Skip to content

Commit d0f78bb

Browse files
authored
Merge pull request #3369 from MicrosoftDocs/onboard-win-server
Onboard Win Server
2 parents 5cb3a9f + 51e24e3 commit d0f78bb

File tree

67 files changed

+396
-641
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

67 files changed

+396
-641
lines changed

.openpublishing.redirection.defender-endpoint.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -124,6 +124,16 @@
124124
"source_path": "defender-endpoint/non-windows.md",
125125
"redirect_url": "/defender-endpoint/microsoft-defender-endpoint",
126126
"redirect_document_id": true
127+
},
128+
{
129+
"source_path": "defender-endpoint/configure-endpoints-non-windows.md",
130+
"redirect_url": "/defender-endpoint/onboarding",
131+
"redirect_document_id": true
132+
},
133+
{
134+
"source_path": "defender-endpoint/configure-server-endpoints.md",
135+
"redirect_url": "/defender-endpoint/onboard-windows-server-2012r2-2016",
136+
"redirect_document_id": true
127137
}
128138
]
129139
}

defender-endpoint/TOC.yml

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -162,10 +162,12 @@
162162
- name: Onboard server devices
163163
href: onboard-server.md
164164
items:
165-
- name: Onboarding Windows Server overview
165+
- name: Onboard Windows Server version 1803, Windows Server 2019, and later
166166
href: onboard-windows-server.md
167-
- name: Onboard Windows Server 2012 R2, 2016, Semi-Annual Channel, 2019 and later
168-
href: configure-server-endpoints.md
167+
- name: Onboard Windows Server 2012 R2 and Windows Server 2016
168+
href: onboard-windows-server-2012r2-2016.md
169+
- name: Defender for Endpoint on Windows Server with SAP
170+
href: mde-sap-windows-server.md
169171
- name: Onboard Windows devices using Configuration Manager
170172
href: configure-endpoints-sccm.md
171173
- name: Onboard Windows devices using Group Policy
@@ -174,10 +176,8 @@
174176
href: configure-endpoints-script.md
175177
- name: Onboard non-persistent virtual desktop infrastructure (VDI) devices
176178
href: configure-endpoints-vdi.md
177-
- name: Defender for Endpoint on Windows Server with SAP
178-
href: mde-sap-windows-server.md
179-
- name: Onboard non-Windows devices
180-
href: configure-endpoints-non-windows.md
179+
- name: Direct onboarding with Defender for Cloud
180+
href: /azure/defender-for-cloud/onboard-machines-with-defender-for-endpoint?toc=/defender-endpoint/toc.json&bc=/defender-endpoint/breadcrumb/toc.json
181181
- name: Defender for Endpoint on macOS
182182
items:
183183
- name: Deploy Defender for Endpoint on macOS

defender-endpoint/advanced-features.md

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -74,7 +74,7 @@ This feature enables you to block potentially malicious files in your network. B
7474

7575
To turn **Allow or block** files on:
7676

77-
1. In the Microsoft Defender portal, in navigation pane, select **Settings** \> **Endpoints** \> **General** \> **Advanced features** \> **Allow or block file**.
77+
1. In the Microsoft Defender portal, in the navigation pane, select **Settings** \> **Endpoints** \> **General** \> **Advanced features** \> **Allow or block file**.
7878

7979
2. Toggle the setting between **On** and **Off**.
8080

@@ -129,8 +129,7 @@ Enabling the Skype for Business integration gives you the ability to communicate
129129

130130
Enabling this setting forwards Defender for Endpoint signals to Microsoft Defender for Cloud Apps to provide deeper visibility into cloud application usage. Forwarded data is stored and processed in the same location as your Defender for Cloud Apps data.
131131

132-
> [!NOTE]
133-
> This feature will be available with an E5 license for [Enterprise Mobility + Security](https://www.microsoft.com/cloud-platform/enterprise-mobility-security) on devices running Windows 10, version 1709 (OS Build 16299.1085 with [KB4493441](https://support.microsoft.com/help/4493441)), Windows 10, version 1803 (OS Build 17134.704 with [KB4493464](https://support.microsoft.com/help/4493464)), Windows 10, version 1809 (OS Build 17763.379 with [KB4489899](https://support.microsoft.com/help/4489899)), later Windows 10 versions, or Windows 11.
132+
For more information, see [Microsoft Defender for Cloud Apps overview](/defender-cloud-apps/what-is-defender-for-cloud-apps).
134133

135134
## Web content filtering
136135

defender-endpoint/api/device-health-api-methods-properties.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,7 @@ Retrieves a list of Microsoft Defender Antivirus device health details. This API
5050
Data that is collected using either `JSON response` or by using files is a snapshot of the current state. This data doesn't contain historical data. To collect historical data, you must save the data in your own data storage.
5151

5252
> [!IMPORTANT]
53-
> For Windows Server 2012 R2 and Windows Server 2016 to appear in device health reports, these devices must be onboarded using the modern unified solution package. For more information, see [New functionality in the modern unified solution for Windows Server 2012 R2 and 2016](../configure-server-endpoints.md#functionality-in-the-modern-unified-solution).
53+
> For Windows Server 2012 R2 and Windows Server 2016 to appear in device health reports, these devices must be onboarded using the modern unified solution package. For more information, see [New functionality in the modern unified solution for Windows Server 2012 R2 and 2016](../onboard-windows-server-2012r2-2016.md#functionality-in-the-modern-unified-solution).
5454
>
5555
> For information about using the **Device health and antivirus compliance** reporting tool in the Microsoft Defender portal, see: [Device health and antivirus report in Microsoft Defender for Endpoint](../device-health-reports.md).
5656

defender-endpoint/api/device-health-export-antivirus-health-report-api.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,7 @@ Data that is collected using either '_JSON response_ or _via files_' is the curr
4848

4949
> [!IMPORTANT]
5050
>
51-
> For Windows Server 2012 R2 and Windows Server 2016 to appear in device health reports, these devices must be onboarded using the modern unified solution package. For more information, see [New functionality in the modern unified solution for Windows Server 2012 R2 and 2016](../configure-server-endpoints.md#functionality-in-the-modern-unified-solution).
51+
> For Windows Server 2012 R2 and Windows Server 2016 to appear in device health reports, these devices must be onboarded using the modern unified solution package. For more information, see [New functionality in the modern unified solution for Windows Server 2012 R2 and 2016](../onboard-windows-server-2012r2-2016.md#functionality-in-the-modern-unified-solution).
5252
5353
> [!NOTE]
5454
>

defender-endpoint/application-deployment-via-mecm.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -126,7 +126,7 @@ Copy the unified solution package, onboarding script, and migration script to th
126126
- [Microsoft Monitoring Agent Setup](/services-hub/health/mma-setup)
127127
- [Deploy applications - Configuration Manager](/mem/configmgr/apps/deploy-use/deploy-applications)
128128
- [Microsoft Defender for Endpoint - Configuration Manager](/mem/configmgr/protect/deploy-use/defender-advanced-threat-protection)
129-
- [Onboard Windows servers to the Microsoft Defender for Endpoint service](configure-server-endpoints.md)
129+
- [Onboard servers through Microsoft Defender for Endpoint's onboarding experience](onboard-server.md)
130130
- [Microsoft Defender for Endpoint: Defending Windows Server 2012 R2 and 2016](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/defending-windows-server-2012-r2-and-2016/ba-p/2783292)
131131
132132
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]

defender-endpoint/attack-surface-reduction-rules-reference.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -111,7 +111,7 @@ The following table lists the supported operating systems for rules that are cur
111111

112112
> [!NOTE]
113113
> Unless otherwise indicated, the minimum Windows 10 build is version 1709 (RS3, build 16299) or later; the minimum Windows Server build is version 1809 or later.
114-
> Attack surface reduction rules in Windows Server 2012 R2 and Windows Server 2016 are available for devices onboarded using the modern unified solution package. For more information, see [New Windows Server 2012 R2 and 2016 functionality in the modern unified solution](configure-server-endpoints.md#functionality-in-the-modern-unified-solution).
114+
> Attack surface reduction rules in Windows Server 2012 R2 and Windows Server 2016 are available for devices onboarded using the modern unified solution package. For more information, see [New Windows Server 2012 R2 and 2016 functionality in the modern unified solution](onboard-windows-server-2012r2-2016.md#functionality-in-the-modern-unified-solution).
115115
116116
| Rule name| Windows 10 and 11 | Windows Server version 1803, 2019, and later | Windows Server 2016 and 2012 R2 |
117117
|---|---|---|---|
@@ -136,7 +136,8 @@ The following table lists the supported operating systems for rules that are cur
136136
| [Use advanced protection against ransomware](#use-advanced-protection-against-ransomware) | Y <br> version 1803 or later | Y | Y |
137137

138138
> [!NOTE]
139-
> - For Windows Server 2012 R2 and Windows Server 2016, use the [modern, unified solution](/defender-endpoint/configure-server-endpoints#functionality-in-the-modern-unified-solution). If you're using Configuration Manager, the minimum required version of Microsoft Endpoint Configuration Manager is version 2111.
139+
> - For Windows Server 2012 R2 and Windows Server 2016, see [Onboard Windows Server 2012 R2 and Windows Server 2016 to Microsoft Defender for Endpoint](onboard-windows-server-2012r2-2016.md).
140+
> - If you're using Configuration Manager, the minimum required version of Microsoft Endpoint Configuration Manager is version 2111.
140141
> - For Windows client devices, "version 1809 or later" and "version 1903 (build 18362)" apply to Windows 10 only.
141142
142143
## ASR rules supported configuration management systems

defender-endpoint/attack-surface-reduction-rules-report.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -52,7 +52,7 @@ For more information about individual attack surface reduction rules, see [Attac
5252

5353
> [!IMPORTANT]
5454
> To access the attack surface reduction rules report, read permissions are required for the Microsoft Defender portal.
55-
> For Windows Server 2012 R2 and Windows Server 2016 to appear in the attack surface reduction rules report, these devices must be onboarded using the modern unified solution package. For more information, see [New functionality in the modern unified solution for Windows Server 2012 R2 and 2016](configure-server-endpoints.md#functionality-in-the-modern-unified-solution).
55+
> For Windows Server 2012 R2 and Windows Server 2016 to appear in the attack surface reduction rules report, these devices must be onboarded using the modern unified solution package. For more information, see [New functionality in the modern unified solution for Windows Server 2012 R2 and 2016](onboard-windows-server-2012r2-2016.md#functionality-in-the-modern-unified-solution).
5656
5757
## Report access permissions
5858

defender-endpoint/attack-surface-reduction.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -142,7 +142,7 @@ You can set attack surface reduction rules for devices that are running any of t
142142
- [Windows Server 2012 R2](/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/hh801901(v=ws.11))
143143

144144
> [!NOTE]
145-
> Windows Server 2016 and Windows Server 2012 R2 must be onboarded using the instructions in [Onboard Windows servers](/defender-endpoint/configure-server-endpoints#functionality-in-the-modern-unified-solution) for this feature to work.
145+
> Windows Server 2016 and Windows Server 2012 R2 must be onboarded using the instructions in [Onboard Windows Server 2012 R2 and Windows Server 2016 to Microsoft Defender for Endpoint](onboard-windows-server-2012r2-2016.md) for this feature to work.
146146
147147
Although attack surface reduction rules don't require a [Windows E5 license](/windows/deployment/deploy-enterprise-licenses), if you have Windows E5, you get advanced management capabilities. The advanced capabilities - available only in Windows E5 - include:S
148148

defender-endpoint/automated-investigations.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -93,7 +93,7 @@ Currently, AIR only supports the following OS versions:
9393
- Windows 11
9494

9595
> [!NOTE]
96-
> Automated investigation and response on Windows Server 2012 R2 and Windows Server 2016 requires the [Unified Agent](configure-server-endpoints.md#functionality-in-the-modern-unified-solution) to be installed.
96+
> Automated investigation and response on Windows Server 2012 R2 and Windows Server 2016 requires the [Unified Agent](onboard-windows-server-2012r2-2016.md#functionality-in-the-modern-unified-solution) to be installed.
9797
9898
## Next steps
9999

0 commit comments

Comments
 (0)