From f8638b52b2b89dd25b9db40b91a5755021da1898 Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Tue, 25 Aug 2020 10:53:50 -0700 Subject: [PATCH] update section name --- .../onboarding-endpoint-manager.md | 22 ++++++------------- 1 file changed, 7 insertions(+), 15 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/onboarding-endpoint-manager.md b/windows/security/threat-protection/microsoft-defender-atp/onboarding-endpoint-manager.md index a0bbbf41cc..1bdf12f7cd 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/onboarding-endpoint-manager.md +++ b/windows/security/threat-protection/microsoft-defender-atp/onboarding-endpoint-manager.md @@ -76,9 +76,6 @@ needs.
4. Add your test user or device. - >[!NOTE] - >Azure Active Directory groups can contain users or devices, not combinations of both. - 5. From the **Groups > All groups** pane, open your new group. 6. Select **Members > Add members**. @@ -89,7 +86,7 @@ needs.
8. Your testing group now has a member to test. -## Create a configuration policy +## Create configuration policies In the following section, you'll create a number of configuration policies. First is a configuration policy to select which groups of users or devices will be onboarded to Microsoft Defender ATP. Then you will continue by creating several @@ -116,10 +113,8 @@ different types of Endpoint security policies. ![Image of Microsoft Endpoint Manager portal](images/cea7e288b5d42a9baf1aef0754ade910.png) >[!NOTE] - >In this instance, this has been auto populated as Microsoft Defender ATP has already been integrated with Intune. For more information on the integration, see [Enable Microsoft Defender ATP in Intune](https://docs.microsoft.com/mem/intune/protect/advanced-threat-protection#enable-microsoft-defender-atp-in-intune).
- >If you have not integrated Microsoft Defender ATP and Intune, complete [these - steps](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-mdm#onboard-machines-using-microsoft-intune) - to create and upload an onboarding blob. + >In this instance, this has been auto populated as Microsoft Defender ATP has already been integrated with Intune. For more information on the integration, see [Enable Microsoft Defender ATP in Intune](https://docs.microsoft.com/mem/intune/protect/advanced-threat-protection-configure#to-enable-microsoft-defender-atp).
+ ![Image of Microsoft Endpoint Manager portal](images/2466460812371ffae2d19a10c347d6f4.png) @@ -184,9 +179,6 @@ different types of Endpoint security policies. 3. Select **Create Policy**. - >[!NOTE] - >We will be setting these as Audit. - 4. Select **Platform - Windows 10 and Later – Profile - Attack surface reduction rules > Create**. @@ -339,13 +331,13 @@ To confirm that the configuration policy has been applied to your test device, f 1. Before applying the policy on a test device, pen a PowerShell Window and type `Get-MpPreference`. -2. This should respond with the following lines with no content +2. This should respond with the following lines with no content: - 1. AttackSurfaceReductionOnlyExclusions: + AttackSurfaceReductionOnlyExclusions: - 2. AttackSurfaceReductionRules_Actions: + AttackSurfaceReductionRules_Actions: - 3. AttackSurfaceReductionRules_Ids: + AttackSurfaceReductionRules_Ids: ![Image of command line](images/cb0260d4b2636814e37eee427211fe71.png)