From ca491dabe59093bd8cb19000e40d5bef2326b005 Mon Sep 17 00:00:00 2001 From: ManikaDhiman Date: Thu, 19 Sep 2019 12:39:47 -0700 Subject: [PATCH] minor update --- .../device-control/control-usb-devices-using-intune.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/device-control/control-usb-devices-using-intune.md b/windows/security/threat-protection/device-control/control-usb-devices-using-intune.md index 152149fa52..27fe7b7ee3 100644 --- a/windows/security/threat-protection/device-control/control-usb-devices-using-intune.md +++ b/windows/security/threat-protection/device-control/control-usb-devices-using-intune.md @@ -185,7 +185,7 @@ Microsoft Defender ATP blocks installation and usage of prohibited peripherals b ### Limit services that use Bluetooth -Using Intune, you can limit the services that can use Bluetooth through the “Bluetooth allowed services”. The default state of [Bluetooth allowed services](https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-bluetooth#servicesallowedlist-usage-guide) settings means everything is allowed. As soon as a service is added, that becomes the allowed list. If the customer adds the Keyboards and Mice values, and doesn’t add the file transfer GUIDs, file transfer should be blocked. +Using Intune, you can limit the services that can use Bluetooth through the ["Bluetooth allowed services"](https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-bluetooth#servicesallowedlist-usage-guide). The default state of "Bluetooth allowed services" settings means everything is allowed. As soon as a service is added, that becomes the allowed list. If the customer adds the Keyboards and Mice values, and doesn’t add the file transfer GUIDs, file transfer should be blocked. ![Bluetooth](images/bluetooth.png)