diff --git a/windows/security/threat-protection/microsoft-defender-atp/onboarding-endpoint-configuration-manager.md b/windows/security/threat-protection/microsoft-defender-atp/onboarding-endpoint-configuration-manager.md index 6bca3b62d1..c1623f28ee 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/onboarding-endpoint-configuration-manager.md +++ b/windows/security/threat-protection/microsoft-defender-atp/onboarding-endpoint-configuration-manager.md @@ -30,7 +30,7 @@ This article is part of the Deployment guide and acts as an example onboarding m - Onboarding Windows devices to the service - Configuring Microsoft Defender ATP capabilities -This onboarding guidance will walk you through: +This onboarding guidance will walk you through the following basic steps that you need to take when using Microsoft Endpoint Configuration Manager: - **Creating a collection in Microsoft Endpoint Configuration Manager** - **Configuring Microsoft Defender ATP capabilities using Microsoft Endpoint Configuration Manager** diff --git a/windows/security/threat-protection/microsoft-defender-atp/onboarding-endpoint-manager.md b/windows/security/threat-protection/microsoft-defender-atp/onboarding-endpoint-manager.md index aca1533f48..3adb0bb3aa 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/onboarding-endpoint-manager.md +++ b/windows/security/threat-protection/microsoft-defender-atp/onboarding-endpoint-manager.md @@ -31,7 +31,7 @@ ms.topic: article This article is part of the Deployment guide and acts as an example onboarding method that guides users in: - Onboarding devices to the service by creating a group in Microsoft Endpoint Manager (MEM) -- Configuring Microsoft Defender ATP capabilities +- Configuring Microsoft Defender ATP capabilities using Microsoft Endpoint Manager This onboarding guidance will walk you through: - Identifying target devices or users