From 398bc635b3a1fee0ed6aa3ac8cea62ae0e058e51 Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Thu, 16 Jul 2020 14:35:19 -0700 Subject: [PATCH] update to insider risk toggle description --- .../microsoft-defender-atp/advanced-features.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/advanced-features.md b/windows/security/threat-protection/microsoft-defender-atp/advanced-features.md index 7d241ed7e3..ac64db9e82 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/advanced-features.md +++ b/windows/security/threat-protection/microsoft-defender-atp/advanced-features.md @@ -176,9 +176,9 @@ When you enable Intune integration, Intune will automatically create a classic C > The classic CA policy created by Intune is distinct from modern [Conditional Access policies](https://docs.microsoft.com/azure/active-directory/conditional-access/overview/), which are used for configuring endpoints. -## Insider risk management integration +## Share endpoint alerts with Microsoft Compliance Center -Enabling Insider risk management integration gives you the ability to share Microsoft Defender ATP alerts and their triage status with insider risk management user alerts. This helps link Microsoft Defender ATP activities with other risky user activities identified by insider risk management security violation policies. +Forwards endpoint security alerts and their triage status to Microsoft Compliance Center, allowing you to enhance insider risk management policies with alerts and remediate internal risks before they cause harm. Forwarded data is processed and stored in the same location as your Office 365 data. ### Enable the Microsoft Defender ATP integration for insider risk management from the Azure ATP portal