From 5135773b4bb60b2e116bae3c6403d242bf4479f3 Mon Sep 17 00:00:00 2001 From: Dolcita Montemayor Date: Sat, 6 Apr 2019 00:19:00 +0000 Subject: [PATCH] Updated configure-and-manage-tvm.md --- .../configure-and-manage-tvm.md | 16 ++++++++++------ 1 file changed, 10 insertions(+), 6 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-atp/configure-and-manage-tvm.md b/windows/security/threat-protection/windows-defender-atp/configure-and-manage-tvm.md index 232ff229b9..9e5fa41b21 100644 --- a/windows/security/threat-protection/windows-defender-atp/configure-and-manage-tvm.md +++ b/windows/security/threat-protection/windows-defender-atp/configure-and-manage-tvm.md @@ -24,11 +24,15 @@ This section guides you through the steps you need to take to configure Threat & ### Before you begin >[!IMPORTANT] ->- Ensure that you have the right RBAC permissions to configure your Threat & Vulnerability Management integration with Microsoft Intune or Microsoft System Center Configuration Manager (SCCM). ->- Threat & Vulnerability Management data currently supports Windows 10 machines. Upgrade to Windows 10 to account for the rest of your devices’ threat and vulnerability exposure data.
->- Your machines should be enrolled to either Microsoft Intune or Microsoft System Center Configuration Manager (SCCM) to experience the remediation workflow handoff scenario between Security Administrator to IT Administrator. You can use any of the following options to enroll devices in Intune: ->---IT Admin: For more information on how to enabling auto-enrollment, see [Windows Enrollment](https://docs.microsoft.com/intune/windows-enroll#enable-windows-10-automatic-enrollment) ->---End-user: For more information on how to enroll your Windows 10 device in Intune, see [Enroll your Windows 10 device in Intune](https://docs.microsoft.com/intune-user-help/enroll-your-w10-device-access-work-or-school) ->---End-user alternative: For more information on joining an Azure AD domain, see [Set up Azure Active Directory joined devices](https://docs.microsoft.com/azure/active-directory/device-management-azuread-joined-devices-setup). +Threat & Vulnerability Management data currently supports Windows 10 machines. Upgrade to Windows 10 to account for the rest of your devices’ threat and vulnerability exposure data.
+ +Ensure that you have the right RBAC permissions to configure your Threat & Vulnerability Management integration with Microsoft Intune or Microsoft System Center Configuration Manager (SCCM). + +Your machines should be enrolled to either Microsoft Intune or Microsoft System Center Configuration Manager (SCCM) to experience the remediation workflow handoff scenario between Security Administrator to IT Administrator. + +Use any of the following options to enroll devices in Intune: +>- IT Admin: For more information on how to enabling auto-enrollment, see [Windows Enrollment](https://docs.microsoft.com/intune/windows-enroll#enable-windows-10-automatic-enrollment) +>- End-user: For more information on how to enroll your Windows 10 device in Intune, see [Enroll your Windows 10 device in Intune](https://docs.microsoft.com/intune-user-help/enroll-your-w10-device-access-work-or-school) +>- End-user alternative: For more information on joining an Azure AD domain, see [Set up Azure Active Directory joined devices](https://docs.microsoft.com/azure/active-directory/device-management-azuread-joined-devices-setup).