90 KiB
Threat protection
The Windows Defender Security Center app
Customize the Windows Defender Security Center app for your organization
Hide Windows Defender Security Center app notifications
Manage Windows Defender Security Center in Windows 10 in S mode
Virus and threat protection
Account protection
Firewall and network protection
App and browser control
Device security
Device performance and health
Family options
Windows Defender Advanced Threat Protection
###Get started
Minimum requirements
Validate licensing and complete setup
Troubleshoot subscription and portal access issues
Preview features
Data storage and privacy
Assign user access to the portal
Onboard machines
Onboard Windows 10 machines
Onboard machines using Group Policy
Onboard machines using System Center Configuration Manager
Onboard machines using Mobile Device Management tools
Onboard machines using Microsoft Intune
Onboard machines using a local script
Onboard non-persistent virtual desktop infrastructure (VDI) machines
Onboard servers
Onboard non-Windows machines
Run a detection test on a newly onboarded machine
Run simulated attacks on machines
Configure proxy and Internet connectivity settings
Troubleshoot onboarding issues
Understand the Windows Defender ATP portal
Portal overview
View the Security operations dashboard
View the Secure Score dashboard and improve your secure score
View the Threat analytics dashboard and take recommended mitigation actions
###Investigate and remediate threats ####Alerts queue
View and organize the Alerts queue
Manage alerts
Investigate alerts
Investigate files
Investigate machines
Investigate an IP address
Investigate a domain
Investigate a user account
####Machines list
View and organize the Machines list
Manage machine group and tags
Alerts related to this machine
Machine timeline
Search for specific events
Filter events from a specific date
Export machine timeline events
Navigate between pages
Take response actions
Take response actions on a machine
Collect investigation package
Run antivirus scan
Restrict app execution
Remove app restriction
Isolate machines from the network
Release machine from isolation
Check activity details in Action center
Take response actions on a file
Stop and quarantine files in your network
Remove file from quarantine
Block files in your network
Remove file from blocked list
Check activity details in Action center
Deep analysis
####### Submit files for analysis ####### View deep analysis reports ####### Troubleshoot deep analysis
Use Automated investigation to investigate and remediate threats
Query data using Advanced hunting
Advanced hunting reference
Advanced hunting query language best practices
Protect users, data, and devices with conditional access
###API and SIEM support
Pull alerts to your SIEM tools
Enable SIEM integration
Configure Splunk to pull alerts
Configure HP ArcSight to pull alerts
Windows Defender ATP alert API fields
Pull alerts using REST API
Troubleshoot SIEM tool integration issues
Use the threat intelligence API to create custom alerts
Understand threat intelligence concepts
Enable the custom threat intelligence application
Create custom threat intelligence alerts
PowerShell code examples
Python code examples
Experiment with custom threat intelligence alerts
Troubleshoot custom threat intelligence issues
Use the Windows Defender ATP exposed APIs
Supported Windows Defender ATP APIs
######Actor ####### Get actor information ####### Get actor related alerts ######Alerts ####### Get alerts ####### Get alert information by ID ####### Get alert related actor information ####### Get alert related domain information ####### Get alert related file information ####### Get alert related IP information ####### Get alert related machine information ######Domain ####### Get domain related alerts ####### Get domain related machines ####### Get domain statistics ####### Is domain seen in organization
######File ####### Block file API ####### Get file information ####### Get file related alerts ####### Get file related machines ####### Get file statistics ####### Get FileActions collection API ####### Unblock file API
######IP ####### Get IP related alerts ####### Get IP related machines ####### Get IP statistics ####### Is IP seen in organization ######Machines ####### Collect investigation package API ####### Find machine information by IP ####### Get machines ####### Get FileMachineAction object API ####### Get FileMachineActions collection API ####### Get machine by ID ####### Get machine log on users ####### Get machine related alerts ####### Get MachineAction object API ####### Get MachineActions collection API ####### Get machines ####### Get package SAS URI API ####### Isolate machine API ####### Release machine from isolation API ####### Remove app restriction API ####### Request sample API ####### Restrict app execution API ####### Run antivirus scan API ####### Stop and quarantine file API
######User ####### Get alert related user information ####### Get user information ####### Get user related alerts ####### Get user related machines
###Reporting
Create and build Power BI reports using Windows Defender ATP data
###Check service health and sensor state
Check sensor state
Fix unhealthy sensors
Inactive machines
Misconfigured machines
Check service health
Configure Windows Defender ATP Settings
####General
Update data retention settings
Configure alert notifications
Enable and create Power BI reports using Windows Defender ATP data
Enable Secure score security controls
Configure advanced features
####Permissions
Manage portal access using RBAC
Create and manage machine groups
####APIs
Enable Threat intel
Enable SIEM integration
####Rules
Manage suppression rules
Manage automation allowed/blocked
Manage automation file uploads
Manage automation folder exclusions
####Machine management
Onboarding machines
Offboarding machines
Configure Windows Defender ATP time zone settings
Access the Windows Defender ATP Community Center
Troubleshoot Windows Defender ATP
Review events and errors on machines with Event Viewer
Windows Defender Antivirus compatibility with Windows Defender ATP
Windows Defender Antivirus in Windows 10
Windows Defender AV in the Windows Defender Security Center app
Windows Defender AV on Windows Server 2016
Windows Defender Antivirus compatibility
Use limited periodic scanning in Windows Defender AV
Evaluate Windows Defender Antivirus protection
Deploy, manage updates, and report on Windows Defender Antivirus
Deploy and enable Windows Defender Antivirus
Deployment guide for VDI environments
Report on Windows Defender Antivirus protection
Troubleshoot Windows Defender Antivirus reporting in Update Compliance
Manage updates and apply baselines
Manage protection and definition updates
Manage when protection updates should be downloaded and applied
Manage updates for endpoints that are out of date
Manage event-based forced updates
Manage updates for mobile devices and VMs
Configure Windows Defender Antivirus features
Utilize Microsoft cloud-delivered protection
Enable cloud-delivered protection
Specify the cloud-delivered protection level
Configure and validate network connections
Enable the Block at First Sight feature
Configure the cloud block timeout period
Configure behavioral, heuristic, and real-time protection
Detect and block Potentially Unwanted Applications
Enable and configure always-on protection and monitoring
Configure end-user interaction with Windows Defender AV
Configure the notifications that appear on endpoints
Prevent users from seeing or interacting with the user interface
Prevent or allow users to locally modify policy settings
Customize, initiate, and review the results of scans and remediation
Configure and validate exclusions in Windows Defender AV scans
Configure and validate exclusions based on file name, extension, and folder location
Configure and validate exclusions for files opened by processes
Configure exclusions in Windows Defender AV on Windows Server 2016
Configure scanning options in Windows Defender AV
Configure remediation for scans
Configure scheduled scans
Configure and run scans
Review scan results
Run and review the results of a Windows Defender Offline scan
Restore quarantined files in Windows Defender AV
Review event logs and error codes to troubleshoot issues
Manage Windows Defender AV in your business
Use Group Policy settings to configure and manage Windows Defender AV
Use System Center Configuration Manager and Microsoft Intune to configure and manage Windows Defender AV
Use PowerShell cmdlets to configure and manage Windows Defender AV
Use Windows Management Instrumentation (WMI) to configure and manage Windows Defender AV
Use the mpcmdrun.exe commandline tool to configure and manage Windows Defender AV
Windows Defender Exploit Guard
Evaluate Windows Defender Exploit Guard
Use auditing mode to evaluate Windows Defender Exploit Guard
View Exploit Guard events
Exploit protection
Comparison with Enhanced Mitigation Experience Toolkit
Evaluate Exploit protection
Enable Exploit protection
Customize Exploit protection
Import, export, and deploy Exploit protection configurations
Attack surface reduction
Evaluate Attack surface reduction
Enable Attack surface reduction
Customize Attack surface reduction
Troubleshoot Attack surface reduction rules
Network Protection
Evaluate Network Protection
Enable Network Protection
Troubleshoot Network protection
Controlled folder access
Evaluate Controlled folder access
Enable Controlled folder access
Customize Controlled folder access
Memory integrity
Requirements for virtualization-based protection of code integrity
Enable virtualization-based protection of code integrity
Windows Defender Application Control
Control the health of Windows 10-based devices
Windows Defender Device Guard: virtualization-based security and WDAC
Windows Defender SmartScreen
Available Windows Defender SmartScreen Group Policy and mobile device management (MDM) settings
Set up and use Windows Defender SmartScreen on individual devices
##Windows Defender Application Guard ###System requirements for Windows Defender Application Guard ###Prepare and install Windows Defender Application Guard ###Configure the Group Policy settings for Windows Defender Application Guard ###Testing scenarios using Windows Defender Application Guard in your business or organization ###Frequently Asked Questions - Windows Defender Application Guard