Skip to content

Commit 221773a

Browse files
committed
fixes
1 parent c2579c4 commit 221773a

File tree

2 files changed

+2
-2
lines changed

2 files changed

+2
-2
lines changed

defender-endpoint/onboard-server.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ The following table lists deployment methods for onboarding servers:
3737

3838
|Operating system|Deployment method|
3939
|---|---|
40-
| Windows Server 2022 <br/>Windows Server 2019<br/>Windows Server, version 1803 | [Local script](configure-endpoints-script.md) (uses an onboarding package)<br/>[Defender for Cloud](/azure/defender-for-cloud/plan-defender-for-servers), which [integrates with Defender for Endpoint](azure-server-integration.md)<br/> [Microsoft Configuration Manager](/mem/configmgr/protect/deploy-use/defender-advanced-threat-protection) <br/> [Group Policy](configure-endpoints-gp.md) <br/>[VDI scripts](configure-endpoints-vdi.md) |
40+
| Windows Server 2025 <br/>Windows Server 2022 <br/>Windows Server 2019<br/>Windows Server, version 1803 | [Local script](configure-endpoints-script.md) (uses an onboarding package)<br/>[Defender for Cloud](/azure/defender-for-cloud/plan-defender-for-servers), which [integrates with Defender for Endpoint](azure-server-integration.md)<br/> [Microsoft Configuration Manager](/mem/configmgr/protect/deploy-use/defender-advanced-threat-protection) <br/> [Group Policy](configure-endpoints-gp.md) <br/>[VDI scripts](configure-endpoints-vdi.md) |
4141
| Windows Server 2016 <br/>Windows Server 2012 R2 | [Modern unified solution in Defender for Endpoint](/defender-endpoint/configure-server-endpoints#windows-server-2016-and-windows-server-2012-r2) |
4242
|Linux Server <br/>(see [System requirements](microsoft-defender-endpoint-linux.md#system-requirements)) |[Local script](linux-install-manually.md) (manual deployment) <br/> [Puppet](linux-install-with-puppet.md) <br/> [Ansible](linux-install-with-ansible.md) <br/> [Chef](linux-deploy-defender-for-endpoint-with-chef.md)<br/> [Saltstack](linux-install-with-saltack.md)<br/>[Defender for Endpoint on Linux for ARM64-based devices (preview)](mde-linux-arm.md)<br/>[Deployment guidance for Defender for Endpoint on Linux for SAP](mde-linux-deployment-on-sap.md) <br/>[Advanced deployment guidance for Microsoft Defender for Endpoint on Linux](comprehensive-guidance-on-linux-deployment.md)|
4343

defender-endpoint/prevent-changes-to-security-settings-with-tamper-protection.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -71,7 +71,7 @@ Tamper protection doesn't prevent you from viewing your security settings. And,
7171
Tamper protection is available for devices that are running one of the following versions of Windows:
7272

7373
- Windows 10 and 11 (including Enterprise multi-session)
74-
- Windows Server 2022, Windows Server 2019, and Windows Server, version 1803 or later
74+
- Windows Server 2025, Windows Server 2022, Windows Server 2019, and Windows Server, version 1803 or later
7575
- Windows Server 2016 and Windows Server 2012 R2 (using the modern, unified solution)
7676

7777
Tamper protection is also available for Mac, although it works a little differently than on Windows. For more information, see [Protect macOS security settings with tamper protection](tamperprotection-macos.md).

0 commit comments

Comments
 (0)