From 31ec79e9c9418982d5d0f3b946dd206935e26ca9 Mon Sep 17 00:00:00 2001
From: amirsc3 <42802974+amirsc3@users.noreply.github.com>
Date: Mon, 13 Apr 2020 18:36:31 +0300
Subject: [PATCH] Update configure-endpoints-vdi.md
Minor text changes
---
.../microsoft-defender-atp/configure-endpoints-vdi.md | 4 +++-
1 file changed, 3 insertions(+), 1 deletion(-)
diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-vdi.md b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-vdi.md
index 3b13abc972..2310049183 100644
--- a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-vdi.md
+++ b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-vdi.md
@@ -108,7 +108,9 @@ https://docs.microsoft.com/en-us/windows-hardware/manufacture/desktop/dism-image
https://docs.microsoft.com/en-us/windows-hardware/manufacture/desktop/reduce-the-size-of-the-component-store-in-an-offline-windows-image
- If offline servicing is not an a viable option for your non-persistent VDI environment, then the following steps should be taken to ensure consistency and sensor health:
-1. After booting the master image for online servicing or patching, run the offboarding script to turn off the defender ATP sensor.
+1. After booting the master image for online servicing or patching, run an offboarding script to turn off the defender ATP sensor.
+Refer to the article below for guidance on offboarding script:
+https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-script#offboard-machines-using-a-local-script
2. Ensure the sensor is off by running 'sc query sense'.
3. Service the image as needed.
4. Run the below commands using PsExec.exe (which can be downloaded from https://download.sysinternals.com/files/PSTools.zip) to cleanup the cyber folder contents that the sensor may have accumelated since boot: