From 659764aff7bf0ee8f8e9799d74a8eacee2faa17f Mon Sep 17 00:00:00 2001 From: jcaparas Date: Mon, 20 Mar 2017 18:05:15 -0700 Subject: [PATCH] Update experiment-custom-ti-windows-defender-advanced-threat-protection.md --- ...ment-custom-ti-windows-defender-advanced-threat-protection.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/keep-secure/experiment-custom-ti-windows-defender-advanced-threat-protection.md b/windows/keep-secure/experiment-custom-ti-windows-defender-advanced-threat-protection.md index b553018087..0af9bbd37e 100644 --- a/windows/keep-secure/experiment-custom-ti-windows-defender-advanced-threat-protection.md +++ b/windows/keep-secure/experiment-custom-ti-windows-defender-advanced-threat-protection.md @@ -47,6 +47,7 @@ This step will guide you in creating an alert definition and an IOC for a malici >Make sure you replace the `authUrl`, `clientId`, and `clientSecret` values with your details which you saved in when you enabled the threat intelligence application. [!code[ExampleScript](./code/example-script.ps1#L1-L60)] + 3. Run the script and verify that the operation succeeded in the results the window. Wait up to 20 minutes until the new or updated alert definition propagates to the detection engines. ![Image of the script running](images/atp-running-script.png)