From c9ef09f6c043d522dd16e13b1e31676f6deed85b Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Fri, 17 Jan 2020 15:36:39 -0800 Subject: [PATCH] fix issues --- .../microsoft-defender-atp/investigate-behind-proxy.md | 1 - .../microsoft-defender-atp/prepare-deployment.md | 2 +- .../microsoft-defender-atp/production-deployment.md | 2 +- .../administer-security-policy-settings.md | 2 ++ 4 files changed, 4 insertions(+), 3 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/investigate-behind-proxy.md b/windows/security/threat-protection/microsoft-defender-atp/investigate-behind-proxy.md index 9470494d18..88ac0b8be9 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/investigate-behind-proxy.md +++ b/windows/security/threat-protection/microsoft-defender-atp/investigate-behind-proxy.md @@ -86,4 +86,3 @@ DeviceNetworkEvents ## Related topics - [Applying network protection with GP - policy CSP](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-defender#defender-enablenetworkprotection) -- [Protect your network](https://docs.microsoft.comwindows/security/threat-protection/windows-defender-exploit-guard/network-protection-exploit-guard) \ No newline at end of file diff --git a/windows/security/threat-protection/microsoft-defender-atp/prepare-deployment.md b/windows/security/threat-protection/microsoft-defender-atp/prepare-deployment.md index 3bcf6ebefb..60c0833058 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/prepare-deployment.md +++ b/windows/security/threat-protection/microsoft-defender-atp/prepare-deployment.md @@ -133,7 +133,7 @@ structure required for your environment. |--------|-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|---------------------| | Tier 1 | **Local security operations team / IT team**
This team usually triages and investigates alerts contained within their geolocation and escalates to Tier 2 in cases where an active remediation is required. | | | Tier 2 | **Regional security operations team**
This team can see all the machines for their region and perform remediation actions. | View data | -| Tier 3 | **Global security operations team**
This team consists of security experts and are authorized to see and perform all actions from the portal. | View data
Alerts investigation Active remediation ctions
Alerts investigation Active remediation actions
Manage portal system settings
Manage security settings | +| Tier 3 | **Global security operations team**
This team consists of security experts and are authorized to see and perform all actions from the portal. | View data
Alerts investigation Active remediation actions
Alerts investigation Active remediation actions
Manage portal system settings
Manage security settings | diff --git a/windows/security/threat-protection/microsoft-defender-atp/production-deployment.md b/windows/security/threat-protection/microsoft-defender-atp/production-deployment.md index 636c4f6e3d..4e93583820 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/production-deployment.md +++ b/windows/security/threat-protection/microsoft-defender-atp/production-deployment.md @@ -375,7 +375,7 @@ To deploy the MMA with System Center Configuration Manager, follow the steps below to utilize the provided batch files to onboard the systems. The CMD file when executed, will require the system to copy files from a network share by the System, the System will install MMA, Install the DependencyAgent, and configure -MMA for enrolment into the workspace. +MMA for enrollment into the workspace. 1. In System Center Configuration Manager console, navigate to **Software diff --git a/windows/security/threat-protection/security-policy-settings/administer-security-policy-settings.md b/windows/security/threat-protection/security-policy-settings/administer-security-policy-settings.md index f337a0aae0..b777bb0066 100644 --- a/windows/security/threat-protection/security-policy-settings/administer-security-policy-settings.md +++ b/windows/security/threat-protection/security-policy-settings/administer-security-policy-settings.md @@ -99,6 +99,7 @@ Over time, new ways to manage security policy settings have been introduced, whi + ## Using the Local Security Policy snap-in @@ -208,6 +209,7 @@ The following table lists the features of the Security Configuration Manager. + ### Security Configuration and Analysis