Skip to content

Commit db576b0

Browse files
authored
Merge pull request #4301 from ManoharLakkoju-MSFT/patch-4
(AzureCXP) fixes MicrosoftDocs/defender-docs#440233
2 parents 584522b + ce03950 commit db576b0

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

defender-endpoint/configure-device-connectivity.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.collection:
1414
ms.reviewer: pahuijbr
1515
search.appverid: MET150
1616
audience: ITPro
17-
ms.date: 06/11/2025
17+
ms.date: 06/27/2025
1818
---
1919

2020
# Onboarding devices using streamlined connectivity for Microsoft Defender for Endpoint
@@ -162,11 +162,11 @@ The following table lists the current static IP ranges covered by the MicrosoftD
162162

163163
Configure devices to communicate through your connectivity infrastructure. Ensure devices meet prerequisites and have updated sensor and Microsoft Defender Antivirus versions. For more information, see [Configure device proxy and Internet connection settings ](configure-proxy-internet.md).
164164

165-
### Stage 3. Verify client connectivity preonboarding
165+
### Stage 3. Verify client connectivity pre-onboarding
166166

167167
For more information, see [Verify client connectivity](verify-connectivity.md).
168168

169-
The following preonboarding checks can be run on both Windows and Xplat MDE Client analyzer: [Download the Microsoft Defender for Endpoint client analyzer](overview-client-analyzer.md).
169+
The following pre-onboarding checks can be run on both Windows and Xplat MDE Client analyzer: [Download the Microsoft Defender for Endpoint client analyzer](overview-client-analyzer.md).
170170

171171
To test streamlined connectivity for devices not yet onboarded to Defender for Endpoint, you can use the Client Analyzer for Windows using the following commands:
172172

0 commit comments

Comments
 (0)