From f3bbac7981b42409dc298b5271f750e09307ad38 Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Fri, 23 Oct 2020 13:31:44 -0700 Subject: [PATCH] udpates --- windows/security/threat-protection/TOC.md | 6 +-- .../deployment-rings.md | 50 ++++++++++++++---- .../images/deployment-rings.png | Bin 24969 -> 25023 bytes .../images/insider-rings.png | Bin 0 -> 38213 bytes 4 files changed, 43 insertions(+), 13 deletions(-) create mode 100644 windows/security/threat-protection/microsoft-defender-atp/images/insider-rings.png diff --git a/windows/security/threat-protection/TOC.md b/windows/security/threat-protection/TOC.md index 8f92bf2e40..4f732d6ced 100644 --- a/windows/security/threat-protection/TOC.md +++ b/windows/security/threat-protection/TOC.md @@ -16,14 +16,14 @@ ## [Plan deployment](microsoft-defender-atp/deployment-strategy.md) ## [Deployment guide]() -### [Deployment rings](microsoft-defender-atp/deployment-rings.md) ### [Deployment phases](microsoft-defender-atp/deployment-phases.md) ### [Phase 1: Prepare](microsoft-defender-atp/prepare-deployment.md) ### [Phase 2: Set up](microsoft-defender-atp/production-deployment.md) ### [Phase 3: Onboard]() +#### [Deployment rings](microsoft-defender-atp/deployment-rings.md) #### [Onboarding overview](microsoft-defender-atp/onboarding.md) -##### [Onboarding using Microsoft Endpoint Configuration Manager](microsoft-defender-atp/onboarding-endpoint-configuration-manager.md) -##### [Onboarding using Microsoft Endpoint Manager](microsoft-defender-atp/onboarding-endpoint-manager.md) +#### [Onboarding using Microsoft Endpoint Configuration Manager](microsoft-defender-atp/onboarding-endpoint-configuration-manager.md) +#### [Onboarding using Microsoft Endpoint Manager](microsoft-defender-atp/onboarding-endpoint-manager.md) ## [Migration guides](microsoft-defender-atp/migration-guides.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/deployment-rings.md b/windows/security/threat-protection/microsoft-defender-atp/deployment-rings.md index 266fd081ad..4825c6f7ed 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/deployment-rings.md +++ b/windows/security/threat-protection/microsoft-defender-atp/deployment-rings.md @@ -29,6 +29,12 @@ ms.topic: article Deploying Microsoft Defender ATP can be done using a ring-based deployment approach. +The deployment rings can be applied in the following scenarios: +- New deployments +- Existing deployments + +## New deployments + ![Image of deployment rings](images/deployment-rings.png) @@ -49,14 +55,11 @@ Full deployment | Ring 3: Roll out service to the rest of environment in larger ## Evaluate -You can use the [evaluation lab](evaluation-lab.md) to gain full access to the capabilities of the suite without the complexities of environment configuration. +Identify a small number of test machines in your environment to onboard to the service. Ideally, these machines would be less than 50 endpoints. -You'll be able to add Windows 10 or Windows Server 2019 devices to the lab environment, install threat simulators, and run scenarios to instantly see how the platform performs. - -### Exit criteria? -- Able to run simulation -- Able to install threat simulator -- Results from simulation is displayed in dashboard +### Exit criteria +- Devices show up in the device inventory list +- Alerts appear in dashboard ## Pilot @@ -66,14 +69,15 @@ The following table shows the supported endpoints and the corresponding tool you | Endpoint | Deployment tool | |--------------|------------------------------------------| -| **Windows** | [Local script (up to 10 devices)](configure-endpoints-script.md)
[Group Policy](configure-endpoints-gp.md)
[Microsoft Endpoint Manager/ Mobile Device Manager](configure-endpoints-mdm.md)
[Microsoft Endpoint Configuration Manager](configure-endpoints-sccm.md)
[VDI scripts](configure-endpoints-vdi.md) | +| **Windows** | [Local script (up to 10 devices)](configure-endpoints-script.md)
NOTE: If you want to deploy more than 10 devices in a production environment, use the Group Policy method instead.
[Group Policy](configure-endpoints-gp.md)
[Microsoft Endpoint Manager/ Mobile Device Manager](configure-endpoints-mdm.md)
[Microsoft Endpoint Configuration Manager](configure-endpoints-sccm.md)
[VDI scripts](configure-endpoints-vdi.md) | | **macOS** | [Local script](mac-install-manually.md)
[Microsoft Endpoint Manager](mac-install-with-intune.md)
[JAMF Pro](mac-install-with-jamf.md)
[Mobile Device Management](mac-install-with-other-mdm.md) | | **Linux Server** | [Local script](linux-install-manually.md)
[Puppet](linux-install-with-puppet.md)
[Ansible](linux-install-with-ansible.md)| | **iOS** | [App-based](ios-install.md) | | **Android** | [Microsoft Endpoint Manager](android-intune.md) | -### Exit criteria? +### Exit criteria +- Devices show up in the device inventory list - [Run a detection test](run-detection-test.md) - [Run a simulated attack on a device](attack-simulations.md) @@ -89,4 +93,30 @@ Use the following material to select the appropriate Microsoft Defender ATP arch |[![Thumb image for Microsoft Defender ATP deployment strategy](images/mdatp-deployment-strategy.png)](https://github.com/MicrosoftDocs/windows-itpro-docs/raw/public/windows/security/threat-protection/microsoft-defender-atp/downloads/mdatp-deployment-strategy.pdf)
[PDF](https://github.com/MicrosoftDocs/windows-itpro-docs/raw/public/windows/security/threat-protection/microsoft-defender-atp/downloads/mdatp-deployment-strategy.pdf) \| [Visio](https://github.com/MicrosoftDocs/windows-itpro-docs/raw/public/windows/security/threat-protection/microsoft-defender-atp/downloads/mdatp-deployment-strategy.vsdx) | The architectural material helps you plan your deployment for the following architectures: