fix warnings

This commit is contained in:
Joey Caparas 2018-08-25 14:18:09 -07:00
parent 7c7f8e0dac
commit e4cba3d934
3 changed files with 5 additions and 4 deletions

View File

@ -70,10 +70,10 @@ Adding a guest user is done in a similar way to regular users. They must be adde
If you're using basic permissions to access the portal, the guest user must be assigned a Security Administrator role. For more information, see [Use basic permissions to access the portal](basic-permissions-windows-defender-advanced-threat-protection.md).
If you're using role-based access control (RBAC), the guest user must be to added to the appropriate group or groups. Fore more information on RBAC in Windows Defender ATP, see [Manage portal access using RBAC](rbac-windows-defender-advanced-threat-protection).
If you're using role-based access control (RBAC), the guest user must be to added to the appropriate group or groups. Fore more information on RBAC in Windows Defender ATP, see [Manage portal access using RBAC](rbac-windows-defender-advanced-threat-protection.md).
>[!NOTE]
> There is no difference between the Member user and Guest user roles from RBAC perspective.
>There is no difference between the Member user and Guest user roles from RBAC perspective.
It is recommended that groups are created for MSSPs to make authorization access more manageable.

View File

@ -52,7 +52,7 @@ Windows Defender ATP integrates with Azure Security Center to provide a comprehe
- Incidents queue <br>
- [Integration with Microsoft Cloud App Security](overview-mcas-integration.md)<br>
- [Integration with Microsoft Cloud App Security](microsoft-cloud-app-security-integration.md)<br>
Microsoft Cloud App Security leverages Windows Defender ATP endpoint signals to allow direct visibility into cloud application usage including the use of unsupported cloud services (shadow IT) from all Windows Defender ATP monitored machines.

View File

@ -53,7 +53,8 @@ The** Mitigation recommendations** section provides specific actionable recommen
The **Mitigation status** and **Mitigation status over time** shows the endpoint configuration status assessed based on the recommended mitigations. Clicking on the **Mitigated** or **Unmitigated** parts of the pies brings you to the Machines list filtered based on the machines that are missing at least one specific threat mitigation.
>[!NOTE]:
>[!NOTE]
>The Unavailable category indicates that there is no data available from the specific machine yet.