You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: memdocs/configmgr/protect/deploy-use/defender-advanced-threat-protection.md
+21-24Lines changed: 21 additions & 24 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -47,7 +47,7 @@ Instructions to [Onboarding to Microsoft Defender for Endpoint with Configuratio
47
47
48
48
Instructions to [Onboarding to Microsoft Defender for Endpoint with Configuration Manager 2203 and earlier versions](#bkmk_2203)
49
49
50
-
## <aname="bkmk_2207"></a> About onboarding to Microsoft Defender for Endpoint with Configuration Manager (2207 and later)
50
+
## <aname="bkmk_2207"></a> Onboarding to Microsoft Defender for Endpoint with Configuration Manager 2207 and later versions
51
51
52
52
Different operating systems have different needs for onboarding to Microsoft Defender for Endpoint. Up-level devices, such as Windows Server version 1803, need the onboarding configuration file. Starting Current Branch 2207, For down-level server operating system devices, you can choose between Microsoft Defender for Endpoint (MDE) Client (recommended) or Microsoft Monitoring Agent (MMA) (legacy) in the Client Settings. For Windows 8.1 devices, you need to use Microsoft Monitoring Agent (MMA) (legacy) in the Client Settings.
53
53
@@ -69,18 +69,17 @@ Down-level operating systems that support MDE Client include:
69
69
Down-level operating systems that require MMA Agent:
70
70
- Windows 8.1
71
71
72
-
> [!Note]
72
+
> [!NOTE]
73
73
> Currently, the [modern, unified Microsoft Defender for Endpoint for Windows Server 2012 R2 & 2016](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/defending-windows-server-2012-r2-and-2016/bc-p/2904464) is generally available. Configuration Manager version 2107 with the update rollup supports configuration using Endpoint Protection policies, including those policies created in the Microsoft Endpoint Manager admin center using tenant attach. Configuration Manager version 2207 now supports automatic deployment of MDE Client, if you choose to use through Client Settings. For older supported versions, see [Server migration scenarios](/microsoft-365/security/defender-endpoint/server-migration).
74
74
75
75
When you onboard devices to Microsoft Defender for Endpoint with Configuration Manager, you deploy the Defender policy to a target collection or multiple collections. Sometimes the target collection contains devices running any number of the supported operating systems. The instructions for onboarding these devices vary based on if you're targeting a collection containing devices with operating systems that are only up-level and devices that support MDE Client or if the collection also includes down-level clients that require MMA.
76
76
77
77
- If your collection contains only up-level devices and/or down-level server operating system devices that require MDE Client (based on the client settings), then you can use the [onboarding instructions using Microsoft Defender for Endpoint Client](#bkmk_2207_uplevel) (recommended).
78
78
- If your target collection contains down-level server operating system devices that require MMA (based on the client settings) or Windows 8.1 devices, then use the instructions to [onboard devices using Microsoft Monitoring Agent](#bkmk_2207_any_os).
79
79
80
+
> [!WARNING]
81
+
> If your target collection contains down-level devices that require MMA, and you use the instructions for onboarding using MDE Client, then the down-level devices won't be onboarded. The optional **Workspace key** and **Workspace ID** fields are used for onboarding down-level devices that require MMA, but if they aren't included then the policy will fail on down-level clients that require MMA.
80
82
81
-
> [!Warning]
82
-
> - If your target collection contains down-level devices that require MMA, and you use the instructions for onboarding using MDE Client, then the down-level devices won't be onboarded. The optional **Workspace key** and **Workspace ID** fields are used for onboarding down-level devices that require MMA, but if they aren't included then the policy will fail on down-level clients that require MMA.
83
-
>
84
83
85
84
### <aname="bkmk_2207_uplevel"></a> Onboard devices using MDE Client to Microsoft Defender for Endpoint (recommended)
86
85
@@ -95,23 +94,23 @@ Down-level operating systems that support MDE Client include:
95
94
- Windows Server 2012 R2
96
95
- Windows Server 2016
97
96
98
-
### Get an onboarding configuration file for up-level devices
97
+
####Get an onboarding configuration file for up-level devices
99
98
100
99
1. Go to the [Microsoft Defender Security Center](https://securitycenter.windows.com/) and sign in.
101
100
1. Select **Settings**, then select **Onboarding** under the **Endpoint** heading.
102
101
1. For the operating system, select **Windows 10 and 11**.
103
102
1. Choose **Microsoft Endpoint Configuration Manager current branch and later** for the deployment method.
104
103
1. Select **Download package**.
105
104
1. Download the compressed archive (.zip) file and extract the contents.
106
-
> [!Note]
107
-
> The steps have you download the onboarding file for Windows 10 and 11 but this file is also used for up-level Server operating systems.
105
+
> [!NOTE]
106
+
> The steps have you download the onboarding file for Windows 10 and 11 but this file is also used for up-level Server operating systems.
108
107
109
108
> [!IMPORTANT]
110
109
> - The Microsoft Defender for Endpoint configuration file contains sensitive information which should be kept secure.
111
110
> - If your target collection contains down-level devices that require MMA, and you use the instructions for onboarding using MDE Client, then the down-level devices won't be onboarded. The optional **Workspace key** and **Workspace ID** fields are used for onboarding down-level devices, but if they aren't included then the policy will fail on down-level clients.
112
111
113
112
114
-
### Onboard the up-level devices
113
+
####Onboard the up-level devices
115
114
116
115
1. In the Configuration Manager console, navigate to **Administration** > **Client Settings**.
117
116
1. Create custom Client Device Settings or go to the properties of the required client setting and select **Endpoint Protection**
@@ -127,9 +126,10 @@ Down-level operating systems that support MDE Client include:
127
126
1. Right-click on the policy you created, then select **Deploy** to target the Microsoft Defender for Endpoint policy to clients.
128
127
129
128
### <aname="bkmk_2207_any_os"></a> Onboard devices with MDE Client and MMA to Microsoft Defender for Endpoint
129
+
130
130
You can onboard devices running any of the [supported operating systems](#bkmk_os) to Microsoft Defender for Endpoint by providing the configuration file, **Workspace key**, and **Workspace ID** to Configuration Manager.
131
131
132
-
### Get the configuration file, workspace ID, and workspace key
132
+
####Get the configuration file, workspace ID, and workspace key
133
133
134
134
1. Go to the [Microsoft Defender for Endpoint online service](https://security.microsoft.com/) and sign in.
135
135
1. Select **Settings**, then select **Onboarding** under the **Endpoints** heading.
@@ -149,7 +149,7 @@ Down-level operating systems that support MDE Client include:
149
149
> The Microsoft Defender for Endpoint configuration file contains sensitive information which should be kept secure.
150
150
151
151
152
-
### Onboard the devices
152
+
####Onboard the devices
153
153
154
154
1. In the Configuration Manager console, navigate to **Administration** > **Client Settings**.
155
155
1. Create custom Client Device Settings or go to the properties of the required client setting and select **Endpoint Protection**
@@ -184,22 +184,22 @@ Down-level operating systems include:
184
184
- Windows Server 2012 R2
185
185
- Windows Server 2016
186
186
187
-
> [!Note]
187
+
> [!NOTE]
188
188
> Currently, the [modern, unified Microsoft Defender for Endpoint for Windows Server 2012 R2 & 2016](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/defending-windows-server-2012-r2-and-2016/bc-p/2904464) is generally available. Configuration Manager version 2107 with the update rollup supports configuration using Endpoint Protection policies, including those policies created in the Microsoft Endpoint Manager admin center using tenant attach. For more information on how to deploy the preview, see [Server migration scenarios](/microsoft-365/security/defender-endpoint/server-migration).
189
189
190
190
When you onboard devices to Microsoft Defender for Endpoint with Configuration Manager, you deploy the Defender policy to a target collection or multiple collections. Sometimes the target collection contains devices running any number of the supported operating systems. The instructions for onboarding these devices vary based on if you're targeting a collection containing devices with operating systems that are only up-level or if the collection also includes down-level clients.
191
191
192
192
- If your target collection contains both up-level and down-level devices, then use the instructions to [onboard devices running any supported operating system](#bkmk_any_os) (recommended).
193
193
- If your collection contains only up-level devices, then you can use the [up-level onboarding instructions](#bkmk_uplevel).
194
194
195
-
> [!Warning]
196
-
> -If your target collection contains down-level devices, and you use the instructions for onboarding only up-level devices, then the down-level devices won't be onboarded. The optional **Workspace key** and **Workspace ID** fields are used for onboarding down-level devices, but if they aren't included then the policy will fail on down-level clients.
197
-
>
195
+
> [!WARNING]
196
+
> If your target collection contains down-level devices, and you use the instructions for onboarding only up-level devices, then the down-level devices won't be onboarded. The optional **Workspace key** and **Workspace ID** fields are used for onboarding down-level devices, but if they aren't included then the policy will fail on down-level clients.
197
+
198
198
199
199
### <aname="bkmk_any_os"></a> Onboard devices with any supported operating system to Microsoft Defender for Endpoint (recommended)
200
200
You can onboard devices running any of the [supported operating systems](#bkmk_os) to Microsoft Defender for Endpoint by providing the configuration file, **Workspace key**, and **Workspace ID** to Configuration Manager.
201
201
202
-
### Get the configuration file, workspace ID, and workspace key
202
+
####Get the configuration file, workspace ID, and workspace key
203
203
204
204
1. Go to the [Microsoft Defender for Endpoint online service](https://security.microsoft.com/) and sign in.
205
205
1. Select **Settings**, then select **Onboarding** under the **Endpoints** heading.
@@ -218,7 +218,7 @@ When you onboard devices to Microsoft Defender for Endpoint with Configuration M
218
218
> The Microsoft Defender for Endpoint configuration file contains sensitive information which should be kept secure.
219
219
220
220
221
-
### Onboard the devices
221
+
####Onboard the devices
222
222
223
223
1. In the Configuration Manager console, navigate to **Assets and Compliance** > **Endpoint Protection** > **Microsoft Defender ATP Policies**.
224
224
1. Select **Create Microsoft Defender ATP Policy** to open the policy wizard.
@@ -234,9 +234,6 @@ When you onboard devices to Microsoft Defender for Endpoint with Configuration M
234
234
1. Review the summary and complete the wizard.
235
235
1. Right-click on the policy you created, then select **Deploy** to target the Microsoft Defender for Endpoint policy to clients.
236
236
237
-
> [!IMPORTANT]
238
-
> - In Configuration Manager 2006, or earlier: <!--8715565-->
239
-
> - If you edit an existing policy to add or edit the **Workspace key** and **Workspace ID** fields, you must also provide the configuration file too. If all three items are not provided, the policy will fail on down-level clients. > - If you need to edit the onboarding file, and also have the **Workspace key** and **Workspace ID** fields populated, provide them again along with the onboarding file. If all three items are not provided, the policy will fail on down-level clients. <!--8715565-->
240
237
241
238
### <aname="bkmk_uplevel"></a> Onboard devices running only up-level operating systems to Microsoft Defender for Endpoint
242
239
@@ -249,23 +246,23 @@ Up-level clients require an onboarding configuration file for onboarding to Micr
249
246
250
247
If your target collection contains both up-level and down-level devices, or if you're not sure, then use the instructions to [onboard devices running any supported operating system (recommended)](#bkmk_any_os).
251
248
252
-
### Get an onboarding configuration file for up-level devices
249
+
####Get an onboarding configuration file for up-level devices
253
250
254
251
1. Go to the [Microsoft Defender Security Center](https://securitycenter.windows.com/) and sign in.
255
252
1. Select **Settings**, then select **Onboarding** under the **Endpoint** heading.
256
253
1. For the operating system, select **Windows 10 and 11**.
257
254
1. Choose **Microsoft Endpoint Configuration Manager current branch and later** for the deployment method.
258
255
1. Select **Download package**.
259
256
1. Download the compressed archive (.zip) file and extract the contents.
260
-
> [!Note]
261
-
> The steps have you download the onboarding file for Windows 10 and 11 but this file is also used for up-level Server operating systems.
257
+
> [!NOTE]
258
+
> The steps have you download the onboarding file for Windows 10 and 11 but this file is also used for up-level Server operating systems.
262
259
263
260
> [!IMPORTANT]
264
261
> - The Microsoft Defender for Endpoint configuration file contains sensitive information which should be kept secure.
265
262
> - If your target collection contains down-level devices, and you use the instructions for onboarding only up-level devices, then the down-level devices won't be onboarded. The optional **Workspace key** and **Workspace ID** fields are used for onboarding down-level devices, but if they aren't included then the policy will fail on down-level clients.
266
263
267
264
268
-
### Onboard the up-level devices
265
+
####Onboard the up-level devices
269
266
270
267
1. In the Configuration Manager console, navigate to **Assets and Compliance** > **Endpoint Protection** > **Microsoft Defender ATP Policies** and select **Create Microsoft Defender ATP Policy**. The policy wizard opens.
271
268
1. Type the **Name** and **Description** for the Microsoft Defender for Endpoint policy and select **Onboarding**.
0 commit comments