Skip to content

Commit f534510

Browse files
committed
minor edits
1 parent 090006a commit f534510

1 file changed

Lines changed: 21 additions & 24 deletions

File tree

memdocs/configmgr/protect/deploy-use/defender-advanced-threat-protection.md

Lines changed: 21 additions & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ Instructions to [Onboarding to Microsoft Defender for Endpoint with Configuratio
4747

4848
Instructions to [Onboarding to Microsoft Defender for Endpoint with Configuration Manager 2203 and earlier versions](#bkmk_2203)
4949

50-
## <a name="bkmk_2207"></a> About onboarding to Microsoft Defender for Endpoint with Configuration Manager (2207 and later)
50+
## <a name="bkmk_2207"></a> Onboarding to Microsoft Defender for Endpoint with Configuration Manager 2207 and later versions
5151

5252
Different operating systems have different needs for onboarding to Microsoft Defender for Endpoint. Up-level devices, such as Windows Server version 1803, need the onboarding configuration file. Starting Current Branch 2207, For down-level server operating system devices, you can choose between Microsoft Defender for Endpoint (MDE) Client (recommended) or Microsoft Monitoring Agent (MMA) (legacy) in the Client Settings. For Windows 8.1 devices, you need to use Microsoft Monitoring Agent (MMA) (legacy) in the Client Settings.
5353

@@ -69,18 +69,17 @@ Down-level operating systems that support MDE Client include:
6969
Down-level operating systems that require MMA Agent:
7070
- Windows 8.1
7171

72-
> [!Note]
72+
> [!NOTE]
7373
> Currently, the [modern, unified Microsoft Defender for Endpoint for Windows Server 2012 R2 & 2016](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/defending-windows-server-2012-r2-and-2016/bc-p/2904464) is generally available. Configuration Manager version 2107 with the update rollup supports configuration using Endpoint Protection policies, including those policies created in the Microsoft Endpoint Manager admin center using tenant attach. Configuration Manager version 2207 now supports automatic deployment of MDE Client, if you choose to use through Client Settings. For older supported versions, see [Server migration scenarios](/microsoft-365/security/defender-endpoint/server-migration).
7474
7575
When you onboard devices to Microsoft Defender for Endpoint with Configuration Manager, you deploy the Defender policy to a target collection or multiple collections. Sometimes the target collection contains devices running any number of the supported operating systems. The instructions for onboarding these devices vary based on if you're targeting a collection containing devices with operating systems that are only up-level and devices that support MDE Client or if the collection also includes down-level clients that require MMA.
7676

7777
- If your collection contains only up-level devices and/or down-level server operating system devices that require MDE Client (based on the client settings), then you can use the [onboarding instructions using Microsoft Defender for Endpoint Client](#bkmk_2207_uplevel) (recommended).
7878
- If your target collection contains down-level server operating system devices that require MMA (based on the client settings) or Windows 8.1 devices, then use the instructions to [onboard devices using Microsoft Monitoring Agent](#bkmk_2207_any_os).
7979

80+
> [!WARNING]
81+
> If your target collection contains down-level devices that require MMA, and you use the instructions for onboarding using MDE Client, then the down-level devices won't be onboarded. The optional **Workspace key** and **Workspace ID** fields are used for onboarding down-level devices that require MMA, but if they aren't included then the policy will fail on down-level clients that require MMA.
8082
81-
> [!Warning]
82-
> - If your target collection contains down-level devices that require MMA, and you use the instructions for onboarding using MDE Client, then the down-level devices won't be onboarded. The optional **Workspace key** and **Workspace ID** fields are used for onboarding down-level devices that require MMA, but if they aren't included then the policy will fail on down-level clients that require MMA.
83-
>
8483

8584
### <a name="bkmk_2207_uplevel"></a> Onboard devices using MDE Client to Microsoft Defender for Endpoint (recommended)
8685

@@ -95,23 +94,23 @@ Down-level operating systems that support MDE Client include:
9594
- Windows Server 2012 R2
9695
- Windows Server 2016
9796

98-
### Get an onboarding configuration file for up-level devices
97+
#### Get an onboarding configuration file for up-level devices
9998

10099
1. Go to the [Microsoft Defender Security Center](https://securitycenter.windows.com/) and sign in.
101100
1. Select **Settings**, then select **Onboarding** under the **Endpoint** heading.
102101
1. For the operating system, select **Windows 10 and 11**.
103102
1. Choose **Microsoft Endpoint Configuration Manager current branch and later** for the deployment method.
104103
1. Select **Download package**.
105104
1. Download the compressed archive (.zip) file and extract the contents.
106-
> [!Note]
107-
> The steps have you download the onboarding file for Windows 10 and 11 but this file is also used for up-level Server operating systems.
105+
> [!NOTE]
106+
> The steps have you download the onboarding file for Windows 10 and 11 but this file is also used for up-level Server operating systems.
108107
109108
> [!IMPORTANT]
110109
> - The Microsoft Defender for Endpoint configuration file contains sensitive information which should be kept secure.
111110
> - If your target collection contains down-level devices that require MMA, and you use the instructions for onboarding using MDE Client, then the down-level devices won't be onboarded. The optional **Workspace key** and **Workspace ID** fields are used for onboarding down-level devices, but if they aren't included then the policy will fail on down-level clients.
112111
113112

114-
### Onboard the up-level devices
113+
#### Onboard the up-level devices
115114

116115
1. In the Configuration Manager console, navigate to **Administration** > **Client Settings**.
117116
1. Create custom Client Device Settings or go to the properties of the required client setting and select **Endpoint Protection**
@@ -127,9 +126,10 @@ Down-level operating systems that support MDE Client include:
127126
1. Right-click on the policy you created, then select **Deploy** to target the Microsoft Defender for Endpoint policy to clients.
128127

129128
### <a name="bkmk_2207_any_os"></a> Onboard devices with MDE Client and MMA to Microsoft Defender for Endpoint
129+
130130
You can onboard devices running any of the [supported operating systems](#bkmk_os) to Microsoft Defender for Endpoint by providing the configuration file, **Workspace key**, and **Workspace ID** to Configuration Manager.
131131

132-
### Get the configuration file, workspace ID, and workspace key
132+
#### Get the configuration file, workspace ID, and workspace key
133133

134134
1. Go to the [Microsoft Defender for Endpoint online service](https://security.microsoft.com/) and sign in.
135135
1. Select **Settings**, then select **Onboarding** under the **Endpoints** heading.
@@ -149,7 +149,7 @@ Down-level operating systems that support MDE Client include:
149149
> The Microsoft Defender for Endpoint configuration file contains sensitive information which should be kept secure.
150150
151151

152-
### Onboard the devices
152+
#### Onboard the devices
153153

154154
1. In the Configuration Manager console, navigate to **Administration** > **Client Settings**.
155155
1. Create custom Client Device Settings or go to the properties of the required client setting and select **Endpoint Protection**
@@ -184,22 +184,22 @@ Down-level operating systems include:
184184
- Windows Server 2012 R2
185185
- Windows Server 2016
186186

187-
> [!Note]
187+
> [!NOTE]
188188
> Currently, the [modern, unified Microsoft Defender for Endpoint for Windows Server 2012 R2 & 2016](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/defending-windows-server-2012-r2-and-2016/bc-p/2904464) is generally available. Configuration Manager version 2107 with the update rollup supports configuration using Endpoint Protection policies, including those policies created in the Microsoft Endpoint Manager admin center using tenant attach. For more information on how to deploy the preview, see [Server migration scenarios](/microsoft-365/security/defender-endpoint/server-migration).
189189
190190
When you onboard devices to Microsoft Defender for Endpoint with Configuration Manager, you deploy the Defender policy to a target collection or multiple collections. Sometimes the target collection contains devices running any number of the supported operating systems. The instructions for onboarding these devices vary based on if you're targeting a collection containing devices with operating systems that are only up-level or if the collection also includes down-level clients.
191191

192192
- If your target collection contains both up-level and down-level devices, then use the instructions to [onboard devices running any supported operating system](#bkmk_any_os) (recommended).
193193
- If your collection contains only up-level devices, then you can use the [up-level onboarding instructions](#bkmk_uplevel).
194194

195-
> [!Warning]
196-
> - If your target collection contains down-level devices, and you use the instructions for onboarding only up-level devices, then the down-level devices won't be onboarded. The optional **Workspace key** and **Workspace ID** fields are used for onboarding down-level devices, but if they aren't included then the policy will fail on down-level clients.
197-
>
195+
> [!WARNING]
196+
> If your target collection contains down-level devices, and you use the instructions for onboarding only up-level devices, then the down-level devices won't be onboarded. The optional **Workspace key** and **Workspace ID** fields are used for onboarding down-level devices, but if they aren't included then the policy will fail on down-level clients.
197+
198198

199199
### <a name="bkmk_any_os"></a> Onboard devices with any supported operating system to Microsoft Defender for Endpoint (recommended)
200200
You can onboard devices running any of the [supported operating systems](#bkmk_os) to Microsoft Defender for Endpoint by providing the configuration file, **Workspace key**, and **Workspace ID** to Configuration Manager.
201201

202-
### Get the configuration file, workspace ID, and workspace key
202+
#### Get the configuration file, workspace ID, and workspace key
203203

204204
1. Go to the [Microsoft Defender for Endpoint online service](https://security.microsoft.com/) and sign in.
205205
1. Select **Settings**, then select **Onboarding** under the **Endpoints** heading.
@@ -218,7 +218,7 @@ When you onboard devices to Microsoft Defender for Endpoint with Configuration M
218218
> The Microsoft Defender for Endpoint configuration file contains sensitive information which should be kept secure.
219219
220220

221-
### Onboard the devices
221+
#### Onboard the devices
222222

223223
1. In the Configuration Manager console, navigate to **Assets and Compliance** > **Endpoint Protection** > **Microsoft Defender ATP Policies**.
224224
1. Select **Create Microsoft Defender ATP Policy** to open the policy wizard.
@@ -234,9 +234,6 @@ When you onboard devices to Microsoft Defender for Endpoint with Configuration M
234234
1. Review the summary and complete the wizard.
235235
1. Right-click on the policy you created, then select **Deploy** to target the Microsoft Defender for Endpoint policy to clients.
236236

237-
> [!IMPORTANT]
238-
> - In Configuration Manager 2006, or earlier: <!--8715565-->
239-
> - If you edit an existing policy to add or edit the **Workspace key** and **Workspace ID** fields, you must also provide the configuration file too. If all three items are not provided, the policy will fail on down-level clients. > - If you need to edit the onboarding file, and also have the **Workspace key** and **Workspace ID** fields populated, provide them again along with the onboarding file. If all three items are not provided, the policy will fail on down-level clients. <!--8715565-->
240237

241238
### <a name="bkmk_uplevel"></a> Onboard devices running only up-level operating systems to Microsoft Defender for Endpoint
242239

@@ -249,23 +246,23 @@ Up-level clients require an onboarding configuration file for onboarding to Micr
249246

250247
If your target collection contains both up-level and down-level devices, or if you're not sure, then use the instructions to [onboard devices running any supported operating system (recommended)](#bkmk_any_os).
251248

252-
### Get an onboarding configuration file for up-level devices
249+
#### Get an onboarding configuration file for up-level devices
253250

254251
1. Go to the [Microsoft Defender Security Center](https://securitycenter.windows.com/) and sign in.
255252
1. Select **Settings**, then select **Onboarding** under the **Endpoint** heading.
256253
1. For the operating system, select **Windows 10 and 11**.
257254
1. Choose **Microsoft Endpoint Configuration Manager current branch and later** for the deployment method.
258255
1. Select **Download package**.
259256
1. Download the compressed archive (.zip) file and extract the contents.
260-
> [!Note]
261-
> The steps have you download the onboarding file for Windows 10 and 11 but this file is also used for up-level Server operating systems.
257+
> [!NOTE]
258+
> The steps have you download the onboarding file for Windows 10 and 11 but this file is also used for up-level Server operating systems.
262259
263260
> [!IMPORTANT]
264261
> - The Microsoft Defender for Endpoint configuration file contains sensitive information which should be kept secure.
265262
> - If your target collection contains down-level devices, and you use the instructions for onboarding only up-level devices, then the down-level devices won't be onboarded. The optional **Workspace key** and **Workspace ID** fields are used for onboarding down-level devices, but if they aren't included then the policy will fail on down-level clients.
266263
267264

268-
### Onboard the up-level devices
265+
#### Onboard the up-level devices
269266

270267
1. In the Configuration Manager console, navigate to **Assets and Compliance** > **Endpoint Protection** > **Microsoft Defender ATP Policies** and select **Create Microsoft Defender ATP Policy**. The policy wizard opens.
271268
1. Type the **Name** and **Description** for the Microsoft Defender for Endpoint policy and select **Onboarding**.

0 commit comments

Comments
 (0)