diff --git a/windows/security/threat-protection/windows-defender-atp/api-hello-word.md b/windows/security/threat-protection/windows-defender-atp/api-hello-word.md index 30b9f71c45..acde3f9cc0 100644 --- a/windows/security/threat-protection/windows-defender-atp/api-hello-word.md +++ b/windows/security/threat-protection/windows-defender-atp/api-hello-word.md @@ -95,7 +95,7 @@ Done! You have successfully registered an application! ### Step 2 - Get a token using the App and use this token to access the API. -- Copy the script below to PowerShell ISE or to a text editor, and save as "**Get-Token.ps1**" +- Copy the script below to PowerShell ISE or to a text editor, and save it as "**Get-Token.ps1**" - Running this script will generate a token and will save it in the working folder under the name "**Latest-token.txt**". ``` @@ -121,11 +121,11 @@ return $token ``` -- Sanity Check: -Run the script. -In your browser go to: https://jwt.ms/ -Copy the token (the content of the Latest-token.txt file). -Paste in the top box. +- Sanity Check:
+Run the script.
+In your browser go to: https://jwt.ms/
+Copy the token (the content of the Latest-token.txt file).
+Paste in the top box.
Look for the "roles" section. Find the Alert.Read.All role. ![Image jwt.ms](images/api-jwt-ms.png)