Software Library -> Application Management –> Applications Note: The 32-bit is not applicable to Windows Server 2008 R2, Windows Server 2012 R2, and Windows Server 2016, since they are 64-bit systems. MMASetup-AMD64.exe /c /t:C:\MDATP_Onboarding_Downlevel_clients\Extractedģ2-bit Windows Log Analytics agent (LLA, used to be known as Microsoft Monitoring Agent (MMA))
Note: If you are missing this security hotfix from 2015, you should really patch your boxes asap.Ħ4-bit Windows Log Analytics agent (LLA, used to be known as Microsoft Monitoring Agent (MMA))
NET Framework 3.5.1 on Windows 7 SP1 and Server 2008 R2 SP1 (Alternative)ģ045999 MS15-038: Description of the security update for Windows: April 14, 2015 Support for TLS System Default Versions included in the. Note: If you are missing this security hotfix from 2018, you should really patch your boxes asap.ģ080149 Update for customer experience and diagnostic telemetry Step 2) Download the Log Analytics Agent (used to be known as the Microsoft Monitoring Agent).ĭepending on the version of Windows client and/or Windows Server, there are different pre-requisites: O.S.įebruary 13, 2018-KB4074598 (Monthly Rollup)
Jot down “Workspace ID” and “Workspace key”. Select operating system to start onboarding process: Windows Server 2008 R2 SP1, 2012 R2, and 2016 Jot down “Workspace ID” and “Workspace key”.Īnd/or
Select operating system to start onboarding process: Windows 7 SP1 and 8.1 Settings -> Machine Management -> Onboarding Login to the “Microsoft Defender Security Center” ( ) Step 1) Download the onboarding package for “Windows 7 SP1, Windows 8.1, Windows Server 2008 R2 SP1, Windows Server 2012 R2, and Windows Server 2016”
Note: The MDATP deployment/onboarding method are the same for Windows 7 SP1 = Windows Server 2008 R2 SP1, Windows 8.1 = Windows Server 2012 R2 and Windows Server 2016.Previous versions of Windows Client (Windows 7 and Windows 8.1).In this blog post, we will be going over onboarding MDATP (EDR) for Windows 7 SP1, Windows 8.1, Windows Server 2008 R2 SP1, Windows Server 2012 R2, and Windows Server 2016 using SCCM CB.įor the latest information, please review: SCCM-Endpoint Protection: Microsoft Defender Advanced Threat Protection (EDR) for Windows Server 2019 (Part 14) Microsoft Defender Advanced Threat Protection (MDATP formerly known as Windows Defender Advanced Threat Protection (aka Endpoint Detection and Response (EDR)) for these OS’es:Ĭontinuing with setting up the SCCM-Endpoint Protection series. System Center Configuration Manager (SCCM) Current Branch (CB) running: I grant you a nonexclusive, royalty-free right to use & modify my sample code & to reproduce & distribute the object code form of the sample code, provided that you agree: (i) to not use my name, my companies name, logo, or trademarks to market your software product in which the sample code is embedded (ii) to include a valid copyright notice on your software product in which the sample code is embedded and (iii) to indemnify, hold harmless, and defend me, Microsoft & our suppliers from & against any claims or lawsuits, including attorneys’ fees, that arise or result from the use or distribution of the sample code. They are provided ‘as is’ without warranty of any kind, expressed or implied, including but not limited to the implied warranties of merchantability and/or fitness for a particular purpose. If I post any code, scripts or demos, they are provided for the purpose of illustration & are not intended to be used in a production environment. All posts are provided “AS IS” with no warranties & confers no rights. Disclaimer: The views expressed in my posts on this site are mine & mine alone & don’t necessarily reflect the views of Microsoft.