mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-16 19:03:46 +00:00
update section name
This commit is contained in:
@ -76,9 +76,6 @@ needs.<br>
|
||||
|
||||
4. Add your test user or device.
|
||||
|
||||
>[!NOTE]
|
||||
>Azure Active Directory groups can contain users or devices, not combinations of both.
|
||||
|
||||
5. From the **Groups > All groups** pane, open your new group.
|
||||
|
||||
6. Select **Members > Add members**.
|
||||
@ -89,7 +86,7 @@ needs.<br>
|
||||
|
||||
8. Your testing group now has a member to test.
|
||||
|
||||
## Create a configuration policy
|
||||
## Create configuration policies
|
||||
In the following section, you'll create a number of configuration policies.
|
||||
First is a configuration policy to select which groups of users or devices will
|
||||
be onboarded to Microsoft Defender ATP. Then you will continue by creating several
|
||||
@ -116,10 +113,8 @@ different types of Endpoint security policies.
|
||||

|
||||
|
||||
>[!NOTE]
|
||||
>In this instance, this has been auto populated as Microsoft Defender ATP has already been integrated with Intune. For more information on the integration, see [Enable Microsoft Defender ATP in Intune](https://docs.microsoft.com/mem/intune/protect/advanced-threat-protection#enable-microsoft-defender-atp-in-intune). <br>
|
||||
>If you have not integrated Microsoft Defender ATP and Intune, complete [these
|
||||
steps](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-mdm#onboard-machines-using-microsoft-intune)
|
||||
to create and upload an onboarding blob.
|
||||
>In this instance, this has been auto populated as Microsoft Defender ATP has already been integrated with Intune. For more information on the integration, see [Enable Microsoft Defender ATP in Intune](https://docs.microsoft.com/mem/intune/protect/advanced-threat-protection-configure#to-enable-microsoft-defender-atp). <br>
|
||||
|
||||
|
||||

|
||||
|
||||
@ -184,9 +179,6 @@ different types of Endpoint security policies.
|
||||
|
||||
3. Select **Create Policy**.
|
||||
|
||||
>[!NOTE]
|
||||
>We will be setting these as Audit.
|
||||
|
||||
4. Select **Platform - Windows 10 and Later – Profile - Attack surface reduction
|
||||
rules > Create**.
|
||||
|
||||
@ -339,13 +331,13 @@ To confirm that the configuration policy has been applied to your test device, f
|
||||
|
||||
1. Before applying the policy on a test device, pen a PowerShell Window and type `Get-MpPreference`.
|
||||
|
||||
2. This should respond with the following lines with no content
|
||||
2. This should respond with the following lines with no content:
|
||||
|
||||
1. AttackSurfaceReductionOnlyExclusions:
|
||||
AttackSurfaceReductionOnlyExclusions:
|
||||
|
||||
2. AttackSurfaceReductionRules_Actions:
|
||||
AttackSurfaceReductionRules_Actions:
|
||||
|
||||
3. AttackSurfaceReductionRules_Ids:
|
||||
AttackSurfaceReductionRules_Ids:
|
||||
|
||||

|
||||
|
||||
|
Reference in New Issue
Block a user