From 2ad7f2543659f4272ee3b957c66c628e17905aa1 Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Fri, 11 Aug 2017 14:42:49 -0700 Subject: [PATCH] minor text updates --- ...n-windows-windows-defender-advanced-threat-protection.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/windows/threat-protection/windows-defender-atp/configure-endpoints-non-windows-windows-defender-advanced-threat-protection.md b/windows/threat-protection/windows-defender-atp/configure-endpoints-non-windows-windows-defender-advanced-threat-protection.md index 4a25f6c834..7b718d2c99 100644 --- a/windows/threat-protection/windows-defender-atp/configure-endpoints-non-windows-windows-defender-advanced-threat-protection.md +++ b/windows/threat-protection/windows-defender-atp/configure-endpoints-non-windows-windows-defender-advanced-threat-protection.md @@ -43,11 +43,11 @@ Windows Defender ATP supports the following third-party solutions: 5. Click **Save preferences**. ->[!WARNING] [DAN OR OTHER SME'S - PLEASE VERIFY IF THIS WARNING IS CORRECT. IS IT ONLY DISPLAYED ONCE?] -> The access token is only displayed once. Make sure you keep a copy of it in a safe place. If needed, regenerate the token close to the time you need to share it with the third-party solution. +>[!WARNING] +> The access token has a limited validity period. If needed, regenerate the token close to the time you need to share it with the third-party solution. ## Offboard non-Windows endpoints -To effectively offboard the endpoints from the service, you'll need to disable the data push on the third-party portal then switch the toggle to off in Windows Defender Security Center to block the data inbound flow. +To effectively offboard the endpoints from the service, you'll need to disable the data push on the third-party portal first then switch the toggle to off in Windows Defender Security Center. The toggle in the portal only blocks the data inbound flow. 1. Follow the third-party documentation to opt-out on the third-party service side.