From 529f599f00da1d2fddd28759ff9b6e803549e494 Mon Sep 17 00:00:00 2001 From: Dulce Montemayor Date: Wed, 26 Jun 2019 09:49:49 -0700 Subject: [PATCH] Updated note --- .../microsoft-defender-atp/threat-and-vuln-mgt-scenarios.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/threat-and-vuln-mgt-scenarios.md b/windows/security/threat-protection/microsoft-defender-atp/threat-and-vuln-mgt-scenarios.md index 43c01b0729..1b05dfd5a9 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/threat-and-vuln-mgt-scenarios.md +++ b/windows/security/threat-protection/microsoft-defender-atp/threat-and-vuln-mgt-scenarios.md @@ -120,7 +120,7 @@ Security Administrators like you can request for the IT Administrator to remedia See [Use Intune to remediate vulnerabilities identified by Microsoft Defender ATP](https://docs.microsoft.com/en-us/intune/atp-manage-vulnerabilities) for details. >[!NOTE] ->If your request involves remediating more than 10,000 machines, we will only send 10,000 machines for remediation to Intune at a time. Create another remediation request for the remaining machines up to 10,000. +>If your request involves remediating more than 10,000 machines, we will only send 10,000 machines for remediation to Intune. ## File for exception With Threat & Vulnerability Management, you can create exceptions for recommendations, as an alternative to requesting for remediation.