From e1170c3c7963774f2311faddf3721ca33e18da5f Mon Sep 17 00:00:00 2001 From: Gary Moore Date: Wed, 1 Apr 2020 14:22:16 -0700 Subject: [PATCH] Adjusted indentation --- .../microsoft-defender-atp/production-deployment.md | 13 +++++-------- 1 file changed, 5 insertions(+), 8 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/production-deployment.md b/windows/security/threat-protection/microsoft-defender-atp/production-deployment.md index 4592526b13..4fabe73b03 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/production-deployment.md +++ b/windows/security/threat-protection/microsoft-defender-atp/production-deployment.md @@ -69,9 +69,9 @@ Checking for the license state and whether it got properly provisioned, can be d 1. Alternately, in the admin center, navigate to **Billing** > **Subscriptions**. - - On the screen you will see all the provisioned licenses and their current **Status**. + On the screen you will see all the provisioned licenses and their current **Status**. - ![Image of billing licenses](images/atp-billing-subscriptions.png) + ![Image of billing licenses](images/atp-billing-subscriptions.png) ## Cloud Service Provider validation @@ -160,11 +160,8 @@ services if a computer is not permitted to connect to the Internet. The static proxy is configurable through Group Policy (GP). The group policy can be found under: -- Administrative Templates \> Windows Components \> Data Collection and - Preview Builds \> Configure Authenticated Proxy usage for the Connected User - Experience and Telemetry Service - - - Set it to **Enabled** and select **Disable Authenticated Proxy usage** + - Administrative Templates \> Windows Components \> Data Collection and Preview Builds \> Configure Authenticated Proxy usage for the Connected User Experience and Telemetry Service + - Set it to **Enabled** and select **Disable Authenticated Proxy usage** 1. Open the Group Policy Management Console. 2. Create a policy or edit an existing policy based off the organizational practices. @@ -261,4 +258,4 @@ You can find the Azure IP range on [Microsoft Azure Datacenter IP Ranges](https: ## Next step ||| |:-------|:-----| -|![Phase 3: Onboard](images/onboard.png)
[Phase 3: Onboard](onboarding.md) | Onboard devices to the service so the Microsoft Defender ATP service can get sensor data from them \ No newline at end of file +|![Phase 3: Onboard](images/onboard.png)
[Phase 3: Onboard](onboarding.md) | Onboard devices to the service so the Microsoft Defender ATP service can get sensor data from them