Skip to content

Commit 03e9396

Browse files
authored
Merge pull request #1618 from MicrosoftDocs/chrisda
Chrisda to Main
2 parents d10fe76 + a76fb2a commit 03e9396

File tree

2 files changed

+5
-5
lines changed

2 files changed

+5
-5
lines changed

defender-endpoint/onboard-downlevel.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -180,7 +180,7 @@ Follow the steps in [Run a detection test on a newly onboarded device](run-detec
180180
1. Download the following and place them in the MMA folder:
181181

182182
- Update for customer experience and diagnostic telemetry:
183-
- [For Windows Server 2008 R2 x64](https://www.microsoft.com/download/details.aspx?familyid=1bd1d18d-4631-4d8e-a897-327925765f71)
183+
- [For Windows Server 2008 R2 x64](https://www.microsoft.com/download/details.aspx?id=48641)
184184

185185
For Windows Server 2008 R2 SP1, following updates are also required:
186186

defender-xdr/microsoft-365-security-center-mde.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ To use Microsoft Defender for Endpoint in the Microsoft Defender portal, you nee
3939

4040
In addition, confirm that you have the requirements on hardware and software, browser, network connectivity, and compatibility with Microsoft Defender Antivirus. For more information, see [Microsoft Defender for Endpoint minimum requirements](/defender-endpoint/minimum-requirements).
4141

42-
You also need to have the required permissions to access the Microsoft Defender portal. For more information, see [Use basic permissions to access the portal](/defender-endpoint/basic-permissions.md).
42+
You also need to have the required permissions to access the Microsoft Defender portal. For more information, see [Use basic permissions to access the portal](/defender-endpoint/basic-permissions).
4343

4444
## What to expect
4545

@@ -67,7 +67,7 @@ The [Action center](m365d-action-center.md) shows you the investigations created
6767

6868
:::image type="content" source="/defender/media/portal/mde-in-portal/action-center-mde-small.png" alt-text="Screenshot of the Action center in the Microsoft Defender portal." lightbox="/defender/media/portal/mde-in-portal/action-center-mde.png":::
6969

70-
You can submit files, email attachments, and URLs to Microsoft Defender for analysis in the [Submission portal](/defender-endpoint/admin-submissions-mde.md). You can also view the status of the submissions and the results of the analysis. Navigate to the submssions page under **Investigation & response > Actions & submissions > Submissions**.
70+
You can submit files, email attachments, and URLs to Microsoft Defender for analysis in the [Submission portal](/defender-endpoint/admin-submissions-mde). You can also view the status of the submissions and the results of the analysis. Navigate to the submssions page under **Investigation & response > Actions & submissions > Submissions**.
7171

7272
### Threat intelligence
7373

@@ -83,7 +83,7 @@ The **Assets > Devices** page contains the [device inventory](/defender-endpoint
8383

8484
### Microsoft Defender for Vulnerability Management and endpoint configuration management
8585

86-
You can find [Microsoft Defender Vulnerability Management](/defender-vulnerability-management/defender-vulnerability-management) dashboard under **Endpoints > Vulnerability management**. Defender for Vulnerability Management helps you discover, prioritize, and remediate vulnerabilities in your network. Know more about [prerequisites and permissions](/defender-vulnerability-management/tvm-prerequisites) and how to [onboard devices to Defender Vulnerability Management](/defender-vulnerability-management/mdvm-onboard-devices.md).
86+
You can find [Microsoft Defender Vulnerability Management](/defender-vulnerability-management/defender-vulnerability-management) dashboard under **Endpoints > Vulnerability management**. Defender for Vulnerability Management helps you discover, prioritize, and remediate vulnerabilities in your network. Know more about [prerequisites and permissions](/defender-vulnerability-management/tvm-prerequisites) and how to [onboard devices to Defender Vulnerability Management](/defender-vulnerability-management/mdvm-onboard-devices).
8787

8888
The device configuration dashboard is found in **Endpoints > Configuration management > Dashboard**. You can view device security, onboarding via Microsoft Intune and Microsoft Defender for Endpoint, web protection coverage, and attack surface management at a glance.
8989

@@ -105,7 +105,7 @@ In the **Settings > Device discovery** page, you can configure device discovery
105105

106106
#### Endpoint settings
107107

108-
Navigate to the **Settings > Endpoints** page to configure settings for Microsoft Defender for Endpoint, including [advanced features](/defender-endpoint/advanced-features.md), email notifications, permissions, and more.
108+
Navigate to the **Settings > Endpoints** page to configure settings for Microsoft Defender for Endpoint, including [advanced features](/defender-endpoint/advanced-features), email notifications, permissions, and more.
109109

110110
:::image type="content" source="/defender/media/portal/mde-in-portal/settings-mde-small.png" alt-text="Screenshot of the Settings page in the Microsoft Defender portal where endpoint settings are highlighted." lightbox="/defender/media/portal/mde-in-portal/settings-mde.png":::
111111

0 commit comments

Comments
 (0)