From b71b9ee393827bfc16630c59055e5583fc1553ac Mon Sep 17 00:00:00 2001 From: jcaparas Date: Mon, 16 Apr 2018 06:26:02 -0700 Subject: [PATCH] automated inv --- ...tional-access-windows-defender-advanced-threat-protection.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/windows-defender-atp/conditional-access-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/conditional-access-windows-defender-advanced-threat-protection.md index 202fd179bd..c6a7cd6d3c 100644 --- a/windows/security/threat-protection/windows-defender-atp/conditional-access-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/conditional-access-windows-defender-advanced-threat-protection.md @@ -53,7 +53,7 @@ In Intune, a device compliance policy is used in conjunction with Azure AD condi To resolve the risk found on a device, you'll need to return the device to a compliant state. A device returns to a compliant state when there is no risk seen on it. There are three ways to address a risk: -1. Use Manual or auto remediation. +1. Use Manual or automated remediation. 2. Resolve active alerts on the machine. This will remove the risk from the machine. 3. You can remove the machine from the active policies and consequently, conditional access will not be applied on the machine.