mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-28 13:17:23 +00:00
fix warnings
This commit is contained in:
parent
7c7f8e0dac
commit
e4cba3d934
@ -70,10 +70,10 @@ Adding a guest user is done in a similar way to regular users. They must be adde
|
||||
|
||||
If you're using basic permissions to access the portal, the guest user must be assigned a Security Administrator role. For more information, see [Use basic permissions to access the portal](basic-permissions-windows-defender-advanced-threat-protection.md).
|
||||
|
||||
If you're using role-based access control (RBAC), the guest user must be to added to the appropriate group or groups. Fore more information on RBAC in Windows Defender ATP, see [Manage portal access using RBAC](rbac-windows-defender-advanced-threat-protection).
|
||||
If you're using role-based access control (RBAC), the guest user must be to added to the appropriate group or groups. Fore more information on RBAC in Windows Defender ATP, see [Manage portal access using RBAC](rbac-windows-defender-advanced-threat-protection.md).
|
||||
|
||||
>[!NOTE]
|
||||
> There is no difference between the Member user and Guest user roles from RBAC perspective.
|
||||
>There is no difference between the Member user and Guest user roles from RBAC perspective.
|
||||
|
||||
It is recommended that groups are created for MSSPs to make authorization access more manageable.
|
||||
|
||||
|
@ -52,7 +52,7 @@ Windows Defender ATP integrates with Azure Security Center to provide a comprehe
|
||||
|
||||
- Incidents queue <br>
|
||||
|
||||
- [Integration with Microsoft Cloud App Security](overview-mcas-integration.md)<br>
|
||||
- [Integration with Microsoft Cloud App Security](microsoft-cloud-app-security-integration.md)<br>
|
||||
Microsoft Cloud App Security leverages Windows Defender ATP endpoint signals to allow direct visibility into cloud application usage including the use of unsupported cloud services (shadow IT) from all Windows Defender ATP monitored machines.
|
||||
|
||||
|
||||
|
@ -53,7 +53,8 @@ The** Mitigation recommendations** section provides specific actionable recommen
|
||||
The **Mitigation status** and **Mitigation status over time** shows the endpoint configuration status assessed based on the recommended mitigations. Clicking on the **Mitigated** or **Unmitigated** parts of the pies brings you to the Machines list filtered based on the machines that are missing at least one specific threat mitigation.
|
||||
|
||||
|
||||
>[!NOTE]:
|
||||
|
||||
>[!NOTE]
|
||||
>The Unavailable category indicates that there is no data available from the specific machine yet.
|
||||
|
||||
|
||||
|
Loading…
x
Reference in New Issue
Block a user