From 203a801c3b59c9958882836138a006881903df30 Mon Sep 17 00:00:00 2001 From: Toon Dillen Date: Sun, 26 Apr 2020 15:50:54 +0200 Subject: [PATCH 1/2] Typo correction --- .../microsoft-defender-atp/onboarding-notification.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/onboarding-notification.md b/windows/security/threat-protection/microsoft-defender-atp/onboarding-notification.md index e403692a49..98d03e3cb6 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/onboarding-notification.md +++ b/windows/security/threat-protection/microsoft-defender-atp/onboarding-notification.md @@ -22,7 +22,7 @@ ms.topic: article **Applies to:** - [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) -Create a notification rule so that when a local onboarding or offboardiing script is used, you'll be notified. +Create a notification rule so that when a local onboarding or offboarding script is used, you'll be notified. ## Before you begin You'll need to have access to: From efc8cf2042ca607c6dc658c038b90d3a138152dd Mon Sep 17 00:00:00 2001 From: Tina Burden Date: Wed, 17 Feb 2021 11:21:01 -0800 Subject: [PATCH 2/2] pencil edit --- .../microsoft-defender-atp/onboarding-notification.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/onboarding-notification.md b/windows/security/threat-protection/microsoft-defender-atp/onboarding-notification.md index 4f37d44693..1cdfe2f6b4 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/onboarding-notification.md +++ b/windows/security/threat-protection/microsoft-defender-atp/onboarding-notification.md @@ -72,7 +72,7 @@ You'll need to have access to: - Audience: `https://securitycenter.onmicrosoft.com/windowsatpservice\` - Client ID: Sign-in to https://portal.azure.com and navigate to **Azure Active Directory > App Registrations** and get the Client ID value. - Credential Type: Select "Secret". - - Secret: Sign-in to https://portal.azure.com and navigate tnd navigate to **Azure Active Directory > App Registrations** and get the Tenant ID value. + - Secret: Sign-in to https://portal.azure.com and navigate to **Azure Active Directory > App Registrations** and get the Tenant ID value. ![Image of the HTTP conditions](images/http-conditions.png)