Skip to content

Commit 8c09284

Browse files
MDE Doc Update by GK
1 parent c05a79f commit 8c09284

1 file changed

Lines changed: 8 additions & 8 deletions

File tree

memdocs/configmgr/protect/deploy-use/defender-advanced-threat-protection.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -90,7 +90,7 @@ Up-level clients require an onboarding configuration file for onboarding to Micr
9090
- Windows Server 2019
9191
- Windows Server 2022
9292

93-
Down-level operating systems that supports MDE Client include:
93+
Down-level operating systems that support MDE Client include:
9494
- Windows Server 2012 R2
9595
- Windows Server 2016
9696

@@ -100,7 +100,7 @@ Down-level operating systems that supports MDE Client include:
100100
1. Select **Settings**, then select **Onboarding** under the **Endpoint** heading.
101101
1. For the operating system, select **Windows 10 and 11**.
102102
1. Choose **Microsoft Endpoint Configuration Manager current branch and later** for the deployment method.
103-
1. Click **Download package**.
103+
1. Select **Download package**.
104104
1. Download the compressed archive (.zip) file and extract the contents.
105105
> [!Note]
106106
> The steps have you download the onboarding file for Windows 10 and 11 but this file is also used for up-level Server operating systems.
@@ -134,7 +134,7 @@ Down-level operating systems that supports MDE Client include:
134134
1. Select **Settings**, then select **Onboarding** under the **Endpoints** heading.
135135
1. For the operating system, select **Windows 10 and 11**.
136136
1. Choose **Microsoft Endpoint Configuration Manager current branch and later** for the deployment method.
137-
1. Click **Download package**.
137+
1. Select **Download package**.
138138

139139
:::image type="content" source="media/5229962-onboarding-configuration.png" alt-text="Onboarding configuration file download" lightbox="media/5229962-onboarding-configuration.png":::
140140

@@ -157,7 +157,7 @@ Down-level operating systems that supports MDE Client include:
157157
1. Select **Create Microsoft Defender ATP Policy** to open the policy wizard.
158158
1. Type the **Name** and **Description** for the Microsoft Defender for Endpoint policy and select **Onboarding**.
159159
1. **Browse** to the configuration file you extracted from the downloaded .zip file.
160-
1. Supply the **Workspace key** and **Workspace ID** then click **Next**.
160+
1. Supply the **Workspace key** and **Workspace ID** then select **Next**.
161161
- Verify that the **Workspace key** and **Workspace ID** are in the correct fields. The order in the console may vary from the order in Microsoft Defender for Endpoint online service. <!--8538605-->
162162
:::image type="content" source="media/5229962-create-atp-policy-wizard.png" alt-text="Create Microsoft Defender for Endpoint Policy Wizard" lightbox="media/5229962-create-atp-policy-wizard.png":::
163163

@@ -204,7 +204,7 @@ When you onboard devices to Microsoft Defender for Endpoint with Configuration M
204204
1. Select **Settings**, then select **Onboarding** under the **Endpoints** heading.
205205
1. For the operating system, select **Windows 10 and 11**.
206206
1. Choose **Microsoft Endpoint Configuration Manager current branch and later** for the deployment method.
207-
1. Click **Download package**.
207+
1. Select **Download package**.
208208

209209
:::image type="content" source="media/5229962-onboarding-configuration.png" alt-text="Onboarding configuration file download" lightbox="media/5229962-onboarding-configuration.png":::
210210
1. Download the compressed archive (.zip) file and extract the contents.
@@ -223,7 +223,7 @@ When you onboard devices to Microsoft Defender for Endpoint with Configuration M
223223
1. Select **Create Microsoft Defender ATP Policy** to open the policy wizard.
224224
1. Type the **Name** and **Description** for the Microsoft Defender for Endpoint policy and select **Onboarding**.
225225
1. **Browse** to the configuration file you extracted from the downloaded .zip file.
226-
1. Supply the **Workspace key** and **Workspace ID** then click **Next**.
226+
1. Supply the **Workspace key** and **Workspace ID** then select **Next**.
227227
- Verify that the **Workspace key** and **Workspace ID** are in the correct fields. The order in the console may vary from the order in Microsoft Defender for Endpoint online service. <!--8538605-->
228228
:::image type="content" source="media/5229962-create-atp-policy-wizard.png" alt-text="Create Microsoft Defender for Endpoint Policy Wizard" lightbox="media/5229962-create-atp-policy-wizard.png":::
229229

@@ -254,7 +254,7 @@ If your target collection contains both up-level and down-level devices, or if y
254254
1. Select **Settings**, then select **Onboarding** under the **Endpoint** heading.
255255
1. For the operating system, select **Windows 10 and 11**.
256256
1. Choose **Microsoft Endpoint Configuration Manager current branch and later** for the deployment method.
257-
1. Click **Download package**.
257+
1. Select **Download package**.
258258
1. Download the compressed archive (.zip) file and extract the contents.
259259
> [!Note]
260260
> The steps have you download the onboarding file for Windows 10 and 11 but this file is also used for up-level Server operating systems.
@@ -298,7 +298,7 @@ If your target collection contains both up-level and down-level devices, or if y
298298
1. Sign in to the [Microsoft Defender Security Center](https://securitycenter.windows.com/).
299299
1. Select **Settings**, then select **Offboarding** under the **Endpoint** heading.
300300
1. Select **Windows 10 and 11** for the operating system and **Microsoft Endpoint Configuration Manager current branch and later** for the deployment method.
301-
- Using the **Windows 10 and 11** option ensures that all devices in the collection are offboarded and the MMA is uninstalled when needed.
301+
- Using the **Windows 10 and 11** option ensures that all devices in the collection are off boarded and the MMA is uninstalled when needed.
302302
1. Download the compressed archive (.zip) file and extract the contents. Offboarding files are valid for 30 days.
303303

304304
1. In the Configuration Manager console, navigate to **Assets and Compliance** > **Endpoint Protection** > **Microsoft Defender ATP Policies** and select **Create Microsoft Defender ATP Policy**. The policy wizard opens.

0 commit comments

Comments
 (0)