From 4a7ca91fc8ba1a531653325e03fd128207f5a690 Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Thu, 16 Mar 2017 15:17:50 -0700 Subject: [PATCH] fix broken link --- ...ment-custom-ti-windows-defender-advanced-threat-protection.md | 1 - 1 file changed, 1 deletion(-) diff --git a/windows/keep-secure/experiment-custom-ti-windows-defender-advanced-threat-protection.md b/windows/keep-secure/experiment-custom-ti-windows-defender-advanced-threat-protection.md index 661720f446..2aa8d53372 100644 --- a/windows/keep-secure/experiment-custom-ti-windows-defender-advanced-threat-protection.md +++ b/windows/keep-secure/experiment-custom-ti-windows-defender-advanced-threat-protection.md @@ -45,7 +45,6 @@ This step will guide you in creating an alert definition and an IOC for a malici >[!NOTE] >Make sure you replace the `authUrl`, `clientID`, and `clientSecret` values with your details which you saved in when you enabled the threat intelligence application. - [!code[ExampleScript](./code/example-script.py#L1-L60)] 3. Run the script and verify that the operation succeeded in the results the window. Wait up to 20 minutes until the new or updated alert definition propagates to the detection engines.