mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-12 13:27:23 +00:00
Merge pull request #4538 from MicrosoftDocs/master
Publish 01/11/2021, 3:30 PM
This commit is contained in:
commit
f44e6383d0
@ -390,6 +390,26 @@ Intune tamper protection setting UX supports three states:
|
|||||||
|
|
||||||
When enabled or disabled exists on the client and admin moves the setting to not configured, it will not have any impact on the device state. To change the state to either enabled or disabled would require to be set explicitly.
|
When enabled or disabled exists on the client and admin moves the setting to not configured, it will not have any impact on the device state. To change the state to either enabled or disabled would require to be set explicitly.
|
||||||
|
|
||||||
|
<a href="" id="configuration-disablelocaladminmerge"></a>**Configuration/DisableLocalAdminMerge**<br>
|
||||||
|
This policy setting controls whether or not complex list settings configured by a local administrator are merged with managed settings. This setting applies to lists such as threats and exclusions.
|
||||||
|
|
||||||
|
If you disable or do not configure this setting, unique items defined in preference settings configured by the local administrator will be merged into the resulting effective policy. In the case of conflicts, management settings will override preference settings.
|
||||||
|
|
||||||
|
If you enable this setting, only items defined by management will be used in the resulting effective policy. Managed settings will override preference settings configured by the local administrator.
|
||||||
|
|
||||||
|
> [!NOTE]
|
||||||
|
> Applying this setting will not remove exclusions from the device registry, it will only prevent them from being applied/used. This is reflected in **Get-MpPreference**.
|
||||||
|
|
||||||
|
Supported OS versions: Windows 10
|
||||||
|
|
||||||
|
The data type is integer.
|
||||||
|
|
||||||
|
Supported operations are Add, Delete, Get, Replace.
|
||||||
|
|
||||||
|
Valid values are:
|
||||||
|
- 1 – Enable.
|
||||||
|
- 0 (default) – Disable.
|
||||||
|
|
||||||
<a href="" id="configuration-enablefilehashcomputation"></a>**Configuration/EnableFileHashComputation**
|
<a href="" id="configuration-enablefilehashcomputation"></a>**Configuration/EnableFileHashComputation**
|
||||||
Enables or disables file hash computation feature.
|
Enables or disables file hash computation feature.
|
||||||
When this feature is enabled Windows defender will compute hashes for files it scans.
|
When this feature is enabled Windows defender will compute hashes for files it scans.
|
||||||
|
@ -281,25 +281,6 @@ Valid values:
|
|||||||
|
|
||||||
Value type is bool. Supported operations include Get, Add, Replace, and Delete.
|
Value type is bool. Supported operations include Get, Add, Replace, and Delete.
|
||||||
|
|
||||||
<a href="" id="vpnv2-profilename-lockdown"></a>**VPNv2/**<em>ProfileName</em>**/LockDown** (./Device only profile)
|
|
||||||
Lockdown profile.
|
|
||||||
|
|
||||||
Valid values:
|
|
||||||
|
|
||||||
- False (default) - this is not a LockDown profile.
|
|
||||||
- True - this is a LockDown profile.
|
|
||||||
|
|
||||||
When the LockDown profile is turned on, it does the following things:
|
|
||||||
|
|
||||||
- First, it automatically becomes an "always on" profile.
|
|
||||||
- Second, it can never be disconnected.
|
|
||||||
- Third, if the profile is not connected, then the user has no network.
|
|
||||||
- Fourth, no other profiles may be connected or modified.
|
|
||||||
|
|
||||||
A Lockdown profile must be deleted before you can add, remove, or connect other profiles.
|
|
||||||
|
|
||||||
Value type is bool. Supported operations include Get, Add, Replace, and Delete.
|
|
||||||
|
|
||||||
<a href="" id="vpnv2-profilename-devicetunnel"></a>**VPNv2/**<em>ProfileName</em>**/DeviceTunnel** (./Device only profile)
|
<a href="" id="vpnv2-profilename-devicetunnel"></a>**VPNv2/**<em>ProfileName</em>**/DeviceTunnel** (./Device only profile)
|
||||||
Device tunnel profile.
|
Device tunnel profile.
|
||||||
|
|
||||||
|
@ -390,7 +390,7 @@ Windows Insider Preview builds only apply to Windows 10 and are not available fo
|
|||||||
|
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> If you upgrade a device that is configured to minimize connections from Windows to Microsoft services (that is, a device configured for Restricted Traffic) to a Windows Insider Preview build, the Feedback & Diagnostic setting will automatically be set to **Full**. Although the diagnostic data level may initially appear as **Basic**, a few hours after the UI is refreshed or the machine is rebooted, the setting will become **Full**.
|
> If you upgrade a device that is configured to minimize connections from Windows to Microsoft services (that is, a device configured for Restricted Traffic) to a Windows Insider Preview build, the Feedback & Diagnostic setting will automatically be set to **Optional (Full)**. Although the diagnostic data level may initially appear as **Required (Basic)**, a few hours after the UI is refreshed or the machine is rebooted, the setting will become **Optional (Full)**.
|
||||||
|
|
||||||
To turn off Insider Preview builds for a released version of Windows 10:
|
To turn off Insider Preview builds for a released version of Windows 10:
|
||||||
|
|
||||||
@ -1302,7 +1302,7 @@ To change how frequently **Windows should ask for my feedback**:
|
|||||||
|
|
||||||
To change the level of diagnostic and usage data sent when you **Send your device data to Microsoft**:
|
To change the level of diagnostic and usage data sent when you **Send your device data to Microsoft**:
|
||||||
|
|
||||||
- Click either the **Basic** or **Full** options.
|
- Click either the **Required (Basic)** or **Optional (Full)** options.
|
||||||
|
|
||||||
-or-
|
-or-
|
||||||
|
|
||||||
|
@ -20,9 +20,9 @@ ms.custom: bitlocker
|
|||||||
|
|
||||||
# BitLocker Group Policy settings
|
# BitLocker Group Policy settings
|
||||||
|
|
||||||
**Applies to**
|
**Applies to:**
|
||||||
|
|
||||||
- Windows 10
|
- Windows 10, Windows Server 2019, Windows Server 2016, Windows 8.1, and Windows Server 2012 R2
|
||||||
|
|
||||||
This topic for IT professionals describes the function, location, and effect of each Group Policy setting that is used to manage BitLocker Drive Encryption.
|
This topic for IT professionals describes the function, location, and effect of each Group Policy setting that is used to manage BitLocker Drive Encryption.
|
||||||
|
|
||||||
|
@ -114,9 +114,9 @@ The following table lists commands for some of the most common scenarios. Run `m
|
|||||||
|Configuration |Turn off PUA protection |`mdatp threat policy set --type potentially_unwanted_application --action off` |
|
|Configuration |Turn off PUA protection |`mdatp threat policy set --type potentially_unwanted_application --action off` |
|
||||||
|Configuration |Turn on audit mode for PUA protection |`mdatp threat policy set --type potentially_unwanted_application --action audit` |
|
|Configuration |Turn on audit mode for PUA protection |`mdatp threat policy set --type potentially_unwanted_application --action audit` |
|
||||||
|Diagnostics |Change the log level |`mdatp log level set --level verbose [error|warning|info|verbose]` |
|
|Diagnostics |Change the log level |`mdatp log level set --level verbose [error|warning|info|verbose]` |
|
||||||
|Diagnostics |Generate diagnostic logs |`mdatp diagnostic create` |
|
|Diagnostics |Generate diagnostic logs |`mdatp diagnostic create --path [directory]` |
|
||||||
|Health |Check the product's health |`mdatp health` |
|
|Health |Check the product's health |`mdatp health` |
|
||||||
|Protection |Scan a path |`mdatp scan custom --path [path]` |
|
|Protection |Scan a path |`mdatp scan custom --path [path] [--ignore-exclusions]` |
|
||||||
|Protection |Do a quick scan |`mdatp scan quick` |
|
|Protection |Do a quick scan |`mdatp scan quick` |
|
||||||
|Protection |Do a full scan |`mdatp scan full` |
|
|Protection |Do a full scan |`mdatp scan full` |
|
||||||
|Protection |Cancel an ongoing on-demand scan |`mdatp scan cancel` |
|
|Protection |Cancel an ongoing on-demand scan |`mdatp scan cancel` |
|
||||||
|
@ -23,6 +23,16 @@ ms.topic: conceptual
|
|||||||
|
|
||||||
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
|
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
|
||||||
|
|
||||||
|
## 101.18.53
|
||||||
|
|
||||||
|
- EDR for Linux is now [generally available](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/edr-for-linux-is-now-is-generally-available/ba-p/2048539)
|
||||||
|
- Added a new command-line switch (`--ignore-exclusions`) to ignore AV exclusions during custom scans (`mdatp scan custom`)
|
||||||
|
- Extended `mdatp diagnostic create` with a new parameter (`--path [directory]`) that allows the diagnostic logs to be saved to a different directory
|
||||||
|
- Performance improvements & bug fixes
|
||||||
|
|
||||||
|
## 101.12.99
|
||||||
|
|
||||||
|
- Performance improvements & bug fixes
|
||||||
|
|
||||||
## 101.04.76
|
## 101.04.76
|
||||||
|
|
||||||
|
@ -54,7 +54,7 @@ Property | Type | Description
|
|||||||
id | String | [machine](machine.md) identity.
|
id | String | [machine](machine.md) identity.
|
||||||
computerDnsName | String | [machine](machine.md) fully qualified name.
|
computerDnsName | String | [machine](machine.md) fully qualified name.
|
||||||
firstSeen | DateTimeOffset | First date and time where the [machine](machine.md) was observed by Microsoft Defender for Endpoint.
|
firstSeen | DateTimeOffset | First date and time where the [machine](machine.md) was observed by Microsoft Defender for Endpoint.
|
||||||
lastSeen | DateTimeOffset | Last date and time where the [machine](machine.md) was observed by Microsoft Defender for Endpoint.
|
lastSeen | DateTimeOffset |Time and date of the last received full device report. A device typically sends a full report every 24 hours.
|
||||||
osPlatform | String | Operating system platform.
|
osPlatform | String | Operating system platform.
|
||||||
version | String | Operating system Version.
|
version | String | Operating system Version.
|
||||||
osBuild | Nullable long | Operating system build number.
|
osBuild | Nullable long | Operating system build number.
|
||||||
|
@ -28,7 +28,7 @@ ms.topic: article
|
|||||||
|
|
||||||
>Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-machinesview-abovefoldlink)
|
>Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-machinesview-abovefoldlink)
|
||||||
|
|
||||||
The **Devices list** shows a list of the devices in your network where alerts were generated. By default, the queue displays devices with alerts seen in the last 30 days.
|
The **Devices list** shows a list of the devices in your network where alerts were generated. By default, the queue displays devices seen in the last 30 days.
|
||||||
|
|
||||||
At a glance you'll see information such as domain, risk level, OS platform, and other details for easy identification of devices most at risk.
|
At a glance you'll see information such as domain, risk level, OS platform, and other details for easy identification of devices most at risk.
|
||||||
|
|
||||||
|
@ -95,6 +95,7 @@ Access to Defender for Endpoint is done through a browser, supporting the follow
|
|||||||
- Windows Server 2016
|
- Windows Server 2016
|
||||||
- Windows Server, version 1803 or later
|
- Windows Server, version 1803 or later
|
||||||
- Windows Server 2019
|
- Windows Server 2019
|
||||||
|
- Windows Virtual Desktop
|
||||||
|
|
||||||
Devices on your network must be running one of these editions.
|
Devices on your network must be running one of these editions.
|
||||||
|
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Onboard devices without Internet access to Microsoft Defender ATP
|
title: Onboard devices without Internet access to Microsoft Defender for Endpoint
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
description: Onboard devices without Internet access so that they can send sensor data to the Microsoft Defender ATP sensor
|
description: Onboard devices without Internet access so that they can send sensor data to the Microsoft Defender ATP sensor
|
||||||
keywords: onboard, servers, vm, on-premise, oms gateway, log analytics, azure log analytics, mma
|
keywords: onboard, servers, vm, on-premise, oms gateway, log analytics, azure log analytics, mma
|
||||||
|
@ -40,6 +40,11 @@ For more information preview features, see [Preview features](https://docs.micro
|
|||||||
> https://docs.microsoft.com/api/search/rss?search=%22Microsoft+Defender+ATP+as+well+as+security+features+in+Windows+10+and+Windows+Server.%22&locale=en-us
|
> https://docs.microsoft.com/api/search/rss?search=%22Microsoft+Defender+ATP+as+well+as+security+features+in+Windows+10+and+Windows+Server.%22&locale=en-us
|
||||||
> ```
|
> ```
|
||||||
|
|
||||||
|
|
||||||
|
## January 2021
|
||||||
|
|
||||||
|
- [Windows Virtual Desktop](https://azure.microsoft.com/services/virtual-desktop/) <br> Microsoft Defender for Endpoint now adds support for Windows Virtual Desktop.
|
||||||
|
|
||||||
## December 2020
|
## December 2020
|
||||||
- [Microsoft Defender for Endpoint for iOS](microsoft-defender-atp-ios.md) <br> Microsoft Defender for Endpoint now adds support for iOS. Learn how to install, configure, update, and use Microsoft Defender for Endpoint for iOS.
|
- [Microsoft Defender for Endpoint for iOS](microsoft-defender-atp-ios.md) <br> Microsoft Defender for Endpoint now adds support for iOS. Learn how to install, configure, update, and use Microsoft Defender for Endpoint for iOS.
|
||||||
|
|
||||||
|
@ -47,6 +47,9 @@ The Security Compliance Toolkit consists of:
|
|||||||
|
|
||||||
- Microsoft Edge security baseline
|
- Microsoft Edge security baseline
|
||||||
- Version 85
|
- Version 85
|
||||||
|
|
||||||
|
- Windows Update security baseline
|
||||||
|
- Windows 10 20H2 and below (October 2020 Update)
|
||||||
|
|
||||||
- Tools
|
- Tools
|
||||||
- Policy Analyzer tool
|
- Policy Analyzer tool
|
||||||
|
Loading…
x
Reference in New Issue
Block a user