Skip to content

Commit da128b0

Browse files
authored
Merge pull request #6208 from atikmapari/Broken-link-brenduns
Broken link Fixed
2 parents dd95ce2 + a1e5174 commit da128b0

3 files changed

Lines changed: 4 additions & 4 deletions

File tree

memdocs/intune/protect/encrypt-devices.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -180,7 +180,7 @@ All BitLocker recovery key accesses are audited. For more information on Audit L
180180

181181
When you’ve configured the tenant attach scenario, Microsoft Endpoint Manager can display recovery key data for tenant attached devices.
182182

183-
- To support the display of recovery keys for tenant attached devices, your Configuration Manager sites must run version 2107 or later. For sites that run 2107, you must install an update rollup to support Azure AD joined devices:. See [KB11121541](/configmgr/hotfix/2107/11121541).
183+
- To support the display of recovery keys for tenant attached devices, your Configuration Manager sites must run version 2107 or later. For sites that run 2107, you must install an update rollup to support Azure AD joined devices:. See [KB11121541](/mem/configmgr/hotfix/2107/11121541).
184184

185185
- To view the recovery keys, your Intune account must have the Intune RBAC permissions to view BitLocker keys, and must be associated with an on-premises user that has the related permissions for Configuration Manager of Collection Role, with Read Permission > Read BitLocker Recovery Key Permission. For more information see [Configure role-based administration for Configuration Manager](/configmgr/core/servers/deploy/configure/configure-role-based-administration).
186186

memdocs/intune/protect/mde-security-integration.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -265,7 +265,7 @@ When you select a policy, you'll see information about the device check-in statu
265265
## Known limitations and considerations
266266

267267
### Co-existence with Microsoft Endpoint Configuration Manager
268-
When using Configuration Manager, the best path for management of security policy is using the [Configuration Manager tenant attach](/memdocs/configmgr/tenant-attach/endpoint-security-get-started). In some environments it may be desired to use Security Management for Microsoft Defender. When using Security Management for Microsoft Defender with Configuration Manager, endpoint security policy should be isolated to a single control plane. Controlling policy through both channels will create the opportunity for conflicts and undesired results.
268+
When using Configuration Manager, the best path for management of security policy is using the [Configuration Manager tenant attach](/mem/configmgr/tenant-attach/endpoint-security-get-started). In some environments it may be desired to use Security Management for Microsoft Defender. When using Security Management for Microsoft Defender with Configuration Manager, endpoint security policy should be isolated to a single control plane. Controlling policy through both channels will create the opportunity for conflicts and undesired results.
269269

270270
### Active Directory joined devices
271271

memdocs/intune/protect/security-baseline-settings-windows-365.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -125,7 +125,7 @@ For general information, see [Learn about attack surface reduction rules](/micro
125125

126126
- **Enable network protection**:
127127
Baseline default: *Enable*
128-
CSP: [Defender/EnableNetworkProtection](/windows/client-management/mdm/policy-csp-defender&preserve-view=true#defender-enablenetworkprotection)
128+
CSP: [Defender/EnableNetworkProtection](/windows/client-management/mdm/policy-csp-defender#defender-enablenetworkprotection)
129129

130130
- **Block untrusted and unsigned processes that run from USB**:
131131
Baseline default: *Block*
@@ -1261,4 +1261,4 @@ Audit settings configure the events that are generated for the conditions of the
12611261
Baseline default: *Enable*
12621262
[Reference for Tamper Protection](https://support.microsoft.com/windows/prevent-changes-to-security-settings-with-tamper-protection-31d51aaa-645d-408e-6ce7-8d7f8e593f87)
12631263

1264-
::: zone-end
1264+
::: zone-end

0 commit comments

Comments
 (0)