mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-19 20:33:42 +00:00
Merge pull request #3329 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to master to sync with https://github.com/MicrosoftDocs/windows-itpro-docs (branch public)
This commit is contained in:
@ -343,7 +343,7 @@ GUID: `b2b3f03d-6a65-4f7b-a9c7-1c7ef74a9ba4`
|
|||||||
|
|
||||||
### Block Office communication application from creating child processes
|
### Block Office communication application from creating child processes
|
||||||
|
|
||||||
This rule prevents Outlook from creating child processes, while till allowing legitimate Outlook functions.
|
This rule prevents Outlook from creating child processes, while still allowing legitimate Outlook functions.
|
||||||
|
|
||||||
This protects against social engineering attacks and prevents exploit code from abusing vulnerabilities in Outlook. It also protects against [Outlook rules and forms exploits](https://blogs.technet.microsoft.com/office365security/defending-against-rules-and-forms-injection/) that attackers can use when a user's credentials are compromised.
|
This protects against social engineering attacks and prevents exploit code from abusing vulnerabilities in Outlook. It also protects against [Outlook rules and forms exploits](https://blogs.technet.microsoft.com/office365security/defending-against-rules-and-forms-injection/) that attackers can use when a user's credentials are compromised.
|
||||||
|
|
||||||
|
@ -66,7 +66,7 @@ The following image shows an instance of unwanted software that was detected and
|
|||||||
|Microsoft Defender Antivirus engine |Make sure your engine is up to date. Using PowerShell, run the [Get-MpComputerStatus](https://docs.microsoft.com/powershell/module/defender/get-mpcomputerstatus?view=win10-ps) cmdlet as an administrator. <br/> In the **AMEngineVersion** line, you should see **1.1.16700.2** or above. |
|
|Microsoft Defender Antivirus engine |Make sure your engine is up to date. Using PowerShell, run the [Get-MpComputerStatus](https://docs.microsoft.com/powershell/module/defender/get-mpcomputerstatus?view=win10-ps) cmdlet as an administrator. <br/> In the **AMEngineVersion** line, you should see **1.1.16700.2** or above. |
|
||||||
|
|
||||||
> [!IMPORTANT]
|
> [!IMPORTANT]
|
||||||
> To get the best protection value, make sure your antivirus solution is configured to receive regular updates and essential features.
|
> To get the best protection value, make sure your antivirus solution is configured to receive regular updates and essential features, and that your exclusions are defined.
|
||||||
|
|
||||||
|
|
||||||
## Frequently asked questions
|
## Frequently asked questions
|
||||||
|
@ -28,7 +28,7 @@ There are some minimum requirements for onboarding devices to the service. Learn
|
|||||||
|
|
||||||
|
|
||||||
> [!TIP]
|
> [!TIP]
|
||||||
> - Learn about the latest enhancements in Microsoft Defender ATP:[Microsoft Defender Advanced Threat Protection Tech Community](https://techcommunity.microsoft.com/t5/Windows-Defender-Advanced-Threat/ct-p/WindowsDefenderAdvanced).
|
> - Learn about the latest enhancements in Microsoft Defender ATP: [Microsoft Defender Advanced Threat Protection Tech Community](https://techcommunity.microsoft.com/t5/Windows-Defender-Advanced-Threat/ct-p/WindowsDefenderAdvanced).
|
||||||
> - Microsoft Defender ATP demonstrated industry-leading optics and detection capabilities in the recent MITRE evaluation. Read: [Insights from the MITRE ATT&CK-based evaluation](https://cloudblogs.microsoft.com/microsoftsecure/2018/12/03/insights-from-the-mitre-attack-based-evaluation-of-windows-defender-atp/).
|
> - Microsoft Defender ATP demonstrated industry-leading optics and detection capabilities in the recent MITRE evaluation. Read: [Insights from the MITRE ATT&CK-based evaluation](https://cloudblogs.microsoft.com/microsoftsecure/2018/12/03/insights-from-the-mitre-attack-based-evaluation-of-windows-defender-atp/).
|
||||||
|
|
||||||
## Licensing requirements
|
## Licensing requirements
|
||||||
@ -54,7 +54,7 @@ Microsoft Defender Advanced Threat Protection, on Windows Server, requires one o
|
|||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> Customers with a combined minimum of 50 licenses for one or more of the following may acquire Server SLs for Microsoft Defender Advanced Threat Protection for Servers (one per covered Server OSE): Microsoft Defender Advanced Threat Protection, Windows E5/A5, Microsoft 365 E5/A5 and Microsoft 365 E5 Security User SLs. This license applies to Microsoft Defender ATP for Linux.
|
> Customers with a combined minimum of 50 licenses for one or more of the following may acquire Server SLs for Microsoft Defender Advanced Threat Protection for Servers (one per covered Server OSE): Microsoft Defender Advanced Threat Protection, Windows E5/A5, Microsoft 365 E5/A5 and Microsoft 365 E5 Security User SLs. This license applies to Microsoft Defender ATP for Linux.
|
||||||
|
|
||||||
For detailed licensing information, see the [Product terms page](https://www.microsoft.com/licensing/product-licensing/products) and work with your account team to learn the detailed terms and conditions for the product.
|
For detailed licensing information, see the [Product Terms site](https://www.microsoft.com/licensing/terms/) and work with your account team to learn the detailed terms and conditions for the product.
|
||||||
|
|
||||||
For more information on the array of features in Windows 10 editions, see [Compare Windows 10 editions](https://www.microsoft.com/windowsforbusiness/compare).
|
For more information on the array of features in Windows 10 editions, see [Compare Windows 10 editions](https://www.microsoft.com/windowsforbusiness/compare).
|
||||||
|
|
||||||
@ -103,11 +103,11 @@ The hardware requirements for Microsoft Defender ATP on devices are the same for
|
|||||||
|
|
||||||
|
|
||||||
### Other supported operating systems
|
### Other supported operating systems
|
||||||
- macOSX
|
- macOS
|
||||||
- Linux (currently, Microsoft Defender ATP is only available in the Public Preview Edition for Linux)
|
- Linux (currently, Microsoft Defender ATP is only available in the Public Preview Edition for Linux)
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> You'll need to know the exact Linux distros, Android, and macOS versions that are compatible with Microsoft Defender ATP for the integration to work.
|
> You'll need to know the exact Linux distributions and versions of Android and macOS that are compatible with Microsoft Defender ATP for the integration to work.
|
||||||
>
|
>
|
||||||
> Also note that Microsoft Defender ATP is currently only available in the Public Preview Edition for Linux.
|
> Also note that Microsoft Defender ATP is currently only available in the Public Preview Edition for Linux.
|
||||||
|
|
||||||
@ -132,19 +132,19 @@ By default, this service is enabled. It's good practice to check to ensure that
|
|||||||
|
|
||||||
1. Open an elevated command-line prompt on the device:
|
1. Open an elevated command-line prompt on the device:
|
||||||
|
|
||||||
a. Go to **Start** and type **cmd**.
|
1. Go to **Start** and type **cmd**.
|
||||||
|
|
||||||
b. Right-click **Command prompt** and select **Run as administrator**.
|
1. Right-click **Command prompt** and select **Run as administrator**.
|
||||||
|
|
||||||
2. Enter the following command, and press **Enter**:
|
2. Enter the following command, and press **Enter**:
|
||||||
|
|
||||||
```text
|
```console
|
||||||
sc qc diagtrack
|
sc qc diagtrack
|
||||||
```
|
```
|
||||||
|
|
||||||
If the service is enabled, then the result should look like the following screenshot:
|
If the service is enabled, then the result should look like the following screenshot:
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
|
|
||||||
You'll need to set the service to automatically start if the **START_TYPE** is not set to **AUTO_START**.
|
You'll need to set the service to automatically start if the **START_TYPE** is not set to **AUTO_START**.
|
||||||
@ -154,19 +154,19 @@ You'll need to set the service to automatically start if the **START_TYPE** is n
|
|||||||
|
|
||||||
1. Open an elevated command-line prompt on the endpoint:
|
1. Open an elevated command-line prompt on the endpoint:
|
||||||
|
|
||||||
a. Go to **Start** and type **cmd**.
|
1. Go to **Start** and type **cmd**.
|
||||||
|
|
||||||
b. Right-click **Command prompt** and select **Run as administrator**.
|
1. Right-click **Command prompt** and select **Run as administrator**.
|
||||||
|
|
||||||
2. Enter the following command, and press **Enter**:
|
2. Enter the following command, and press **Enter**:
|
||||||
|
|
||||||
```text
|
```console
|
||||||
sc config diagtrack start=auto
|
sc config diagtrack start=auto
|
||||||
```
|
```
|
||||||
|
|
||||||
3. A success message is displayed. Verify the change by entering the following command, and press **Enter**:
|
3. A success message is displayed. Verify the change by entering the following command, and press **Enter**:
|
||||||
|
|
||||||
```text
|
```console
|
||||||
sc qc diagtrack
|
sc qc diagtrack
|
||||||
```
|
```
|
||||||
|
|
||||||
|
Reference in New Issue
Block a user