From f2721fc355854ef0b4106bbf99496b5bdf1e7794 Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Thu, 2 Jul 2020 15:00:09 -0700 Subject: [PATCH] remove en-us --- .../microsoft-defender-atp/grant-mssp-access.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/grant-mssp-access.md b/windows/security/threat-protection/microsoft-defender-atp/grant-mssp-access.md index 69e69b4053..1a150684ba 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/grant-mssp-access.md +++ b/windows/security/threat-protection/microsoft-defender-atp/grant-mssp-access.md @@ -29,9 +29,9 @@ To implement a multi-tenant delegated access solution take the following steps: 1. Enable [role-based access control](rbac.md) in Microsoft Defender ATP and connect with Active Directory (AD) groups. -2. Configure [Governance Access Packages](https://docs.microsoft.com/en-us/azure/active-directory/governance/identity-governance-overview) for access request and provisioning. +2. Configure [Governance Access Packages](https://docs.microsoft.com/azure/active-directory/governance/identity-governance-overview) for access request and provisioning. -3. Manage access requests and audits in [Microsoft Myaccess](https://docs.microsoft.com/en-us/azure/active-directory/governance/entitlement-management-request-approve). +3. Manage access requests and audits in [Microsoft Myaccess](https://docs.microsoft.com/azure/active-directory/governance/entitlement-management-request-approve). ## Enable role-based access controls in Microsoft Defender ATP