From ef670a86ff4d7588215273c545e100353d705c69 Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Fri, 9 Apr 2021 08:38:43 -0700 Subject: [PATCH] Update control-usb-devices-using-intune.md --- .../device-control/control-usb-devices-using-intune.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/device-control/control-usb-devices-using-intune.md b/windows/security/threat-protection/device-control/control-usb-devices-using-intune.md index 0707fe03dc..ac4e7c42c4 100644 --- a/windows/security/threat-protection/device-control/control-usb-devices-using-intune.md +++ b/windows/security/threat-protection/device-control/control-usb-devices-using-intune.md @@ -265,7 +265,7 @@ This can be done by setting **Untrusted and unsigned processes that run from USB With this rule, admins can prevent or audit unsigned or untrusted executable files from running from USB removable drives, including SD cards. Affected file types include executable files (such as .exe, .dll, or .scr) and script files such as a PowerShell (.ps), VisualBasic (.vbs), or JavaScript (.js) files. -These settings require [enabling real-time protection](../microsoft-defender-antivirus/configure-real-time-protection-microsoft-defender-antivirus.md). +These settings require [enabling real-time protection](/microsoft-365/security/defender-endpoint/configure-real-time-protection-microsoft-defender-antivirus). 1. Sign in to the [Microsoft Endpoint Manager](https://endpoint.microsoft.com/). 2. Click **Devices** > **Windows** > **Configuration Policies** > **Create profile**.