ ms.reviewer: ramarom, evaldm, isco, mabraitm, chriggs [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - -**Applies to** - +**Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) If your organization is using [Microsoft Defender for Endpoint](https://docs.microsoft.com/windows/security/threat-protection/) (Defender for Endpoint), [automated investigation and remediation capabilities](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/automated-investigations) can save your security operations team time and effort. As outlined in [this blog post](https://techcommunity.microsoft.com/t5/microsoft-defender-atp/enhance-your-soc-with-microsoft-defender-atp-automatic/ba-p/848946), these capabilities mimic the ideal steps that a security analyst takes to investigate and remediate threats. [Learn more about automated investigation and remediation](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/automated-investigations). diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-conditional-access.md b/windows/security/threat-protection/microsoft-defender-atp/configure-conditional-access.md index 206e5721b3..179220a82c 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-conditional-access.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-conditional-access.md @@ -23,6 +23,7 @@ ms.topic: article **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) This section guides you through all the steps you need to take to properly implement Conditional Access. diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-email-notifications.md b/windows/security/threat-protection/microsoft-defender-atp/configure-email-notifications.md index f7ccfe871b..359e660d49 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-email-notifications.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-email-notifications.md @@ -21,9 +21,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) >Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-emailconfig-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-gp.md b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-gp.md index 5360517315..2f52e87c77 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-gp.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-gp.md @@ -26,8 +26,8 @@ ms.date: 04/24/2018 **Applies to:** - Group Policy - - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-mdm.md b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-mdm.md index 0a97fbf1e3..7f93a3b0d0 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-mdm.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-mdm.md @@ -23,9 +23,8 @@ ms.topic: article **Applies to:** - - - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) >Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-configureendpointsmdm-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-non-windows.md b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-non-windows.md index ba65815551..695326a404 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-non-windows.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-non-windows.md @@ -27,6 +27,7 @@ ms.topic: article - macOS - Linux - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) >Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-nonwindows-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-sccm.md b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-sccm.md index 38ec7959c3..4f17253970 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-sccm.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-sccm.md @@ -26,6 +26,7 @@ ms.date: 02/07/2020 **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) - Microsoft Endpoint Configuration Manager current branch - System Center 2012 R2 Configuration Manager diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-script.md b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-script.md index acfdb668c7..d063e91f81 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-script.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-script.md @@ -22,10 +22,7 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] -**Applies to:** - - -- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-vdi.md b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-vdi.md index fc7c7e1d3c..c2143a8c0d 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-vdi.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-vdi.md @@ -24,7 +24,8 @@ ms.date: 04/16/2020 **Applies to:** -- Virtual desktop infrastructure (VDI) devices +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) >[!WARNING] > Microsoft Defender for Endpoint support for Windows Virtual Desktop multi-user scenarios is currently in Preview and limited up to 25 concurrent sessions per host/VM. However single session scenarios on Windows Virtual Desktop are fully supported. diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints.md b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints.md index 00ee7a17a2..e11efc3916 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints.md @@ -21,11 +21,9 @@ ms.topic: conceptual [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - - - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) - [Microsoft 365 Endpoint data loss prevention (DLP)](/microsoft-365/compliance/endpoint-dlp-learn-about) Devices in your organization must be configured so that the Defender for Endpoint service can get sensor data from them. There are various methods and deployment tools that you can use to configure the devices in your organization. diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-machines-asr.md b/windows/security/threat-protection/microsoft-defender-atp/configure-machines-asr.md index 17e8cb3039..d5d5d57342 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-machines-asr.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-machines-asr.md @@ -21,10 +21,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - -* [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) > Want to experience Defender for Endpoint? [Sign up for a free trial](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-onboardconfigure-abovefoldlink). diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-machines-onboarding.md b/windows/security/threat-protection/microsoft-defender-atp/configure-machines-onboarding.md index b207e1fb84..d5c84321a6 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-machines-onboarding.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-machines-onboarding.md @@ -21,9 +21,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) >Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-onboardconfigure-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-machines-security-baseline.md b/windows/security/threat-protection/microsoft-defender-atp/configure-machines-security-baseline.md index e110a3d518..c5ac3b1e85 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-machines-security-baseline.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-machines-security-baseline.md @@ -21,9 +21,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) >Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-onboardconfigure-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-machines.md b/windows/security/threat-protection/microsoft-defender-atp/configure-machines.md index 9b830a3988..9f4ad2ec51 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-machines.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-machines.md @@ -21,9 +21,9 @@ ms.topic: conceptual [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** -- [Microsoft Defender for Endpoint ](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) >Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-onboardconfigure-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-microsoft-threat-experts.md b/windows/security/threat-protection/microsoft-defender-atp/configure-microsoft-threat-experts.md index 3ce240d781..c3033e6e9b 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-microsoft-threat-experts.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-microsoft-threat-experts.md @@ -25,8 +25,8 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] **Applies to:** - - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) ## Before you begin > [!NOTE] diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-mssp-notifications.md b/windows/security/threat-protection/microsoft-defender-atp/configure-mssp-notifications.md index e75588efda..20f4727023 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-mssp-notifications.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-mssp-notifications.md @@ -21,10 +21,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) >Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-mssp-support-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-mssp-support.md b/windows/security/threat-protection/microsoft-defender-atp/configure-mssp-support.md index dde5d47ec5..69475ea801 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-mssp-support.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-mssp-support.md @@ -21,10 +21,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) >Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-mssp-support-abovefoldlink) From 4e57cd34aad3413e52cf3b6491d747ed768929c1 Mon Sep 17 00:00:00 2001 From: Lovina Saldanha Date: Mon, 14 Dec 2020 15:53:02 +0530 Subject: [PATCH 019/915] updated-4620497 updated --- .../microsoft-defender-atp/configure-proxy-internet.md | 5 ++--- .../microsoft-defender-atp/configure-server-endpoints.md | 1 + .../microsoft-defender-atp/configure-siem.md | 3 +-- .../microsoft-defender-atp/connected-applications.md | 1 + .../microsoft-defender-atp/contact-support.md | 3 ++- .../microsoft-defender-atp/controlled-folders.md | 3 +-- .../microsoft-defender-atp/create-alert-by-reference.md | 4 +++- .../microsoft-defender-atp/custom-detection-rules.md | 2 +- .../microsoft-defender-atp/custom-detections-manage.md | 1 + .../customize-attack-surface-reduction.md | 4 ++-- .../microsoft-defender-atp/customize-controlled-folders.md | 4 ++-- .../microsoft-defender-atp/customize-exploit-protection.md | 4 ++-- .../microsoft-defender-atp/data-retention-settings.md | 3 +-- .../microsoft-defender-atp/data-storage-privacy.md | 3 ++- .../microsoft-defender-atp/defender-compatibility.md | 7 ++----- .../microsoft-defender-atp/delete-ti-indicator-by-id.md | 5 +++-- .../microsoft-defender-atp/deployment-phases.md | 2 +- .../microsoft-defender-atp/deployment-rings.md | 2 ++ .../microsoft-defender-atp/deployment-strategy.md | 1 + .../microsoft-defender-atp/device-timeline-event-flag.md | 4 +++- .../microsoft-defender-atp/edr-in-block-mode.md | 3 +-- .../enable-attack-surface-reduction.md | 3 +++ .../microsoft-defender-atp/enable-controlled-folders.md | 4 ++-- .../microsoft-defender-atp/enable-exploit-protection.md | 5 ++--- .../microsoft-defender-atp/enable-network-protection.md | 5 ++--- 25 files changed, 44 insertions(+), 38 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-proxy-internet.md b/windows/security/threat-protection/microsoft-defender-atp/configure-proxy-internet.md index 48fd0bee7d..29d8a51496 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-proxy-internet.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-proxy-internet.md @@ -23,10 +23,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - -- [Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) > Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-configureendpointsscript-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-server-endpoints.md b/windows/security/threat-protection/microsoft-defender-atp/configure-server-endpoints.md index 6c6a1ea7cc..18fcfe65b1 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-server-endpoints.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-server-endpoints.md @@ -31,6 +31,7 @@ ms.topic: article - Windows Server 2019 and later - Windows Server 2019 core edition - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) > Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-configserver-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-siem.md b/windows/security/threat-protection/microsoft-defender-atp/configure-siem.md index 62e2e5f5b1..02df3a13d3 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-siem.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-siem.md @@ -21,10 +21,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) >Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-configuresiem-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/connected-applications.md b/windows/security/threat-protection/microsoft-defender-atp/connected-applications.md index 99a86d51e7..6744927292 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/connected-applications.md +++ b/windows/security/threat-protection/microsoft-defender-atp/connected-applications.md @@ -24,6 +24,7 @@ ms.topic: conceptual **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) Connected applications integrates with the Defender for Endpoint platform using APIs. diff --git a/windows/security/threat-protection/microsoft-defender-atp/contact-support.md b/windows/security/threat-protection/microsoft-defender-atp/contact-support.md index b8af068443..b323d8069b 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/contact-support.md +++ b/windows/security/threat-protection/microsoft-defender-atp/contact-support.md @@ -23,7 +23,8 @@ ms.topic: conceptual **Applies to:** -- [Microsoft Defender for Endpoint](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) Defender for Endpoint has recently upgraded the support process to offer a more modern and advanced support experience. diff --git a/windows/security/threat-protection/microsoft-defender-atp/controlled-folders.md b/windows/security/threat-protection/microsoft-defender-atp/controlled-folders.md index 272d1480ec..bdd720eab1 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/controlled-folders.md +++ b/windows/security/threat-protection/microsoft-defender-atp/controlled-folders.md @@ -21,10 +21,9 @@ ms.custom: asr [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) ## What is controlled folder access? diff --git a/windows/security/threat-protection/microsoft-defender-atp/create-alert-by-reference.md b/windows/security/threat-protection/microsoft-defender-atp/create-alert-by-reference.md index a5c286ef37..bf6f406639 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/create-alert-by-reference.md +++ b/windows/security/threat-protection/microsoft-defender-atp/create-alert-by-reference.md @@ -21,7 +21,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] -**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) - Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/custom-detection-rules.md b/windows/security/threat-protection/microsoft-defender-atp/custom-detection-rules.md index 17e23e40fc..f47b66c90f 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/custom-detection-rules.md +++ b/windows/security/threat-protection/microsoft-defender-atp/custom-detection-rules.md @@ -24,8 +24,8 @@ ms.date: 09/20/2020 [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] **Applies to:** - - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) Custom detection rules built from [advanced hunting](advanced-hunting-overview.md) queries let you proactively monitor various events and system states, including suspected breach activity and misconfigured devices. You can set them to run at regular intervals, generating alerts and taking response actions whenever there are matches. diff --git a/windows/security/threat-protection/microsoft-defender-atp/custom-detections-manage.md b/windows/security/threat-protection/microsoft-defender-atp/custom-detections-manage.md index ef5088e134..cd17efa6b8 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/custom-detections-manage.md +++ b/windows/security/threat-protection/microsoft-defender-atp/custom-detections-manage.md @@ -25,6 +25,7 @@ ms.topic: article **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) Manage your existing [custom detection rules](custom-detection-rules.md) to ensure they are effectively finding threats and taking actions. Explore how to view the list of rules, check their previous runs, and review the alerts they have triggered. You can also run a rule on demand and modify it. diff --git a/windows/security/threat-protection/microsoft-defender-atp/customize-attack-surface-reduction.md b/windows/security/threat-protection/microsoft-defender-atp/customize-attack-surface-reduction.md index 81ede44b00..03a274b066 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/customize-attack-surface-reduction.md +++ b/windows/security/threat-protection/microsoft-defender-atp/customize-attack-surface-reduction.md @@ -20,8 +20,8 @@ manager: dansimp **Applies to:** - -* [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) > [!IMPORTANT] > Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. diff --git a/windows/security/threat-protection/microsoft-defender-atp/customize-controlled-folders.md b/windows/security/threat-protection/microsoft-defender-atp/customize-controlled-folders.md index 39b6cd2158..b6570ffae3 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/customize-controlled-folders.md +++ b/windows/security/threat-protection/microsoft-defender-atp/customize-controlled-folders.md @@ -20,8 +20,8 @@ manager: dansimp **Applies to:** - -* [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) Controlled folder access helps you protect valuable data from malicious apps and threats, such as ransomware. Controlled folder access is supported on Windows Server 2019 and Windows 10 clients. diff --git a/windows/security/threat-protection/microsoft-defender-atp/customize-exploit-protection.md b/windows/security/threat-protection/microsoft-defender-atp/customize-exploit-protection.md index 964158b256..fa16ddf58a 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/customize-exploit-protection.md +++ b/windows/security/threat-protection/microsoft-defender-atp/customize-exploit-protection.md @@ -20,8 +20,8 @@ manager: dansimp **Applies to:** - -* [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) Exploit protection automatically applies a number of exploit mitigation techniques on both the operating system processes and on individual apps. diff --git a/windows/security/threat-protection/microsoft-defender-atp/data-retention-settings.md b/windows/security/threat-protection/microsoft-defender-atp/data-retention-settings.md index 7932cfb153..df983743ae 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/data-retention-settings.md +++ b/windows/security/threat-protection/microsoft-defender-atp/data-retention-settings.md @@ -22,9 +22,8 @@ ms.topic: conceptual **Applies to:** - - - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) >Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-gensettings-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/data-storage-privacy.md b/windows/security/threat-protection/microsoft-defender-atp/data-storage-privacy.md index 953b74c139..0b69d38538 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/data-storage-privacy.md +++ b/windows/security/threat-protection/microsoft-defender-atp/data-storage-privacy.md @@ -23,7 +23,8 @@ ms.topic: conceptual **Applies to:** -- [Microsoft Defender for Endpoint](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) diff --git a/windows/security/threat-protection/microsoft-defender-atp/defender-compatibility.md b/windows/security/threat-protection/microsoft-defender-atp/defender-compatibility.md index f84762a3a0..28d34ad383 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/defender-compatibility.md +++ b/windows/security/threat-protection/microsoft-defender-atp/defender-compatibility.md @@ -24,12 +24,9 @@ ms.date: 04/24/2018 **Applies to:** - - -- Windows Defender - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - - +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) +- Windows Defender >Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-defendercompat-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/delete-ti-indicator-by-id.md b/windows/security/threat-protection/microsoft-defender-atp/delete-ti-indicator-by-id.md index 123ce4959e..4d1f037200 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/delete-ti-indicator-by-id.md +++ b/windows/security/threat-protection/microsoft-defender-atp/delete-ti-indicator-by-id.md @@ -20,8 +20,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - -**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) - Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/deployment-phases.md b/windows/security/threat-protection/microsoft-defender-atp/deployment-phases.md index 16e39faf4d..2c443f3d9e 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/deployment-phases.md +++ b/windows/security/threat-protection/microsoft-defender-atp/deployment-phases.md @@ -25,7 +25,7 @@ ms.topic: article **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) Learn how to deploy Microsoft Defender for Endpoint so that your enterprise can take advantage of preventative protection, post-breach detection, automated investigation, and response. diff --git a/windows/security/threat-protection/microsoft-defender-atp/deployment-rings.md b/windows/security/threat-protection/microsoft-defender-atp/deployment-rings.md index 8ad96f8300..1c6eaca4d0 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/deployment-rings.md +++ b/windows/security/threat-protection/microsoft-defender-atp/deployment-rings.md @@ -25,6 +25,8 @@ ms.topic: article **Applies to:** - [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) Deploying Microsoft Defender ATP can be done using a ring-based deployment approach. diff --git a/windows/security/threat-protection/microsoft-defender-atp/deployment-strategy.md b/windows/security/threat-protection/microsoft-defender-atp/deployment-strategy.md index fad489826a..0cb703372f 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/deployment-strategy.md +++ b/windows/security/threat-protection/microsoft-defender-atp/deployment-strategy.md @@ -22,6 +22,7 @@ ms.topic: article **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) >Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-secopsdashboard-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/device-timeline-event-flag.md b/windows/security/threat-protection/microsoft-defender-atp/device-timeline-event-flag.md index 8ab3495d50..67c3961a98 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/device-timeline-event-flag.md +++ b/windows/security/threat-protection/microsoft-defender-atp/device-timeline-event-flag.md @@ -20,7 +20,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] -**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) Event flags in the Defender for Endpoint device timeline help you filter and organize specific events when you're investigate potential attacks. diff --git a/windows/security/threat-protection/microsoft-defender-atp/edr-in-block-mode.md b/windows/security/threat-protection/microsoft-defender-atp/edr-in-block-mode.md index 0372ef6ab9..f190d344a8 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/edr-in-block-mode.md +++ b/windows/security/threat-protection/microsoft-defender-atp/edr-in-block-mode.md @@ -25,10 +25,9 @@ ms.collection: [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) ## What is EDR in block mode? diff --git a/windows/security/threat-protection/microsoft-defender-atp/enable-attack-surface-reduction.md b/windows/security/threat-protection/microsoft-defender-atp/enable-attack-surface-reduction.md index 603f751bdd..9464fb22dd 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/enable-attack-surface-reduction.md +++ b/windows/security/threat-protection/microsoft-defender-atp/enable-attack-surface-reduction.md @@ -19,6 +19,9 @@ manager: dansimp [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) [Attack surface reduction rules](attack-surface-reduction.md) (ASR rules) help prevent actions that malware often abuses to compromise devices and networks. You can set ASR rules for devices running any of the following editions and versions of Windows: - Windows 10 Pro, [version 1709](https://docs.microsoft.com/windows/whats-new/whats-new-windows-10-version-1709) or later diff --git a/windows/security/threat-protection/microsoft-defender-atp/enable-controlled-folders.md b/windows/security/threat-protection/microsoft-defender-atp/enable-controlled-folders.md index 8af897f9a0..1e040286f7 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/enable-controlled-folders.md +++ b/windows/security/threat-protection/microsoft-defender-atp/enable-controlled-folders.md @@ -21,8 +21,8 @@ manager: dansimp **Applies to:** - -* [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) [Controlled folder access](controlled-folders.md) helps you protect valuable data from malicious apps and threats, such as ransomware. Controlled folder access is included with Windows 10 and Windows Server 2019. diff --git a/windows/security/threat-protection/microsoft-defender-atp/enable-exploit-protection.md b/windows/security/threat-protection/microsoft-defender-atp/enable-exploit-protection.md index 7b1c044a64..2e4c2b5cb0 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/enable-exploit-protection.md +++ b/windows/security/threat-protection/microsoft-defender-atp/enable-exploit-protection.md @@ -18,10 +18,9 @@ manager: dansimp [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - -* [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) [Exploit protection](exploit-protection.md) helps protect against malware that uses exploits to infect devices and spread. Exploit protection consists of a number of mitigations that can be applied to either the operating system or individual apps. diff --git a/windows/security/threat-protection/microsoft-defender-atp/enable-network-protection.md b/windows/security/threat-protection/microsoft-defender-atp/enable-network-protection.md index 4f9ad6dff7..41c19a2a84 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/enable-network-protection.md +++ b/windows/security/threat-protection/microsoft-defender-atp/enable-network-protection.md @@ -18,10 +18,9 @@ manager: dansimp [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - -* [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) [Network protection](network-protection.md) helps to prevent employees from using any application to access dangerous domains that may host phishing scams, exploits, and other malicious content on the internet. You can [audit network protection](evaluate-network-protection.md) in a test environment to view which apps would be blocked before you enable it. From fcbc401f6ee75012e0045557fdab71507940c84f Mon Sep 17 00:00:00 2001 From: Lovina Saldanha Date: Tue, 15 Dec 2020 11:10:51 +0530 Subject: [PATCH 020/915] updated-4620497 updated --- .../microsoft-defender-atp/get-alert-related-files-info.md | 4 +++- .../microsoft-defender-atp/get-alert-related-ip-info.md | 5 +++-- .../microsoft-defender-atp/get-alert-related-machine-info.md | 4 +++- .../microsoft-defender-atp/get-alert-related-user-info.md | 4 +++- .../threat-protection/microsoft-defender-atp/get-alerts.md | 5 +++-- .../microsoft-defender-atp/get-all-recommendations.md | 1 + .../get-all-vulnerabilities-by-machines.md | 5 +++-- .../microsoft-defender-atp/get-all-vulnerabilities.md | 1 + .../microsoft-defender-atp/get-cvekbmap-collection.md | 2 +- .../microsoft-defender-atp/get-device-secure-score.md | 5 +++-- .../microsoft-defender-atp/get-discovered-vulnerabilities.md | 2 +- .../microsoft-defender-atp/get-domain-related-alerts.md | 5 +++-- .../microsoft-defender-atp/get-domain-related-machines.md | 5 +++-- .../microsoft-defender-atp/get-domain-statistics.md | 5 +++-- .../microsoft-defender-atp/get-exposure-score.md | 5 +++-- .../microsoft-defender-atp/get-file-information.md | 5 +++-- .../microsoft-defender-atp/get-file-related-alerts.md | 5 +++-- .../microsoft-defender-atp/get-file-related-machines.md | 5 +++-- .../microsoft-defender-atp/get-file-statistics.md | 5 +++-- .../microsoft-defender-atp/get-installed-software.md | 1 + .../microsoft-defender-atp/get-investigation-collection.md | 5 +++-- .../microsoft-defender-atp/get-investigation-object.md | 5 +++-- .../microsoft-defender-atp/get-ip-related-alerts.md | 5 +++-- .../microsoft-defender-atp/get-ip-statistics.md | 5 +++-- .../microsoft-defender-atp/get-kbinfo-collection.md | 3 +-- 25 files changed, 63 insertions(+), 39 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-files-info.md b/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-files-info.md index 6e61e17504..651b49212d 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-files-info.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-files-info.md @@ -21,7 +21,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] -**Applies to:** [Microsoft Defender for Endpoint ](https://go.microsoft.com/fwlink/p/?linkid=2146631) +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) - Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-ip-info.md b/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-ip-info.md index 62db50d08a..7825b85156 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-ip-info.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-ip-info.md @@ -20,8 +20,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - -**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) - Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-machine-info.md b/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-machine-info.md index 98f64ac8d1..03708c1020 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-machine-info.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-machine-info.md @@ -21,7 +21,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] -**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) - Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-user-info.md b/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-user-info.md index 3e96ce7383..72be8a0c42 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-user-info.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-user-info.md @@ -21,7 +21,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] -**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) - Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-alerts.md b/windows/security/threat-protection/microsoft-defender-atp/get-alerts.md index a7c825d739..f101a9d602 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-alerts.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-alerts.md @@ -20,8 +20,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - -**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) - Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-all-recommendations.md b/windows/security/threat-protection/microsoft-defender-atp/get-all-recommendations.md index a5cde6e4a0..0c2616e9e7 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-all-recommendations.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-all-recommendations.md @@ -22,6 +22,7 @@ ms.topic: article **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) [!include[Prerelease information](../../includes/prerelease.md)] diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-all-vulnerabilities-by-machines.md b/windows/security/threat-protection/microsoft-defender-atp/get-all-vulnerabilities-by-machines.md index f2de05191d..f2da7275b6 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-all-vulnerabilities-by-machines.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-all-vulnerabilities-by-machines.md @@ -20,8 +20,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - -**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) Retrieves a list of all the vulnerabilities affecting the organization per [machine](machine.md) and [software](software.md). - If the vulnerability has a fixing KB, it will appear in the response. diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-all-vulnerabilities.md b/windows/security/threat-protection/microsoft-defender-atp/get-all-vulnerabilities.md index 9847c928d4..a3e95d9c16 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-all-vulnerabilities.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-all-vulnerabilities.md @@ -22,6 +22,7 @@ ms.topic: article **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) [!include[Prerelease information](../../includes/prerelease.md)] diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-cvekbmap-collection.md b/windows/security/threat-protection/microsoft-defender-atp/get-cvekbmap-collection.md index 7a5a5aacb3..385c421a26 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-cvekbmap-collection.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-cvekbmap-collection.md @@ -24,8 +24,8 @@ ROBOTS: NOINDEX **Applies to:** - - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) Retrieves a map of CVE's to KB's and CVE details. diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-device-secure-score.md b/windows/security/threat-protection/microsoft-defender-atp/get-device-secure-score.md index e14a6859a7..4f9e92ddcc 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-device-secure-score.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-device-secure-score.md @@ -20,8 +20,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - -**Applies to:** [Microsoft Defender for Endpoint(https://go.microsoft.com/fwlink/p/?linkid=2146631) +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) - Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-discovered-vulnerabilities.md b/windows/security/threat-protection/microsoft-defender-atp/get-discovered-vulnerabilities.md index 5b16a71cfc..7f222bc4a9 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-discovered-vulnerabilities.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-discovered-vulnerabilities.md @@ -20,9 +20,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) Retrieves a collection of discovered vulnerabilities related to a given device ID. diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-domain-related-alerts.md b/windows/security/threat-protection/microsoft-defender-atp/get-domain-related-alerts.md index 26fdbad6f4..d9b0b32483 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-domain-related-alerts.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-domain-related-alerts.md @@ -20,8 +20,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - -**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) - Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-domain-related-machines.md b/windows/security/threat-protection/microsoft-defender-atp/get-domain-related-machines.md index 5bf5182ede..1c2d3fb2bd 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-domain-related-machines.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-domain-related-machines.md @@ -20,8 +20,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - -**Applies to:** [Microsoft Defender for Endpoint(https://go.microsoft.com/fwlink/p/?linkid=2146631) +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) - Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-domain-statistics.md b/windows/security/threat-protection/microsoft-defender-atp/get-domain-statistics.md index cb49efb465..95f80888b4 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-domain-statistics.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-domain-statistics.md @@ -20,8 +20,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - -**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) - Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-exposure-score.md b/windows/security/threat-protection/microsoft-defender-atp/get-exposure-score.md index 43d7ac20e9..1b198b2bdb 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-exposure-score.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-exposure-score.md @@ -20,8 +20,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - -**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) - Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-file-information.md b/windows/security/threat-protection/microsoft-defender-atp/get-file-information.md index 61ab343580..1767867907 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-file-information.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-file-information.md @@ -20,8 +20,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - -**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) - Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-file-related-alerts.md b/windows/security/threat-protection/microsoft-defender-atp/get-file-related-alerts.md index d1c53228ac..b391f38bdf 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-file-related-alerts.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-file-related-alerts.md @@ -20,8 +20,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - -**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) - Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-file-related-machines.md b/windows/security/threat-protection/microsoft-defender-atp/get-file-related-machines.md index c60f272c69..8b7bb61eb7 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-file-related-machines.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-file-related-machines.md @@ -20,8 +20,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - -**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) - Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-file-statistics.md b/windows/security/threat-protection/microsoft-defender-atp/get-file-statistics.md index 59f525f594..df341da739 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-file-statistics.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-file-statistics.md @@ -20,8 +20,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - -**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) - Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-installed-software.md b/windows/security/threat-protection/microsoft-defender-atp/get-installed-software.md index 293d458f27..4d1867d87d 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-installed-software.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-installed-software.md @@ -22,6 +22,7 @@ ms.topic: article **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) [!include[Prerelease information](../../includes/prerelease.md)] diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-investigation-collection.md b/windows/security/threat-protection/microsoft-defender-atp/get-investigation-collection.md index 296f7c81ce..75c7209471 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-investigation-collection.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-investigation-collection.md @@ -20,8 +20,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - -**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) - Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-investigation-object.md b/windows/security/threat-protection/microsoft-defender-atp/get-investigation-object.md index 6953ccabba..ea31977cd3 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-investigation-object.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-investigation-object.md @@ -20,8 +20,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - -**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) - Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-ip-related-alerts.md b/windows/security/threat-protection/microsoft-defender-atp/get-ip-related-alerts.md index 6d078cbf15..80e7f081b7 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-ip-related-alerts.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-ip-related-alerts.md @@ -20,8 +20,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - -**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) - Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-ip-statistics.md b/windows/security/threat-protection/microsoft-defender-atp/get-ip-statistics.md index b58fd359e9..3d541b25a8 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-ip-statistics.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-ip-statistics.md @@ -20,8 +20,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - -**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) - Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-kbinfo-collection.md b/windows/security/threat-protection/microsoft-defender-atp/get-kbinfo-collection.md index e7ac39a93c..26b4ec47c1 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-kbinfo-collection.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-kbinfo-collection.md @@ -22,10 +22,9 @@ ROBOTS: NOINDEX [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) Retrieves a collection of KB's and KB details. From a40b8a23a8bd7d1e9827a45ffbd7ccba810ad70c Mon Sep 17 00:00:00 2001 From: Lovina Saldanha Date: Tue, 15 Dec 2020 21:31:32 +0530 Subject: [PATCH 021/915] updated-4620497 updated --- .../microsoft-defender-atp/get-user-related-alerts.md | 5 +++-- .../microsoft-defender-atp/get-user-related-machines.md | 5 +++-- .../microsoft-defender-atp/get-vuln-by-software.md | 3 +-- .../microsoft-defender-atp/get-vulnerability-by-id.md | 1 + .../security/threat-protection/microsoft-defender-atp/gov.md | 1 + .../microsoft-defender-atp/grant-mssp-access.md | 3 +-- .../microsoft-defender-atp/helpful-resources.md | 1 + .../import-export-exploit-protection-emet-xml.md | 4 ++-- .../microsoft-defender-atp/indicator-certificates.md | 1 + .../microsoft-defender-atp/indicator-file.md | 1 + .../microsoft-defender-atp/indicator-ip-domain.md | 2 +- .../microsoft-defender-atp/indicator-manage.md | 1 + .../information-protection-in-windows-overview.md | 2 +- .../information-protection-investigation.md | 2 +- .../microsoft-defender-atp/initiate-autoir-investigation.md | 5 +++-- .../microsoft-defender-atp/investigate-alerts.md | 2 +- .../microsoft-defender-atp/investigate-behind-proxy.md | 2 +- .../microsoft-defender-atp/investigate-domain.md | 3 +-- .../microsoft-defender-atp/investigate-files.md | 2 +- .../microsoft-defender-atp/investigate-incidents.md | 1 + .../microsoft-defender-atp/investigate-ip.md | 2 +- .../microsoft-defender-atp/investigate-machines.md | 2 +- .../microsoft-defender-atp/investigate-user.md | 2 +- .../microsoft-defender-atp/investigation.md | 5 +++-- .../microsoft-defender-atp/ios-configure-features.md | 4 ++++ 25 files changed, 37 insertions(+), 25 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-user-related-alerts.md b/windows/security/threat-protection/microsoft-defender-atp/get-user-related-alerts.md index b6282b18f3..c33872be0e 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-user-related-alerts.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-user-related-alerts.md @@ -20,8 +20,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - -**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) - Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-user-related-machines.md b/windows/security/threat-protection/microsoft-defender-atp/get-user-related-machines.md index 33fbf7f79a..55c5367cdf 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-user-related-machines.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-user-related-machines.md @@ -20,8 +20,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - -**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) - Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-vuln-by-software.md b/windows/security/threat-protection/microsoft-defender-atp/get-vuln-by-software.md index ac266cf40f..1b88d6ba58 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-vuln-by-software.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-vuln-by-software.md @@ -20,10 +20,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) [!include[Prerelease information](../../includes/prerelease.md)] diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-vulnerability-by-id.md b/windows/security/threat-protection/microsoft-defender-atp/get-vulnerability-by-id.md index 3e66207db5..ddfe9b7613 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-vulnerability-by-id.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-vulnerability-by-id.md @@ -22,6 +22,7 @@ ms.topic: article **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) [!include[Prerelease information](../../includes/prerelease.md)] diff --git a/windows/security/threat-protection/microsoft-defender-atp/gov.md b/windows/security/threat-protection/microsoft-defender-atp/gov.md index af348b95bc..ddeee9fffc 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/gov.md +++ b/windows/security/threat-protection/microsoft-defender-atp/gov.md @@ -24,6 +24,7 @@ ms.topic: conceptual **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) Microsoft Defender for Endpoint for US Government Community Cloud High (GCC High) customers, built in the US Azure Government environment, uses the same underlying technologies as Defender for Endpoint in Azure Commercial. diff --git a/windows/security/threat-protection/microsoft-defender-atp/grant-mssp-access.md b/windows/security/threat-protection/microsoft-defender-atp/grant-mssp-access.md index f62c3b418f..131b074f3b 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/grant-mssp-access.md +++ b/windows/security/threat-protection/microsoft-defender-atp/grant-mssp-access.md @@ -21,10 +21,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) >Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-mssp-support-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/helpful-resources.md b/windows/security/threat-protection/microsoft-defender-atp/helpful-resources.md index adc3dd0a3b..e25dc5ca9d 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/helpful-resources.md +++ b/windows/security/threat-protection/microsoft-defender-atp/helpful-resources.md @@ -24,6 +24,7 @@ ms.topic: conceptual **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) Access helpful resources such as links to blogs and other resources related to Microsoft Defender for Endpoint. diff --git a/windows/security/threat-protection/microsoft-defender-atp/import-export-exploit-protection-emet-xml.md b/windows/security/threat-protection/microsoft-defender-atp/import-export-exploit-protection-emet-xml.md index f496d2d153..8647909960 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/import-export-exploit-protection-emet-xml.md +++ b/windows/security/threat-protection/microsoft-defender-atp/import-export-exploit-protection-emet-xml.md @@ -21,8 +21,8 @@ manager: dansimp **Applies to:** - -* [Microsoft Defender for Endpoint](microsoft-defender-advanced-threat-protection.md) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) Exploit protection helps protect devices from malware that use exploits to spread and infect. It consists of a number of mitigations that can be applied at either the operating system level, or at the individual app level. diff --git a/windows/security/threat-protection/microsoft-defender-atp/indicator-certificates.md b/windows/security/threat-protection/microsoft-defender-atp/indicator-certificates.md index f0439ebf7f..71da3d2842 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/indicator-certificates.md +++ b/windows/security/threat-protection/microsoft-defender-atp/indicator-certificates.md @@ -25,6 +25,7 @@ ms.topic: article **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) >Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-automationexclusionlist-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/indicator-file.md b/windows/security/threat-protection/microsoft-defender-atp/indicator-file.md index 3e7b8c855d..ec6a1043c3 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/indicator-file.md +++ b/windows/security/threat-protection/microsoft-defender-atp/indicator-file.md @@ -25,6 +25,7 @@ ms.topic: article **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) >Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-automationexclusionlist-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/indicator-ip-domain.md b/windows/security/threat-protection/microsoft-defender-atp/indicator-ip-domain.md index 800f2e0f16..3639845fad 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/indicator-ip-domain.md +++ b/windows/security/threat-protection/microsoft-defender-atp/indicator-ip-domain.md @@ -22,9 +22,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) >Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-automationexclusionlist-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/indicator-manage.md b/windows/security/threat-protection/microsoft-defender-atp/indicator-manage.md index 569a727336..81c7f458a4 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/indicator-manage.md +++ b/windows/security/threat-protection/microsoft-defender-atp/indicator-manage.md @@ -25,6 +25,7 @@ ms.topic: article **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) >Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-automationexclusionlist-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/information-protection-in-windows-overview.md b/windows/security/threat-protection/microsoft-defender-atp/information-protection-in-windows-overview.md index 74f53cc04c..31dcd3c313 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/information-protection-in-windows-overview.md +++ b/windows/security/threat-protection/microsoft-defender-atp/information-protection-in-windows-overview.md @@ -23,8 +23,8 @@ ms.topic: conceptual **Applies to:** - - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) [!include[Prerelease information](../../includes/prerelease.md)] diff --git a/windows/security/threat-protection/microsoft-defender-atp/information-protection-investigation.md b/windows/security/threat-protection/microsoft-defender-atp/information-protection-investigation.md index 30a7574c30..4c4156700e 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/information-protection-investigation.md +++ b/windows/security/threat-protection/microsoft-defender-atp/information-protection-investigation.md @@ -22,8 +22,8 @@ ms.topic: article **Applies to:** - - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) A typical advanced persistent threat lifecycle involves data exfiltration. In a security incident, it's important to have the ability to prioritize investigations where sensitive files may be jeopardy so that corporate data and information are protected. diff --git a/windows/security/threat-protection/microsoft-defender-atp/initiate-autoir-investigation.md b/windows/security/threat-protection/microsoft-defender-atp/initiate-autoir-investigation.md index 683be6e6bf..dbc21b4bd8 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/initiate-autoir-investigation.md +++ b/windows/security/threat-protection/microsoft-defender-atp/initiate-autoir-investigation.md @@ -20,8 +20,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - -**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) - Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/investigate-alerts.md b/windows/security/threat-protection/microsoft-defender-atp/investigate-alerts.md index e9ad5814eb..c4e01d5884 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/investigate-alerts.md +++ b/windows/security/threat-protection/microsoft-defender-atp/investigate-alerts.md @@ -26,8 +26,8 @@ ms.date: 04/24/2018 **Applies to:** - - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) diff --git a/windows/security/threat-protection/microsoft-defender-atp/investigate-behind-proxy.md b/windows/security/threat-protection/microsoft-defender-atp/investigate-behind-proxy.md index 42e6837413..33186852c6 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/investigate-behind-proxy.md +++ b/windows/security/threat-protection/microsoft-defender-atp/investigate-behind-proxy.md @@ -25,8 +25,8 @@ ms.topic: article **Applies to:** - - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) >Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-investigatemachines-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/investigate-domain.md b/windows/security/threat-protection/microsoft-defender-atp/investigate-domain.md index bee61aaabc..a8dfc081a7 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/investigate-domain.md +++ b/windows/security/threat-protection/microsoft-defender-atp/investigate-domain.md @@ -25,9 +25,8 @@ ms.date: 04/24/2018 **Applies to:** - - - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) diff --git a/windows/security/threat-protection/microsoft-defender-atp/investigate-files.md b/windows/security/threat-protection/microsoft-defender-atp/investigate-files.md index a9e415015a..3ca7969948 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/investigate-files.md +++ b/windows/security/threat-protection/microsoft-defender-atp/investigate-files.md @@ -26,8 +26,8 @@ ms.date: 04/24/2018 **Applies to:** - - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) >Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-investigatefiles-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/investigate-incidents.md b/windows/security/threat-protection/microsoft-defender-atp/investigate-incidents.md index 003cb02227..1eb70e5f19 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/investigate-incidents.md +++ b/windows/security/threat-protection/microsoft-defender-atp/investigate-incidents.md @@ -26,6 +26,7 @@ ms.topic: article **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) Investigate incidents that affect your network, understand what they mean, and collate evidence to resolve them. diff --git a/windows/security/threat-protection/microsoft-defender-atp/investigate-ip.md b/windows/security/threat-protection/microsoft-defender-atp/investigate-ip.md index 3647ff20ed..0bdd9fb21d 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/investigate-ip.md +++ b/windows/security/threat-protection/microsoft-defender-atp/investigate-ip.md @@ -26,8 +26,8 @@ ms.date: 04/24/2018 **Applies to:** - - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) >Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-investigateip-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/investigate-machines.md b/windows/security/threat-protection/microsoft-defender-atp/investigate-machines.md index c08d0c02f2..a7c48aa610 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/investigate-machines.md +++ b/windows/security/threat-protection/microsoft-defender-atp/investigate-machines.md @@ -25,8 +25,8 @@ ms.topic: article **Applies to:** - - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) >Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-investigatemachines-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/investigate-user.md b/windows/security/threat-protection/microsoft-defender-atp/investigate-user.md index 292ee98eec..f2bfd13fa8 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/investigate-user.md +++ b/windows/security/threat-protection/microsoft-defender-atp/investigate-user.md @@ -25,8 +25,8 @@ ms.date: 04/24/2018 **Applies to:** - - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) >Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-investigatgeuser-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/investigation.md b/windows/security/threat-protection/microsoft-defender-atp/investigation.md index 9a079ca9cb..aff16dc0e4 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/investigation.md +++ b/windows/security/threat-protection/microsoft-defender-atp/investigation.md @@ -22,8 +22,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - -**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) - Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/ios-configure-features.md b/windows/security/threat-protection/microsoft-defender-atp/ios-configure-features.md index 6c50645b1f..daef5c685b 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/ios-configure-features.md +++ b/windows/security/threat-protection/microsoft-defender-atp/ios-configure-features.md @@ -24,6 +24,10 @@ ms.topic: conceptual [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) + > [!NOTE] > Defender for Endpoint for iOS would use a VPN in order to provide the Web Protection feature. This is not a regular VPN and is a local/self-looping VPN that does not take traffic outside the device. From 7dbd48b899e1df8e4472527359c78e53ccd21da5 Mon Sep 17 00:00:00 2001 From: Lovina Saldanha Date: Tue, 15 Dec 2020 22:21:52 +0530 Subject: [PATCH 022/915] updated-4620497 updated --- .../threat-protection/microsoft-defender-atp/ios-install.md | 4 ++++ .../threat-protection/microsoft-defender-atp/ios-privacy.md | 4 ++-- .../threat-protection/microsoft-defender-atp/ios-terms.md | 4 ++++ .../microsoft-defender-atp/isolate-machine.md | 4 +++- .../microsoft-defender-atp/linux-exclusions.md | 4 ++-- .../microsoft-defender-atp/linux-install-manually.md | 4 ++-- .../microsoft-defender-atp/linux-install-with-ansible.md | 4 ++-- .../microsoft-defender-atp/linux-install-with-puppet.md | 4 ++-- .../microsoft-defender-atp/linux-preferences.md | 4 ++-- .../microsoft-defender-atp/linux-privacy.md | 4 ++-- .../threat-protection/microsoft-defender-atp/linux-pua.md | 4 ++-- .../microsoft-defender-atp/linux-resources.md | 4 ++-- .../linux-static-proxy-configuration.md | 4 ++-- .../microsoft-defender-atp/linux-support-connectivity.md | 4 ++-- .../microsoft-defender-atp/linux-support-install.md | 4 ++-- .../microsoft-defender-atp/linux-support-perf.md | 4 ++-- .../microsoft-defender-atp/linux-updates.md | 4 ++-- .../microsoft-defender-atp/live-response-command-examples.md | 3 ++- .../microsoft-defender-atp/live-response.md | 3 +-- .../microsoft-defender-atp/mac-exclusions.md | 4 ++-- .../microsoft-defender-atp/mac-install-jamfpro-login.md | 5 ++--- .../microsoft-defender-atp/mac-install-manually.md | 4 ++-- .../microsoft-defender-atp/mac-install-with-jamf.md | 4 ++-- .../microsoft-defender-atp/mac-install-with-other-mdm.md | 4 ++-- .../microsoft-defender-atp/mac-jamfpro-device-groups.md | 5 ++--- .../microsoft-defender-atp/mac-jamfpro-enroll-devices.md | 4 ++-- 26 files changed, 56 insertions(+), 48 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/ios-install.md b/windows/security/threat-protection/microsoft-defender-atp/ios-install.md index 6f0005e8b9..855be33f20 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/ios-install.md +++ b/windows/security/threat-protection/microsoft-defender-atp/ios-install.md @@ -24,6 +24,10 @@ ms.topic: conceptual [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) + This topic describes deploying Defender for Endpoint for iOS on Intune Company Portal enrolled devices. For more information about Intune device enrollment, see [Enroll iOS/iPadOS devices in Intune](https://docs.microsoft.com/mem/intune/enrollment/ios-enroll). ## Before you begin diff --git a/windows/security/threat-protection/microsoft-defender-atp/ios-privacy.md b/windows/security/threat-protection/microsoft-defender-atp/ios-privacy.md index 361ee24da1..bea4f8b740 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/ios-privacy.md +++ b/windows/security/threat-protection/microsoft-defender-atp/ios-privacy.md @@ -23,8 +23,8 @@ ms.topic: conceptual # Privacy information - Microsoft Defender for Endpoint for iOS **Applies to:** - -- [Microsoft Defender for Endpoint](microsoft-defender-atp-ios.md) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) > [!NOTE] > Defender for Endpoint for iOS uses a VPN to provide the Web Protection feature. This is not a regular VPN and is a local or self-looping VPN that does not take traffic outside the device. **Microsoft or your organization, does not see your browsing activity.** diff --git a/windows/security/threat-protection/microsoft-defender-atp/ios-terms.md b/windows/security/threat-protection/microsoft-defender-atp/ios-terms.md index 997e5ed226..99c2a1585c 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/ios-terms.md +++ b/windows/security/threat-protection/microsoft-defender-atp/ios-terms.md @@ -25,6 +25,10 @@ hideEdit: true [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) + ## MICROSOFT APPLICATION LICENSE TERMS: MICROSOFT DEFENDER FOR ENDPOINT diff --git a/windows/security/threat-protection/microsoft-defender-atp/isolate-machine.md b/windows/security/threat-protection/microsoft-defender-atp/isolate-machine.md index 98cfaa0d40..b6bf991bcf 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/isolate-machine.md +++ b/windows/security/threat-protection/microsoft-defender-atp/isolate-machine.md @@ -21,7 +21,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] -**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) - Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/linux-exclusions.md b/windows/security/threat-protection/microsoft-defender-atp/linux-exclusions.md index e1e14ad345..2a939b7865 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/linux-exclusions.md +++ b/windows/security/threat-protection/microsoft-defender-atp/linux-exclusions.md @@ -25,8 +25,8 @@ ms.topic: conceptual **Applies to:** - -- [Microsoft Defender for Endpoint for Linux](microsoft-defender-atp-linux.md) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) This article provides information on how to define exclusions that apply to on-demand scans, and real-time protection and monitoring. diff --git a/windows/security/threat-protection/microsoft-defender-atp/linux-install-manually.md b/windows/security/threat-protection/microsoft-defender-atp/linux-install-manually.md index 0b7026d467..31cdf4d0ee 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/linux-install-manually.md +++ b/windows/security/threat-protection/microsoft-defender-atp/linux-install-manually.md @@ -26,8 +26,8 @@ ms.topic: conceptual **Applies to:** - -- [Microsoft Defender for Endpoint for Linux](microsoft-defender-atp-linux.md) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) This article describes how to deploy Microsoft Defender for Endpoint for Linux manually. A successful deployment requires the completion of all of the following tasks: diff --git a/windows/security/threat-protection/microsoft-defender-atp/linux-install-with-ansible.md b/windows/security/threat-protection/microsoft-defender-atp/linux-install-with-ansible.md index 35fe0795ab..d20dbb61df 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/linux-install-with-ansible.md +++ b/windows/security/threat-protection/microsoft-defender-atp/linux-install-with-ansible.md @@ -26,8 +26,8 @@ ms.topic: conceptual **Applies to:** - -- [Microsoft Defender for Endpoint for Linux](microsoft-defender-atp-linux.md) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) This article describes how to deploy Defender for Endpoint for Linux using Ansible. A successful deployment requires the completion of all of the following tasks: diff --git a/windows/security/threat-protection/microsoft-defender-atp/linux-install-with-puppet.md b/windows/security/threat-protection/microsoft-defender-atp/linux-install-with-puppet.md index 46100ac983..131154d289 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/linux-install-with-puppet.md +++ b/windows/security/threat-protection/microsoft-defender-atp/linux-install-with-puppet.md @@ -26,8 +26,8 @@ ms.topic: conceptual **Applies to:** - -- [Microsoft Defender for Endpoint for Linux](microsoft-defender-atp-linux.md) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) This article describes how to deploy Defender for Endpoint for Linux using Puppet. A successful deployment requires the completion of all of the following tasks: diff --git a/windows/security/threat-protection/microsoft-defender-atp/linux-preferences.md b/windows/security/threat-protection/microsoft-defender-atp/linux-preferences.md index 2ec4ae0d08..ec07346a41 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/linux-preferences.md +++ b/windows/security/threat-protection/microsoft-defender-atp/linux-preferences.md @@ -26,8 +26,8 @@ ms.topic: conceptual **Applies to:** - -- [Microsoft Defender for Endpoint for Linux](microsoft-defender-atp-linux.md) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) >[!IMPORTANT] >This topic contains instructions for how to set preferences for Defender for Endpoint for Linux in enterprise environments. If you are interested in configuring the product on a device from the command-line, see [Resources](linux-resources.md#configure-from-the-command-line). diff --git a/windows/security/threat-protection/microsoft-defender-atp/linux-privacy.md b/windows/security/threat-protection/microsoft-defender-atp/linux-privacy.md index 28afe2d32b..c07a3578a6 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/linux-privacy.md +++ b/windows/security/threat-protection/microsoft-defender-atp/linux-privacy.md @@ -23,8 +23,8 @@ ms.topic: conceptual **Applies to:** - -- [Microsoft Defender for Endpoint](microsoft-defender-atp-linux.md) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) Microsoft is committed to providing you with the information and controls you need to make choices about how your data is collected and used when you’re using Defender for Endpoint for Linux. diff --git a/windows/security/threat-protection/microsoft-defender-atp/linux-pua.md b/windows/security/threat-protection/microsoft-defender-atp/linux-pua.md index ff2da099a2..68e7f23b4e 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/linux-pua.md +++ b/windows/security/threat-protection/microsoft-defender-atp/linux-pua.md @@ -25,8 +25,8 @@ ms.topic: conceptual **Applies to:** - -- [Microsoft Defender for Endpoint for Linux](microsoft-defender-atp-linux.md) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) The potentially unwanted application (PUA) protection feature in Defender for Endpoint for Linux can detect and block PUA files on endpoints in your network. diff --git a/windows/security/threat-protection/microsoft-defender-atp/linux-resources.md b/windows/security/threat-protection/microsoft-defender-atp/linux-resources.md index 3b12f36855..73987788c9 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/linux-resources.md +++ b/windows/security/threat-protection/microsoft-defender-atp/linux-resources.md @@ -26,8 +26,8 @@ ms.topic: conceptual **Applies to:** - -- [Microsoft Defender for Endpoint for Linux](microsoft-defender-atp-linux.md) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) ## Collect diagnostic information diff --git a/windows/security/threat-protection/microsoft-defender-atp/linux-static-proxy-configuration.md b/windows/security/threat-protection/microsoft-defender-atp/linux-static-proxy-configuration.md index 6f0bf1667a..5c05635456 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/linux-static-proxy-configuration.md +++ b/windows/security/threat-protection/microsoft-defender-atp/linux-static-proxy-configuration.md @@ -26,8 +26,8 @@ ms.topic: conceptual **Applies to:** - -- [Microsoft Defender for Endpoint for Linux](microsoft-defender-atp-linux.md) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) Microsoft Defender ATP can discover a proxy server using the ```HTTPS_PROXY``` environment variable. This setting must be configured **both** at installation time and after the product has been installed. diff --git a/windows/security/threat-protection/microsoft-defender-atp/linux-support-connectivity.md b/windows/security/threat-protection/microsoft-defender-atp/linux-support-connectivity.md index 74db615cdb..7ddf65b664 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/linux-support-connectivity.md +++ b/windows/security/threat-protection/microsoft-defender-atp/linux-support-connectivity.md @@ -26,8 +26,8 @@ ms.topic: conceptual **Applies to:** - -- [Microsoft Defender for Endpoint for Linux](microsoft-defender-atp-linux.md) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) ## Run the connectivity test diff --git a/windows/security/threat-protection/microsoft-defender-atp/linux-support-install.md b/windows/security/threat-protection/microsoft-defender-atp/linux-support-install.md index 9a2bf09a0d..31e67a513e 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/linux-support-install.md +++ b/windows/security/threat-protection/microsoft-defender-atp/linux-support-install.md @@ -26,8 +26,8 @@ ms.topic: conceptual **Applies to:** - -- [Microsoft Defender for Endpoint for Linux](microsoft-defender-atp-linux.md) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) ## Verify if installation succeeded diff --git a/windows/security/threat-protection/microsoft-defender-atp/linux-support-perf.md b/windows/security/threat-protection/microsoft-defender-atp/linux-support-perf.md index e6585fc97f..cc909e9afa 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/linux-support-perf.md +++ b/windows/security/threat-protection/microsoft-defender-atp/linux-support-perf.md @@ -25,8 +25,8 @@ ms.topic: conceptual **Applies to:** - -- [Microsoft Defender for Endpoint for Linux](microsoft-defender-atp-linux.md) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) This article provides some general steps that can be used to narrow down performance issues related to Defender for Endpoint for Linux. diff --git a/windows/security/threat-protection/microsoft-defender-atp/linux-updates.md b/windows/security/threat-protection/microsoft-defender-atp/linux-updates.md index 7c9fe1e51e..de5f4532b8 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/linux-updates.md +++ b/windows/security/threat-protection/microsoft-defender-atp/linux-updates.md @@ -26,8 +26,8 @@ ms.topic: conceptual **Applies to:** - -- [Microsoft Defender for Endpoint for Linux](microsoft-defender-atp-linux.md) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) Microsoft regularly publishes software updates to improve performance, security, and to deliver new features. diff --git a/windows/security/threat-protection/microsoft-defender-atp/live-response-command-examples.md b/windows/security/threat-protection/microsoft-defender-atp/live-response-command-examples.md index 7c5bb16771..db9749d0f9 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/live-response-command-examples.md +++ b/windows/security/threat-protection/microsoft-defender-atp/live-response-command-examples.md @@ -23,7 +23,8 @@ ms.topic: article **Applies to:** -- [Microsoft Defender for Endpoint](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) Learn about common commands used in live response and see examples on how they are typically used. diff --git a/windows/security/threat-protection/microsoft-defender-atp/live-response.md b/windows/security/threat-protection/microsoft-defender-atp/live-response.md index 312550fb3f..0b5318d4af 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/live-response.md +++ b/windows/security/threat-protection/microsoft-defender-atp/live-response.md @@ -21,10 +21,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) Live response gives security operations teams instantaneous access to a device (also referred to as a machine) using a remote shell connection. This gives you the power to do in-depth investigative work and take immediate response actions to promptly contain identified threats—in real time. diff --git a/windows/security/threat-protection/microsoft-defender-atp/mac-exclusions.md b/windows/security/threat-protection/microsoft-defender-atp/mac-exclusions.md index 2e17fbc6fd..1a5a15f330 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/mac-exclusions.md +++ b/windows/security/threat-protection/microsoft-defender-atp/mac-exclusions.md @@ -25,8 +25,8 @@ ms.topic: conceptual **Applies to:** - -- [Microsoft Defender for Endpoint for Mac](microsoft-defender-atp-mac.md) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) This article provides information on how to define exclusions that apply to on-demand scans, and real-time protection and monitoring. diff --git a/windows/security/threat-protection/microsoft-defender-atp/mac-install-jamfpro-login.md b/windows/security/threat-protection/microsoft-defender-atp/mac-install-jamfpro-login.md index d1f6337306..27de5d44de 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/mac-install-jamfpro-login.md +++ b/windows/security/threat-protection/microsoft-defender-atp/mac-install-jamfpro-login.md @@ -23,10 +23,9 @@ ms.topic: conceptual [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - -- [Microsoft Defender for Endpoint for Mac](microsoft-defender-atp-mac.md) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) 1. Enter your credentials. diff --git a/windows/security/threat-protection/microsoft-defender-atp/mac-install-manually.md b/windows/security/threat-protection/microsoft-defender-atp/mac-install-manually.md index 7f15b5ad73..064657b978 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/mac-install-manually.md +++ b/windows/security/threat-protection/microsoft-defender-atp/mac-install-manually.md @@ -25,8 +25,8 @@ ms.topic: conceptual **Applies to:** - -- [Microsoft Defender for Endpoint for macOS](microsoft-defender-atp-mac.md) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) This topic describes how to deploy Microsoft Defender for Endpoint for macOS manually. A successful deployment requires the completion of all of the following steps: - [Download installation and onboarding packages](#download-installation-and-onboarding-packages) diff --git a/windows/security/threat-protection/microsoft-defender-atp/mac-install-with-jamf.md b/windows/security/threat-protection/microsoft-defender-atp/mac-install-with-jamf.md index fccf7ab83a..4d8f5b0a59 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/mac-install-with-jamf.md +++ b/windows/security/threat-protection/microsoft-defender-atp/mac-install-with-jamf.md @@ -25,8 +25,8 @@ ms.topic: conceptual **Applies to:** - -- [Microsoft Defender for Endpoint for Mac](microsoft-defender-atp-mac.md) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) Learn how to deploy Microsoft Defender for Endpoint for macOS with Jamf Pro. diff --git a/windows/security/threat-protection/microsoft-defender-atp/mac-install-with-other-mdm.md b/windows/security/threat-protection/microsoft-defender-atp/mac-install-with-other-mdm.md index 509a722b64..044e4550e7 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/mac-install-with-other-mdm.md +++ b/windows/security/threat-protection/microsoft-defender-atp/mac-install-with-other-mdm.md @@ -25,8 +25,8 @@ ms.topic: conceptual **Applies to:** - -- [Microsoft Defender for Endpoint for Mac](microsoft-defender-atp-mac.md) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) ## Prerequisites and system requirements diff --git a/windows/security/threat-protection/microsoft-defender-atp/mac-jamfpro-device-groups.md b/windows/security/threat-protection/microsoft-defender-atp/mac-jamfpro-device-groups.md index d0bde6a3d1..327ec51d6f 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/mac-jamfpro-device-groups.md +++ b/windows/security/threat-protection/microsoft-defender-atp/mac-jamfpro-device-groups.md @@ -23,10 +23,9 @@ ms.topic: conceptual [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - -- [Microsoft Defender for Endpoint for Mac](microsoft-defender-atp-mac.md) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) Set up the device groups similar to Group policy organizational unite (OUs), Microsoft Endpoint Configuration Manager's device collection, and Intune's device groups. diff --git a/windows/security/threat-protection/microsoft-defender-atp/mac-jamfpro-enroll-devices.md b/windows/security/threat-protection/microsoft-defender-atp/mac-jamfpro-enroll-devices.md index d6954e0d90..7e2a462130 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/mac-jamfpro-enroll-devices.md +++ b/windows/security/threat-protection/microsoft-defender-atp/mac-jamfpro-enroll-devices.md @@ -25,8 +25,8 @@ ms.topic: conceptual **Applies to:** - -- [Microsoft Defender for Endpoint for Mac](microsoft-defender-atp-mac.md) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) ## Enroll macOS devices From fa7ff33a3ae22711e9040bfc9958ce7299d727f3 Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Tue, 15 Dec 2020 14:54:58 -0800 Subject: [PATCH 023/915] Create defender-endpoint-false-positives-negatives.md --- ...nder-endpoint-false-positives-negatives.md | 33 +++++++++++++++++++ 1 file changed, 33 insertions(+) create mode 100644 windows/security/threat-protection/microsoft-defender-atp/defender-endpoint-false-positives-negatives.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/defender-endpoint-false-positives-negatives.md b/windows/security/threat-protection/microsoft-defender-atp/defender-endpoint-false-positives-negatives.md new file mode 100644 index 0000000000..6ea027c1ee --- /dev/null +++ b/windows/security/threat-protection/microsoft-defender-atp/defender-endpoint-false-positives-negatives.md @@ -0,0 +1,33 @@ +--- +title: Address false positives/negatives in Microsoft Defender for Endpoint +description: Learn how to handle false positives or false negatives in Microsoft Defender for Endpoint. +keywords: alert, exclusion, defender atp, false positive, false negative +search.product: eADQiWindows 10XVcnh +search.appverid: met150 +ms.prod: w10 +ms.technology: windows +ms.mktglfcycl: deploy +ms.sitesec: library +ms.pagetype: security +ms.author: deniseb +author: denisebmsft +ms.date: 12/15/2020 +ms.localizationpriority: medium +manager: dansimp +audience: ITPro +ms.collection: +- m365-security-compliance +- m365initiative-defender-endpoint +ms.topic: conceptual +ms.reviewer: ramarom, evaldm, isco, mabraitm, chriggs, yonghree +ms.custom: AIR +--- + +# Address false positives/negatives in Microsoft Defender for Endpoint + +[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] + +**Applies to** + +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146806) + From 6ce84f2c4dbacc71486731a580b322af7bd12486 Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Tue, 15 Dec 2020 14:57:19 -0800 Subject: [PATCH 024/915] Update defender-endpoint-false-positives-negatives.md --- .../defender-endpoint-false-positives-negatives.md | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/defender-endpoint-false-positives-negatives.md b/windows/security/threat-protection/microsoft-defender-atp/defender-endpoint-false-positives-negatives.md index 6ea027c1ee..b3098ec0dd 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/defender-endpoint-false-positives-negatives.md +++ b/windows/security/threat-protection/microsoft-defender-atp/defender-endpoint-false-positives-negatives.md @@ -20,7 +20,7 @@ ms.collection: - m365initiative-defender-endpoint ms.topic: conceptual ms.reviewer: ramarom, evaldm, isco, mabraitm, chriggs, yonghree -ms.custom: AIR +ms.custom: FPFN --- # Address false positives/negatives in Microsoft Defender for Endpoint @@ -31,3 +31,5 @@ ms.custom: AIR - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146806) +Did Microsoft Defender for Endpoint identify an artifact as malicious, even though it wasn't? Are files or processes that are not a threat being stopped in their tracks by Defender for Endpoint? Or, did Defender for Endpoint miss something? Use this article as a guide for addressing false positives or false negatives in Defender for Endpoint. + From fda53f2bd94c7d4e2691922fad5982a7c5b08a0e Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Tue, 15 Dec 2020 15:10:19 -0800 Subject: [PATCH 025/915] Update defender-endpoint-false-positives-negatives.md --- .../defender-endpoint-false-positives-negatives.md | 3 +++ 1 file changed, 3 insertions(+) diff --git a/windows/security/threat-protection/microsoft-defender-atp/defender-endpoint-false-positives-negatives.md b/windows/security/threat-protection/microsoft-defender-atp/defender-endpoint-false-positives-negatives.md index b3098ec0dd..72ede58c51 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/defender-endpoint-false-positives-negatives.md +++ b/windows/security/threat-protection/microsoft-defender-atp/defender-endpoint-false-positives-negatives.md @@ -33,3 +33,6 @@ ms.custom: FPFN Did Microsoft Defender for Endpoint identify an artifact as malicious, even though it wasn't? Are files or processes that are not a threat being stopped in their tracks by Defender for Endpoint? Or, did Defender for Endpoint miss something? Use this article as a guide for addressing false positives or false negatives in Defender for Endpoint. +| Step | Description | +|:---|:---| +| 1. Identify a false positive/negative | | \ No newline at end of file From 131da8346ac47dac17b151b7ed07ff7c81cfd056 Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Tue, 15 Dec 2020 15:56:57 -0800 Subject: [PATCH 026/915] Update defender-endpoint-false-positives-negatives.md --- ...nder-endpoint-false-positives-negatives.md | 23 ++++++++++++++++++- 1 file changed, 22 insertions(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/defender-endpoint-false-positives-negatives.md b/windows/security/threat-protection/microsoft-defender-atp/defender-endpoint-false-positives-negatives.md index 72ede58c51..7a8b28a303 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/defender-endpoint-false-positives-negatives.md +++ b/windows/security/threat-protection/microsoft-defender-atp/defender-endpoint-false-positives-negatives.md @@ -35,4 +35,25 @@ Did Microsoft Defender for Endpoint identify an artifact as malicious, even thou | Step | Description | |:---|:---| -| 1. Identify a false positive/negative | | \ No newline at end of file +| 1. Identify a false positive/negative | | +| 2. Review/define exclusions for Defender for Endpoint | | +| 3. Review/define indicators for Defender for Endpoint | | +| 4. Classify a false positive/negative in Defender for Endpoint | | +| 5. Submit a file for analysis | | +| 6. Confirm your software uses EV code signing | | + +## Identify a false positive/negative + +*How do we know something is a false positive or negative? What do we want customers to look for?* + +## Review or define exclusions + +*Exclusions are defined for AutoIR and for MDAV, yes?* + +## Review or define indicators + +## Classify a false positive or false negative + +## Submit a file for analysis + +## Confirm your software uses EV code signing \ No newline at end of file From ae764c12b4d5421861690c50422d036e3e37cc7b Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Tue, 15 Dec 2020 16:02:50 -0800 Subject: [PATCH 027/915] Update defender-endpoint-false-positives-negatives.md --- ...nder-endpoint-false-positives-negatives.md | 22 +++++++++++++------ 1 file changed, 15 insertions(+), 7 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/defender-endpoint-false-positives-negatives.md b/windows/security/threat-protection/microsoft-defender-atp/defender-endpoint-false-positives-negatives.md index 7a8b28a303..40bb2b65ea 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/defender-endpoint-false-positives-negatives.md +++ b/windows/security/threat-protection/microsoft-defender-atp/defender-endpoint-false-positives-negatives.md @@ -35,12 +35,12 @@ Did Microsoft Defender for Endpoint identify an artifact as malicious, even thou | Step | Description | |:---|:---| -| 1. Identify a false positive/negative | | -| 2. Review/define exclusions for Defender for Endpoint | | -| 3. Review/define indicators for Defender for Endpoint | | -| 4. Classify a false positive/negative in Defender for Endpoint | | -| 5. Submit a file for analysis | | -| 6. Confirm your software uses EV code signing | | +| 1. [Identify a false positive/negative](#identify-a-false-positivenegative) | | +| 2. [Review/define exclusions for Defender for Endpoint](#review-or-define-exclusions) | | +| 3. [Review/define indicators for Defender for Endpoint](#review-or-define-indicators) | | +| 4. [Classify a false positive/negative in Defender for Endpoint](#classify-a-false-positive-or-false-negative) | | +| 5. [Submit a file for analysis](#submit-a-file-for-analysis) | | +| 6. [Confirm your software uses EV code signing](#confirm-your-software-uses-ev-code-signing) | | ## Identify a false positive/negative @@ -52,8 +52,16 @@ Did Microsoft Defender for Endpoint identify an artifact as malicious, even thou ## Review or define indicators +*Allow indicators for false positives; block indicators for false negatives. https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/manage-indicators* + ## Classify a false positive or false negative +*Need to figure out where/how this is done* + ## Submit a file for analysis -## Confirm your software uses EV code signing \ No newline at end of file +*https://www.microsoft.com/wdsi/filesubmission/* + +## Confirm your software uses EV code signing + +*Some info is available here: https://docs.microsoft.com/windows-hardware/drivers/dashboard/get-a-code-signing-certificate* \ No newline at end of file From fe4c83039bc4c7431f25a5f3f975109743b011ce Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Tue, 15 Dec 2020 16:08:27 -0800 Subject: [PATCH 028/915] Update defender-endpoint-false-positives-negatives.md --- .../defender-endpoint-false-positives-negatives.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/defender-endpoint-false-positives-negatives.md b/windows/security/threat-protection/microsoft-defender-atp/defender-endpoint-false-positives-negatives.md index 40bb2b65ea..2d4e5efdb5 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/defender-endpoint-false-positives-negatives.md +++ b/windows/security/threat-protection/microsoft-defender-atp/defender-endpoint-false-positives-negatives.md @@ -35,7 +35,7 @@ Did Microsoft Defender for Endpoint identify an artifact as malicious, even thou | Step | Description | |:---|:---| -| 1. [Identify a false positive/negative](#identify-a-false-positivenegative) | | +| 1. [Identify a false positive/negative](#identify-a-false-positivenegative) | A false positive is something that was detected and identified as malicious, when in fact it does not pose a threat.
A false negative is something that was not detected as a threat even though it is, in fact, malicious.
Both false positives and false negatives can be problematic for your organization. | | 2. [Review/define exclusions for Defender for Endpoint](#review-or-define-exclusions) | | | 3. [Review/define indicators for Defender for Endpoint](#review-or-define-indicators) | | | 4. [Classify a false positive/negative in Defender for Endpoint](#classify-a-false-positive-or-false-negative) | | From 9491ceb753d93ad0bd2ef2d64b400f363d79d469 Mon Sep 17 00:00:00 2001 From: Lovina Saldanha Date: Wed, 16 Dec 2020 11:46:41 +0530 Subject: [PATCH 029/915] updated-4620497 updated --- .../threat-protection/microsoft-defender-atp/mac-privacy.md | 5 ++--- .../threat-protection/microsoft-defender-atp/mac-pua.md | 5 ++--- .../microsoft-defender-atp/mac-resources.md | 5 ++--- .../microsoft-defender-atp/mac-schedule-scan-atp.md | 3 +++ .../microsoft-defender-atp/mac-support-install.md | 2 ++ .../microsoft-defender-atp/mac-support-kext.md | 2 ++ .../microsoft-defender-atp/mac-support-license.md | 2 ++ .../microsoft-defender-atp/mac-support-perf.md | 2 ++ .../microsoft-defender-atp/mac-sysext-policies.md | 3 +++ .../microsoft-defender-atp/mac-sysext-preview.md | 3 +++ .../threat-protection/microsoft-defender-atp/mac-updates.md | 2 ++ .../microsoft-defender-atp/mac-whatsnew.md | 4 ++++ .../microsoft-defender-atp/machine-groups.md | 1 + .../microsoft-defender-atp/machine-reports.md | 1 + .../microsoft-defender-atp/machine-tags.md | 3 +++ .../threat-protection/microsoft-defender-atp/machine.md | 5 +++-- .../microsoft-defender-atp/machineaction.md | 5 +++-- .../microsoft-defender-atp/machines-view-overview.md | 4 ++-- .../microsoft-defender-atp/manage-alerts.md | 2 +- .../manage-atp-post-migration-configuration-manager.md | 2 +- .../manage-atp-post-migration-group-policy-objects.md | 2 +- .../manage-atp-post-migration-intune.md | 2 +- .../manage-atp-post-migration-other-tools.md | 2 +- .../microsoft-defender-atp/manage-atp-post-migration.md | 1 + .../manage-automation-file-uploads.md | 6 +----- .../manage-automation-folder-exclusions.md | 5 +---- .../threat-protection/microsoft-defender-atp/manage-edr.md | 3 +++ 27 files changed, 53 insertions(+), 29 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/mac-privacy.md b/windows/security/threat-protection/microsoft-defender-atp/mac-privacy.md index 2bf5eaf608..4b2485bada 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/mac-privacy.md +++ b/windows/security/threat-protection/microsoft-defender-atp/mac-privacy.md @@ -23,10 +23,9 @@ ms.topic: conceptual [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - -- [Microsoft Defender for Endpoint for Mac](microsoft-defender-atp-mac.md) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) Microsoft is committed to providing you with the information and controls you need to make choices about how your data is collected and used when you’re using Microsoft Defender for Endpoint for Mac. diff --git a/windows/security/threat-protection/microsoft-defender-atp/mac-pua.md b/windows/security/threat-protection/microsoft-defender-atp/mac-pua.md index 7668c4bfd0..4820f1a240 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/mac-pua.md +++ b/windows/security/threat-protection/microsoft-defender-atp/mac-pua.md @@ -23,10 +23,9 @@ ms.topic: conceptual [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - -- [Microsoft Defender for Endpoint for Mac](microsoft-defender-atp-mac.md) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) The potentially unwanted application (PUA) protection feature in Microsoft Defender for Endpoint for Mac can detect and block PUA files on endpoints in your network. diff --git a/windows/security/threat-protection/microsoft-defender-atp/mac-resources.md b/windows/security/threat-protection/microsoft-defender-atp/mac-resources.md index 11549d3a62..938a071c86 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/mac-resources.md +++ b/windows/security/threat-protection/microsoft-defender-atp/mac-resources.md @@ -23,10 +23,9 @@ ms.topic: conceptual [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - -- [Microsoft Defender for Endpoint for Mac](microsoft-defender-atp-mac.md) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) ## Collecting diagnostic information diff --git a/windows/security/threat-protection/microsoft-defender-atp/mac-schedule-scan-atp.md b/windows/security/threat-protection/microsoft-defender-atp/mac-schedule-scan-atp.md index 98d0151efc..93a06cb500 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/mac-schedule-scan-atp.md +++ b/windows/security/threat-protection/microsoft-defender-atp/mac-schedule-scan-atp.md @@ -23,6 +23,9 @@ ms.topic: conceptual [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) While you can start a threat scan at any time with Microsoft Defender for Endpoint, your enterprise might benefit from scheduled or timed scans. For example, you can schedule a scan to run at the beginning of every workday or week. diff --git a/windows/security/threat-protection/microsoft-defender-atp/mac-support-install.md b/windows/security/threat-protection/microsoft-defender-atp/mac-support-install.md index 4df09099cf..49ab358c4d 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/mac-support-install.md +++ b/windows/security/threat-protection/microsoft-defender-atp/mac-support-install.md @@ -27,6 +27,8 @@ ms.topic: conceptual **Applies to:** - [Microsoft Defender for Endpoint for Mac](microsoft-defender-atp-mac.md) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) ## Installation failed diff --git a/windows/security/threat-protection/microsoft-defender-atp/mac-support-kext.md b/windows/security/threat-protection/microsoft-defender-atp/mac-support-kext.md index 9241a56fdf..2ca36a4873 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/mac-support-kext.md +++ b/windows/security/threat-protection/microsoft-defender-atp/mac-support-kext.md @@ -27,6 +27,8 @@ ms.topic: conceptual **Applies to:** - [Microsoft Defender for Endpoint for Mac](microsoft-defender-atp-mac.md) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) This article provides information on how to troubleshoot issues with the kernel extension that is installed as part of Microsoft Defender for Endpoint for Mac. diff --git a/windows/security/threat-protection/microsoft-defender-atp/mac-support-license.md b/windows/security/threat-protection/microsoft-defender-atp/mac-support-license.md index f93f41004d..35e4ec10cd 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/mac-support-license.md +++ b/windows/security/threat-protection/microsoft-defender-atp/mac-support-license.md @@ -27,6 +27,8 @@ ms.topic: conceptual **Applies to:** - [Microsoft Defender for Endpoint for Mac](microsoft-defender-atp-mac.md) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) While you are going through [Microsoft Defender for Endpoint for Mac](microsoft-defender-atp-mac.md) and [Manual deployment](mac-install-manually.md) testing or a Proof Of Concept (PoC), you might get the following error: diff --git a/windows/security/threat-protection/microsoft-defender-atp/mac-support-perf.md b/windows/security/threat-protection/microsoft-defender-atp/mac-support-perf.md index 40e8240cbf..40bf88fbb5 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/mac-support-perf.md +++ b/windows/security/threat-protection/microsoft-defender-atp/mac-support-perf.md @@ -27,6 +27,8 @@ ms.topic: conceptual **Applies to:** - [Microsoft Defender for Endpoint for Mac](microsoft-defender-atp-mac.md) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) This topic provides some general steps that can be used to narrow down performance issues related to Microsoft Defender for Endpoint for Mac. diff --git a/windows/security/threat-protection/microsoft-defender-atp/mac-sysext-policies.md b/windows/security/threat-protection/microsoft-defender-atp/mac-sysext-policies.md index 73bb94faf9..b8632b1ff3 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/mac-sysext-policies.md +++ b/windows/security/threat-protection/microsoft-defender-atp/mac-sysext-policies.md @@ -24,6 +24,9 @@ ROBOTS: noindex,nofollow [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) In alignment with macOS evolution, we are preparing a Microsoft Defender for Endpoint for Mac update that leverages system extensions instead of kernel extensions. This update will only be applicable to macOS Catalina (10.15.4) and newer versions of macOS. diff --git a/windows/security/threat-protection/microsoft-defender-atp/mac-sysext-preview.md b/windows/security/threat-protection/microsoft-defender-atp/mac-sysext-preview.md index 9eacf9f1c6..4e180f97ac 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/mac-sysext-preview.md +++ b/windows/security/threat-protection/microsoft-defender-atp/mac-sysext-preview.md @@ -24,6 +24,9 @@ ROBOTS: noindex,nofollow [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) In alignment with macOS evolution, we are preparing a Defender for Endpoint for Mac update that leverages system extensions instead of kernel extensions. This update will only be applicable to macOS Catalina (10.15.4) and newer versions of macOS. diff --git a/windows/security/threat-protection/microsoft-defender-atp/mac-updates.md b/windows/security/threat-protection/microsoft-defender-atp/mac-updates.md index 7db11e8873..dbecac6a22 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/mac-updates.md +++ b/windows/security/threat-protection/microsoft-defender-atp/mac-updates.md @@ -27,6 +27,8 @@ ms.topic: conceptual **Applies to:** - [Microsoft Defender for Endpoint for Mac](microsoft-defender-atp-mac.md) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) Microsoft regularly publishes software updates to improve performance, security, and to deliver new features. diff --git a/windows/security/threat-protection/microsoft-defender-atp/mac-whatsnew.md b/windows/security/threat-protection/microsoft-defender-atp/mac-whatsnew.md index 692a50914e..1aac2f2e9f 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/mac-whatsnew.md +++ b/windows/security/threat-protection/microsoft-defender-atp/mac-whatsnew.md @@ -23,6 +23,10 @@ ms.topic: conceptual [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) + > [!IMPORTANT] > On macOS 11 (Big Sur), Microsoft Defender for Endpoint requires additional configuration profiles. If you are an existing customer upgrading from earlier versions of macOS, make sure to deploy the additional configuration profiles listed on [this page](mac-sysext-policies.md). diff --git a/windows/security/threat-protection/microsoft-defender-atp/machine-groups.md b/windows/security/threat-protection/microsoft-defender-atp/machine-groups.md index 3b19a5d4f9..1988df1790 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/machine-groups.md +++ b/windows/security/threat-protection/microsoft-defender-atp/machine-groups.md @@ -27,6 +27,7 @@ ms.topic: article - Azure Active Directory - Office 365 - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) In an enterprise scenario, security operation teams are typically assigned a set of devices. These devices are grouped together based on a set of attributes such as their domains, computer names, or designated tags. diff --git a/windows/security/threat-protection/microsoft-defender-atp/machine-reports.md b/windows/security/threat-protection/microsoft-defender-atp/machine-reports.md index 45864dd1d6..e5db586297 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/machine-reports.md +++ b/windows/security/threat-protection/microsoft-defender-atp/machine-reports.md @@ -24,6 +24,7 @@ ms.topic: article **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) The devices status report provides high-level information about the devices in your organization. The report includes trending information showing the sensor health state, antivirus status, OS platforms, and Windows 10 versions. diff --git a/windows/security/threat-protection/microsoft-defender-atp/machine-tags.md b/windows/security/threat-protection/microsoft-defender-atp/machine-tags.md index 73940895f1..768e8270b7 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/machine-tags.md +++ b/windows/security/threat-protection/microsoft-defender-atp/machine-tags.md @@ -21,6 +21,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) Add tags on devices to create a logical group affiliation. Device tags support proper mapping of the network, enabling you to attach different tags to capture context and to enable dynamic list creation as part of an incident. Tags can be used as a filter in **Devices list** view, or to group devices. For more information on device grouping, see [Create and manage device groups](machine-groups.md). diff --git a/windows/security/threat-protection/microsoft-defender-atp/machine.md b/windows/security/threat-protection/microsoft-defender-atp/machine.md index 817ecce65b..42d8efa0dd 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/machine.md +++ b/windows/security/threat-protection/microsoft-defender-atp/machine.md @@ -20,8 +20,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - -**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) - Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/machineaction.md b/windows/security/threat-protection/microsoft-defender-atp/machineaction.md index 94f6a0a86b..c85800023a 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/machineaction.md +++ b/windows/security/threat-protection/microsoft-defender-atp/machineaction.md @@ -20,8 +20,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - -**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) - Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/machines-view-overview.md b/windows/security/threat-protection/microsoft-defender-atp/machines-view-overview.md index fae0dfc00e..3f7d9f6290 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/machines-view-overview.md +++ b/windows/security/threat-protection/microsoft-defender-atp/machines-view-overview.md @@ -23,8 +23,8 @@ ms.topic: article **Applies to:** - -- [Microsoft Defender for Endpoint)](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) >Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-machinesview-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/manage-alerts.md b/windows/security/threat-protection/microsoft-defender-atp/manage-alerts.md index 92810d1d1f..8862ac7822 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/manage-alerts.md +++ b/windows/security/threat-protection/microsoft-defender-atp/manage-alerts.md @@ -21,9 +21,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) >Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-managealerts-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/manage-atp-post-migration-configuration-manager.md b/windows/security/threat-protection/microsoft-defender-atp/manage-atp-post-migration-configuration-manager.md index a0a93f2dc7..38dceefad0 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/manage-atp-post-migration-configuration-manager.md +++ b/windows/security/threat-protection/microsoft-defender-atp/manage-atp-post-migration-configuration-manager.md @@ -26,9 +26,9 @@ ms.reviewer: chventou [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) We recommend using We recommend using [Microsoft Endpoint Manager](https://docs.microsoft.com/mem), which includes [Microsoft Intune](https://docs.microsoft.com/mem/intune/fundamentals/what-is-intune) (Intune) and [Microsoft Endpoint Configuration Manager](https://docs.microsoft.com/mem/configmgr/core/understand/introduction) (Configuration Manager) to manage your organization's threat protection features for devices (also referred to as endpoints). - [Learn more about Endpoint Manager](https://docs.microsoft.com/mem/endpoint-manager-overview) diff --git a/windows/security/threat-protection/microsoft-defender-atp/manage-atp-post-migration-group-policy-objects.md b/windows/security/threat-protection/microsoft-defender-atp/manage-atp-post-migration-group-policy-objects.md index c9fe3f4c85..9d8b3a42b1 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/manage-atp-post-migration-group-policy-objects.md +++ b/windows/security/threat-protection/microsoft-defender-atp/manage-atp-post-migration-group-policy-objects.md @@ -26,9 +26,9 @@ ms.reviewer: chventou [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) > [!NOTE] > We recommend using [Microsoft Endpoint Manager](https://docs.microsoft.com/mem) to manage your organization's threat protection features for devices (also referred to as endpoints). Endpoint Manager includes [Microsoft Intune](https://docs.microsoft.com/mem/intune/fundamentals/what-is-intune) and [Microsoft Endpoint Configuration Manager](https://docs.microsoft.com/mem/configmgr/core/understand/introduction). **[Learn more about Endpoint Manager](https://docs.microsoft.com/mem/endpoint-manager-overview)**. diff --git a/windows/security/threat-protection/microsoft-defender-atp/manage-atp-post-migration-intune.md b/windows/security/threat-protection/microsoft-defender-atp/manage-atp-post-migration-intune.md index 94a77a1007..e919ae28a4 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/manage-atp-post-migration-intune.md +++ b/windows/security/threat-protection/microsoft-defender-atp/manage-atp-post-migration-intune.md @@ -26,9 +26,9 @@ ms.reviewer: chventou [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) We recommend using [Microsoft Endpoint Manager](https://docs.microsoft.com/mem), which includes Microsoft Intune (Intune) to manage your organization's threat protection features for devices (also referred to as endpoints). [Learn more about Endpoint Manager](https://docs.microsoft.com/mem/endpoint-manager-overview). diff --git a/windows/security/threat-protection/microsoft-defender-atp/manage-atp-post-migration-other-tools.md b/windows/security/threat-protection/microsoft-defender-atp/manage-atp-post-migration-other-tools.md index 339857a351..cdd5938c30 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/manage-atp-post-migration-other-tools.md +++ b/windows/security/threat-protection/microsoft-defender-atp/manage-atp-post-migration-other-tools.md @@ -26,9 +26,9 @@ ms.reviewer: chventou [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) > [!NOTE] > We recommend using [Microsoft Endpoint Manager](https://docs.microsoft.com/mem) to manage your organization's threat protection features for devices (also referred to as endpoints). Endpoint Manager includes [Microsoft Intune](https://docs.microsoft.com/mem/intune/fundamentals/what-is-intune) and [Microsoft Endpoint Configuration Manager](https://docs.microsoft.com/mem/configmgr/core/understand/introduction). diff --git a/windows/security/threat-protection/microsoft-defender-atp/manage-atp-post-migration.md b/windows/security/threat-protection/microsoft-defender-atp/manage-atp-post-migration.md index 7d186a373a..ed982d2bab 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/manage-atp-post-migration.md +++ b/windows/security/threat-protection/microsoft-defender-atp/manage-atp-post-migration.md @@ -29,6 +29,7 @@ ms.reviewer: chventou **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) After you have moved from your previous endpoint protection and antivirus solution to Microsoft Defender for Endpoint, your next step is to manage your features and capabilities. We recommend using [Microsoft Endpoint Manager](https://docs.microsoft.com/mem/endpoint-manager-overview), which includes [Microsoft Intune](https://docs.microsoft.com/mem/intune/fundamentals/what-is-intune) and [Microsoft Endpoint Configuration Manager](https://docs.microsoft.com/mem/configmgr/core/understand/introduction), to manage your organization's devices and security settings. However, you can use other tools/methods, such as [Group Policy Objects in Azure Active Directory Domain Services](https://docs.microsoft.com/azure/active-directory-domain-services/manage-group-policy). diff --git a/windows/security/threat-protection/microsoft-defender-atp/manage-automation-file-uploads.md b/windows/security/threat-protection/microsoft-defender-atp/manage-automation-file-uploads.md index a82c4c98cc..ef23f1447a 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/manage-automation-file-uploads.md +++ b/windows/security/threat-protection/microsoft-defender-atp/manage-automation-file-uploads.md @@ -21,13 +21,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - - - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - - +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) >Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-automationefileuploads-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/manage-automation-folder-exclusions.md b/windows/security/threat-protection/microsoft-defender-atp/manage-automation-folder-exclusions.md index c60093cd86..4be4861255 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/manage-automation-folder-exclusions.md +++ b/windows/security/threat-protection/microsoft-defender-atp/manage-automation-folder-exclusions.md @@ -23,11 +23,8 @@ ms.topic: article **Applies to:** - - - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - - +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) >Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-automationexclusionfolder-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/manage-edr.md b/windows/security/threat-protection/microsoft-defender-atp/manage-edr.md index 458c0798ce..bafeede5a8 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/manage-edr.md +++ b/windows/security/threat-protection/microsoft-defender-atp/manage-edr.md @@ -24,6 +24,9 @@ ms.topic: conceptual [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) Manage the alerts queue, investigate devices in the devices list, take response actions, and hunt for possible threats in your organization using advanced hunting. From e8bbccb49cda9f43a0b8640630d01f5ad606644c Mon Sep 17 00:00:00 2001 From: Lovina Saldanha Date: Wed, 16 Dec 2020 13:09:28 +0530 Subject: [PATCH 030/915] updated-4620497 updated --- .../threat-protection/microsoft-defender-atp/manage-edr.md | 3 +++ .../microsoft-defender-atp/manage-incidents.md | 1 + .../microsoft-defender-atp/manage-indicators.md | 3 +-- .../microsoft-defender-atp/manage-suppression-rules.md | 2 +- .../microsoft-defender-atp/management-apis.md | 2 +- .../mcafee-to-microsoft-defender-migration.md | 3 +++ .../mcafee-to-microsoft-defender-onboard.md | 3 +++ .../mcafee-to-microsoft-defender-prepare.md | 4 ++++ .../mcafee-to-microsoft-defender-setup.md | 3 +++ .../microsoft-cloud-app-security-config.md | 3 +-- .../microsoft-cloud-app-security-integration.md | 5 +++-- .../microsoft-defender-advanced-threat-protection.md | 3 +++ .../microsoft-defender-atp/microsoft-defender-atp-android.md | 3 +++ .../microsoft-defender-atp/microsoft-defender-atp-ios.md | 4 ++++ .../microsoft-defender-atp/microsoft-defender-atp-linux.md | 3 +++ .../microsoft-defender-atp/microsoft-defender-atp-mac.md | 3 +++ .../microsoft-defender-security-center.md | 3 +++ .../microsoft-defender-atp/microsoft-threat-experts.md | 1 + .../microsoft-defender-atp/migration-guides.md | 3 +++ .../microsoft-defender-atp/minimum-requirements.md | 2 +- .../threat-protection/microsoft-defender-atp/mssp-list.md | 2 +- .../threat-protection/microsoft-defender-atp/mssp-support.md | 2 +- .../microsoft-defender-atp/network-protection.md | 3 +-- .../microsoft-defender-atp/next-gen-threat-and-vuln-mgt.md | 2 +- .../threat-protection/microsoft-defender-atp/non-windows.md | 2 +- 25 files changed, 53 insertions(+), 15 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/manage-edr.md b/windows/security/threat-protection/microsoft-defender-atp/manage-edr.md index 458c0798ce..bafeede5a8 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/manage-edr.md +++ b/windows/security/threat-protection/microsoft-defender-atp/manage-edr.md @@ -24,6 +24,9 @@ ms.topic: conceptual [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) Manage the alerts queue, investigate devices in the devices list, take response actions, and hunt for possible threats in your organization using advanced hunting. diff --git a/windows/security/threat-protection/microsoft-defender-atp/manage-incidents.md b/windows/security/threat-protection/microsoft-defender-atp/manage-incidents.md index 4fa8c2f463..493023678c 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/manage-incidents.md +++ b/windows/security/threat-protection/microsoft-defender-atp/manage-incidents.md @@ -26,6 +26,7 @@ ms.topic: article **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) Managing incidents is an important part of every cybersecurity operation. You can manage incidents by selecting an incident from the **Incidents queue** or the **Incidents management pane**. diff --git a/windows/security/threat-protection/microsoft-defender-atp/manage-indicators.md b/windows/security/threat-protection/microsoft-defender-atp/manage-indicators.md index e13c8bff5c..4a8307b45f 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/manage-indicators.md +++ b/windows/security/threat-protection/microsoft-defender-atp/manage-indicators.md @@ -22,10 +22,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) >Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/WindowsForBusiness/windows-atp?ocid=docs-wdatp-automationexclusionlist-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/manage-suppression-rules.md b/windows/security/threat-protection/microsoft-defender-atp/manage-suppression-rules.md index bf6e43d5b2..067864deb3 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/manage-suppression-rules.md +++ b/windows/security/threat-protection/microsoft-defender-atp/manage-suppression-rules.md @@ -23,8 +23,8 @@ ms.topic: article **Applies to:** - - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) There might be scenarios where you need to suppress alerts from appearing in the portal. You can create suppression rules for specific alerts that are known to be innocuous such as known tools or processes in your organization. For more information on how to suppress alerts, see [Suppress alerts](manage-alerts.md). diff --git a/windows/security/threat-protection/microsoft-defender-atp/management-apis.md b/windows/security/threat-protection/microsoft-defender-atp/management-apis.md index 4be39cf3be..b854f14c18 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/management-apis.md +++ b/windows/security/threat-protection/microsoft-defender-atp/management-apis.md @@ -22,9 +22,9 @@ ms.topic: conceptual [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) >Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-mgt-apis-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/mcafee-to-microsoft-defender-migration.md b/windows/security/threat-protection/microsoft-defender-atp/mcafee-to-microsoft-defender-migration.md index efb438eb60..c0a76d0fa8 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/mcafee-to-microsoft-defender-migration.md +++ b/windows/security/threat-protection/microsoft-defender-atp/mcafee-to-microsoft-defender-migration.md @@ -28,6 +28,9 @@ ms.reviewer: jesquive, chventou, jonix, chriggs, owtho [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) If you are planning to switch from McAfee Endpoint Security (McAfee) to [Microsoft Defender for Endpoint](https://docs.microsoft.com/windows/security/threat-protection) (Microsoft Defender for Endpoint), you're in the right place. Use this article as a guide to plan your migration. diff --git a/windows/security/threat-protection/microsoft-defender-atp/mcafee-to-microsoft-defender-onboard.md b/windows/security/threat-protection/microsoft-defender-atp/mcafee-to-microsoft-defender-onboard.md index d38a5977e8..a0e94b3305 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/mcafee-to-microsoft-defender-onboard.md +++ b/windows/security/threat-protection/microsoft-defender-atp/mcafee-to-microsoft-defender-onboard.md @@ -28,6 +28,9 @@ ms.reviewer: jesquive, chventou, jonix, chriggs, owtho [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) |[![Phase 1: Prepare](images/prepare.png)](mcafee-to-microsoft-defender-prepare.md)
[Phase 1: Prepare](mcafee-to-microsoft-defender-prepare.md) |[![Phase 2: Set up](images/setup.png)](mcafee-to-microsoft-defender-setup.md)
[Phase 2: Set up](mcafee-to-microsoft-defender-setup.md) |![Phase 3: Onboard](images/onboard.png)
Phase 3: Onboard | |--|--|--| diff --git a/windows/security/threat-protection/microsoft-defender-atp/mcafee-to-microsoft-defender-prepare.md b/windows/security/threat-protection/microsoft-defender-atp/mcafee-to-microsoft-defender-prepare.md index 3dd9c47fba..31abf8eea2 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/mcafee-to-microsoft-defender-prepare.md +++ b/windows/security/threat-protection/microsoft-defender-atp/mcafee-to-microsoft-defender-prepare.md @@ -28,6 +28,10 @@ ms.reviewer: jesquive, chventou, jonix, chriggs, owtho [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) + |![Phase 1: Prepare](images/prepare.png)
Phase 1: Prepare |[![Phase 2: Set up](images/setup.png)](mcafee-to-microsoft-defender-setup.md)
[Phase 2: Set up](mcafee-to-microsoft-defender-setup.md) |[![Phase 3: Onboard](images/onboard.png)](mcafee-to-microsoft-defender-onboard.md)
[Phase 3: Onboard](mcafee-to-microsoft-defender-onboard.md) | |--|--|--| diff --git a/windows/security/threat-protection/microsoft-defender-atp/mcafee-to-microsoft-defender-setup.md b/windows/security/threat-protection/microsoft-defender-atp/mcafee-to-microsoft-defender-setup.md index bbd1030800..8338f70288 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/mcafee-to-microsoft-defender-setup.md +++ b/windows/security/threat-protection/microsoft-defender-atp/mcafee-to-microsoft-defender-setup.md @@ -28,6 +28,9 @@ ms.reviewer: jesquive, chventou, jonix, chriggs, owtho [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) |[![Phase 1: Prepare](images/prepare.png)](mcafee-to-microsoft-defender-prepare.md)
[Phase 1: Prepare](mcafee-to-microsoft-defender-prepare.md) |![Phase 2: Set up](images/setup.png)
Phase 2: Set up |[![Phase 3: Onboard](images/onboard.png)](mcafee-to-microsoft-defender-onboard.md)
[Phase 3: Onboard](mcafee-to-microsoft-defender-onboard.md) | |--|--|--| diff --git a/windows/security/threat-protection/microsoft-defender-atp/microsoft-cloud-app-security-config.md b/windows/security/threat-protection/microsoft-defender-atp/microsoft-cloud-app-security-config.md index a05d99d1d6..f97c289ff3 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/microsoft-cloud-app-security-config.md +++ b/windows/security/threat-protection/microsoft-defender-atp/microsoft-cloud-app-security-config.md @@ -22,10 +22,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) To benefit from Microsoft Defender for Endpoint cloud app discovery signals, turn on Microsoft Cloud App Security integration. diff --git a/windows/security/threat-protection/microsoft-defender-atp/microsoft-cloud-app-security-integration.md b/windows/security/threat-protection/microsoft-defender-atp/microsoft-cloud-app-security-integration.md index 87814b1b25..6fb50d90da 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/microsoft-cloud-app-security-integration.md +++ b/windows/security/threat-protection/microsoft-defender-atp/microsoft-cloud-app-security-integration.md @@ -23,10 +23,11 @@ ms.date: 10/18/2018 [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] +[!include[Prerelease information](../../includes/prerelease.md)] + **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - -[!include[Prerelease information](../../includes/prerelease.md)] +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) Microsoft Cloud App Security (Cloud App Security) is a comprehensive solution that gives visibility into cloud apps and services by allowing you to control and limit access to cloud apps, while enforcing compliance requirements on data stored in the cloud. For more information, see [Cloud App Security](https://docs.microsoft.com/cloud-app-security/what-is-cloud-app-security). diff --git a/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-advanced-threat-protection.md index fc37668b46..085f783ff2 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-advanced-threat-protection.md @@ -21,6 +21,9 @@ ms.topic: conceptual [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) > For more info about Windows 10 Enterprise Edition features and functionality, see [Windows 10 Enterprise edition](https://www.microsoft.com/WindowsForBusiness/buy). diff --git a/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-atp-android.md b/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-atp-android.md index 8fe16c9e8d..889f565e87 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-atp-android.md +++ b/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-atp-android.md @@ -24,6 +24,9 @@ ms.topic: conceptual [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) This topic describes how to install, configure, update, and use Defender for Endpoint for Android. diff --git a/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-atp-ios.md b/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-atp-ios.md index 7aa02ac093..5594be464c 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-atp-ios.md +++ b/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-atp-ios.md @@ -24,6 +24,10 @@ ms.topic: conceptual [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) + **Microsoft Defender for Endpoint for iOS** will offer protection against phishing and unsafe network connections from websites, emails, and apps. All alerts will be available through a single pane of glass in the Microsoft Defender Security Center. The portal gives security teams a centralized view of threats on iOS devices along with other platforms. diff --git a/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-atp-linux.md b/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-atp-linux.md index 87dd24a90d..44e62a283e 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-atp-linux.md +++ b/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-atp-linux.md @@ -24,6 +24,9 @@ ms.topic: conceptual [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) This topic describes how to install, configure, update, and use Microsoft Defender for Endpoint for Linux. diff --git a/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-atp-mac.md b/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-atp-mac.md index 0ec7a8050c..d0d840d6d0 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-atp-mac.md +++ b/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-atp-mac.md @@ -24,6 +24,9 @@ ms.topic: conceptual [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) This topic describes how to install, configure, update, and use Defender for Endpoint for Mac. diff --git a/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-security-center.md b/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-security-center.md index b9fff07022..5f28deb01e 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-security-center.md +++ b/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-security-center.md @@ -23,6 +23,9 @@ ms.topic: conceptual [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) Microsoft Defender Security Center is the portal where you can access Microsoft Defender for Endpoint capabilities. It gives enterprise security operations teams a single pane of glass experience to help secure networks. diff --git a/windows/security/threat-protection/microsoft-defender-atp/microsoft-threat-experts.md b/windows/security/threat-protection/microsoft-defender-atp/microsoft-threat-experts.md index d73aa55b7b..59ccfffccb 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/microsoft-threat-experts.md +++ b/windows/security/threat-protection/microsoft-defender-atp/microsoft-threat-experts.md @@ -26,6 +26,7 @@ ms.topic: conceptual **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) Microsoft Threat Experts is a managed threat hunting service that provides Security Operation Centers (SOCs) with expert level monitoring and analysis to help them ensure that critical threats in their unique environments don’t get missed. diff --git a/windows/security/threat-protection/microsoft-defender-atp/migration-guides.md b/windows/security/threat-protection/microsoft-defender-atp/migration-guides.md index 24527c0a89..ceb8db05a3 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/migration-guides.md +++ b/windows/security/threat-protection/microsoft-defender-atp/migration-guides.md @@ -22,6 +22,9 @@ ms.date: 09/24/2020 [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) ## Migration guides diff --git a/windows/security/threat-protection/microsoft-defender-atp/minimum-requirements.md b/windows/security/threat-protection/microsoft-defender-atp/minimum-requirements.md index 98cb4690dd..5d5a31488c 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/minimum-requirements.md +++ b/windows/security/threat-protection/microsoft-defender-atp/minimum-requirements.md @@ -21,9 +21,9 @@ ms.topic: conceptual [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) There are some minimum requirements for onboarding devices to the service. Learn about the licensing, hardware and software requirements, and other configuration settings to onboard devices to the service. diff --git a/windows/security/threat-protection/microsoft-defender-atp/mssp-list.md b/windows/security/threat-protection/microsoft-defender-atp/mssp-list.md index 0bf437cb62..29c657c86e 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/mssp-list.md +++ b/windows/security/threat-protection/microsoft-defender-atp/mssp-list.md @@ -20,8 +20,8 @@ ms.topic: article # Supported managed security service providers **Applies to:** - - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) Logo |Partner name | Description :---|:---|:--- diff --git a/windows/security/threat-protection/microsoft-defender-atp/mssp-support.md b/windows/security/threat-protection/microsoft-defender-atp/mssp-support.md index e6d53ec221..730662b970 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/mssp-support.md +++ b/windows/security/threat-protection/microsoft-defender-atp/mssp-support.md @@ -21,9 +21,9 @@ ms.topic: conceptual [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) >Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-mssp-support-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/network-protection.md b/windows/security/threat-protection/microsoft-defender-atp/network-protection.md index 0b6737027d..cf325c653b 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/network-protection.md +++ b/windows/security/threat-protection/microsoft-defender-atp/network-protection.md @@ -22,10 +22,9 @@ ms.custom: asr [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) Network protection helps reduce the attack surface of your devices from Internet-based events. It prevents employees from using any application to access dangerous domains that may host phishing scams, exploits, and other malicious content on the Internet. diff --git a/windows/security/threat-protection/microsoft-defender-atp/next-gen-threat-and-vuln-mgt.md b/windows/security/threat-protection/microsoft-defender-atp/next-gen-threat-and-vuln-mgt.md index d0317cd1ba..b14ee0271d 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/next-gen-threat-and-vuln-mgt.md +++ b/windows/security/threat-protection/microsoft-defender-atp/next-gen-threat-and-vuln-mgt.md @@ -22,8 +22,8 @@ ms.topic: overview [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] **Applies to:** - - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) >Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-portaloverview-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/non-windows.md b/windows/security/threat-protection/microsoft-defender-atp/non-windows.md index 0cce3c728b..6c6358a9b5 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/non-windows.md +++ b/windows/security/threat-protection/microsoft-defender-atp/non-windows.md @@ -24,7 +24,7 @@ ms.topic: article **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) Microsoft has been on a journey to extend its industry leading endpoint security capabilities beyond Windows and Windows Server to macOS, Linux, Android, and From 02e5e9c53dc9205d0b34e2338d90a260435f63e6 Mon Sep 17 00:00:00 2001 From: Lovina Saldanha Date: Wed, 16 Dec 2020 15:00:55 +0530 Subject: [PATCH 031/915] updated-24620497 updated --- .../Onboard-Windows-10-multi-session-device.md | 3 +++ .../microsoft-defender-atp/offboard-machine-api.md | 5 +++-- .../microsoft-defender-atp/offboard-machines.md | 1 + .../microsoft-defender-atp/onboard-configure.md | 2 +- .../microsoft-defender-atp/onboard-downlevel.md | 1 + .../microsoft-defender-atp/onboard-offline-machines.md | 1 + .../threat-protection/microsoft-defender-atp/onboard.md | 2 +- .../onboarding-endpoint-configuration-manager.md | 1 + .../microsoft-defender-atp/onboarding-endpoint-manager.md | 2 +- .../microsoft-defender-atp/onboarding-notification.md | 2 +- .../threat-protection/microsoft-defender-atp/onboarding.md | 2 +- .../overview-attack-surface-reduction.md | 5 ++--- .../microsoft-defender-atp/overview-custom-detections.md | 1 + .../overview-endpoint-detection-response.md | 2 +- .../overview-hardware-based-isolation.md | 5 +++-- .../microsoft-defender-atp/partner-applications.md | 2 +- .../microsoft-defender-atp/partner-integration.md | 3 ++- .../microsoft-defender-atp/portal-overview.md | 1 + .../microsoft-defender-atp/post-ti-indicator.md | 5 +++-- .../microsoft-defender-atp/preferences-setup.md | 2 ++ .../microsoft-defender-atp/prepare-deployment.md | 3 +-- .../microsoft-defender-atp/preview-settings.md | 2 +- .../threat-protection/microsoft-defender-atp/preview.md | 1 + .../microsoft-defender-atp/production-deployment.md | 1 + .../microsoft-defender-atp/pull-alerts-using-rest-api.md | 1 + 25 files changed, 36 insertions(+), 20 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/Onboard-Windows-10-multi-session-device.md b/windows/security/threat-protection/microsoft-defender-atp/Onboard-Windows-10-multi-session-device.md index 928df9d3fd..37ffe71d5e 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/Onboard-Windows-10-multi-session-device.md +++ b/windows/security/threat-protection/microsoft-defender-atp/Onboard-Windows-10-multi-session-device.md @@ -23,6 +23,9 @@ manager: dansimp Applies to: - Windows 10 multi-session running on Windows Virtual Desktop (WVD) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) + > [!IMPORTANT] > Welcome to Microsoft Defender for Endpoint, the new name for Microsoft Defender for Endpoint. Read more about this and other updates here. We'll be updating names in products and in the docs in the near future. diff --git a/windows/security/threat-protection/microsoft-defender-atp/offboard-machine-api.md b/windows/security/threat-protection/microsoft-defender-atp/offboard-machine-api.md index 8cc6f7bed9..41a63e43bb 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/offboard-machine-api.md +++ b/windows/security/threat-protection/microsoft-defender-atp/offboard-machine-api.md @@ -20,8 +20,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - -**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) - Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/offboard-machines.md b/windows/security/threat-protection/microsoft-defender-atp/offboard-machines.md index 3eb9642bf4..204d6c9c0f 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/offboard-machines.md +++ b/windows/security/threat-protection/microsoft-defender-atp/offboard-machines.md @@ -28,6 +28,7 @@ ms.topic: conceptual - Windows Server 2012 R2 - Windows Server 2016 - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) >Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-offboarddevices-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/onboard-configure.md b/windows/security/threat-protection/microsoft-defender-atp/onboard-configure.md index 1a625303aa..ca25d5a1ad 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/onboard-configure.md +++ b/windows/security/threat-protection/microsoft-defender-atp/onboard-configure.md @@ -21,9 +21,9 @@ ms.topic: conceptual [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) [!include[Prerelease information](../../includes/prerelease.md)] diff --git a/windows/security/threat-protection/microsoft-defender-atp/onboard-downlevel.md b/windows/security/threat-protection/microsoft-defender-atp/onboard-downlevel.md index f99a9fbab3..815a6139dd 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/onboard-downlevel.md +++ b/windows/security/threat-protection/microsoft-defender-atp/onboard-downlevel.md @@ -29,6 +29,7 @@ ms.topic: article - Windows 8.1 Pro - Windows 8.1 Enterprise - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) >Want to experience Defender for Endpoint? [Sign up for a free trial](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-downlevel-abovefoldlink). diff --git a/windows/security/threat-protection/microsoft-defender-atp/onboard-offline-machines.md b/windows/security/threat-protection/microsoft-defender-atp/onboard-offline-machines.md index e3aea210fc..fe2804290e 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/onboard-offline-machines.md +++ b/windows/security/threat-protection/microsoft-defender-atp/onboard-offline-machines.md @@ -25,6 +25,7 @@ ms.topic: article **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) To onboard devices without Internet access, you'll need to take the following general steps: diff --git a/windows/security/threat-protection/microsoft-defender-atp/onboard.md b/windows/security/threat-protection/microsoft-defender-atp/onboard.md index d35f1668f8..87831075d7 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/onboard.md +++ b/windows/security/threat-protection/microsoft-defender-atp/onboard.md @@ -23,8 +23,8 @@ ms.topic: conceptual [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] **Applies to:** - - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) Configure and manage all the Defender for Endpoint capabilities to get the best security protection for your organization. diff --git a/windows/security/threat-protection/microsoft-defender-atp/onboarding-endpoint-configuration-manager.md b/windows/security/threat-protection/microsoft-defender-atp/onboarding-endpoint-configuration-manager.md index 87b9afcb05..1e788eab51 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/onboarding-endpoint-configuration-manager.md +++ b/windows/security/threat-protection/microsoft-defender-atp/onboarding-endpoint-configuration-manager.md @@ -25,6 +25,7 @@ ms.topic: article **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) This article is part of the Deployment guide and acts as an example onboarding method that guides users in: - Step 1: Onboarding Windows devices to the service diff --git a/windows/security/threat-protection/microsoft-defender-atp/onboarding-endpoint-manager.md b/windows/security/threat-protection/microsoft-defender-atp/onboarding-endpoint-manager.md index 1c87de1aa1..69308b1069 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/onboarding-endpoint-manager.md +++ b/windows/security/threat-protection/microsoft-defender-atp/onboarding-endpoint-manager.md @@ -25,7 +25,7 @@ ms.topic: article **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) diff --git a/windows/security/threat-protection/microsoft-defender-atp/onboarding-notification.md b/windows/security/threat-protection/microsoft-defender-atp/onboarding-notification.md index ff6119eee4..b598e8b95d 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/onboarding-notification.md +++ b/windows/security/threat-protection/microsoft-defender-atp/onboarding-notification.md @@ -21,9 +21,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) Create a notification rule so that when a local onboarding or offboardiing script is used, you'll be notified. diff --git a/windows/security/threat-protection/microsoft-defender-atp/onboarding.md b/windows/security/threat-protection/microsoft-defender-atp/onboarding.md index f79266bf23..41626f31a2 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/onboarding.md +++ b/windows/security/threat-protection/microsoft-defender-atp/onboarding.md @@ -25,7 +25,7 @@ ms.topic: article **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) Deploying Defender for Endpoint is a three-phase process: diff --git a/windows/security/threat-protection/microsoft-defender-atp/overview-attack-surface-reduction.md b/windows/security/threat-protection/microsoft-defender-atp/overview-attack-surface-reduction.md index 6f7a10acf3..c560286379 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/overview-attack-surface-reduction.md +++ b/windows/security/threat-protection/microsoft-defender-atp/overview-attack-surface-reduction.md @@ -23,10 +23,9 @@ ms.topic: conceptual [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - -* [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) Help reduce your attack surfaces, by minimizing the places where your organization is vulnerable to cyberthreats and attacks. Use the following resources to configure protection for the devices and applications in your organization. diff --git a/windows/security/threat-protection/microsoft-defender-atp/overview-custom-detections.md b/windows/security/threat-protection/microsoft-defender-atp/overview-custom-detections.md index 9135f4ebe0..af438b69b1 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/overview-custom-detections.md +++ b/windows/security/threat-protection/microsoft-defender-atp/overview-custom-detections.md @@ -24,6 +24,7 @@ ms.topic: conceptual **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) With custom detections, you can proactively monitor for and respond to various events and system states, including suspected breach activity and misconfigured devices. You can do this with customizable detection rules that automatically trigger alerts and response actions. diff --git a/windows/security/threat-protection/microsoft-defender-atp/overview-endpoint-detection-response.md b/windows/security/threat-protection/microsoft-defender-atp/overview-endpoint-detection-response.md index f79f0792f3..caff10f756 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/overview-endpoint-detection-response.md +++ b/windows/security/threat-protection/microsoft-defender-atp/overview-endpoint-detection-response.md @@ -24,8 +24,8 @@ ms.topic: conceptual **Applies to:** - - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) Defender for Endpoint endpoint detection and response capabilities provide advanced attack detections that are near real-time and actionable. Security analysts can prioritize alerts effectively, gain visibility into the full scope of a breach, and take response actions to remediate threats. diff --git a/windows/security/threat-protection/microsoft-defender-atp/overview-hardware-based-isolation.md b/windows/security/threat-protection/microsoft-defender-atp/overview-hardware-based-isolation.md index c1705995b8..882adef417 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/overview-hardware-based-isolation.md +++ b/windows/security/threat-protection/microsoft-defender-atp/overview-hardware-based-isolation.md @@ -21,8 +21,9 @@ ms.date: 09/07/2018 [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - -**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) Hardware-based isolation helps protect system integrity in Windows 10 and is integrated with Microsoft Defender for Endpoint. diff --git a/windows/security/threat-protection/microsoft-defender-atp/partner-applications.md b/windows/security/threat-protection/microsoft-defender-atp/partner-applications.md index af671e6890..0576b900d9 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/partner-applications.md +++ b/windows/security/threat-protection/microsoft-defender-atp/partner-applications.md @@ -23,8 +23,8 @@ ms.topic: conceptual [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] **Applies to:** - - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) Defender for Endpoint supports third-party applications to help enhance the detection, investigation, and threat intelligence capabilities of the platform. diff --git a/windows/security/threat-protection/microsoft-defender-atp/partner-integration.md b/windows/security/threat-protection/microsoft-defender-atp/partner-integration.md index 349dc8d30d..1643e00f0b 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/partner-integration.md +++ b/windows/security/threat-protection/microsoft-defender-atp/partner-integration.md @@ -23,8 +23,9 @@ ms.topic: conceptual [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] -**Applies to:** +**Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) > Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/portal-overview.md b/windows/security/threat-protection/microsoft-defender-atp/portal-overview.md index e4679370bb..fcf3f127d0 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/portal-overview.md +++ b/windows/security/threat-protection/microsoft-defender-atp/portal-overview.md @@ -24,6 +24,7 @@ ms.topic: conceptual **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) >Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-portaloverview-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/post-ti-indicator.md b/windows/security/threat-protection/microsoft-defender-atp/post-ti-indicator.md index ab2b412ae2..13472618b4 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/post-ti-indicator.md +++ b/windows/security/threat-protection/microsoft-defender-atp/post-ti-indicator.md @@ -20,8 +20,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - -**Applies to:** [Microsoft Defender for Endpoint]https://go.microsoft.com/fwlink/p/?linkid=2146631) +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) - Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/preferences-setup.md b/windows/security/threat-protection/microsoft-defender-atp/preferences-setup.md index 335e716372..5425f45098 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/preferences-setup.md +++ b/windows/security/threat-protection/microsoft-defender-atp/preferences-setup.md @@ -24,6 +24,8 @@ ms.topic: article **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) + >Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-prefsettings-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/prepare-deployment.md b/windows/security/threat-protection/microsoft-defender-atp/prepare-deployment.md index fdec9e6465..96825f43c6 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/prepare-deployment.md +++ b/windows/security/threat-protection/microsoft-defender-atp/prepare-deployment.md @@ -24,10 +24,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) diff --git a/windows/security/threat-protection/microsoft-defender-atp/preview-settings.md b/windows/security/threat-protection/microsoft-defender-atp/preview-settings.md index 8c1f70f474..295e6f17f8 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/preview-settings.md +++ b/windows/security/threat-protection/microsoft-defender-atp/preview-settings.md @@ -20,9 +20,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) >Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-previewsettings-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/preview.md b/windows/security/threat-protection/microsoft-defender-atp/preview.md index ef3c2f75b8..ee0c75f426 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/preview.md +++ b/windows/security/threat-protection/microsoft-defender-atp/preview.md @@ -28,6 +28,7 @@ ms.topic: conceptual **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) The Defender for Endpoint service is constantly being updated to include new feature enhancements and capabilities. diff --git a/windows/security/threat-protection/microsoft-defender-atp/production-deployment.md b/windows/security/threat-protection/microsoft-defender-atp/production-deployment.md index 516c64e1b5..9d6c7b65fd 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/production-deployment.md +++ b/windows/security/threat-protection/microsoft-defender-atp/production-deployment.md @@ -27,6 +27,7 @@ ms.topic: article **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) Deploying Defender for Endpoint is a three-phase process: diff --git a/windows/security/threat-protection/microsoft-defender-atp/pull-alerts-using-rest-api.md b/windows/security/threat-protection/microsoft-defender-atp/pull-alerts-using-rest-api.md index d656f995c8..765b46c8d4 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/pull-alerts-using-rest-api.md +++ b/windows/security/threat-protection/microsoft-defender-atp/pull-alerts-using-rest-api.md @@ -24,6 +24,7 @@ ms.topic: article **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) From 359095bd0362c8b5d9800c07798a1fc85d08d441 Mon Sep 17 00:00:00 2001 From: Lovina Saldanha Date: Wed, 16 Dec 2020 17:42:12 +0530 Subject: [PATCH 032/915] updated-4620497 updated --- .../microsoft-defender-atp/threat-protection-reports.md | 1 + .../threat-protection/microsoft-defender-atp/ti-indicator.md | 5 +++-- .../microsoft-defender-atp/time-settings.md | 2 +- .../microsoft-defender-atp/troubleshoot-asr.md | 4 ++-- .../troubleshoot-collect-support-log.md | 1 + .../troubleshoot-exploit-protection-mitigations.md | 4 ++-- .../microsoft-defender-atp/troubleshoot-live-response.md | 3 +-- .../microsoft-defender-atp/troubleshoot-np.md | 4 ++-- .../troubleshoot-onboarding-error-messages.md | 2 +- .../microsoft-defender-atp/troubleshoot-onboarding.md | 1 + .../microsoft-defender-atp/troubleshoot-siem.md | 1 + .../microsoft-defender-atp/tvm-assign-device-value.md | 1 + .../microsoft-defender-atp/tvm-dashboard-insights.md | 1 + .../microsoft-defender-atp/tvm-end-of-support-software.md | 1 + .../microsoft-defender-atp/tvm-exception.md | 2 ++ .../microsoft-defender-atp/tvm-exposure-score.md | 1 + .../microsoft-defender-atp/tvm-hunt-exposed-devices.md | 1 + .../tvm-microsoft-secure-score-devices.md | 1 + .../microsoft-defender-atp/tvm-prerequisites.md | 1 + .../microsoft-defender-atp/tvm-remediation.md | 1 + .../microsoft-defender-atp/tvm-security-recommendation.md | 1 + .../microsoft-defender-atp/tvm-software-inventory.md | 1 + .../microsoft-defender-atp/tvm-supported-os.md | 1 + .../microsoft-defender-atp/tvm-vulnerable-devices-report.md | 1 + .../microsoft-defender-atp/tvm-weaknesses.md | 1 + 25 files changed, 31 insertions(+), 12 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/threat-protection-reports.md b/windows/security/threat-protection/microsoft-defender-atp/threat-protection-reports.md index 221de57589..cb3f428c6f 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/threat-protection-reports.md +++ b/windows/security/threat-protection/microsoft-defender-atp/threat-protection-reports.md @@ -24,6 +24,7 @@ ms.topic: article **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) The threat protection report provides high-level information about alerts generated in your organization. The report includes trending information showing the detection sources, categories, severities, statuses, classifications, and determinations of alerts across time. diff --git a/windows/security/threat-protection/microsoft-defender-atp/ti-indicator.md b/windows/security/threat-protection/microsoft-defender-atp/ti-indicator.md index 2b37172304..d1e37474fa 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/ti-indicator.md +++ b/windows/security/threat-protection/microsoft-defender-atp/ti-indicator.md @@ -20,8 +20,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - -**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) - Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/time-settings.md b/windows/security/threat-protection/microsoft-defender-atp/time-settings.md index f8fe1639aa..33070c0b45 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/time-settings.md +++ b/windows/security/threat-protection/microsoft-defender-atp/time-settings.md @@ -21,9 +21,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) diff --git a/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-asr.md b/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-asr.md index f860930a0a..d87ac10c13 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-asr.md +++ b/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-asr.md @@ -23,8 +23,8 @@ ms.custom: asr **Applies to:** - -* [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) When you use [attack surface reduction rules](attack-surface-reduction.md) you may run into issues, such as: diff --git a/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-collect-support-log.md b/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-collect-support-log.md index 6ef738803e..2bed8e988b 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-collect-support-log.md +++ b/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-collect-support-log.md @@ -22,6 +22,7 @@ ms.topic: troubleshooting **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) When contacting support, you may be asked to provide the output package of the Microsoft Defender for Endpoint Client Analyzer tool. diff --git a/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-exploit-protection-mitigations.md b/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-exploit-protection-mitigations.md index 3b515a9853..16c70fb73c 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-exploit-protection-mitigations.md +++ b/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-exploit-protection-mitigations.md @@ -22,8 +22,8 @@ manager: dansimp **Applies to:** - -* [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) When you create a set of exploit protection mitigations (known as a configuration), you might find that the configuration export and import process does not remove all unwanted mitigations. diff --git a/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-live-response.md b/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-live-response.md index 01ddeadebe..6e64168c66 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-live-response.md +++ b/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-live-response.md @@ -21,10 +21,9 @@ ms.topic: troubleshooting [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - - **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) This page provides detailed steps to troubleshoot live response issues. diff --git a/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-np.md b/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-np.md index 522973a893..888c161d6d 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-np.md +++ b/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-np.md @@ -22,8 +22,8 @@ manager: dansimp **Applies to:** - -* [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) * IT administrators diff --git a/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-onboarding-error-messages.md b/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-onboarding-error-messages.md index ce25cadea3..78b71f1b4b 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-onboarding-error-messages.md +++ b/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-onboarding-error-messages.md @@ -23,8 +23,8 @@ ms.topic: troubleshooting **Applies to:** - - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) >Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-troublshootonboarding-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-onboarding.md b/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-onboarding.md index f6e7c7fc29..7fd6f29b20 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-onboarding.md +++ b/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-onboarding.md @@ -27,6 +27,7 @@ ms.topic: troubleshooting - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - Windows Server 2012 R2 - Windows Server 2016 +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) You might need to troubleshoot the Microsoft Defender for Endpoint onboarding process if you encounter issues. This page provides detailed steps to troubleshoot onboarding issues that might occur when deploying with one of the deployment tools and common errors that might occur on the devices. diff --git a/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-siem.md b/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-siem.md index e98e9a3f71..e67a94e2ed 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-siem.md +++ b/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-siem.md @@ -24,6 +24,7 @@ ms.topic: troubleshooting **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) diff --git a/windows/security/threat-protection/microsoft-defender-atp/tvm-assign-device-value.md b/windows/security/threat-protection/microsoft-defender-atp/tvm-assign-device-value.md index 3e49cdb1c3..86295407b5 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/tvm-assign-device-value.md +++ b/windows/security/threat-protection/microsoft-defender-atp/tvm-assign-device-value.md @@ -27,6 +27,7 @@ ms.topic: article - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Threat and vulnerability management](next-gen-threat-and-vuln-mgt.md) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) >Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-portaloverview-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/tvm-dashboard-insights.md b/windows/security/threat-protection/microsoft-defender-atp/tvm-dashboard-insights.md index c1a94e108f..7c2da1accb 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/tvm-dashboard-insights.md +++ b/windows/security/threat-protection/microsoft-defender-atp/tvm-dashboard-insights.md @@ -26,6 +26,7 @@ ms.topic: conceptual - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Threat and vulnerability management](next-gen-threat-and-vuln-mgt.md) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) >Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-portaloverview-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/tvm-end-of-support-software.md b/windows/security/threat-protection/microsoft-defender-atp/tvm-end-of-support-software.md index 1b100207a8..de266ed964 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/tvm-end-of-support-software.md +++ b/windows/security/threat-protection/microsoft-defender-atp/tvm-end-of-support-software.md @@ -26,6 +26,7 @@ ms.topic: conceptual - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Threat and vulnerability management](next-gen-threat-and-vuln-mgt.md) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) >Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-portaloverview-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/tvm-exception.md b/windows/security/threat-protection/microsoft-defender-atp/tvm-exception.md index 3af172dba7..5ceb5fe0d3 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/tvm-exception.md +++ b/windows/security/threat-protection/microsoft-defender-atp/tvm-exception.md @@ -26,6 +26,8 @@ ms.topic: conceptual - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Threat and vulnerability management](next-gen-threat-and-vuln-mgt.md) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) + >Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-portaloverview-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/tvm-exposure-score.md b/windows/security/threat-protection/microsoft-defender-atp/tvm-exposure-score.md index 45f7973943..d46c9e6ca7 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/tvm-exposure-score.md +++ b/windows/security/threat-protection/microsoft-defender-atp/tvm-exposure-score.md @@ -26,6 +26,7 @@ ms.topic: conceptual - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Threat and vulnerability management](next-gen-threat-and-vuln-mgt.md) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) >Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-portaloverview-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/tvm-hunt-exposed-devices.md b/windows/security/threat-protection/microsoft-defender-atp/tvm-hunt-exposed-devices.md index 2ce01e4071..3eee372b7c 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/tvm-hunt-exposed-devices.md +++ b/windows/security/threat-protection/microsoft-defender-atp/tvm-hunt-exposed-devices.md @@ -27,6 +27,7 @@ ms.topic: article - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Threat and vulnerability management](next-gen-threat-and-vuln-mgt.md) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) >Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-portaloverview-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/tvm-microsoft-secure-score-devices.md b/windows/security/threat-protection/microsoft-defender-atp/tvm-microsoft-secure-score-devices.md index 36959192bb..0f5a6419e1 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/tvm-microsoft-secure-score-devices.md +++ b/windows/security/threat-protection/microsoft-defender-atp/tvm-microsoft-secure-score-devices.md @@ -26,6 +26,7 @@ ms.topic: conceptual - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Threat and vulnerability management](next-gen-threat-and-vuln-mgt.md) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) >[!NOTE] > Configuration score is now part of threat and vulnerability management as Microsoft Secure Score for Devices. diff --git a/windows/security/threat-protection/microsoft-defender-atp/tvm-prerequisites.md b/windows/security/threat-protection/microsoft-defender-atp/tvm-prerequisites.md index ef781abcdd..8b065fb975 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/tvm-prerequisites.md +++ b/windows/security/threat-protection/microsoft-defender-atp/tvm-prerequisites.md @@ -25,6 +25,7 @@ ms.topic: conceptual - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Threat and vulnerability management](next-gen-threat-and-vuln-mgt.md) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) >Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-portaloverview-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/tvm-remediation.md b/windows/security/threat-protection/microsoft-defender-atp/tvm-remediation.md index 37f460afea..9a1aed0032 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/tvm-remediation.md +++ b/windows/security/threat-protection/microsoft-defender-atp/tvm-remediation.md @@ -25,6 +25,7 @@ ms.topic: conceptual **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Threat and vulnerability management](next-gen-threat-and-vuln-mgt.md) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) >Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-portaloverview-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/tvm-security-recommendation.md b/windows/security/threat-protection/microsoft-defender-atp/tvm-security-recommendation.md index 032da734d3..46183f78df 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/tvm-security-recommendation.md +++ b/windows/security/threat-protection/microsoft-defender-atp/tvm-security-recommendation.md @@ -26,6 +26,7 @@ ms.topic: conceptual - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Threat and vulnerability management](next-gen-threat-and-vuln-mgt.md) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) >Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-portaloverview-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/tvm-software-inventory.md b/windows/security/threat-protection/microsoft-defender-atp/tvm-software-inventory.md index d18b376b49..e38af16c87 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/tvm-software-inventory.md +++ b/windows/security/threat-protection/microsoft-defender-atp/tvm-software-inventory.md @@ -25,6 +25,7 @@ ms.topic: conceptual **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Threat and vulnerability management](next-gen-threat-and-vuln-mgt.md) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) >Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-portaloverview-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/tvm-supported-os.md b/windows/security/threat-protection/microsoft-defender-atp/tvm-supported-os.md index d466083c34..991431699d 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/tvm-supported-os.md +++ b/windows/security/threat-protection/microsoft-defender-atp/tvm-supported-os.md @@ -26,6 +26,7 @@ ms.topic: article - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Threat and vulnerability management](next-gen-threat-and-vuln-mgt.md) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) >Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-portaloverview-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/tvm-vulnerable-devices-report.md b/windows/security/threat-protection/microsoft-defender-atp/tvm-vulnerable-devices-report.md index 5ce499f8fe..8ed6f8f3d0 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/tvm-vulnerable-devices-report.md +++ b/windows/security/threat-protection/microsoft-defender-atp/tvm-vulnerable-devices-report.md @@ -27,6 +27,7 @@ ms.topic: article - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Threat and vulnerability management](next-gen-threat-and-vuln-mgt.md) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) >Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-portaloverview-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/tvm-weaknesses.md b/windows/security/threat-protection/microsoft-defender-atp/tvm-weaknesses.md index e9ead66986..00da2d91dc 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/tvm-weaknesses.md +++ b/windows/security/threat-protection/microsoft-defender-atp/tvm-weaknesses.md @@ -25,6 +25,7 @@ ms.topic: conceptual **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Threat and vulnerability management](next-gen-threat-and-vuln-mgt.md) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) >Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-portaloverview-abovefoldlink) From 418b19a4c5e0e662f5e031b1cfe6ed95e15dbf50 Mon Sep 17 00:00:00 2001 From: Lovina Saldanha Date: Wed, 16 Dec 2020 17:54:22 +0530 Subject: [PATCH 033/915] updated-4620497 updated --- .../microsoft-defender-atp/tvm-zero-day-vulnerabilities.md | 1 + .../microsoft-defender-atp/unisolate-machine.md | 5 +++-- .../microsoft-defender-atp/unrestrict-code-execution.md | 5 +++-- .../threat-protection/microsoft-defender-atp/update-alert.md | 5 +++-- .../security/threat-protection/microsoft-defender-atp/use.md | 2 +- .../threat-protection/microsoft-defender-atp/user-roles.md | 2 +- .../threat-protection/microsoft-defender-atp/user.md | 5 +++-- .../microsoft-defender-atp/view-incidents-queue.md | 1 + .../microsoft-defender-atp/vulnerability.md | 4 +++- .../microsoft-defender-atp/web-content-filtering.md | 4 ++++ .../microsoft-defender-atp/web-protection-monitoring.md | 4 ++++ .../microsoft-defender-atp/web-protection-overview.md | 4 ++++ .../microsoft-defender-atp/web-protection-response.md | 3 +++ .../microsoft-defender-atp/web-threat-protection.md | 3 +++ .../whats-new-in-microsoft-defender-atp.md | 2 +- 15 files changed, 38 insertions(+), 12 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/tvm-zero-day-vulnerabilities.md b/windows/security/threat-protection/microsoft-defender-atp/tvm-zero-day-vulnerabilities.md index 6a90da4f66..2c2111bf84 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/tvm-zero-day-vulnerabilities.md +++ b/windows/security/threat-protection/microsoft-defender-atp/tvm-zero-day-vulnerabilities.md @@ -27,6 +27,7 @@ ms.topic: article - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Threat and vulnerability management](next-gen-threat-and-vuln-mgt.md) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) >Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-portaloverview-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/unisolate-machine.md b/windows/security/threat-protection/microsoft-defender-atp/unisolate-machine.md index 211e184891..ef9ee5bad6 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/unisolate-machine.md +++ b/windows/security/threat-protection/microsoft-defender-atp/unisolate-machine.md @@ -21,8 +21,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - -**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) - Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/unrestrict-code-execution.md b/windows/security/threat-protection/microsoft-defender-atp/unrestrict-code-execution.md index 49037547d6..71f6f96492 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/unrestrict-code-execution.md +++ b/windows/security/threat-protection/microsoft-defender-atp/unrestrict-code-execution.md @@ -20,8 +20,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - -**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) - Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/update-alert.md b/windows/security/threat-protection/microsoft-defender-atp/update-alert.md index a62ac7611a..3911a3d896 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/update-alert.md +++ b/windows/security/threat-protection/microsoft-defender-atp/update-alert.md @@ -20,8 +20,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - -**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) - Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/use.md b/windows/security/threat-protection/microsoft-defender-atp/use.md index 3b37769671..f6ed1f6801 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/use.md +++ b/windows/security/threat-protection/microsoft-defender-atp/use.md @@ -23,8 +23,8 @@ ms.topic: conceptual **Applies to:** - - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) >Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-usewdatp-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/user-roles.md b/windows/security/threat-protection/microsoft-defender-atp/user-roles.md index fa2af61c92..37e39d73d5 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/user-roles.md +++ b/windows/security/threat-protection/microsoft-defender-atp/user-roles.md @@ -21,9 +21,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) >Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-roles-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/user.md b/windows/security/threat-protection/microsoft-defender-atp/user.md index 948460d6a9..4bb0c22aea 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/user.md +++ b/windows/security/threat-protection/microsoft-defender-atp/user.md @@ -20,8 +20,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - -**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) - Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/view-incidents-queue.md b/windows/security/threat-protection/microsoft-defender-atp/view-incidents-queue.md index df9ae6390d..4125a7ece6 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/view-incidents-queue.md +++ b/windows/security/threat-protection/microsoft-defender-atp/view-incidents-queue.md @@ -24,6 +24,7 @@ ms.topic: article **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) The **Incidents queue** shows a collection of incidents that were flagged from devices in your network. It helps you sort through incidents to prioritize and create an informed cybersecurity response decision. diff --git a/windows/security/threat-protection/microsoft-defender-atp/vulnerability.md b/windows/security/threat-protection/microsoft-defender-atp/vulnerability.md index eaaa313b18..136080f4f5 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/vulnerability.md +++ b/windows/security/threat-protection/microsoft-defender-atp/vulnerability.md @@ -21,7 +21,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] -**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) - Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/web-content-filtering.md b/windows/security/threat-protection/microsoft-defender-atp/web-content-filtering.md index d8daf9644c..7e1a28eee6 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/web-content-filtering.md +++ b/windows/security/threat-protection/microsoft-defender-atp/web-content-filtering.md @@ -21,6 +21,10 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) + > [!IMPORTANT] > **Web content filtering is currently in public preview**
> This preview version is provided without a service level agreement, and it's not recommended for production workloads. Certain features might not be supported or might have constrained capabilities. diff --git a/windows/security/threat-protection/microsoft-defender-atp/web-protection-monitoring.md b/windows/security/threat-protection/microsoft-defender-atp/web-protection-monitoring.md index 8bc1e5811a..e86d2f2e6f 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/web-protection-monitoring.md +++ b/windows/security/threat-protection/microsoft-defender-atp/web-protection-monitoring.md @@ -21,6 +21,10 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) + >Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-main-abovefoldlink&rtc=1) Web protection lets you monitor your organization’s web browsing security through reports under **Reports > Web protection** in the Microsoft Defender Security Center. The report contains cards that provide web threat detection statistics. diff --git a/windows/security/threat-protection/microsoft-defender-atp/web-protection-overview.md b/windows/security/threat-protection/microsoft-defender-atp/web-protection-overview.md index 998d416c2a..e96b843194 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/web-protection-overview.md +++ b/windows/security/threat-protection/microsoft-defender-atp/web-protection-overview.md @@ -21,6 +21,10 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) + >Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-main-abovefoldlink&rtc=1) diff --git a/windows/security/threat-protection/microsoft-defender-atp/web-protection-response.md b/windows/security/threat-protection/microsoft-defender-atp/web-protection-response.md index 4d52993b4d..3f3b3f169d 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/web-protection-response.md +++ b/windows/security/threat-protection/microsoft-defender-atp/web-protection-response.md @@ -21,6 +21,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) >Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-main-abovefoldlink&rtc=1) diff --git a/windows/security/threat-protection/microsoft-defender-atp/web-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/web-threat-protection.md index f6b119e508..67f5d7e77f 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/web-threat-protection.md +++ b/windows/security/threat-protection/microsoft-defender-atp/web-threat-protection.md @@ -21,6 +21,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) >Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-main-abovefoldlink&rtc=1) diff --git a/windows/security/threat-protection/microsoft-defender-atp/whats-new-in-microsoft-defender-atp.md b/windows/security/threat-protection/microsoft-defender-atp/whats-new-in-microsoft-defender-atp.md index 9a8ae62bdb..3516cd4e76 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/whats-new-in-microsoft-defender-atp.md +++ b/windows/security/threat-protection/microsoft-defender-atp/whats-new-in-microsoft-defender-atp.md @@ -25,8 +25,8 @@ ms.topic: conceptual **Applies to:** - - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) The following features are generally available (GA) in the latest release of Microsoft Defender for Endpoint as well as security features in Windows 10 and Windows Server. From 443c53cbfd1a94240e6568ae4dfe09e5be9299b6 Mon Sep 17 00:00:00 2001 From: Lovina Saldanha Date: Wed, 16 Dec 2020 23:21:11 +0530 Subject: [PATCH 034/915] updated-4620497 updated --- windows/security/threat-protection/index.md | 3 +++ 1 file changed, 3 insertions(+) diff --git a/windows/security/threat-protection/index.md b/windows/security/threat-protection/index.md index 88ac6667fb..f9594c5218 100644 --- a/windows/security/threat-protection/index.md +++ b/windows/security/threat-protection/index.md @@ -19,6 +19,9 @@ ms.topic: conceptual # Threat Protection [Microsoft Defender for Endpoint](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-advanced-threat-protection) is a unified platform for preventative protection, post-breach detection, automated investigation, and response. Defender for Endpoint protects endpoints from cyber threats, detects advanced attacks and data breaches, automates security incidents, and improves security posture. +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) + > [!TIP] > Enable your users to access cloud services and on-premises applications with ease and enable modern management capabilities for all devices. For more information, see [Secure your remote workforce](https://docs.microsoft.com/enterprise-mobility-security/remote-work/). From 0d487c033b230665bacfd30bf18fee9072bb3be1 Mon Sep 17 00:00:00 2001 From: Asha Iyengar Date: Fri, 18 Dec 2020 16:49:14 +0530 Subject: [PATCH 035/915] Minor change. --- .../threat-protection/microsoft-defender-atp/vulnerability.md | 4 +--- 1 file changed, 1 insertion(+), 3 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/vulnerability.md b/windows/security/threat-protection/microsoft-defender-atp/vulnerability.md index 136080f4f5..a2717f7960 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/vulnerability.md +++ b/windows/security/threat-protection/microsoft-defender-atp/vulnerability.md @@ -22,11 +22,9 @@ ms.topic: article **Applies to:** -- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631). To experience Microsoft Defender for Endpoint, [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) -- Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) - [!include[Prerelease information](../../includes/prerelease.md)] ## Methods From d8aee78ad6a711b7f5e55740d446a4bfe070a308 Mon Sep 17 00:00:00 2001 From: Lovina Saldanha Date: Mon, 21 Dec 2020 15:25:26 +0530 Subject: [PATCH 036/915] updated-4715491 updated product name Microsoft Endpoint Manager --- ...ie11-delivery-through-automatic-updates.md | 2 +- .../windows/chromebook-migration-guide.md | 2 +- .../deploy-windows-10-in-a-school-district.md | 42 +++++++++---------- ...d-unsigned-app-to-code-integrity-policy.md | 4 +- ...plications-inside-a-virtual-environment.md | 2 +- .../mdm/appv-deploy-and-config.md | 4 +- ...ollment-using-windows-provisioning-tool.md | 2 +- ...dded-8-1-handheld-devices-to-windows-10.md | 6 +-- .../cortana-at-work/cortana-at-work-o365.md | 2 +- .../cortana-at-work-voice-commands.md | 2 +- .../provisioning-packages.md | 2 +- ...ith-system-center-configuration-manager.md | 4 +- .../ue-v/uev-deploy-required-features.md | 2 +- .../ue-v/uev-prepare-for-deployment.md | 2 +- windows/deployment/deploy-whats-new.md | 2 +- ...-windows-10-using-configuration-manager.md | 4 +- ...-10-using-pxe-and-configuration-manager.md | 4 +- ...f-windows-10-with-configuration-manager.md | 2 +- ...to-windows-10-with-configuraton-manager.md | 4 +- windows/deployment/deploy.md | 2 +- windows/deployment/mbr-to-gpt.md | 2 +- ...are-your-organization-for-windows-to-go.md | 2 +- .../windows-10-deployment-posters.md | 2 +- .../windows-10-deployment-scenarios.md | 2 +- .../windows-10-poc-sc-config-mgr.md | 10 ++--- windows/deployment/windows-10-poc.md | 2 +- 26 files changed, 58 insertions(+), 58 deletions(-) diff --git a/browsers/internet-explorer/ie11-deploy-guide/ie11-delivery-through-automatic-updates.md b/browsers/internet-explorer/ie11-deploy-guide/ie11-delivery-through-automatic-updates.md index edcb50cb9e..bd0befaee9 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/ie11-delivery-through-automatic-updates.md +++ b/browsers/internet-explorer/ie11-deploy-guide/ie11-delivery-through-automatic-updates.md @@ -68,7 +68,7 @@ Additional information on Internet Explorer 11, including a Readiness Toolkit, t ## Availability of Internet Explorer 11 -Automatic Updates will start to distribute Internet Explorer 11 shortly after the final release of the product and will distribute it through the Microsoft Endpoint Configuration Manager and WSUS. +Automatic Updates will start to distribute Internet Explorer 11 shortly after the final release of the product and will distribute it through the Microsoft Endpoint Manager and WSUS. ## Prevent automatic installation of Internet Explorer 11 with WSUS diff --git a/education/windows/chromebook-migration-guide.md b/education/windows/chromebook-migration-guide.md index cbbdb3502b..3cd18bebdd 100644 --- a/education/windows/chromebook-migration-guide.md +++ b/education/windows/chromebook-migration-guide.md @@ -457,7 +457,7 @@ Table 5. Select on-premises AD DS, Azure AD, or hybrid X -Use Microsoft Endpoint Configuration Manager for management +Use Microsoft Endpoint Manager for management X X diff --git a/education/windows/deploy-windows-10-in-a-school-district.md b/education/windows/deploy-windows-10-in-a-school-district.md index 2d08a4c82d..7dd7bebd5a 100644 --- a/education/windows/deploy-windows-10-in-a-school-district.md +++ b/education/windows/deploy-windows-10-in-a-school-district.md @@ -202,7 +202,7 @@ Before you select the deployment and management methods, you need to review the |Scenario feature |Cloud-centric|On-premises and cloud| |---|---|---| |Identity management | Azure AD (stand-alone or integrated with on-premises AD DS) | AD DS integrated with Azure AD | -|Windows 10 deployment | MDT only | Microsoft Endpoint Configuration Manager with MDT | +|Windows 10 deployment | MDT only | Microsoft Endpoint Manager with MDT | |Configuration setting management | Intune | Group Policy

Intune| |App and update management | Intune |Microsoft Endpoint Configuration Manager

Intune| @@ -216,14 +216,14 @@ These scenarios assume the need to support: Some constraints exist in these scenarios. As you select the deployment and management methods for your device, keep the following constraints in mind: * You can use Group Policy or Intune to manage configuration settings on a device but not both. -* You can use Microsoft Endpoint Configuration Manager or Intune to manage apps and updates on a device but not both. +* You can use Microsoft Endpoint Manager or Intune to manage apps and updates on a device but not both. * You cannot manage multiple users on a device with Intune if the device is AD DS domain joined. Use the cloud-centric scenario and on-premises and cloud scenario as a guide for your district. You may need to customize these scenarios, however, based on your district. As you go through the [Select the deployment methods](#select-the-deployment-methods), [Select the configuration setting management methods](#select-the-configuration-setting-management-methods), and the [Select the app and update management products](#select-the-app-and-update-management-products) sections, remember these scenarios and use them as the basis for your district. ### Select the deployment methods -To deploy Windows 10 and your apps, you can use MDT by itself or Microsoft Endpoint Configuration Manager and MDT together. For a district, there are a few ways to deploy Windows 10 to devices. Table 2 lists the methods that this guide describes and recommends. Use this information to determine which combination of deployment methods is right for your institution. +To deploy Windows 10 and your apps, you can use MDT by itself or Microsoft Endpoint Manager and MDT together. For a district, there are a few ways to deploy Windows 10 to devices. Table 2 lists the methods that this guide describes and recommends. Use this information to determine which combination of deployment methods is right for your institution. @@ -291,7 +291,7 @@ Select this method when you:

The disadvantages of this method are that it:

    -
  • Carries an additional cost for Microsoft Endpoint Configuration Manager server licenses (if the institution does not have Configuration Manager already).
  • +
  • Carries an additional cost for Microsoft Endpoint Manager server licenses (if the institution does not have Configuration Manager already).
  • Can deploy Windows 10 only to domain-joined (institution-owned devices).
  • Requires an AD DS infrastructure (if the institution does not have AD DS already).
@@ -307,7 +307,7 @@ Record the deployment methods you selected in Table 3. |Selection | Deployment method| |--------- | -----------------| | |MDT by itself | -| |Microsoft Endpoint Configuration Manager and MDT| +| |Microsoft Endpoint Manager and MDT| *Table 3. Deployment methods selected* @@ -483,12 +483,12 @@ Select this method when you:

- +
Microsoft Endpoint Configuration Manager and Intune (hybrid)Microsoft Endpoint Manager and Intune (hybrid)

Configuration Manager and Intune together extend Configuration Manager from an on-premises management system for domain-joined devices to a solution that can manage devices regardless of their location and connectivity options. This hybrid option provides the benefits of both Configuration Manager and Intune.

Configuration Manager and Intune in the hybrid configuration allow you to support application management throughout the entire application life cycle. You can deploy, upgrade, manage multiple versions, and retire applications by using Configuration Manager, and you can manage Windows desktop and Microsoft Store applications for both institution-owned and personal devices.

Select this method when you: