diff --git a/windows/security/threat-protection/microsoft-defender-atp/deployment-phases.md b/windows/security/threat-protection/microsoft-defender-atp/deployment-phases.md index 103eef241c..6155038acf 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/deployment-phases.md +++ b/windows/security/threat-protection/microsoft-defender-atp/deployment-phases.md @@ -34,9 +34,11 @@ This guide helps you work across stakeholders to prepare your environment and th Each section corresponds to a separate article in this solution. -![Image of deployment phases](images/deployment-guide-phases.png) +![Image of deployment phases with details from table](images/deployment-guide-phases.png) +![Summary of deployment phases: prepare, setup, onboard](/windows/media/phase-diagrams/deployment-phases.png) + |Phase | Description | |:-------|:-----| | [Phase 1: Prepare](prepare-deployment.md)| Learn about what you need to consider when deploying Defender for Endpoint such as stakeholder approvals, environment considerations, access permissions, and adoption order of capabilities.