From 629cc6a5d77fa1d2191b8320668bcde68eafa340 Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Thu, 12 Apr 2018 16:01:26 -0700 Subject: [PATCH] update ca --- ...al-access-windows-defender-advanced-threat-protection.md | 6 +++++- 1 file changed, 5 insertions(+), 1 deletion(-) diff --git a/windows/security/threat-protection/windows-defender-atp/conditional-access-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/conditional-access-windows-defender-advanced-threat-protection.md index 9aed4f71fb..67d8177806 100644 --- a/windows/security/threat-protection/windows-defender-atp/conditional-access-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/conditional-access-windows-defender-advanced-threat-protection.md @@ -64,10 +64,14 @@ The following example sequence of events explains conditional access in action: ## Configure conditional access +This section guides you through all the steps you need to take to properly implement conditional access. + +There are steps you'll need to take in the Windows Defender ATP portal, the Intune portal, and Azure AD portal. + > [!NOTE] > You'll need a Microsoft Intune environment, with Intune managed and Azure AD joined Windows 10 devices. -You'll need to take the following steps to enable conditional access: +Take the following steps to enable conditional access: - Step 1: Turn on the Microsoft Intune connection from the Windows Defender ATP portal - Step 2: Turn on the Windows Defender ATP integration in Intune - Step 3: Create the compliance policy in Intune