migration guide

This commit is contained in:
Denise Vangel-MSFT 2020-06-10 15:51:30 -07:00
parent b1ea345b7d
commit eae362cda8
3 changed files with 6 additions and 4 deletions

View File

@ -595,7 +595,7 @@
### [Migration guides]() ### [Migration guides]()
#### [Migrate from Symantec to Microsoft Defender ATP]() #### [Migrate from Symantec to Microsoft Defender ATP]()
##### [Overview](microsoft-defender-atp/symantec-to-microsoft-defender-atp-migration.md) ##### [Overview and planning](microsoft-defender-atp/symantec-to-microsoft-defender-atp-migration.md)
##### [Part 1: Get Microsoft Defender ATP](microsoft-defender-atp/symantec-to-microsoft-defender-atp-part1.md) ##### [Part 1: Get Microsoft Defender ATP](microsoft-defender-atp/symantec-to-microsoft-defender-atp-part1.md)
##### [Part 2: Configure settings and exclusions](microsoft-defender-atp/symantec-to-microsoft-defender-atp-part2.md) ##### [Part 2: Configure settings and exclusions](microsoft-defender-atp/symantec-to-microsoft-defender-atp-part2.md)
##### [Part 3: Finish making the switch](microsoft-defender-atp/symantec-to-microsoft-defender-atp-part3.md) ##### [Part 3: Finish making the switch](microsoft-defender-atp/symantec-to-microsoft-defender-atp-part3.md)

View File

@ -28,7 +28,7 @@ ms.topic: article
If you are planning to switch from Symantec Endpoint Protection to [Microsoft Defender ATP](https://docs.microsoft.com/windows/security/threat-protection), you're in the right place. Use this article as a guide to plan your migration. If you are planning to switch from Symantec Endpoint Protection to [Microsoft Defender ATP](https://docs.microsoft.com/windows/security/threat-protection), you're in the right place. Use this article as a guide to plan your migration.
## The migration process at a high level ## Planning for migration: The process at a high level
The process of switching from Symantec to Microsoft Defender ATP can be divided into three phases or parts, as listed in the following table. The process of switching from Symantec to Microsoft Defender ATP can be divided into three phases or parts, as listed in the following table.

View File

@ -22,7 +22,7 @@ ms.topic: article
| [Overview](symantec-to-microsoft-defender-atp-migration.md) | Part 1 <br/>*You are here!* | [Part 2](symantec-to-microsoft-defender-atp-part2.md) | [Part 3](symantec-to-microsoft-defender-atp-part3.md) | [Post migration<br/>management](microsoft-defender-atp-post-migration-management.md) | | [Overview](symantec-to-microsoft-defender-atp-migration.md) | Part 1 <br/>*You are here!* | [Part 2](symantec-to-microsoft-defender-atp-part2.md) | [Part 3](symantec-to-microsoft-defender-atp-part3.md) | [Post migration<br/>management](microsoft-defender-atp-post-migration-management.md) |
|--|--|--|--|--| |--|--|--|--|--|
Part 1 of [migrating from Symantec to Microsoft Defender ATP](symantec-to-microsoft-defender-atp-migration.md#the-migration-process-at-a-high-level) includes the following steps: Part 1 of [migrating from Symantec to Microsoft Defender ATP](symantec-to-microsoft-defender-atp-migration.md#planning-for-migration-the-process-at-a-high-level) includes the following steps:
1. [Get Microsoft Defender ATP](#get-microsoft-defender-atp). 1. [Get Microsoft Defender ATP](#get-microsoft-defender-atp).
2. [Grant access to the Microsoft Defender Security Center](#grant-access-to-the-microsoft-defender-security-center). 2. [Grant access to the Microsoft Defender Security Center](#grant-access-to-the-microsoft-defender-security-center).
3. [Configure device proxy and internet connectivity settings](#configure-device-proxy-and-internet-connectivity-settings) 3. [Configure device proxy and internet connectivity settings](#configure-device-proxy-and-internet-connectivity-settings)
@ -38,10 +38,12 @@ To get started, you must have Microsoft Defender ATP with licenses assigned and
3. As a global administrator or security administrator, set up your dedicated cloud instance of Microsoft Defender ATP. See [Microsoft Defender ATP setup: Tenant configuration](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/production-deployment#tenant-configuration). 3. As a global administrator or security administrator, set up your dedicated cloud instance of Microsoft Defender ATP. See [Microsoft Defender ATP setup: Tenant configuration](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/production-deployment#tenant-configuration).
4. If endpoints in your organization use a proxy to access the internet, see [Microsoft Defender ATP setup: Network configuration](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/production-deployment#network-configuration). 4. If endpoints in your organization use a proxy to access the internet, see [Microsoft Defender ATP setup: Network configuration](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/production-deployment#network-configuration).
At this point, you are ready to grant access to the Microsoft Defender Security Center, which is sometimes referred to as the Microsoft Defender ATP portal.
## Grant access to the Microsoft Defender Security Center ## Grant access to the Microsoft Defender Security Center
The Microsoft Defender Security Center ([https://securitycenter.windows.com](https://securitycenter.windows.com)), also referred to as the Microsoft Defender ATP portal, is where you can access the features and capabilities of Microsoft Defender ATP. [Get an overview of the Microsoft Defender Security Center](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/use). The Microsoft Defender Security Center ([https://securitycenter.windows.com](https://securitycenter.windows.com)) is where you can access the features and capabilities of Microsoft Defender ATP. [Get an overview of the Microsoft Defender Security Center](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/use).
Permissions to the Microsoft Defender Security Center can be granted by using either basic permissions or role-based access control (RBAC). We recommend using RBAC so that you have more granular control over permissions. Permissions to the Microsoft Defender Security Center can be granted by using either basic permissions or role-based access control (RBAC). We recommend using RBAC so that you have more granular control over permissions.