From 99e1aa394774d4829c471a2638bfcfab02c289d7 Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Mon, 29 Jun 2020 13:07:12 -0700 Subject: [PATCH] Update symantec-to-microsoft-defender-atp-onboard.md --- .../symantec-to-microsoft-defender-atp-onboard.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-onboard.md b/windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-onboard.md index 40e120cd03..650bbf5900 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-onboard.md +++ b/windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-onboard.md @@ -56,7 +56,7 @@ To verify that your onboarded devices are properly connected to Microsoft Defend |Operating system |Guidance | |---------|---------| -|Windows 10
Windows Server 2019
Windows Server, version 1803
Windows Server 2016
Windows Server 2012 R2 |[Run a detection test](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/run-detection-test) | +|Windows 10
Windows Server 2019
Windows Server, version 1803
Windows Server 2016
Windows Server 2012 R2 |See [Run a detection test](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/run-detection-test).

Visit the Microsoft Defender ATP demo scenarios site ([https://demo.wd.microsoft.com](https://demo.wd.microsoft.com)) and try one or more of the scenarios. For example, try the **Cloud-delivered protection** demo scenario. | |macOS
- 10.15 (Catalina)
- 10.14 (Mojave)
- 10.13 (High Sierra) |Using Terminal, run the following command:
`$ mdatp --connectivity-test`

For more information, see [Microsoft Defender Advanced Threat Protection for Mac](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-atp-mac) | |Linux |1. Run the following command, and look for a result of **1**:
`mdatp health --field real_time_protection_enabled`

2. Open a Terminal window, and run the following command:
`curl -o ~/Downloads/eicar.com.txt https://www.eicar.org/download/eicar.com.txt`

3. Run the following command to list any detected threats:
`mdatp threat list`

For more information, see [Microsoft Defender ATP for Linux](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-atp-linux). |