Skip to content

Commit b12d2ce

Browse files
committed
acrolinx fix
1 parent e661e9f commit b12d2ce

File tree

2 files changed

+1
-6
lines changed

2 files changed

+1
-6
lines changed

defender-endpoint/assign-portal-access.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ Defender for Endpoint supports two ways to manage permissions:
3434
3535
## Change from basic permissions to RBAC
3636

37-
If you have basic permissions, you can switch to RBAC anytime. Consider the following before making the switch:
37+
If you have basic permissions, you can switch to Role-based access control (RBAC) anytime. Consider the following before making the switch:
3838

3939
- Users who have full access are automatically assigned the default Defender for Endpoint administrator role.
4040
- Other Microsoft Entra user groups can be assigned to the Defender for Endpoint administrator role after switching to RBAC.

defender-endpoint/exploit-protection-reference.md

Lines changed: 0 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -24,11 +24,6 @@ appliesto:
2424
---
2525
# Exploit protection reference
2626

27-
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
28-
29-
30-
31-
3227

3328
Exploit protection provides advanced protections for applications that enterprise admins and IT pros can apply after a developer compiles and distributes software.
3429

0 commit comments

Comments
 (0)