You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: microsoft-365/commerce/licenses/product-keys-faq.yml
+8-8Lines changed: 8 additions & 8 deletions
Original file line number
Diff line number
Diff line change
@@ -34,7 +34,7 @@ sections:
34
34
For more information, see [Online Service Activation for Open programs FAQ](/licensing/online-service-activation-faq).
35
35
36
36
- question: |
37
-
How do I find product keys in the Microsoft 365 admin center?
37
+
How to find product keys in the Microsoft 365 admin center
38
38
answer: |
39
39
1. Sign into the Microsoft 365 admin center.
40
40
2. Go to **Billing** > **Your products** > **Volume licensing** > **Downloads & keys** > hover on product and select **View keys**.
@@ -44,14 +44,14 @@ sections:
44
44
Select **Download all product keys** to download the keys displayed for a license to a local drive.
45
45
46
46
- question: |
47
-
How do I find SQL Server product keys?
47
+
How to find SQL Server product keys
48
48
answer: |
49
49
The SQL license key is embedded in the software's activation wizard rather than displayed in the admin center and is detected automatically during installation. For more information, see [The SQL Server Installation Guide](/sql/database-engine/install-windows/install-sql-server).
50
50
51
51
You can also find the key by downloading the SQL ISO file from the admin center > ..\x64 folder > DefaultSetup.ini file. Make sure to back up any existing version before installing or upgrading SQL editions. If you need help with troubleshooting technical issues during product installation or online service activation, contact Microsoft Technical Support by submitting a [Technical Support request](https://support.microsoft.com/oas).
52
52
53
53
- question: |
54
-
How do I find a product key for Volume Licensing purchase?
54
+
How to find a product key for Volume Licensing purchase
55
55
answer: |
56
56
If your agreement authorizes access to a product that requires a key, you can find those keys by going to **Billing** > **Your products** > **Volume licensing** > **Downloads & keys**.
57
57
@@ -159,7 +159,7 @@ sections:
159
159
The number of activations available for a product won't always match the number of licenses purchased. Usually, you receive more activations in case you need to reinstall and activate some of your products. Check the Licensing Summary section of your agreement to view the number of licenses.
160
160
161
161
- question: |
162
-
How do I request an increase to MAK activation limits?
162
+
How to request an increase to MAK activation limits
163
163
answer: |
164
164
Increases to MAK activation quantity can be requested via web form and are granted by exception. For Canada and the United States, submit [Volume Licensing Support Requests](https://support.microsoft.com/supportrequestform/2afa6f15-b710-db46-909a-8346017c802f). For all other countries/regions, submit a [Support Web Form](/licensing/contact-us).
165
165
@@ -172,7 +172,7 @@ sections:
172
172
- Business justification or reason for deployment.
173
173
174
174
- question: |
175
-
How do I activate licenses using a Multiple Activation Key (MAK)?
175
+
How to activate licenses using a Multiple Activation Key (MAK)
176
176
answer: |
177
177
You can activate licenses in one of two ways using MAK:
178
178
@@ -223,7 +223,7 @@ sections:
223
223
- Run a Windows Server virtual machine on a newer version of Windows Server.
224
224
225
225
- question: |
226
-
How do I activate Windows Terminal Server and Remote Desktop Service (RDS)?
226
+
How to activate Windows Terminal Server and Remote Desktop Service (RDS)
227
227
answer: |
228
228
After you download your server media from the VLSC you can activate it by using the product activation wizard. You don't need to locate a volume license key or product set up key in the VLSC. Completing all the activation wizard steps prompts the Server to connect with the Microsoft Clearing House via the internet to validate the data. Alternatively, for offline servers the activation wizard offers phone or web activation.
229
229
@@ -249,7 +249,7 @@ sections:
249
249
For more information on re-imaging rights, see [Product licensing briefs](https://www.microsoft.com/licensing/docs/view/Licensing-Briefs).
250
250
251
251
- question: |
252
-
How do I download my keys to a local file?
252
+
How to download my keys to a local file
253
253
answer: |
254
254
The Microsoft 365 admin center offers an option to download product keys to a local file for later use. When you download product keys from the Downloads and Keys page, the file contains all Volume License Keys associated with agreements in your admin center profile. However, if you download keys from the Licensing ID view on the Relationship Summary page, the file contains only the keys associated with the Licensing ID you're viewing.
255
255
@@ -266,7 +266,7 @@ sections:
266
266
- name: Support
267
267
questions:
268
268
- question: |
269
-
How do I contact support?
269
+
How to contact support
270
270
answer: |
271
271
Microsoft 365 admin center customers can contact support by phone or by web form. Microsoft responds to web form submissions within 24 hours. To contact support, see [Contact Us](/licensing/contact-us).
Copy file name to clipboardExpand all lines: microsoft-365/security/defender-endpoint/defender-endpoint-demonstration-attack-surface-reduction-rules.md
+13-5Lines changed: 13 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -19,15 +19,17 @@ ms.collection:
19
19
- demo
20
20
ms.topic: article
21
21
ms.subservice: asr
22
-
ms.date: 10/21/2022
22
+
ms.date: 01/15/2024
23
23
---
24
24
25
25
# Attack surface reduction rules demonstrations
26
26
27
27
**Applies to:**
28
28
29
-
-[Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)
30
29
-[Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)
30
+
-[Microsoft Defender for Business](https://www.microsoft.com/security/business/endpoint-security/microsoft-defender-business)
31
+
-[Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)
-[Microsoft Defender for Individuals](https://www.microsoft.com/microsoft-365/microsoft-defender-for-individuals)
31
34
32
35
Block at First Sight, is a feature of Microsoft Defender Antivirus cloud-delivered protection that provides a way to detect and block new malware within seconds. You can test that it is working as expected by downloading a fake malware file.
33
36
34
37
## Scenario requirements and setup
35
38
36
-
- Windows 10 Anniversary update (1607) or later
39
+
- Windows 11, Windows 10 Anniversary update (1607) or later
40
+
- Windows Server 2022, Windows Server 2019, Windows Server 2016, and Windows Server 2012 R2 with the new unified Defender for Endpoint client.
41
+
37
42
- Cloud protection is enabled
38
43
- You can [download and use the Powershell script](https://www.powershellgallery.com/packages/WindowsDefender_InternalEvaluationSettings/) to enable this setting and others
Copy file name to clipboardExpand all lines: microsoft-365/security/defender-endpoint/defender-endpoint-demonstration-potentially-unwanted-applications.md
+8-3Lines changed: 8 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -26,15 +26,20 @@ ms.date: 11/20/2023
26
26
27
27
**Applies to:**
28
28
29
-
-[Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)
30
29
-[Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)
30
+
-[Microsoft Defender for Business](https://www.microsoft.com/security/business/endpoint-security/microsoft-defender-business)
31
+
-[Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)
-[Microsoft Defender for Individuals](https://www.microsoft.com/microsoft-365/microsoft-defender-for-individuals)
31
34
32
35
The Potentially Unwanted Applications (PUA) protection feature in Microsoft Defender Antivirus can identify and block PUAs from downloading and installing on endpoints in your network. These applications aren't considered viruses, malware, or other types of threats, but might perform actions on endpoints that adversely affect their performance or use.
33
36
34
37
## Scenario requirements and setup
35
38
36
-
- Windows 10, Windows 11
37
-
39
+
- Windows 11 or Windows 10
40
+
- Windows Server 2022, Windows Server 2019, Windows Server 2016, Windows Server 2012 R2, and Windows Server 2008 R2 SP1
41
+
- macOS
42
+
- Linux
38
43
- Enable PUA protection. For more information, see the [Detect and block Potentially Unwanted Applications](detect-block-potentially-unwanted-apps-microsoft-defender-antivirus.md) article.
39
44
- You can also [download and use the PowerShell script](https://www.powershellgallery.com/packages/WindowsDefender_InternalEvaluationSettings/) to enable this setting and others.
Copy file name to clipboardExpand all lines: microsoft-365/security/defender-endpoint/defender-endpoint-demonstration-smartscreen-url-reputation.md
+5-3Lines changed: 5 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -19,20 +19,22 @@ ms.collection:
19
19
- demo
20
20
ms.topic: article
21
21
ms.subservice: asr
22
-
ms.date: 10/21/2022
22
+
ms.date: 01/15/2024
23
23
---
24
24
25
25
# URL reputation demonstrations
26
26
27
27
**Applies to:**
28
28
29
-
-[Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)
30
29
-[Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)
30
+
-[Microsoft Defender for Business](https://www.microsoft.com/security/business/endpoint-security/microsoft-defender-business)
31
+
-[Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)
31
32
32
33
Test how Microsoft Defender SmartScreen helps you identify phishing and malware websites based on URL reputation.
33
34
Scenario requirements and setup
34
35
35
-
- Windows 10 or 11
36
+
- Windows 11 or Windows
37
+
- Windows Server 2022, Windows Server 2019, Windows Server 2016, Windows Server 2012 R2 and Windows Server 2008 R2 SP1.
36
38
- Microsoft Edge browser required
37
39
- For more information, see [Microsoft Defender SmartScreen](/windows/security/threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-overview)
# EDR detection test for verifying device's onboarding and reporting services
25
26
27
+
#### Applies to:
28
+
29
+
-[Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)
30
+
-[Microsoft Defender for Business](https://www.microsoft.com/security/business/endpoint-security/microsoft-defender-business)
31
+
32
+
## Scenario requirements and setup
33
+
34
+
- Windows 11, Windows 10 version 1709 build 16273 or newer, Windows 8.1, or Windows 7 SP1.
35
+
- Windows Server 2022, Windows Server 2019, Windows Server 2016, Windows Server 2012 R2, and Windows Server 2008 R2 SP1.
36
+
- Linux
37
+
- macOS
38
+
- Microsoft Defender for Endpoint
39
+
- Microsoft Defender for Endpoint on Linux
40
+
- Microsoft Defender for Endpoint on macOS
41
+
26
42
Endpoint detection and response for Endpoint provide advanced attack detections that are near real-time and actionable. Security analysts can prioritize alerts effectively, gain visibility into the full scope of a breach, and take response actions to remediate threats.
27
43
28
44
Run an EDR detection test to verify that the device is properly onboarded and reporting to the service. Perform the following steps on the newly onboarded device:
29
45
46
+
### Windows
47
+
48
+
1. Open a Command Prompt window
49
+
50
+
2. At the prompt, copy and run the command below. The Command Prompt window will close automatically.
3. If successful, the detection test will be marked as completed and a new alert will appear in few minutes.
58
+
59
+
### Linux
60
+
61
+
1. Download [script file](https://aka.ms/LinuxDIY) to an onboarded Linux server
62
+
63
+
64
+
```bash
65
+
curl -o ~/Downloads/MDE Linux DIY.zip https://aka.ms/LinuxDIY
66
+
```
67
+
68
+
1. Extract the zip
69
+
70
+
```bash
71
+
unzip ~/Downloads/MDE Linux DIY.zip
72
+
```
73
+
74
+
1. And run the following command:
75
+
76
+
```bash
77
+
./mde_linux_edr_diy.sh
78
+
```
79
+
80
+
After a few minutes, a detection should be raised in Microsoft Defender XDR.
81
+
82
+
3. Look at the alert details, machine timeline, and perform your typical investigation steps.
83
+
84
+
### macOS
85
+
30
86
1. In your browser, Microsoft Edge for Mac or Safari, download *MDATP MacOS DIY.zip* from [https://aka.ms/mdatpmacosdiy](https://aka.ms/mdatpmacosdiy) and extract.
31
87
32
88
The following prompt appears:
@@ -45,7 +101,7 @@ Run an EDR detection test to verify that the device is properly onboarded and re
45
101
>
46
102
> > **"MDATP MacOS DIY" cannot be opened because the developer cannot be verifier.**<br/>
47
103
> > macOS cannot verify that this app is free from malware.<br/>
0 commit comments