Video Tutorial: Endpoint Protection Part 5 – Windows Defender Advanced Threat Protection Policies

Published 05-24-2021 12:00 PM 1,524 Views
Microsoft

Hello everyone, here is part 5 of a series focusing on Endpoint Protection integration with Configuration Manager.  This series is recorded by Steve Rachui, a Microsoft principal premier field engineer.

 

This tutorial focuses on how Configuration Manager can be used to facilitate onboarding of a Windows device into Defender Advanced Threat Protection.  Steve also discusses what Defender Advanced Threat Protection is and how it is impactful for maintaining security in your enterprise.

Next in the series Steve focuses on how Configuration Manager integrates with Windows Defender Exploit Guard and can be used to deliver Exploit Guard settings. 

Posts in the series

Go straight to the playlist

%3CLINGO-SUB%20id%3D%22lingo-sub-2356491%22%20slang%3D%22en-US%22%3EVideo%20Tutorial%3A%20Endpoint%20Protection%20Part%205%20%E2%80%93%20Windows%20Defender%20Advanced%20Threat%20Protection%20Policies%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2356491%22%20slang%3D%22en-US%22%3E%3CP%3EHello%20everyone%2C%20here%20is%20part%205%20of%20a%20series%20focusing%20on%20Endpoint%20Protection%20integration%20with%20Configuration%20Manager.%26nbsp%3B%20This%20series%20is%20recorded%20by%20Steve%20Rachui%2C%20a%20Microsoft%20principal%20premier%20field%20engineer.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThis%20tutorial%20focuses%20on%20how%20Configuration%20Manager%20can%20be%20used%20to%20facilitate%20onboarding%20of%20a%20Windows%20device%20into%20Defender%20Advanced%20Threat%20Protection.%26nbsp%3B%20Steve%20also%20discusses%20what%20Defender%20Advanced%20Threat%20Protection%20is%20and%20how%20it%20is%20impactful%20for%20maintaining%20security%20in%20your%20enterprise.%3C%2FP%3E%0A%3CP%3E%3C%2FP%3E%3CDIV%20class%3D%22video-embed-center%20video-embed%22%3E%3CIFRAME%20class%3D%22embedly-embed%22%20src%3D%22https%3A%2F%2Fcdn.embedly.com%2Fwidgets%2Fmedia.html%3Fsrc%3Dhttps%253A%252F%252Fwww.youtube.com%252Fembed%252FrEptcSmKfhE%26amp%3Bdisplay_name%3DYouTube%26amp%3Burl%3Dhttps%253A%252F%252Fwww.youtube.com%252Fwatch%253Fv%253DrEptcSmKfhE%26amp%3Bimage%3Dhttp%253A%252F%252Fi.ytimg.com%252Fvi%252FrEptcSmKfhE%252Fhqdefault.jpg%26amp%3Bkey%3Db0d40caa4f094c68be7c29880b16f56e%26amp%3Btype%3Dtext%252Fhtml%26amp%3Bschema%3Dyoutube%22%20width%3D%22600%22%20height%3D%22337%22%20scrolling%3D%22no%22%20title%3D%22YouTube%20embed%22%20frameborder%3D%220%22%20allow%3D%22autoplay%3B%20fullscreen%22%20allowfullscreen%3D%22true%22%3E%3C%2FIFRAME%3E%3C%2FDIV%3E%3CP%3E%3C%2FP%3E%0A%3CP%3ENext%20in%20the%20series%20Steve%20focuses%20on%20how%20Configuration%20Manager%20integrates%20with%20Windows%20Defender%20Exploit%20Guard%20and%20can%20be%20used%20to%20deliver%20Exploit%20Guard%20settings.%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CU%3EPosts%20in%20the%20series%3C%2FU%3E%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fconfiguration-manager-blog%2Fvideo-tutorial-endpoint-protection-part-1-introduction%2Fba-p%2F2356415%22%20target%3D%22_blank%22%3EIntroduction%3C%2FA%3E%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fconfiguration-manager-blog%2Fendpoint-protection-part-2-antimalware-policies%2Fba-p%2F2356436%22%20target%3D%22_blank%22%3EAntimalware%20policies%3C%2FA%3E%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fconfiguration-manager-blog%2Fendpoint-protection-part-3-bitlocker-integration-and-management%2Fba-p%2F2356480%22%20target%3D%22_blank%22%3EBitLocker%20integration%20and%20management%3C%2FA%3E%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fconfiguration-manager-blog%2Fvideo-tutorial-endpoint-protection-part-4-firewall-policies%2Fba-p%2F2356488%22%20target%3D%22_blank%22%3EFirewall%20policies%3C%2FA%3E%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fconfiguration-manager-blog%2Fvideo-tutorial-endpoint-protection-part-5-windows-defender%2Fba-p%2F2356491%22%20target%3D%22_self%22%3EWindows%20Defender%20Advanced%20Threat%20Protection%20(ATP)%20policies%3C%2FA%3E%20(this%20post)%3C%2FLI%3E%0A%3CLI%3EWindows%20Defender%20Exploit%20Guard%20policies%3C%2FLI%3E%0A%3CLI%3EWindows%20Defender%20Application%20Guard%20policies%3C%2FLI%3E%0A%3CLI%3EWindows%20Defender%20Application%20Control%20(WDAC)%20policies%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fwww.youtube.com%2Fplaylist%3Flist%3DPLSrRxZBnj1AUp7JLBNvgwCgcz66ywwTv2%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3EGo%20straight%20to%20the%20playlist%3C%2FA%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-2356491%22%20slang%3D%22en-US%22%3E%3CP%3EHello%20everyone%2C%20here%20is%20part%205%20of%20a%20series%20focusing%20on%20Endpoint%20Protection%20integration%20with%20Configuration%20Manager.%26nbsp%3BThis%20tutorial%20focuses%20on%20how%20Configuration%20Manager%20can%20be%20used%20to%20facilitate%20onboarding%20of%20a%20Windows%20device%20into%20Defender%20Advanced%20Threat%20Protection.%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20image-alt%3D%22Endpoint%20Protection%20Video%20Tutorial.jpg%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F280807iFCB7ECC5F506B59B%2Fimage-size%2Flarge%3Fv%3Dv2%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22Endpoint%20Protection%20Video%20Tutorial.jpg%22%20alt%3D%22Endpoint%20Protection%20video%20series%22%20%2F%3E%3CSPAN%20class%3D%22lia-inline-image-caption%22%20onclick%3D%22event.preventDefault()%3B%22%3EEndpoint%20Protection%20video%20series%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-2356491%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3ECM%20current%20branch%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EEndpoint%20protection%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E
Co-Authors
Version history
Last update:
‎May 14 2021 04:09 PM
Updated by: