Skip to content

Commit 661b844

Browse files
committed
Update deployment-vdi-microsoft-defender-antivirus.md
1 parent 69d0425 commit 661b844

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

defender-endpoint/deployment-vdi-microsoft-defender-antivirus.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -295,7 +295,7 @@ It's important to take advantage of the included threat protection capabilities
295295

296296
### Threats
297297

298-
- Specify threat alert levels at which default action should not be taken when detected: `Enabled`
298+
- Specify threat alert levels at which default action shouldn't be taken when detected: `Enabled`
299299

300300
- Set `Severe (5)`, `High (4)`, `Medium (2)`, and `Low (1)` all to `Quarantine (2)`, as shown in the following table:
301301

@@ -343,9 +343,9 @@ Enable tamper protection to prevent Microsoft Defender Antivirus from being disa
343343

344344
If you think you need to add exclusions, see [Manage exclusions for Microsoft Defender for Endpoint and Microsoft Defender Antivirus](defender-endpoint-antivirus-exclusions.md).
345345

346-
## Next step
346+
## EDR
347347

348-
If you are also deploying Microsoft Defender for Endpoint - EDR to your Windows based VDI VMs, please go thru the steps here: [Onboard non-persistent virtual desktop infrastructure (VDI) devices in Microsoft Defender XDR](/defender-endpoint/configure-endpoints-vdi)
348+
If you're also deploying [endpoint detection and response](overview-endpoint-detection-response.md) (EDR) to your Windows-based VDI VMs, see [Onboard non-persistent virtual desktop infrastructure (VDI) devices in Microsoft Defender XDR](/defender-endpoint/configure-endpoints-vdi).
349349

350350
## See also
351351

0 commit comments

Comments
 (0)