You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/security-center/security-center-alerts-iaas.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -30,7 +30,7 @@ Security Center extends its cloud workload protection platforms by integrating w
30
30
> [!NOTE]
31
31
> Windows Server Defender ATP sensor is automatically enabled on Windows servers that use Security Center.
32
32
33
-
When Windows Server Defender ATP detects a threat, it triggers an alert. The alert is shown on the Security Center dashboard. From the dashboard, you can pivot to the Windows Defender ATP console, and perform a detailed investigation to uncover the scope of the attack. For more information about Windows Server Defender ATP, see [Onboard servers to the Windows Defender ATP service](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/configure-server-endpoints).
33
+
When Windows Server Defender ATP detects a threat, it triggers an alert. The alert is shown on the Security Center dashboard. From the dashboard, you can pivot to the Microsoft Defender ATP console, and perform a detailed investigation to uncover the scope of the attack. For more information about Windows Server Defender ATP, see [Onboard servers to the Microsoft Defender ATP service](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/configure-server-endpoints).
Copy file name to clipboardExpand all lines: articles/security-center/security-center-wdatp.md
+30-33Lines changed: 30 additions & 33 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
-
title: Windows Defender Advanced Threat Protection with Azure Security Center
3
-
description: This document introduces the integration between Azure Security Center and Windows Defender Advanced Threat Protection.
2
+
title: Microsoft Defender Advanced Threat Protection with Azure Security Center
3
+
description: This document introduces the integration between Azure Security Center and Microsoft Defender Advanced Threat Protection.
4
4
services: security-center
5
5
documentationcenter: na
6
6
author: memildin
@@ -10,48 +10,48 @@ ms.devlang: na
10
10
ms.topic: conceptual
11
11
ms.tgt_pltfrm: na
12
12
ms.workload: na
13
-
ms.date: 08/21/2019
13
+
ms.date: 09/24/2019
14
14
ms.author: memildin
15
15
---
16
-
# Windows Defender Advanced Threat Protection with Azure Security Center
16
+
# Microsoft Defender Advanced Threat Protection with Azure Security Center
17
17
18
-
Azure Security Center is extending its Cloud Workload Protection Platforms offering by integrating with [Windows Defender Advanced Threat Protection](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp) (ATP).
19
-
This change brings comprehensive Endpoint Detection and Response (EDR) capabilities. With Windows Defender ATP integration, you can spot abnormalities. You can also detect and respond to advanced attacks on server endpoints monitored by Azure Security Center.
18
+
Azure Security Center is extending its Cloud Workload Protection Platforms offering by integrating with [Microsoft Defender Advanced Threat Protection](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp) (ATP).
19
+
This change brings comprehensive Endpoint Detection and Response (EDR) capabilities. With Microsoft Defender ATP integration, you can spot abnormalities. You can also detect and respond to advanced attacks on server endpoints monitored by Azure Security Center.
20
20
21
-
## Windows Defender ATP features in Security Center
21
+
## Microsoft Defender ATP features in Security Center
22
22
23
-
When you use Windows Defender ATP you get:
23
+
When you use Microsoft Defender ATP you get:
24
24
25
-
-**Next-generation post breach detection sensors**: Windows Defender ATP sensors for Windows servers collect a vast array of behavioral signals.
25
+
-**Next-generation post breach detection sensors**: Microsoft Defender ATP sensors for Windows servers collect a vast array of behavioral signals.
26
26
27
-
-**Analytics-based, cloud-powered post breach detection**: Windows Defender ATP quickly adapts to changing threats. It uses advanced analytics and big data. Windows Defender ATP is amplified by the power of the Intelligent Security Graph with signals across Windows, Azure, and Office to detect unknown threats. It provides actionable alerts and enables you to respond quickly.
27
+
-**Analytics-based, cloud-powered post breach detection**: Microsoft Defender ATP quickly adapts to changing threats. It uses advanced analytics and big data. Microsoft Defender ATP is amplified by the power of the Intelligent Security Graph with signals across Windows, Azure, and Office to detect unknown threats. It provides actionable alerts and enables you to respond quickly.
28
28
29
-
-**Threat intelligence**: Windows Defender ATP identifies attacker tools, techniques, and procedures. When it detects these, it generates alerts. It uses data generated by Microsoft threat hunters and security teams, augmented by intelligence provided by partners.
29
+
-**Threat intelligence**: Microsoft Defender ATP identifies attacker tools, techniques, and procedures. When it detects these, it generates alerts. It uses data generated by Microsoft threat hunters and security teams, augmented by intelligence provided by partners.
30
30
31
31
These capabilities are now available in Azure Security Center:
32
32
33
-
-**Automated onboarding**: The Windows Defender ATP sensor is automatically enabled for Windows servers that are onboarded to Azure Security Center.
33
+
-**Automated onboarding**: The Microsoft Defender ATP sensor is automatically enabled for Windows servers that are onboarded to Azure Security Center.
34
34
35
-
-**Single pane of glass**: The Azure Security Center console displays Windows Defender ATP alerts.
35
+
-**Single pane of glass**: The Azure Security Center console displays Microsoft Defender ATP alerts.
36
36
37
-
-**Detailed machine investigation**: Azure Security Center customers can access Windows Defender ATP console to perform a detailed investigation to uncover the scope of a breach.
37
+
-**Detailed machine investigation**: Azure Security Center customers can access Microsoft Defender ATP console to perform a detailed investigation to uncover the scope of a breach.
38
38
39
39

40
40
41
-
You can further investigate the alert by pivoting to Windows Defender ATP. There you can see additional information such as the alert process tree and the incident graph. You can also see a detailed machine timeline that shows every behavior for a historical period of up to six months.
41
+
You can further investigate the alert by pivoting to Microsoft Defender ATP. There you can see additional information such as the alert process tree and the incident graph. You can also see a detailed machine timeline that shows every behavior for a historical period of up to six months.
42
42
43
-

43
+

44
44
45
45
## Platform support
46
46
47
-
Windows Defender ATP in Security Center supports detection on Windows Server 2016, 2012 R2, and 2008 R2 SP1 operating systems in a Standard service subscription.
47
+
Microsoft Defender ATP in Security Center supports detection on Windows Server 2016, 2012 R2, and 2008 R2 SP1 operating systems in a Standard service subscription.
48
48
49
49
> [!NOTE]
50
-
> When you use Azure Security Center to monitor servers, a Windows Defender ATP tenant is automatically created and the Windows Defender ATP data is stored in Europe by default. If you need to move your data to another location, you need to contact Microsoft Support to reset the tenant.
50
+
> When you use Azure Security Center to monitor servers, a Microsoft Defender ATP tenant is automatically created and the Microsoft Defender ATP data is stored in Europe by default. If you need to move your data to another location, you need to contact Microsoft Support to reset the tenant.
51
51
52
52
## Onboarding servers to Security Center
53
53
54
-
To onboard servers to Security Center, click **Go to Azure Security Center to onboard servers** from the Windows Defender ATP server onboarding.
54
+
To onboard servers to Security Center, click **Go to Azure Security Center to onboard servers** from the Microsoft Defender ATP server onboarding.
55
55
56
56
1. In the **Onboarding** blade select or create a workspace in which to store the data. <br>
57
57
2. If you can’t see all your workspaces, it may be due to a lack of permissions, make sure your workspace is set to Azure Security Standard tier. For more information see [Upgrade to Security Center's Standard tier for enhanced security](security-center-pricing.md).
@@ -62,35 +62,32 @@ To onboard servers to Security Center, click **Go to Azure Security Center to on
To view if Windows Defender ATP integration is enabled, select **Security center** > **Pricing & settings** > click on your subscription.
68
-
69
-

65
+
## Enable Microsoft Defender ATP integration
70
66
67
+
To view if Microsoft Defender ATP integration is enabled, select **Security center** > **Pricing & settings** > click on your subscription.
71
68
Here you can see the integrations currently enabled.
72
69
73
-

70
+

74
71
75
-
- If you've already onboarded the servers to Azure Security Center standard tier, you need take no further action. Azure Security Center will automatically onboard the servers to Windows Defender ATP. This might take up to 24 hours.
72
+
- If you've already onboarded the servers to Azure Security Center standard tier, you need take no further action. Azure Security Center will automatically onboard the servers to Microsoft Defender ATP. This might take up to 24 hours.
76
73
77
74
- If you've never onboarded the servers to Azure Security Center standard tier, onboard them to Azure Security Center as usual.
78
75
79
-
- If you've onboarded the servers through Windows Defender ATP:
76
+
- If you've onboarded the servers through Microsoft Defender ATP:
80
77
- Refer to the documentation for guidance on [how to offboard server machines](https://go.microsoft.com/fwlink/p/?linkid=852906).
81
78
- Onboard these servers to Azure Security Center.
82
79
83
-
## Access to the Windows Defender ATP portal
80
+
## Access to the Microsoft Defender ATP portal
84
81
85
-
Follow the instructions in [Assign user access to the portal](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/assign-portal-access-windows-defender-advanced-threat-protection).
82
+
Follow the instructions in [Assign user access to the portal](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/assign-portal-access).
86
83
87
84
## Set the firewall configuration
88
85
89
-
If you have a proxy or firewall that is blocking anonymous traffic, as a Windows Defender ATP sensor is connecting from the system context, make sure that anonymous traffic is permitted. Follow the instructions in [Enable access to Windows Defender ATP service URLs in the proxy server](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/configure-proxy-internet-windows-defender-advanced-threat-protection#enable-access-to-microsoft-defender-atp-service-urls-in-the-proxy-server).
86
+
If you have a proxy or firewall that is blocking anonymous traffic, as a Microsoft Defender ATP sensor is connecting from the system context, make sure that anonymous traffic is permitted. Follow the instructions in [Enable access to Microsoft Defender ATP service URLs in the proxy server](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/configure-proxy-internet#enable-access-to-microsoft-defender-atp-service-urls-in-the-proxy-server).
90
87
91
88
## Test the feature
92
89
93
-
To generate a benign Windows Defender ATP test alert:
90
+
To generate a benign Microsoft Defender ATP test alert:
94
91
95
92
1. Use Remote Desktop to access either a Windows Server 2012 R2 VM or a Windows Server 2016 VM. Open a Command Prompt window.
96
93
@@ -102,11 +99,11 @@ To generate a benign Windows Defender ATP test alert:
102
99
103
100

104
101
105
-
3. If the command is successful, you'll see a new alert on the Azure Security Center dashboard and the Windows Defender ATP portal. This alert might take a few minutes to appear.
102
+
3. If the command is successful, you'll see a new alert on the Azure Security Center dashboard and the Microsoft Defender ATP portal. This alert might take a few minutes to appear.
106
103
107
104
4. To review the alert in Security Center, go to **Security Alerts** > **Suspicious Powershell CommandLine**.
108
105
109
-
5. From the investigation window, select the link to go to the Windows Defender ATP portal.
106
+
5. From the investigation window, select the link to go to the Microsoft Defender ATP portal.
Copy file name to clipboardExpand all lines: articles/security/fundamentals/operational-best-practices.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -93,7 +93,7 @@ The Free tier of Security Center offers limited security for only your Azure res
93
93
94
94
Use Security Center to get a central view of the security state of all your Azure resources. At a glance, verify that the appropriate security controls are in place and configured correctly, and quickly identify any resources that need attention.
95
95
96
-
Security Center also integrates with [Windows Defender Advanced Threat Protection (ATP)](../../security-center/security-center-wdatp.md), which provides comprehensive Endpoint Detection and Response (EDR) capabilities. With Windows Defender ATP integration, you can spot abnormalities. You can also detect and respond to advanced attacks on server endpoints monitored by Security Center.
96
+
Security Center also integrates with [Microsoft Defender Advanced Threat Protection (ATP)](../../security-center/security-center-wdatp.md), which provides comprehensive Endpoint Detection and Response (EDR) capabilities. With Microsoft Defender ATP integration, you can spot abnormalities. You can also detect and respond to advanced attacks on server endpoints monitored by Security Center.
97
97
98
98
Almost all enterprise organizations have a security information and event management (SIEM) system to help identify emerging threats by consolidating log information from diverse signal gathering devices. The logs are then analyzed by a data analytics system to help identify what’s “interesting” from the noise that is inevitable in all log gathering and analytics solutions.
99
99
@@ -119,7 +119,7 @@ The secure score, which is based on Center for Internet Security (CIS) controls,
119
119
**Detail**: Use [Azure Monitor to gather and export data](/azure/azure-monitor/overview#integrate-and-export-data). This practice is critical for enabling security incident investigation, and online log retention is limited. If you’re using Azure Sentinel, see [Connect data sources](../../sentinel/connect-data-sources.md).
120
120
121
121
**Best practice**: Speed up your investigation and hunting processes and reduce false positives by integrating Endpoint Detection and Response (EDR) capabilities into your attack investigation.
122
-
**Detail**: [Enable Windows Defender ATP integration](../../security-center/security-center-wdatp.md#enable-windows-defender-atp-integration) via your Security Center security policy. Consider using Azure Sentinel for threat hunting and incident response.
122
+
**Detail**: [Enable Microsoft Defender ATP integration](../../security-center/security-center-wdatp.md#enable-microsoft-defender-atp-integration) via your Security Center security policy. Consider using Azure Sentinel for threat hunting and incident response.
Customers build an end-to-end network in Azure by combining network resources like a virtual network, ExpressRoute, Application Gateway, and load balancers. Monitoring is available on each of the network resources.
0 commit comments