Skip to content

Commit 708e228

Browse files
committed
Update server-migration.md
1 parent 7bfe057 commit 708e228

File tree

1 file changed

+30
-23
lines changed

1 file changed

+30
-23
lines changed

defender-endpoint/server-migration.md

Lines changed: 30 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -55,59 +55,65 @@ To facilitate upgrades when Microsoft Endpoint Configuration Manager isn't yet a
5555

5656
6. Apply the onboarding script **for use with Group Policy** downloaded from the [Microsoft Defender portal](https://security.microsoft.com).
5757

58-
To use the script, download it to an installation directory where you have also placed the installation and onboarding packages (see [Configure server endpoints](configure-server-endpoints.md)).
58+
To use the script, download it to an installation directory where you have also placed the installation and onboarding packages (see [Configure server endpoints](configure-server-endpoints.md)).
5959

60-
EXAMPLE: .\install.ps1 -RemoveMMA <YOUR_WORKSPACE_ID> -OnboardingScript ".\WindowsDefenderATPOnboardingScript.cmd"
60+
EXAMPLE: `.\install.ps1 -RemoveMMA <YOUR_WORKSPACE_ID> -OnboardingScript ".\WindowsDefenderATPOnboardingScript.cmd"`
6161

62-
For more information on how to use the script, use the PowerShell command "get-help .\install.ps1".
62+
For more information on how to use the script, use the PowerShell command `get-help .\install.ps1`.
6363

6464
## Microsoft Endpoint Configuration Manager migration scenarios
6565

6666
> [!NOTE]
67-
> You'll need Microsoft Endpoint Configuration Manager, version 2107 or later to perform Endpoint Protection policy configuration. From [version 2207 or later](/mem/configmgr/core/plan-design/changes/whats-new-in-version-2207#improved-microsoft-defender-for-endpoint-mde-onboarding-for-windows-server-2012-r2-and-windows-server-2016) deployment and upgrades can be fully automated.
67+
> You'll need Configuration Manager, version 2107 or later to perform Endpoint Protection policy configuration. From [version 2207 or later](/mem/configmgr/core/plan-design/changes/whats-new-in-version-2207#improved-microsoft-defender-for-endpoint-mde-onboarding-for-windows-server-2012-r2-and-windows-server-2016) deployment and upgrades can be fully automated.
6868
69-
For instructions on how to migrate using Microsoft Endpoint Configuration Manager older than version 2207, see [Migrating servers from Microsoft Monitoring Agent to the unified solution.](application-deployment-via-mecm.md)
69+
For instructions on how to migrate using Configuration Manager older than version 2207, see [Migrating servers from Microsoft Monitoring Agent to the unified solution.](application-deployment-via-mecm.md)
7070

7171
## If you are running a non-Microsoft antivirus solution
7272

7373
1. Fully update the machine including Microsoft Defender Antivirus (Windows Server 2016) ensuring [prerequisites](configure-server-endpoints.md#prerequisites) have been met. For more information on the prerequisites that have to be met, see [Prerequisites for Windows Server 2016](configure-server-endpoints.md#prerequisites-for-windows-server-2016-and-windows-server-2012-r2).
7474

75-
2. Ensure third-party antivirus management no longer pushes antivirus agents to these machines.*
75+
2. Ensure your non-Microsoft antivirus management solution no longer pushes antivirus agents to these machines.
7676

77-
3. Author your policies for the protection capabilities in Microsoft Defender for Endpoint and target those to the machine in the tool of your choice.
77+
3. Author your policies for the protection capabilities in Defender for Endpoint and target those to the machine in the tool of your choice.
7878

79-
4. Install the Microsoft Defender for Endpoint for Windows Server 2012 R2 and 2016 package and **enable passive mode**. See [Install Microsoft Defender Antivirus using command line](configure-server-endpoints.md#install-microsoft-defender-for-endpoint-using-the-command-line).
79+
4. Install the Defender for Endpoint package for Windows Server 2012 R2 and Windows Server 2016, and set it to passive mode.
8080

81+
See [Install Microsoft Defender Antivirus using command line](configure-server-endpoints.md#install-microsoft-defender-for-endpoint-using-the-command-line).
8182

82-
a. Apply the onboarding script **for use with Group Policy** downloaded from [Microsoft Defender XDR](https://security.microsoft.com).
83+
5. Apply the onboarding script **for use with Group Policy** downloaded from the [Microsoft Defender portal](https://security.microsoft.com).
8384

84-
5. Apply updates.
85+
6. Apply updates.
8586

86-
6. Remove your non-Microsoft antivirus software by either using the non-Microsoft antivirus console or by using Microsoft Endpoint Configuration Manager as appropriate. Make sure to remove passive mode configuration.*
87+
7. Remove your non-Microsoft antivirus software by either using the non-Microsoft antivirus console or by using Configuration Manager as appropriate. Make sure to remove passive mode configuration.
8788

88-
> [!TIP]
89-
> You can use the [installer-script](server-migration.md#installer script) as part of your application to automate the above steps. To enable passive mode, apply the -Passive flag. For example, .\install.ps1 -RemoveMMA <YOUR_WORKSPACE_ID> -OnboardingScript ".\WindowsDefenderATPOnboardingScript.cmd" -Passive
89+
To move a machine out of passive mode, set the following key:
9090

91-
*These steps only apply if you intend to replace your non-Microsoft antivirus solution. See [Better together: Microsoft Defender Antivirus and Microsoft Defender for Endpoint](why-use-microsoft-defender-antivirus.md).
91+
Path: `HKLM\SOFTWARE\Policies\Microsoft\Windows Advanced Threat Protection`
92+
Name: `ForceDefenderPassiveMode`
93+
Type: `REG_DWORD`
94+
Value: `0`
9295

93-
To move a machine out of passive mode, set the following key to 0:
96+
> [!TIP]
97+
> You can use the [installer-script](server-migration.md#installer script) as part of your application to automate the above steps. To enable passive mode, apply the -Passive flag. For example, `.\install.ps1 -RemoveMMA <YOUR_WORKSPACE_ID> -OnboardingScript ".\WindowsDefenderATPOnboardingScript.cmd" -Passive`.
9498
95-
Path: `HKLM\SOFTWARE\Policies\Microsoft\Windows Advanced Threat Protection`
96-
Name: `ForceDefenderPassiveMode`
97-
Type: `REG_DWORD`
98-
Value: `0`
99+
In the preceding procedure, steps 2 and 7 apply only if you intend to replace your non-Microsoft antivirus solution. See [Better together: Microsoft Defender Antivirus and Microsoft Defender for Endpoint](why-use-microsoft-defender-antivirus.md).
99100

100-
## If you are running System Center Endpoint Protection but aren't managing the machine using Microsoft Endpoint Configuration Manager (MECM/ConfigMgr)
101+
## If you are running System Center Endpoint Protection but aren't managing the machine using Configuration Manager (MECM/ConfigMgr)
101102

102103
1. Fully update the machine including Microsoft Defender Antivirus (Windows Server 2016) ensuring [prerequisites](configure-server-endpoints.md#prerequisites) have been met.
103-
2. Create and apply policies using Group Policy, PowerShell, or a 3rd party management solution.
104+
105+
2. Create and apply policies using Group Policy, PowerShell, or a non-Microsoft management solution.
106+
104107
3. Uninstall System Center Endpoint Protection (Windows Server 2012 R2).
108+
105109
4. Install Microsoft Defender for Endpoint (see [Configure server endpoints](configure-server-endpoints.md).)
106-
5. Apply the onboarding script **for use with Group Policy** downloaded from [Microsoft Defender XDR](https://security.microsoft.com).
110+
111+
5. Apply the onboarding script **for use with Group Policy** downloaded from the [Microsoft Defender portal](https://security.microsoft.com).
112+
107113
6. Apply updates.
108114

109115
> [!TIP]
110-
> You can use the installer script to automate the above steps.
116+
> You can use the installer script to automate the steps in the preceding procedure.
111117
112118
## Microsoft Defender for Cloud scenarios
113119

@@ -118,4 +124,5 @@ If you're using Microsoft Defender for Cloud, you can use the automated upgrade
118124
## Group Policy configuration
119125

120126
For configuration using Group Policy, ensure you're using the latest ADMX files in your central store to access the correct Defender for Endpoint policy options. For reference, see [How to create and manage the Central Store for Group Policy Administrative Templates in Windows](/troubleshoot/windows-client/group-policy/create-and-manage-central-store) and download the latest files **for use with Windows 10**.
127+
121128
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]

0 commit comments

Comments
 (0)