Set up and configure Microsoft Defender for Business
Microsoft Defender for Business provides a streamlined setup and configuration experience, designed especially for the small and medium-sized business. Use this article as a guide for the overall process.
If you used the setup wizard, then you've already completed several steps of your basic setup process. In this case, you can:
The setup and configuration process
The following diagram depicts the overall setup and configuration process for Defender for Business. If you used the setup wizard, then you've likely already completed steps 1-3, and possibly step 4.
|1||Review the requirements||Review the requirements, including supported operating systems, for Microsoft Defender for Business. See Microsoft Defender for Business requirements.|
|2||Assign roles and permissions||People on your security team need permissions to perform tasks, such as reviewing detected threats & remediation actions, viewing & editing policies, onboarding devices, and using reports. You can grant these permissions through certain roles. See Assign roles and permissions.|
|3||Set up email notifications||You can specify who should receive email notifications when alerts are triggered or new vulnerabilities are discovered. See Set up email notifications.|
|4||Onboard devices||Microsoft Defender for Business is set up so that you can choose from several options to onboard your company's devices. See Onboard devices to Microsoft Defender for Business.|
|5||Configure your security settings and policies||You can choose from several options to configure your security settings and policies, including a simplified configuration process in Defender for Business, or by using the Microsoft Endpoint Manager admin center. See Configure your security settings and policies.|
Pateikti ir peržiūrėti atsiliepimą, skirtą