fixing links

This commit is contained in:
Brian Lich 2016-03-11 15:55:43 -08:00
parent 9da9a0ce14
commit a75c0ec742
4 changed files with 4 additions and 5 deletions

View File

@ -18,7 +18,6 @@ author: CFaw
**In this article**
- [](#)
- [Related topics](#related-topics)
In this topic, you will learn how to monitor a Windows 10 deployment that was started previously using Microsoft System Center 2012 R2 Configuration Manager and the Microsoft Deployment Toolkit (MDT) Deployment Workbench. You will also use the Deployment Workbench to access the computer remotely via the Microsoft Diagnostics and Recovery Toolkit (DaRT) Remote Connection feature.

View File

@ -531,7 +531,7 @@ In addition, a growing number of organizations are being required to store archi
Before deploying the audit policy in a production environment, it is critical that you determine the effects of the policy settings that you have configured.
The first step in assessing your audit policy deployment is to create a test environment in a lab and use it to simulate the various use scenarios that you have identified to confirm that the audit settings you have selected are configured correctly and generate the type of results you intend. For more information about setting up a lab environment for testing security audit policy, see the [Advanced security auditing walkthrough](../keep-secure/advanced-security-auditing-walkthrough.md).
The first step in assessing your audit policy deployment is to create a test environment in a lab and use it to simulate the various use scenarios that you have identified to confirm that the audit settings you have selected are configured correctly and generate the type of results you intend.
However, unless you are able to run fairly realistic simulations of network usage patterns, a lab setup cannot provide you with accurate information about the volume of audit data that the audit policy settings you selected will generate and how effective your plan for monitoring audit data will be. To provide this type of information, you need to conduct one or more pilot deployments. These pilot deployments could involve:

View File

@ -1102,7 +1102,7 @@ For more information please see the following:</p>
<p>To troubleshoot this event:
<ol>
<li>Update the definitions. Either:<ol>
<li>Click the <b>Update definitions</b> button on the <b>Update</b> tab in Windows Defender. <img src="images/Defender_UpdateDefs.png" alt="Update definitions in Windows Defender"/><p>Or,</p>
<li>Click the <b>Update definitions</b> button on the <b>Update</b> tab in Windows Defender. <img src="images/defender-updatedefs.png" alt="Update definitions in Windows Defender"/><p>Or,</p>
</li>
<li>Download the latest definitions from the <a href="http://go.microsoft.com/fwlink/?LinkID=200965">Microsoft Malware Protection Center</a>.
@ -1204,7 +1204,7 @@ For more information please see the following:</p>
<p>To troubleshoot this event:
<ol>
<li>Update the definitions. Either:<ol>
<li>Click the <b>Update definitions</b> button on the <b>Update</b> tab in Windows Defender. <img src="images/Defender_UpdateDefs.png" alt="Update definitions in Windows Defender"/><p>Or,</p>
<li>Click the <b>Update definitions</b> button on the <b>Update</b> tab in Windows Defender. <img src="images/defender-updatedefs.png" alt="Update definitions in Windows Defender"/><p>Or,</p>
</li>
<li>Download the latest definitions from the <a href="http://go.microsoft.com/fwlink/?LinkID=200965">Microsoft Malware Protection Center</a>.

View File

@ -110,7 +110,7 @@ Removing apps from inventory is not currently supported.
 
The actions in the table are how you distribute apps, and manage app licenses. We'll cover those in the next sections. Working with offline-licensed apps has different steps. For more information on distributing offline-licensed apps, see [Distribute offline apps](distribute-offline-apps.md).
The actions in the table are how you distribute apps, and manage app licenses. We'll cover those in the next sections. Working with offline-licensed apps has different steps.
### Distribute apps