diff --git a/windows/keep-secure/configure-endpoints-windows-advanced-threat-protection.md b/windows/keep-secure/configure-endpoints-windows-advanced-threat-protection.md index 6cc137aa42..fa502c8b9f 100644 --- a/windows/keep-secure/configure-endpoints-windows-advanced-threat-protection.md +++ b/windows/keep-secure/configure-endpoints-windows-advanced-threat-protection.md @@ -4,7 +4,7 @@ description: Use Group Policy to deploy the configuration package or do manual r keywords: configure endpoints, client onboarding, configure Windows ATP endpoints, configure Windows Defender Advanced Threat Protection endpoints search.product: eADQiWindows 10XVcnh ms.prod: W10 -ms.mktglfcycl: +ms.mktglfcycl: deploy ms.sitesec: library author: mjcaparas --- @@ -17,6 +17,27 @@ author: mjcaparas You can use a Group Policy (GP) configuration package or an automated script to configure endpoints. You can deploy the GP configuration package or script with a GP update, or manually through the command line. +## Configure with System Center Configuration Manager (SCCM) + +1. Open the SCCM configuration package .zip file (*WindowsATPOnboardingPackage.zip*) that you downloaded from the service onboarding wizard. You can also get the package from the [Windows Defender ATP portal](https://seville.windows.com): Naama: Confirm package name + + a. Click **Client onboarding** on the **Navigation pane**. + + b. Select **SCCM**, click **Download package**, and save the .zip file. Iaan: Need to confirm the UI for this + +2. Copy the .zip file to a shared, read-only location that can be accessed by the network administrators who will deploy the package. + +Iaan: Will confirm ui for this + +3. In the SCCM console, go to **Software Library**. +4. Under **Application Management**, right-click **Packages** and select **Import**. +5. Click **Browse** and choose the package that was downloaded from the portal (zip file). +6. The package will appear under the Packages page. +7. Right-click the Package and choose deploy. +8. Choose a predefined device collection to deploy the package to. + +Naama note: If it’s a package we create then we’ll set the necessary privileges, otherwise provide guidance (Omri: what is the necessary privileges?) + ## Configure with Group Policy Using the GP configuration package ensures your endpoints will be correctly configured to report to the Windows Defender ATP service. @@ -46,27 +67,6 @@ Using the GP configuration package ensures your endpoints will be correctly conf For additional settings, see the [Additional configuration settings section](additional-configuration-windows-advanced-threat-protection.md). -## Configure with System Center Configuration Manager (SCCM) - -1. Open the SCCM configuration package .zip file (*WindowsATPOnboardingPackage.zip*) that you downloaded from the service onboarding wizard. You can also get the package from the [Windows Defender ATP portal](https://seville.windows.com): Naama: Confirm package name - - a. Click **Client onboarding** on the **Navigation pane**. - - b. Select **SCCM**, click **Download package**, and save the .zip file. Iaan: Need to confirm the UI for this - -2. Copy the .zip file to a shared, read-only location that can be accessed by the network administrators who will deploy the package. - -Iaan: Will confirm ui for this - -3. In the SCCM console, go to **Software Library**. -4. Under **Application Management**, right-click **Packages** and select **Import**. -5. Click **Browse** and choose the package that was downloaded from the portal (zip file). -6. The package will appear under the Packages page. -7. Right-click the Package and choose deploy. -8. Choose a predefined device collection to deploy the package to. - -Naama note: If it’s a package we create then we’ll set the necessary privileges, otherwise provide guidance (Omri: what is the necessary privileges?) - ## Configure endpoints manually with registry changes You can also manually onboard individual endpoints to Windows Defender ATP. You might want to do this first when testing the service before you commit to onboarding all endpoints in your network. diff --git a/windows/keep-secure/minimum-requirements-windows-defender-advanced-threat-protection.md b/windows/keep-secure/minimum-requirements-windows-defender-advanced-threat-protection.md index c483bf1efd..bf1d4c5eb8 100644 --- a/windows/keep-secure/minimum-requirements-windows-defender-advanced-threat-protection.md +++ b/windows/keep-secure/minimum-requirements-windows-defender-advanced-threat-protection.md @@ -4,7 +4,7 @@ description: Minimum network and data storage configuration, endpoint hardware a keywords: minimum requirements, Windows Defender Advanced Threat Protection minimum requirements, network and data storage, endpoint, endpoint configuration, deployment channel search.product: eADQiWindows 10XVcnh ms.prod: W10 -ms.mktglfcycl: +ms.mktglfcycl: deploy ms.sitesec: library --- diff --git a/windows/keep-secure/monitor-onboarding-windows-advanced-threat-protection.md b/windows/keep-secure/monitor-onboarding-windows-advanced-threat-protection.md index 0a95b9131a..d9c889806c 100644 --- a/windows/keep-secure/monitor-onboarding-windows-advanced-threat-protection.md +++ b/windows/keep-secure/monitor-onboarding-windows-advanced-threat-protection.md @@ -4,7 +4,7 @@ description: Monitor the onboarding of the Windows Defender ATP service to ensur keywords: monitor onboarding, monitor Windows Defender ATP onboarding, monitor Windows Defender Advanced Threat Protection onboarding search.product: eADQiWindows 10XVcnh ms.prod: W10 -ms.mktglfcycl: +ms.mktglfcycl: deploy ms.sitesec: library author: mjcaparas --- diff --git a/windows/keep-secure/onboard-configure-windows-advanced-threat-protection.md b/windows/keep-secure/onboard-configure-windows-advanced-threat-protection.md index 3d31d3693d..0dbde57476 100644 --- a/windows/keep-secure/onboard-configure-windows-advanced-threat-protection.md +++ b/windows/keep-secure/onboard-configure-windows-advanced-threat-protection.md @@ -6,10 +6,10 @@ search.product: eADQiWindows 10XVcnh ms.prod: W10 ms.mktglfcycl: ms.sitesec: library -author: mjcaparas +author: iaanw --- -# Onboard endpoints and set up the Windows Defender ATP user access +# Onboard and set up Windows Defender Advanced Threat Protection **Applies to** @@ -24,14 +24,14 @@ There are two stages to onboarding: 1. Set up user access in AAD and use a wizard to create a dedicated cloud instance for your network (known as “service onboarding”). -2. Add endpoints to the service with scheduled GP updates or manual +2. Add endpoints to the service with System Center Configuration Manager, scheduled GP updates, or manual registry changes (known as “endpoint onboarding”). ## In this section Topic | Description :---|:--- [Windows Defender ATP service onboarding](service-onboarding-windows-advanced-threat-protection.md) | Learn about managing user access to the Windows Defender ATP portal by assigning users to the Windows Defender ATP service application in ADD. -[Configure Windows Defender ATP endpoints (client onboarding)](configure-endpoints-windows-advanced-threat-protection.md) | You'll need to configure endpoints for it to report to the Windows Defender ATP service. Learn how you can use the configuration package to configure endpoints in your enterprise. +[Configure Windows Defender ATP endpoints (endpoint onboarding)](configure-endpoints-windows-advanced-threat-protection.md) | You'll need to configure endpoints for it to report to the Windows Defender ATP service. Learn how you can use the configuration package to configure endpoints in your enterprise. [Monitor the Windows Defender ATP onboarding](monitor-onboarding-windows-advanced-threat-protection.md) | Learn how you can monitor the onboarding to ensure your endpoints are correctly configured and are sending telemetry reports. [Additional Windows Defender ATP configuration settings](additional-configuration-windows-advanced-threat-protection.md) | This topic describes the steps you need to take to configure settings for sample sharing used in the deep analysis feature. [Troubleshoot Windows Defender Advanced Threat Protection onboarding issues](troubleshoot-onboarding-windows-advanced-threat-protection.md) | This topic contains information on how you can resolve issues that might arise during onboarding. diff --git a/windows/keep-secure/service-onboarding-windows-advanced-threat-protection.md b/windows/keep-secure/service-onboarding-windows-advanced-threat-protection.md index 92e31985a1..fd231a6601 100644 --- a/windows/keep-secure/service-onboarding-windows-advanced-threat-protection.md +++ b/windows/keep-secure/service-onboarding-windows-advanced-threat-protection.md @@ -4,14 +4,15 @@ description: Assign users to the Windows Defender ATP service application in Azu keywords: service onboarding, Windows Defender Advanced Threat Protection service onboarding search.product: eADQiWindows 10XVcnh ms.prod: W10 -ms.mktglfcycl: +ms.mktglfcycl: deploy ms.sitesec: library author: mjcaparas --- -# Windows Defender ATP service onboarding +# Windows Defender ATP service onboarding - Windows 10 Insider Preview +- Azure Active Directory [Some information relates to pre-released product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.]