This commit is contained in:
Joey Caparas 2018-03-22 22:06:06 -07:00
parent 4259c1e9d4
commit 4ad580ef46
2 changed files with 2 additions and 2 deletions

View File

@ -87,7 +87,7 @@ Youll be able to onboard in the same method available for Windows 10 client m
1. Install the latest Windows Server Insider build on a machine. For more information, see [Windows Server Insider Preview](https://www.microsoft.com/en-us/software-download/windowsinsiderpreviewserver). 1. Install the latest Windows Server Insider build on a machine. For more information, see [Windows Server Insider Preview](https://www.microsoft.com/en-us/software-download/windowsinsiderpreviewserver).
2. Configure Windows Defender ATP onboarding settings on the server. For more information, see [[Onboard Window 10 machines](configure-endpoints-windows-defender-advanced-threat-protection.md). 2. Configure Windows Defender ATP onboarding settings on the server. For more information, see [Onboard Windows 10 machines](configure-endpoints-windows-defender-advanced-threat-protection.md).
3. If youre running a third party antimalware solution, you'll need to apply the following Windows Defender AV passive mode settings and verify it was configured correctly: 3. If youre running a third party antimalware solution, you'll need to apply the following Windows Defender AV passive mode settings and verify it was configured correctly:

View File

@ -46,7 +46,7 @@ Finally, you'll need to rank the machine groups so that the appropriate rul is a
### Add machine group ### Add machine group
1. In the navigation pane, select **Settings > Role based access control > Machine groups**. 1. In the navigation pane, select **Settings > Permissions > Machine groups**.
2. Click **Add machine group**. 2. Click **Add machine group**.