From f352c1741a871264ad08156897f1e5331d7a8ed6 Mon Sep 17 00:00:00 2001 From: jcaparas Date: Tue, 3 Apr 2018 14:31:44 -0700 Subject: [PATCH] update CA content --- ...tional-access-windows-defender-advanced-threat-protection.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/windows-defender-atp/conditional-access-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/conditional-access-windows-defender-advanced-threat-protection.md index 544f49fa51..96bf15ed8c 100644 --- a/windows/security/threat-protection/windows-defender-atp/conditional-access-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/conditional-access-windows-defender-advanced-threat-protection.md @@ -47,7 +47,7 @@ In Intune, a device compliance policy is used in conjunction with Azure AD condi To resolve the high risk found on a device, you'll need to return the device to a compliant state. A device returns to a compliant state when there is no risk seen on it. -There are two ways for a risk to be removed: through manual remediation or automated remediation. +There are two ways to address a risk: through manual remediation or automated remediation. Manual remediation requires a secops admin to investigate an alert and address the risk seen on the device. The automated remediation is configured through configuration settings provided in the following section, [Configure conditional access](#configure-conditional-access).