update step and add bullet in Important

This commit is contained in:
Joey Caparas 2017-12-12 11:38:39 -08:00
parent d032878aba
commit 31e349d288
2 changed files with 3 additions and 2 deletions

View File

@ -41,7 +41,7 @@ You'll need to take the following steps to oboard non-Windows endpoints:
3. Click **Generate access token** button and then **Copy**. 3. Click **Generate access token** button and then **Copy**.
4. Depending on the third-party implementation you're using, the implementation might vary. Refer to the third-party solution documentation for guidance on how to use the token. 4. Youll need to copy and paste the token to the third-party solution youre using. The implementation may vary depending on the solution.
>[!WARNING] >[!WARNING]

View File

@ -29,7 +29,8 @@ ms.date: 11/10/2017
Quickly respond to detected attacks by isolating machines or collecting an investigation package. After taking action on machines, you can check activity details on the Action center. Quickly respond to detected attacks by isolating machines or collecting an investigation package. After taking action on machines, you can check activity details on the Action center.
>[!IMPORTANT] >[!IMPORTANT]
> These response actions are only available for machines on Windows 10, version 1703 or later. > - These response actions are only available for machines on Windows 10, version 1703 or later.
> - For non-Windows platforms, response capabilities (such as Machine isolation) are dependent on the third-party capabilities.
## Collect investigation package from machines ## Collect investigation package from machines
As part of the investigation or response process, you can collect an investigation package from a machine. By collecting the investigation package, you can identify the current state of the machine and further understand the tools and techniques used by the attacker. As part of the investigation or response process, you can collect an investigation package from a machine. By collecting the investigation package, you can identify the current state of the machine and further understand the tools and techniques used by the attacker.