From 829941e3a6ef769eae441398e1310c137d0db2dc Mon Sep 17 00:00:00 2001 From: jcaparas Date: Mon, 1 Aug 2016 21:12:59 +1000 Subject: [PATCH] update based on Haitham's changes --- ...-windows-defender-advanced-threat-protection.md | 14 +++++++------- 1 file changed, 7 insertions(+), 7 deletions(-) diff --git a/windows/keep-secure/configure-proxy-internet-windows-defender-advanced-threat-protection.md b/windows/keep-secure/configure-proxy-internet-windows-defender-advanced-threat-protection.md index 6e0427e3a5..c1682df635 100644 --- a/windows/keep-secure/configure-proxy-internet-windows-defender-advanced-threat-protection.md +++ b/windows/keep-secure/configure-proxy-internet-windows-defender-advanced-threat-protection.md @@ -64,9 +64,9 @@ Primary Domain Controller | .Microsoft.com DNS record Verify the proxy configuration completed successfully, that WinHTTP can discover and communicate through the proxy server in your environment, and that the proxy server allows traffic to the Windows Defender ATP service URLs. -1. Download the connectivity verification tool to the PC where Windows Defender ATP sensor is running on. +1. Download the [connectivity verification tool](https://go.microsoft.com/fwlink/p/?linkid=823683) to the PC where Windows Defender ATP sensor is running on. -2. Extract the contents of SenseConnectivtyChecker on the endpoint. +2. Extract the contents of WDATPConnectivityAnalyzer on the endpoint. 3. Open an elevated command-line: @@ -79,15 +79,15 @@ Verify the proxy configuration completed successfully, that WinHTTP can discover ``` HardDrivePath\RunSenseConnectivityCheck.cmd ``` - Replace *HardDrivePath* with the path where the SenseConnectivtyChecker tool was downloaded to, for example + Replace *HardDrivePath* with the path where the WDATPConnectivityAnalyzer tool was downloaded to, for example ```text - C:\Work\tools\ConnectivityChecker\RunSenseConnectivityCheck.cmd + C:\Work\tools\WDATPConnectivityAnalyzer\WDATPConnectivityAnalyzercmd ``` -5. Extract the *ConnectivityCheckResult.zip* file created by tool in the folder used in the *HardDrivePath*. +5. Extract the *WDATPConnectivityAnalyzerResult.zip* file created by tool in the folder used in the *HardDrivePath*. -6. Open *ConnectivityCheck.txt* and verify that you have performed the proxy configuration steps to enable server discovery and access to the service URLs.

-The tool checks the connectivity of Windows Defender ATP service URLs that Windows Defender ATP client is configured to interact with. It then prints the results into the *ConnectivityCheck.txt* file for each URL that can potentially be used to communicate with the Windows Defender ATP services. For example: +6. Open *WDATPConnectivityAnalyzer.txt* and verify that you have performed the proxy configuration steps to enable server discovery and access to the service URLs.

+The tool checks the connectivity of Windows Defender ATP service URLs that Windows Defender ATP client is configured to interact with. It then prints the results into the *WDATPConnectivityAnalyzer.txt* file for each URL that can potentially be used to communicate with the Windows Defender ATP services. For example: ```text Testing URL : https://xxx.microsoft.com/xxx 1 - Default proxy: Succeeded (200)