mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-16 07:17:24 +00:00
udpate toc
This commit is contained in:
parent
2d13134403
commit
f5b8a8f5f5
@ -15,250 +15,17 @@
|
|||||||
## [How-to guides]()
|
## [How-to guides]()
|
||||||
### [Deployment guide]()
|
### [Deployment guide]()
|
||||||
#### [Deployment phases](microsoft-defender-atp/deployment-phases.md)
|
#### [Deployment phases](microsoft-defender-atp/deployment-phases.md)
|
||||||
|
#### [Product brief](microsoft-defender-atp/product-brief.md)
|
||||||
|
|
||||||
#### [Phase 1]()
|
#### [Phase 1]()
|
||||||
##### [Product brief](microsoft-defender-atp/product-brief.md)
|
|
||||||
###### [Threat & Vulnerability Management]()
|
|
||||||
####### [Next-generation capabilities](microsoft-defender-atp/next-gen-threat-and-vuln-mgt.md)
|
|
||||||
####### [Supported operating systems and platforms](microsoft-defender-atp/tvm-supported-os.md)
|
|
||||||
####### [What's in the dashboard and what it means for my organization](microsoft-defender-atp/tvm-dashboard-insights.md)
|
|
||||||
####### [Exposure score](microsoft-defender-atp/tvm-exposure-score.md)
|
|
||||||
####### [Configuration score](microsoft-defender-atp/configuration-score.md)
|
|
||||||
####### [Security recommendation](microsoft-defender-atp/tvm-security-recommendation.md)
|
|
||||||
####### [Remediation and exception](microsoft-defender-atp/tvm-remediation.md)
|
|
||||||
####### [Software inventory](microsoft-defender-atp/tvm-software-inventory.md)
|
|
||||||
####### [Weaknesses](microsoft-defender-atp/tvm-weaknesses.md)
|
|
||||||
####### [Scenarios](microsoft-defender-atp/threat-and-vuln-mgt-scenarios.md)
|
|
||||||
|
|
||||||
###### [Attack surface reduction]()
|
|
||||||
#######[Overview of attack surface reduction](microsoft-defender-atp/overview-attack-surface-reduction.md)
|
|
||||||
###### [Hardware-based isolation]()
|
|
||||||
####### [Hardware-based isolation in Windows 10](microsoft-defender-atp/overview-hardware-based-isolation.md)
|
|
||||||
####### [Application isolation]()
|
|
||||||
######## [Application guard overview](windows-defender-application-guard/wd-app-guard-overview.md)
|
|
||||||
######## [System requirements](windows-defender-application-guard/reqs-wd-app-guard.md)
|
|
||||||
|
|
||||||
####### [System integrity](windows-defender-system-guard/system-guard-how-hardware-based-root-of-trust-helps-protect-windows.md)
|
|
||||||
|
|
||||||
###### [Application control](windows-defender-application-control/windows-defender-application-control.md)
|
|
||||||
###### [Exploit protection](microsoft-defender-atp/exploit-protection.md)
|
|
||||||
###### [Network protection](microsoft-defender-atp/network-protection.md)
|
|
||||||
|
|
||||||
###### [Web protection]()
|
|
||||||
####### [Web protection overview](microsoft-defender-atp/web-protection-overview.md)
|
|
||||||
####### [Web threat protection]()
|
|
||||||
######## [Web threat protection overview](microsoft-defender-atp/web-threat-protection.md)
|
|
||||||
######## [Monitor web security](microsoft-defender-atp/web-protection-monitoring.md)
|
|
||||||
########[Respond to web threats](microsoft-defender-atp/web-protection-response.md)
|
|
||||||
####### [Web content filtering](microsoft-defender-atp/web-content-filtering.md)
|
|
||||||
|
|
||||||
###### [Controlled folder access](microsoft-defender-atp/controlled-folders.md)
|
|
||||||
###### [Attack surface reduction](microsoft-defender-atp/attack-surface-reduction.md)
|
|
||||||
###### [Network firewall](windows-firewall/windows-firewall-with-advanced-security.md)
|
|
||||||
|
|
||||||
###### [Next-generation protection](windows-defender-antivirus/windows-defender-antivirus-in-windows-10.md)
|
|
||||||
####### [Better together: Windows Defender Antivirus and Microsoft Defender ATP](windows-defender-antivirus/why-use-microsoft-antivirus.md)
|
|
||||||
|
|
||||||
###### [Endpoint detection and response]()
|
|
||||||
#######[Endpoint detection and response overview](microsoft-defender-atp/overview-endpoint-detection-response.md)
|
|
||||||
|
|
||||||
###### [Automated investigation and remediation]()
|
|
||||||
####### [Automated investigation and remediation overview](microsoft-defender-atp/automated-investigations.md)
|
|
||||||
|
|
||||||
###### [Secure score](microsoft-defender-atp/overview-secure-score.md)
|
|
||||||
|
|
||||||
|
|
||||||
##### [Prepare deployment](microsoft-defender-atp/prepare-deployment.md)
|
##### [Prepare deployment](microsoft-defender-atp/prepare-deployment.md)
|
||||||
##### [Validate licensing and complete setup](microsoft-defender-atp/licensing.md)
|
##### [Validate licensing and complete setup](microsoft-defender-atp/licensing.md)
|
||||||
##### [Assign user access to the portal](microsoft-defender-atp/assign-portal-access.md)
|
|
||||||
|
|
||||||
#### [Phase 2]()
|
#### [Phase 2]()
|
||||||
##### [Evaluation lab](microsoft-defender-atp/evaluation-lab.md)
|
##### [Evaluation lab](microsoft-defender-atp/evaluation-lab.md)
|
||||||
|
|
||||||
#### [Phase 3]()
|
#### [Phase 3]()
|
||||||
##### [Production deployment](microsoft-defender-atp/production-deployment.md)
|
##### [Production deployment](microsoft-defender-atp/production-deployment.md)
|
||||||
##### [Onboard devices to the service]()
|
|
||||||
###### [Onboard machines to Microsoft Defender ATP](microsoft-defender-atp/onboard-configure.md)
|
|
||||||
###### [Onboard previous versions of Windows](microsoft-defender-atp/onboard-downlevel.md)
|
|
||||||
###### [Onboard Windows 10 machines]()
|
|
||||||
####### [Onboarding tools and methods](microsoft-defender-atp/configure-endpoints.md)
|
|
||||||
####### [Onboard machines using Group Policy](microsoft-defender-atp/configure-endpoints-gp.md)
|
|
||||||
####### [Onboard machines using Microsoft Endpoint Configuration Manager](microsoft-defender-atp/configure-endpoints-sccm.md)
|
|
||||||
####### [Onboard machines using Mobile Device Management tools](microsoft-defender-atp/configure-endpoints-mdm.md)
|
|
||||||
####### [Onboard machines using a local script](microsoft-defender-atp/configure-endpoints-script.md)
|
|
||||||
####### [Onboard non-persistent virtual desktop infrastructure (VDI) machines](microsoft-defender-atp/configure-endpoints-vdi.md)
|
|
||||||
|
|
||||||
###### [Onboard servers](microsoft-defender-atp/configure-server-endpoints.md)
|
|
||||||
###### [Onboard non-Windows machines](microsoft-defender-atp/configure-endpoints-non-windows.md)
|
|
||||||
###### [Onboard machines without Internet access](microsoft-defender-atp/onboard-offline-machines.md)
|
|
||||||
###### [Run a detection test on a newly onboarded machine](microsoft-defender-atp/run-detection-test.md)
|
|
||||||
###### [Run simulated attacks on machines](microsoft-defender-atp/attack-simulations.md)
|
|
||||||
###### [Configure proxy and Internet connectivity settings](microsoft-defender-atp/configure-proxy-internet.md)
|
|
||||||
###### [Create an onboarding or offboarding notification rule](microsoft-defender-atp/onboarding-notification.md)
|
|
||||||
|
|
||||||
###### [Troubleshoot onboarding issues]()
|
|
||||||
####### [Troubleshoot issues during onboarding](microsoft-defender-atp/troubleshoot-onboarding.md)
|
|
||||||
####### [Troubleshoot subscription and portal access issues](microsoft-defender-atp/troubleshoot-onboarding-error-messages.md)
|
|
||||||
|
|
||||||
##### [Role-based access control]()
|
|
||||||
##### [Manage portal access using RBAC](microsoft-defender-atp/rbac.md)
|
|
||||||
##### [Create and manage roles](microsoft-defender-atp/user-roles.md)
|
|
||||||
##### [Create and manage machine groups]()
|
|
||||||
###### [Using machine groups](microsoft-defender-atp/machine-groups.md)
|
|
||||||
###### [Create and manage machine tags](microsoft-defender-atp/machine-tags.md)
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
#### [Configure and manage capabilities]()
|
|
||||||
|
|
||||||
##### [Configure attack surface reduction]()
|
|
||||||
###### [Attack surface reduction configuration settings](microsoft-defender-atp/configure-attack-surface-reduction.md)
|
|
||||||
|
|
||||||
##### [Hardware-based isolation]()
|
|
||||||
###### [System isolation](windows-defender-system-guard/system-guard-secure-launch-and-smm-protection.md)
|
|
||||||
|
|
||||||
###### [Application isolation]()
|
|
||||||
####### [Install Windows Defender Application Guard](windows-defender-application-guard/install-wd-app-guard.md)
|
|
||||||
####### [Application control](windows-defender-application-control/windows-defender-application-control.md)
|
|
||||||
|
|
||||||
###### [Device control]()
|
|
||||||
####### [Control USB devices](device-control/control-usb-devices-using-intune.md)
|
|
||||||
|
|
||||||
####### [Device Guard]()
|
|
||||||
######## [Code integrity](device-guard/introduction-to-device-guard-virtualization-based-security-and-windows-defender-application-control.md)
|
|
||||||
|
|
||||||
######## [Memory integrity]()
|
|
||||||
######### [Understand memory integrity](device-guard/memory-integrity.md)
|
|
||||||
######### [Hardware qualifications](device-guard/requirements-and-deployment-planning-guidelines-for-virtualization-based-protection-of-code-integrity.md)
|
|
||||||
######### [Enable HVCI](device-guard/enable-virtualization-based-protection-of-code-integrity.md)
|
|
||||||
|
|
||||||
###### [Exploit protection]()
|
|
||||||
####### [Enable exploit protection](microsoft-defender-atp/enable-exploit-protection.md)
|
|
||||||
####### [Import/export configurations](microsoft-defender-atp/import-export-exploit-protection-emet-xml.md)
|
|
||||||
|
|
||||||
###### [Network protection](microsoft-defender-atp/enable-network-protection.md)
|
|
||||||
###### [Controlled folder access](microsoft-defender-atp/enable-controlled-folders.md)
|
|
||||||
|
|
||||||
###### [Attack surface reduction controls]()
|
|
||||||
####### [Enable attack surface reduction rules](microsoft-defender-atp/enable-attack-surface-reduction.md)
|
|
||||||
####### [Customize attack surface reduction](microsoft-defender-atp/customize-attack-surface-reduction.md)
|
|
||||||
|
|
||||||
###### [Network firewall](windows-firewall/windows-firewall-with-advanced-security-deployment-guide.md)
|
|
||||||
|
|
||||||
##### [Configure next-generation protection]()
|
|
||||||
###### [Configure Windows Defender Antivirus features](windows-defender-antivirus/configure-windows-defender-antivirus-features.md)
|
|
||||||
|
|
||||||
###### [Utilize Microsoft cloud-delivered protection](windows-defender-antivirus/utilize-microsoft-cloud-protection-windows-defender-antivirus.md)
|
|
||||||
####### [Enable cloud-delivered protection](windows-defender-antivirus/enable-cloud-protection-windows-defender-antivirus.md)
|
|
||||||
####### [Specify the cloud-delivered protection level](windows-defender-antivirus/specify-cloud-protection-level-windows-defender-antivirus.md)
|
|
||||||
####### [Configure and validate network connections](windows-defender-antivirus/configure-network-connections-windows-defender-antivirus.md)
|
|
||||||
####### [Prevent security settings changes with tamper protection](windows-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md)
|
|
||||||
####### [Enable Block at first sight](windows-defender-antivirus/configure-block-at-first-sight-windows-defender-antivirus.md)
|
|
||||||
####### [Configure the cloud block timeout period](windows-defender-antivirus/configure-cloud-block-timeout-period-windows-defender-antivirus.md)
|
|
||||||
|
|
||||||
###### [Configure behavioral, heuristic, and real-time protection]()
|
|
||||||
####### [Configuration overview](windows-defender-antivirus/configure-protection-features-windows-defender-antivirus.md)
|
|
||||||
####### [Detect and block Potentially Unwanted Applications](windows-defender-antivirus/detect-block-potentially-unwanted-apps-windows-defender-antivirus.md)
|
|
||||||
####### [Enable and configure always-on protection and monitoring](windows-defender-antivirus/configure-real-time-protection-windows-defender-antivirus.md)
|
|
||||||
|
|
||||||
###### [Antivirus on Windows Server 2016](windows-defender-antivirus/windows-defender-antivirus-on-windows-server-2016.md)
|
|
||||||
|
|
||||||
###### [Antivirus compatibility]()
|
|
||||||
####### [Compatibility charts](windows-defender-antivirus/windows-defender-antivirus-compatibility.md)
|
|
||||||
####### [Use limited periodic antivirus scanning](windows-defender-antivirus/limited-periodic-scanning-windows-defender-antivirus.md)
|
|
||||||
|
|
||||||
###### [Deploy, manage updates, and report on antivirus]()
|
|
||||||
####### [Preparing to deploy](windows-defender-antivirus/deploy-manage-report-windows-defender-antivirus.md)
|
|
||||||
####### [Deploy and enable antivirus](windows-defender-antivirus/deploy-windows-defender-antivirus.md)
|
|
||||||
######## [Deployment guide for VDI environments](windows-defender-antivirus/deployment-vdi-windows-defender-antivirus.md)
|
|
||||||
|
|
||||||
####### [Report on antivirus protection]()
|
|
||||||
######## [Review protection status and alerts](windows-defender-antivirus/report-monitor-windows-defender-antivirus.md)
|
|
||||||
######## [Troubleshoot antivirus reporting in Update Compliance](windows-defender-antivirus/troubleshoot-reporting.md)
|
|
||||||
|
|
||||||
####### [Manage updates and apply baselines]()
|
|
||||||
######## [Learn about the different kinds of updates](windows-defender-antivirus/manage-updates-baselines-windows-defender-antivirus.md)
|
|
||||||
######## [Manage protection and security intelligence updates](windows-defender-antivirus/manage-protection-updates-windows-defender-antivirus.md)
|
|
||||||
######## [Manage when protection updates should be downloaded and applied](windows-defender-antivirus/manage-protection-update-schedule-windows-defender-antivirus.md)
|
|
||||||
######## [Manage updates for endpoints that are out of date](windows-defender-antivirus/manage-outdated-endpoints-windows-defender-antivirus.md)
|
|
||||||
######## [Manage event-based forced updates](windows-defender-antivirus/manage-event-based-updates-windows-defender-antivirus.md)
|
|
||||||
######## [Manage updates for mobile devices and VMs](windows-defender-antivirus/manage-updates-mobile-devices-vms-windows-defender-antivirus.md)
|
|
||||||
|
|
||||||
###### [Customize, initiate, and review the results of scans and remediation]()
|
|
||||||
####### [Configuration overview](windows-defender-antivirus/customize-run-review-remediate-scans-windows-defender-antivirus.md)
|
|
||||||
|
|
||||||
####### [Configure and validate exclusions in antivirus scans]()
|
|
||||||
######## [Exclusions overview](windows-defender-antivirus/configure-exclusions-windows-defender-antivirus.md)
|
|
||||||
######## [Configure and validate exclusions based on file name, extension, and folder location](windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus.md)
|
|
||||||
######## [Configure and validate exclusions for files opened by processes](windows-defender-antivirus/configure-process-opened-file-exclusions-windows-defender-antivirus.md)
|
|
||||||
######## [Configure antivirus exclusions Windows Server 2016](windows-defender-antivirus/configure-server-exclusions-windows-defender-antivirus.md)
|
|
||||||
|
|
||||||
####### [Configure scanning antivirus options](windows-defender-antivirus/configure-advanced-scan-types-windows-defender-antivirus.md)
|
|
||||||
####### [Configure remediation for scans](windows-defender-antivirus/configure-remediation-windows-defender-antivirus.md)
|
|
||||||
####### [Configure scheduled scans](windows-defender-antivirus/scheduled-catch-up-scans-windows-defender-antivirus.md)
|
|
||||||
####### [Configure and run scans](windows-defender-antivirus/run-scan-windows-defender-antivirus.md)
|
|
||||||
####### [Review scan results](windows-defender-antivirus/review-scan-results-windows-defender-antivirus.md)
|
|
||||||
####### [Run and review the results of an offline scan](windows-defender-antivirus/windows-defender-offline.md)
|
|
||||||
|
|
||||||
###### [Restore quarantined files](windows-defender-antivirus/restore-quarantined-files-windows-defender-antivirus.md)
|
|
||||||
|
|
||||||
###### [Manage antivirus in your business]()
|
|
||||||
####### [Management overview](windows-defender-antivirus/configuration-management-reference-windows-defender-antivirus.md)
|
|
||||||
####### [Use Group Policy settings to configure and manage antivirus](windows-defender-antivirus/use-group-policy-windows-defender-antivirus.md)
|
|
||||||
####### [Use Microsoft Endpoint Configuration Manager and Microsoft Intune to configure and manage antivirus](windows-defender-antivirus/use-intune-config-manager-windows-defender-antivirus.md)
|
|
||||||
####### [Use PowerShell cmdlets to configure and manage antivirus](windows-defender-antivirus/use-powershell-cmdlets-windows-defender-antivirus.md)
|
|
||||||
####### [Use Windows Management Instrumentation (WMI) to configure and manage antivirus](windows-defender-antivirus/use-wmi-windows-defender-antivirus.md)
|
|
||||||
####### [Use the mpcmdrun.exe commandline tool to configure and manage antivirus](windows-defender-antivirus/command-line-arguments-windows-defender-antivirus.md)
|
|
||||||
|
|
||||||
###### [Manage scans and remediation]()
|
|
||||||
####### [Management overview](windows-defender-antivirus/customize-run-review-remediate-scans-windows-defender-antivirus.md)
|
|
||||||
|
|
||||||
####### [Configure and validate exclusions in antivirus scans]()
|
|
||||||
######## [Exclusions overview](windows-defender-antivirus/configure-exclusions-windows-defender-antivirus.md)
|
|
||||||
######## [Configure and validate exclusions based on file name, extension, and folder location](windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus.md)
|
|
||||||
######## [Configure and validate exclusions for files opened by processes](windows-defender-antivirus/configure-process-opened-file-exclusions-windows-defender-antivirus.md)
|
|
||||||
######## [Configure antivirus exclusions on Windows Server 2016](windows-defender-antivirus/configure-server-exclusions-windows-defender-antivirus.md)
|
|
||||||
|
|
||||||
####### [Configure scanning options](windows-defender-antivirus/configure-advanced-scan-types-windows-defender-antivirus.md)
|
|
||||||
|
|
||||||
###### [Configure remediation for scans](windows-defender-antivirus/configure-remediation-windows-defender-antivirus.md)
|
|
||||||
####### [Configure remediation for scans](windows-defender-antivirus/configure-remediation-windows-defender-antivirus.md)
|
|
||||||
####### [Configure scheduled scans](windows-defender-antivirus/scheduled-catch-up-scans-windows-defender-antivirus.md)
|
|
||||||
####### [Configure and run scans](windows-defender-antivirus/run-scan-windows-defender-antivirus.md)
|
|
||||||
####### [Review scan results](windows-defender-antivirus/review-scan-results-windows-defender-antivirus.md)
|
|
||||||
####### [Run and review the results of an offline scan](windows-defender-antivirus/windows-defender-offline.md)
|
|
||||||
####### [Restore quarantined files](windows-defender-antivirus/restore-quarantined-files-windows-defender-antivirus.md)
|
|
||||||
|
|
||||||
###### [Manage next-generation protection in your business]()
|
|
||||||
####### [Handle false positives/negatives in Windows Defender Antivirus](windows-defender-antivirus/antivirus-false-positives-negatives.md)
|
|
||||||
####### [Management overview](windows-defender-antivirus/configuration-management-reference-windows-defender-antivirus.md)
|
|
||||||
####### [Use Microsoft Intune and Microsoft Endpoint Configuration Manager to manage next generation protection](windows-defender-antivirus/use-intune-config-manager-windows-defender-antivirus.md)
|
|
||||||
####### [Use Group Policy settings to manage next generation protection](windows-defender-antivirus/use-group-policy-windows-defender-antivirus.md)
|
|
||||||
####### [Use PowerShell cmdlets to manage next generation protection](windows-defender-antivirus/use-powershell-cmdlets-windows-defender-antivirus.md)
|
|
||||||
####### [Use Windows Management Instrumentation (WMI) to manage next generation protection](windows-defender-antivirus/use-wmi-windows-defender-antivirus.md)
|
|
||||||
####### [Use the mpcmdrun.exe command line tool to manage next generation protection](windows-defender-antivirus/command-line-arguments-windows-defender-antivirus.md)
|
|
||||||
|
|
||||||
##### [Microsoft Defender Advanced Threat Protection for Mac](microsoft-defender-atp/microsoft-defender-atp-mac.md)
|
|
||||||
###### [What's New](microsoft-defender-atp/mac-whatsnew.md)
|
|
||||||
###### [Deploy]()
|
|
||||||
####### [Microsoft Intune-based deployment](microsoft-defender-atp/mac-install-with-intune.md)
|
|
||||||
####### [JAMF-based deployment](microsoft-defender-atp/mac-install-with-jamf.md)
|
|
||||||
####### [Deployment with a different Mobile Device Management (MDM) system](microsoft-defender-atp/mac-install-with-other-mdm.md)
|
|
||||||
####### [Manual deployment](microsoft-defender-atp/mac-install-manually.md)
|
|
||||||
###### [Update](microsoft-defender-atp/mac-updates.md)
|
|
||||||
###### [Configure]()
|
|
||||||
####### [Configure and validate exclusions](microsoft-defender-atp/mac-exclusions.md)
|
|
||||||
####### [Set preferences](microsoft-defender-atp/mac-preferences.md)
|
|
||||||
####### [Detect and block Potentially Unwanted Applications](microsoft-defender-atp/mac-pua.md)
|
|
||||||
###### [Troubleshoot]()
|
|
||||||
####### [Troubleshoot performance issues](microsoft-defender-atp/mac-support-perf.md)
|
|
||||||
####### [Troubleshoot kernel extension issues](microsoft-defender-atp/mac-support-kext.md)
|
|
||||||
###### [Privacy](microsoft-defender-atp/mac-privacy.md)
|
|
||||||
###### [Resources](microsoft-defender-atp/mac-resources.md)
|
|
||||||
|
|
||||||
##### [Configure Secure score dashboard security controls](microsoft-defender-atp/secure-score-dashboard.md)
|
|
||||||
|
|
||||||
##### [Configure and manage Microsoft Threat Experts capabilities](microsoft-defender-atp/configure-microsoft-threat-experts.md)
|
|
||||||
|
|
||||||
|
|
||||||
### [Operations]()
|
### [Operations]()
|
||||||
#### [Security operations]()
|
#### [Security operations]()
|
||||||
@ -380,6 +147,241 @@
|
|||||||
###### [Optimize ASR rule deployment and detections](microsoft-defender-atp/configure-machines-asr.md)
|
###### [Optimize ASR rule deployment and detections](microsoft-defender-atp/configure-machines-asr.md)
|
||||||
|
|
||||||
## Reference
|
## Reference
|
||||||
|
### [Capabilities]()
|
||||||
|
#### [Threat & Vulnerability Management]()
|
||||||
|
##### [Next-generation capabilities](microsoft-defender-atp/next-gen-threat-and-vuln-mgt.md)
|
||||||
|
##### [Supported operating systems and platforms](microsoft-defender-atp/tvm-supported-os.md)
|
||||||
|
##### [What's in the dashboard and what it means for my organization](microsoft-defender-atp/tvm-dashboard-insights.md)
|
||||||
|
##### [Exposure score](microsoft-defender-atp/tvm-exposure-score.md)
|
||||||
|
##### [Configuration score](microsoft-defender-atp/configuration-score.md)
|
||||||
|
##### [Security recommendation](microsoft-defender-atp/tvm-security-recommendation.md)
|
||||||
|
##### [Remediation and exception](microsoft-defender-atp/tvm-remediation.md)
|
||||||
|
##### [Software inventory](microsoft-defender-atp/tvm-software-inventory.md)
|
||||||
|
##### [Weaknesses](microsoft-defender-atp/tvm-weaknesses.md)
|
||||||
|
##### [Scenarios](microsoft-defender-atp/threat-and-vuln-mgt-scenarios.md)
|
||||||
|
|
||||||
|
#### [Attack surface reduction]()
|
||||||
|
#####[Overview of attack surface reduction](microsoft-defender-atp/overview-attack-surface-reduction.md)
|
||||||
|
#### [Hardware-based isolation]()
|
||||||
|
##### [Hardware-based isolation in Windows 10](microsoft-defender-atp/overview-hardware-based-isolation.md)
|
||||||
|
##### [Application isolation]()
|
||||||
|
###### [Application guard overview](windows-defender-application-guard/wd-app-guard-overview.md)
|
||||||
|
###### [System requirements](windows-defender-application-guard/reqs-wd-app-guard.md)
|
||||||
|
|
||||||
|
##### [System integrity](windows-defender-system-guard/system-guard-how-hardware-based-root-of-trust-helps-protect-windows.md)
|
||||||
|
|
||||||
|
#### [Application control](windows-defender-application-control/windows-defender-application-control.md)
|
||||||
|
#### [Exploit protection](microsoft-defender-atp/exploit-protection.md)
|
||||||
|
#### [Network protection](microsoft-defender-atp/network-protection.md)
|
||||||
|
|
||||||
|
#### [Web protection]()
|
||||||
|
##### [Web protection overview](microsoft-defender-atp/web-protection-overview.md)
|
||||||
|
##### [Web threat protection]()
|
||||||
|
###### [Web threat protection overview](microsoft-defender-atp/web-threat-protection.md)
|
||||||
|
###### [Monitor web security](microsoft-defender-atp/web-protection-monitoring.md)
|
||||||
|
######[Respond to web threats](microsoft-defender-atp/web-protection-response.md)
|
||||||
|
##### [Web content filtering](microsoft-defender-atp/web-content-filtering.md)
|
||||||
|
|
||||||
|
#### [Controlled folder access](microsoft-defender-atp/controlled-folders.md)
|
||||||
|
#### [Attack surface reduction](microsoft-defender-atp/attack-surface-reduction.md)
|
||||||
|
#### [Network firewall](windows-firewall/windows-firewall-with-advanced-security.md)
|
||||||
|
|
||||||
|
#### [Next-generation protection](windows-defender-antivirus/windows-defender-antivirus-in-windows-10.md)
|
||||||
|
##### [Better together: Windows Defender Antivirus and Microsoft Defender ATP](windows-defender-antivirus/why-use-microsoftntivirus.md)
|
||||||
|
|
||||||
|
#### [Endpoint detection and response]()
|
||||||
|
#####[Endpoint detection and response overview](microsoft-defender-atp/overview-endpoint-detection-response.md)
|
||||||
|
|
||||||
|
#### [Automated investigation and remediation]()
|
||||||
|
##### [Automated investigation and remediation overview](microsoft-defender-atp/automated-investigations.md)
|
||||||
|
|
||||||
|
#### [Secure score](microsoft-defender-atp/overview-secure-score.md)
|
||||||
|
|
||||||
|
### [Onboard devices to the service]()
|
||||||
|
#### [Onboard machines to Microsoft Defender ATP](microsoft-defender-atp/onboard-configure.md)
|
||||||
|
#### [Onboard previous versions of Windows](microsoft-defender-atp/onboard-downlevel.md)
|
||||||
|
#### [Onboard Windows 10 machines]()
|
||||||
|
##### [Onboarding tools and methods](microsoft-defender-atp/configure-endpoints.md)
|
||||||
|
##### [Onboard machines using Group Policy](microsoft-defender-atp/configure-endpoints-gp.md)
|
||||||
|
##### [Onboard machines using Microsoft Endpoint Configuration Manager](microsoft-defender-atp/configure-endpoints-sccm.md)
|
||||||
|
##### [Onboard machines using Mobile Device Management tools](microsoft-defender-atp/configure-endpoints-mdm.md)
|
||||||
|
##### [Onboard machines using a local script](microsoft-defender-atp/configure-endpoints-script.md)
|
||||||
|
##### [Onboard non-persistent virtual desktop infrastructure (VDI) machines](microsoft-defender-atp/configure-endpoints-vdi.md)
|
||||||
|
|
||||||
|
#### [Onboard servers](microsoft-defender-atp/configure-server-endpoints.md)
|
||||||
|
#### [Onboard non-Windows machines](microsoft-defender-atp/configure-endpoints-non-windows.md)
|
||||||
|
#### [Onboard machines without Internet access](microsoft-defender-atp/onboard-offline-machines.md)
|
||||||
|
#### [Run a detection test on a newly onboarded machine](microsoft-defender-atp/run-detection-test.md)
|
||||||
|
#### [Run simulated attacks on machines](microsoft-defender-atp/attack-simulations.md)
|
||||||
|
#### [Configure proxy and Internet connectivity settings](microsoft-defender-atp/configure-proxy-internet.md)
|
||||||
|
#### [Create an onboarding or offboarding notification rule](microsoft-defender-atp/onboarding-notification.md)
|
||||||
|
|
||||||
|
#### [Troubleshoot onboarding issues]()
|
||||||
|
##### [Troubleshoot issues during onboarding](microsoft-defender-atp/troubleshoot-onboarding.md)
|
||||||
|
##### [Troubleshoot subscription and portal access issues](microsoft-defender-atp/troubleshoot-onboarding-error-messages.md)
|
||||||
|
|
||||||
|
### [Role-based access control]()
|
||||||
|
#### [Manage portal access using RBAC](microsoft-defender-atp/rbac.md)
|
||||||
|
#### [Create and manage roles](microsoft-defender-atp/user-roles.md)
|
||||||
|
#### [Create and manage machine groups]()
|
||||||
|
##### [Using machine groups](microsoft-defender-atp/machine-groups.md)
|
||||||
|
##### [Create and manage machine tags](microsoft-defender-atp/machine-tags.md)
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
### [Configure and manage capabilities]()
|
||||||
|
|
||||||
|
#### [Configure attack surface reduction]()
|
||||||
|
##### [Attack surface reduction configuration settings](microsoft-defender-atp/configure-attack-surface-reduction.md)
|
||||||
|
|
||||||
|
#### [Hardware-based isolation]()
|
||||||
|
##### [System isolation](windows-defender-system-guard/system-guard-secure-launch-and-smm-protection.md)
|
||||||
|
|
||||||
|
##### [Application isolation]()
|
||||||
|
###### [Install Windows Defender Application Guard](windows-defender-application-guard/install-wd-app-guard.md)
|
||||||
|
###### [Application control](windows-defender-application-control/windows-defender-application-control.md)
|
||||||
|
|
||||||
|
##### [Device control]()
|
||||||
|
###### [Control USB devices](device-control/control-usb-devices-using-intune.md)
|
||||||
|
|
||||||
|
###### [Device Guard]()
|
||||||
|
####### [Code integrity](device-guard/introduction-to-device-guard-virtualization-based-security-and-windows-defender-application-control.md)
|
||||||
|
|
||||||
|
####### [Memory integrity]()
|
||||||
|
######## [Understand memory integrity](device-guard/memory-integrity.md)
|
||||||
|
######## [Hardware qualifications](device-guard/requirements-and-deployment-planning-guidelines-for-virtualization-based-protection-of-code-integrity.md)
|
||||||
|
######## [Enable HVCI](device-guard/enable-virtualization-based-protection-of-code-integrity.md)
|
||||||
|
|
||||||
|
##### [Exploit protection]()
|
||||||
|
###### [Enable exploit protection](microsoft-defender-atp/enable-exploit-protection.md)
|
||||||
|
###### [Import/export configurations](microsoft-defender-atp/import-export-exploit-protection-emet-xml.md)
|
||||||
|
|
||||||
|
##### [Network protection](microsoft-defender-atp/enable-network-protection.md)
|
||||||
|
##### [Controlled folder access](microsoft-defender-atp/enable-controlled-folders.md)
|
||||||
|
|
||||||
|
##### [Attack surface reduction controls]()
|
||||||
|
###### [Enable attack surface reduction rules](microsoft-defender-atp/enable-attack-surface-reduction.md)
|
||||||
|
###### [Customize attack surface reduction](microsoft-defender-atp/customize-attack-surface-reduction.md)
|
||||||
|
|
||||||
|
##### [Network firewall](windows-firewall/windows-firewall-with-advanced-security-deployment-guide.md)
|
||||||
|
|
||||||
|
#### [Configure next-generation protection]()
|
||||||
|
##### [Configure Windows Defender Antivirus features](windows-defender-antivirus/configure-windows-defender-antivirus-features.md)
|
||||||
|
|
||||||
|
##### [Utilize Microsoft cloud-delivered protection](windows-defender-antivirus/utilize-microsoft-cloud-protection-windows-defender-antivirus.md)
|
||||||
|
###### [Enable cloud-delivered protection](windows-defender-antivirus/enable-cloud-protection-windows-defender-antivirus.md)
|
||||||
|
###### [Specify the cloud-delivered protection level](windows-defender-antivirus/specify-cloud-protection-level-windows-defender-antivirus.md)
|
||||||
|
###### [Configure and validate network connections](windows-defender-antivirus/configure-network-connections-windows-defender-antivirus.md)
|
||||||
|
###### [Prevent security settings changes with tamper protection](windows-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md)
|
||||||
|
###### [Enable Block at first sight](windows-defender-antivirus/configure-block-at-first-sight-windows-defender-antivirus.md)
|
||||||
|
###### [Configure the cloud block timeout period](windows-defender-antivirus/configure-cloud-block-timeout-period-windows-defender-antivirus.md)
|
||||||
|
|
||||||
|
##### [Configure behavioral, heuristic, and real-time protection]()
|
||||||
|
###### [Configuration overview](windows-defender-antivirus/configure-protection-features-windows-defender-antivirus.md)
|
||||||
|
###### [Detect and block Potentially Unwanted Applications](windows-defender-antivirus/detect-block-potentially-unwanted-apps-windows-defender-antivirus.md)
|
||||||
|
###### [Enable and configure always-on protection and monitoring](windows-defender-antivirus/configure-real-time-protection-windows-defender-antivirus.md)
|
||||||
|
|
||||||
|
##### [Antivirus on Windows Server 2016](windows-defender-antivirus/windows-defender-antivirus-on-windows-server-2016.md)
|
||||||
|
|
||||||
|
##### [Antivirus compatibility]()
|
||||||
|
###### [Compatibility charts](windows-defender-antivirus/windows-defender-antivirus-compatibility.md)
|
||||||
|
###### [Use limited periodic antivirus scanning](windows-defender-antivirus/limited-periodic-scanning-windows-defender-antivirus.md)
|
||||||
|
|
||||||
|
##### [Deploy, manage updates, and report on antivirus]()
|
||||||
|
###### [Preparing to deploy](windows-defender-antivirus/deploy-manage-report-windows-defender-antivirus.md)
|
||||||
|
###### [Deploy and enable antivirus](windows-defender-antivirus/deploy-windows-defender-antivirus.md)
|
||||||
|
####### [Deployment guide for VDI environments](windows-defender-antivirus/deployment-vdi-windows-defender-antivirus.md)
|
||||||
|
|
||||||
|
###### [Report on antivirus protection]()
|
||||||
|
####### [Review protection status and alerts](windows-defender-antivirus/report-monitor-windows-defender-antivirus.md)
|
||||||
|
####### [Troubleshoot antivirus reporting in Update Compliance](windows-defender-antivirus/troubleshoot-reporting.md)
|
||||||
|
|
||||||
|
###### [Manage updates and apply baselines]()
|
||||||
|
####### [Learn about the different kinds of updates](windows-defender-antivirus/manage-updates-baselines-windows-defender-antivirus.md)
|
||||||
|
####### [Manage protection and security intelligence updates](windows-defender-antivirus/manage-protection-updates-windows-defender-antivirus.md)
|
||||||
|
####### [Manage when protection updates should be downloaded and applied](windows-defender-antivirus/manage-protection-update-schedule-windows-defender-antivirus.md)
|
||||||
|
####### [Manage updates for endpoints that are out of date](windows-defender-antivirus/manage-outdated-endpoints-windows-defender-antivirus.md)
|
||||||
|
####### [Manage event-based forced updates](windows-defender-antivirus/manage-event-based-updates-windows-defender-antivirus.md)
|
||||||
|
####### [Manage updates for mobile devices and VMs](windows-defender-antivirus/manage-updates-mobile-devices-vms-windows-defender-antivirus.md)
|
||||||
|
|
||||||
|
##### [Customize, initiate, and review the results of scans and remediation]()
|
||||||
|
###### [Configuration overview](windows-defender-antivirus/customize-run-review-remediate-scans-windows-defender-antivirus.md)
|
||||||
|
|
||||||
|
###### [Configure and validate exclusions in antivirus scans]()
|
||||||
|
####### [Exclusions overview](windows-defender-antivirus/configure-exclusions-windows-defender-antivirus.md)
|
||||||
|
####### [Configure and validate exclusions based on file name, extension, and folder location](windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus.md)
|
||||||
|
####### [Configure and validate exclusions for files opened by processes](windows-defender-antivirus/configure-process-opened-file-exclusions-windows-defender-antivirus.md)
|
||||||
|
####### [Configure antivirus exclusions Windows Server 2016](windows-defender-antivirus/configure-server-exclusions-windows-defender-antivirus.md)
|
||||||
|
|
||||||
|
###### [Configure scanning antivirus options](windows-defender-antivirus/configure-advanced-scan-types-windows-defender-antivirus.md)
|
||||||
|
###### [Configure remediation for scans](windows-defender-antivirus/configure-remediation-windows-defender-antivirus.md)
|
||||||
|
###### [Configure scheduled scans](windows-defender-antivirus/scheduled-catch-up-scans-windows-defender-antivirus.md)
|
||||||
|
###### [Configure and run scans](windows-defender-antivirus/run-scan-windows-defender-antivirus.md)
|
||||||
|
###### [Review scan results](windows-defender-antivirus/review-scan-results-windows-defender-antivirus.md)
|
||||||
|
###### [Run and review the results of an offline scan](windows-defender-antivirus/windows-defender-offline.md)
|
||||||
|
|
||||||
|
##### [Restore quarantined files](windows-defender-antivirus/restore-quarantined-files-windows-defender-antivirus.md)
|
||||||
|
|
||||||
|
##### [Manage antivirus in your business]()
|
||||||
|
###### [Management overview](windows-defender-antivirus/configuration-management-reference-windows-defender-antivirus.md)
|
||||||
|
###### [Use Group Policy settings to configure and manage antivirus](windows-defender-antivirus/use-group-policy-windows-defender-antivirus.md)
|
||||||
|
###### [Use Microsoft Endpoint Configuration Manager and Microsoft Intune to configure and manage antivirus](windows-defender-antivirus/use-intune-config-manager-windows-defender-antivirus.md)
|
||||||
|
###### [Use PowerShell cmdlets to configure and manage antivirus](windows-defender-antivirus/use-powershell-cmdlets-windows-defender-antivirus.md)
|
||||||
|
###### [Use Windows Management Instrumentation (WMI) to configure and manage antivirus](windows-defender-antivirus/use-wmi-windows-defender-antivirus.md)
|
||||||
|
###### [Use the mpcmdrun.exe commandline tool to configure and manage antivirus](windows-defender-antivirus/command-line-arguments-windows-defender-antivirus.md)
|
||||||
|
|
||||||
|
##### [Manage scans and remediation]()
|
||||||
|
###### [Management overview](windows-defender-antivirus/customize-run-review-remediate-scans-windows-defender-antivirus.md)
|
||||||
|
|
||||||
|
###### [Configure and validate exclusions in antivirus scans]()
|
||||||
|
####### [Exclusions overview](windows-defender-antivirus/configure-exclusions-windows-defender-antivirus.md)
|
||||||
|
####### [Configure and validate exclusions based on file name, extension, and folder location](windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus.md)
|
||||||
|
####### [Configure and validate exclusions for files opened by processes](windows-defender-antivirus/configure-process-opened-file-exclusions-windows-defender-antivirus.md)
|
||||||
|
####### [Configure antivirus exclusions on Windows Server 2016](windows-defender-antivirus/configure-server-exclusions-windows-defender-antivirus.md)
|
||||||
|
|
||||||
|
###### [Configure scanning options](windows-defender-antivirus/configure-advanced-scan-types-windows-defender-antivirus.md)
|
||||||
|
|
||||||
|
##### [Configure remediation for scans](windows-defender-antivirus/configure-remediation-windows-defender-antivirus.md)
|
||||||
|
###### [Configure remediation for scans](windows-defender-antivirus/configure-remediation-windows-defender-antivirus.md)
|
||||||
|
###### [Configure scheduled scans](windows-defender-antivirus/scheduled-catch-up-scans-windows-defender-antivirus.md)
|
||||||
|
###### [Configure and run scans](windows-defender-antivirus/run-scan-windows-defender-antivirus.md)
|
||||||
|
###### [Review scan results](windows-defender-antivirus/review-scan-results-windows-defender-antivirus.md)
|
||||||
|
###### [Run and review the results of an offline scan](windows-defender-antivirus/windows-defender-offline.md)
|
||||||
|
###### [Restore quarantined files](windows-defender-antivirus/restore-quarantined-files-windows-defender-antivirus.md)
|
||||||
|
|
||||||
|
##### [Manage next-generation protection in your business]()
|
||||||
|
###### [Handle false positives/negatives in Windows Defender Antivirus](windows-defender-antivirus/antivirus-false-positives-negatives.md)
|
||||||
|
###### [Management overview](windows-defender-antivirus/configuration-management-reference-windows-defender-antivirus.md)
|
||||||
|
###### [Use Microsoft Intune and Microsoft Endpoint Configuration Manager to manage next generation protection](windows-defender-antivirus/use-intune-config-manager-windows-defender-antivirus.md)
|
||||||
|
###### [Use Group Policy settings to manage next generation protection](windows-defender-antivirus/use-group-policy-windows-defender-antivirus.md)
|
||||||
|
###### [Use PowerShell cmdlets to manage next generation protection](windows-defender-antivirus/use-powershell-cmdlets-windows-defender-antivirus.md)
|
||||||
|
###### [Use Windows Management Instrumentation (WMI) to manage next generation protection](windows-defender-antivirus/use-wmi-windows-defender-antivirus.md)
|
||||||
|
###### [Use the mpcmdrun.exe command line tool to manage next generation protection](windows-defender-antivirus/command-line-arguments-windows-defender-antivirus.md)
|
||||||
|
|
||||||
|
#### [Microsoft Defender Advanced Threat Protection for Mac](microsoft-defender-atp/microsoft-defender-atp-mac.md)
|
||||||
|
##### [What's New](microsoft-defender-atp/mac-whatsnew.md)
|
||||||
|
##### [Deploy]()
|
||||||
|
###### [Microsoft Intune-based deployment](microsoft-defender-atp/mac-install-with-intune.md)
|
||||||
|
###### [JAMF-based deployment](microsoft-defender-atp/mac-install-with-jamf.md)
|
||||||
|
###### [Deployment with a different Mobile Device Management (MDM) system](microsoft-defender-atp/mac-install-with-other-mdm.md)
|
||||||
|
###### [Manual deployment](microsoft-defender-atp/mac-install-manually.md)
|
||||||
|
##### [Update](microsoft-defender-atp/mac-updates.md)
|
||||||
|
##### [Configure]()
|
||||||
|
###### [Configure and validate exclusions](microsoft-defender-atp/mac-exclusions.md)
|
||||||
|
###### [Set preferences](microsoft-defender-atp/mac-preferences.md)
|
||||||
|
###### [Detect and block Potentially Unwanted Applications](microsoft-defender-atp/mac-pua.md)
|
||||||
|
##### [Troubleshoot]()
|
||||||
|
###### [Troubleshoot performance issues](microsoft-defender-atp/mac-support-perf.md)
|
||||||
|
###### [Troubleshoot kernel extension issues](microsoft-defender-atp/mac-support-kext.md)
|
||||||
|
##### [Privacy](microsoft-defender-atp/mac-privacy.md)
|
||||||
|
##### [Resources](microsoft-defender-atp/mac-resources.md)
|
||||||
|
|
||||||
|
#### [Configure Secure score dashboard security controls](microsoft-defender-atp/secure-score-dashboard.md)
|
||||||
|
|
||||||
|
#### [Configure and manage Microsoft Threat Experts capabilities](microsoft-defender-atp/configure-microsoft-threat-experts.md)
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
### [Configure portal settings]()
|
### [Configure portal settings]()
|
||||||
#### [Set up preferences](microsoft-defender-atp/preferences-setup.md)
|
#### [Set up preferences](microsoft-defender-atp/preferences-setup.md)
|
||||||
@ -411,7 +413,14 @@
|
|||||||
##### [Onboarding machines](microsoft-defender-atp/onboard-configure.md)
|
##### [Onboarding machines](microsoft-defender-atp/onboard-configure.md)
|
||||||
##### [Offboarding machines](microsoft-defender-atp/offboard-machines.md)
|
##### [Offboarding machines](microsoft-defender-atp/offboard-machines.md)
|
||||||
|
|
||||||
### [Configure Microsoft Defender Security Center time zone settings](microsoft-defender-atp/time-settings.md)
|
#### [Configure Microsoft Defender Security Center time zone settings](microsoft-defender-atp/time-settings.md)
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
Loading…
x
Reference in New Issue
Block a user