Skip to content

Commit ef2068e

Browse files
committed
Edits
1 parent 35b1736 commit ef2068e

1 file changed

Lines changed: 7 additions & 7 deletions

File tree

memdocs/intune/protect/atp-manage-vulnerabilities.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -35,12 +35,12 @@ When you integrate Intune with Microsoft Defender for Endpoint, you can take adv
3535

3636
## How integration works
3737

38-
After you connect Intune to Microsoft Defender for Endpoint, Defender for Endpoint receives threat and vulnerability details from managed devices.
38+
After you connect Intune to Microsoft Defender for Endpoint, Defender for Endpoint receives threat and vulnerability details from managed devices.
3939

40-
- Vulnerabilities that are discovered are not based on configurations from Intune. They are based on Microsoft Defender for Endpoint configurations and scan details.
41-
- Only issues that can be remediated by Intune are raised as security tasks for Intune.
40+
- Vulnerabilities that are discovered aren't based on configurations from Intune. They're based on Microsoft Defender for Endpoint configurations and scan details.
41+
- Not all issues that Defender for Endpoint flags for remediation support remediation through the creation of a security task for Intune.
4242

43-
In the Microsoft Defender Security Center console, Defender for Endpoint security admins review data about endpoint vulnerabilities. The admins then use a a few clicks to create security tasks that flag the vulnerable devices for remediation. The security tasks are immediately passed to the Microsoft Endpoint Manager admin center where Intune admins can view them. The security task identifies the type of vulnerability, priority, status, and the steps to take to remediate the vulnerability. The Intune admin chooses to accept or reject the task.
43+
In the Microsoft Defender Security Center console, Defender for Endpoint security admins review data about endpoint vulnerabilities. The admins then use a few clicks to create security tasks that flag the vulnerable devices for remediation. The security tasks are immediately passed to the Microsoft Endpoint Manager admin center where Intune admins can view them. The security task identifies the type of vulnerability, priority, status, and the steps to take to remediate the vulnerability. The Intune admin chooses to accept or reject the task.
4444

4545
When a task is accepted, the Intune admin then acts to remediate the vulnerability through Intune, using the guidance provided as part of the security task.
4646

@@ -87,7 +87,7 @@ Following is an example workflow for an application. This same general workflow
8787

8888
**Intune configurations for Defender for Endpoint**:
8989

90-
- Configure a service to service connection with Microsoft Defender for Endpoint.
90+
- Configure a service-to-service connection with Microsoft Defender for Endpoint.
9191
- Deploy a device configuration policy with a profile type of **Microsoft Defender for Endpoint (desktop devices running Windows 10 or later)** to devices that will have risk assessed by Defender for Endpoint.
9292

9393
For information about how to set up Intune to work with Defender for Endpoint, see [Enforce compliance for Microsoft Defender for Endpoint with Conditional Access in Intune](advanced-threat-protection-configure.md#enable-microsoft-defender-for-endpoint-in-intune).
@@ -102,7 +102,7 @@ To manage security tasks:
102102

103103
2. Select **Endpoint security** > **Security tasks**.
104104

105-
3. Select a task from the list to open a resource window that displays additional details for that security task.
105+
3. Select a task from the list to open a resource window that displays more details for that security task.
106106

107107
While viewing the security task resource window, you can select additional links:
108108

@@ -119,7 +119,7 @@ To manage security tasks:
119119

120120
6. After completing the remediation steps, open the security task and select **Complete Task**. This action updates the security task status in both Intune and Defender for Endpoint.
121121

122-
After remediation is successful, the risk exposure score in Microsoft Defender for Endpoint can drop, based on new information from the remediated devices.
122+
After remediation is successful, the risk exposure score in Defender for Endpoint can drop, based on new information from the remediated devices.
123123

124124
## Next Steps
125125

0 commit comments

Comments
 (0)