Skip to content

Commit f2a602b

Browse files
committed
Acrolinx score enhancement
1 parent 0e246f2 commit f2a602b

File tree

3 files changed

+15
-15
lines changed

3 files changed

+15
-15
lines changed

defender-endpoint/ios-install.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -37,42 +37,42 @@ This topic describes deploying Defender for Endpoint on iOS on Microsoft Intune
3737

3838
- Ensure iOS enrollment is done for your users. Users need to have a Defender for Endpoint license assigned in order to use Defender for Endpoint on iOS. Refer to [Assign licenses to users](/azure/active-directory/users-groups-roles/licensing-groups-assign) for instructions on how to assign licenses.
3939

40-
- Ensure the end users have company portal app installed, signed in and enrollment completed.
40+
- Ensure the end users have company portal app installed, signed inC, and enrollment completed.
4141

4242
> [!NOTE]
4343
> Microsoft Defender for Endpoint on iOS is available in the [Apple App Store](https://aka.ms/mdatpiosappstore).
4444
4545
This section covers:
4646

47-
1. **Deployment steps** (applicable for both **Supervised** and **Unsupervised** devices)- Admins can deploy Defender for Endpoint on iOS via Microsoft Intune Company Portal. This step is not needed for VPP (volume purchase) apps.
47+
1. **Deployment steps** (applicable for both **Supervised** and **Unsupervised** devices)- Admins can deploy Defender for Endpoint on iOS via Microsoft Intune Company Portal. This step isn't needed for VPP (volume purchase) apps.
4848

4949
1. **Complete deployment** (only for Supervised devices)- Admins can select to deploy any one of the given profiles.
5050
1. **Zero touch (Silent) Control Filter** - Provides Web Protection without the local loopback VPN and also enables silent onboarding for users. App is automatically installed and activated without the need for user to open the app.
5151
1. **Control Filter** - Provides Web Protection without the local loopback VPN.
5252

5353
1. **Automated Onboarding setup** (only for **Unsupervised** devices) - Admins can automate the Defender for Endpoint onboarding for users in two different ways:
5454
1. **Zero touch (Silent) Onboarding** - App is automatically installed and activated without the need for users to open the app.
55-
1. **Auto Onboarding of VPN** - Defender for Endpoint VPN profile is automatically set up without having the user to do so during onboarding. This step is not recommended in Zero touch configurations.
55+
1. **Auto Onboarding of VPN** - Defender for Endpoint VPN profile is automatically set up without having the user to do so during onboarding. This step isn't recommended in Zero touch configurations.
5656

5757
1. **User Enrollment setup** (only for Intune User Enrolled devices) - Admins can deploy and configure the Defender for Endpoint app on the Intune User Enrolled devices also.
5858

59-
1. **Complete onboarding and check status** - This step is applicable for all enrollment types to ensure app is installed on the device, onboarding is completed and device is visible in the Microsoft Defender portal. It can be skipped for the zero touch (silent) onboarding.
59+
1. **Complete onboarding and check status** - This step is applicable for all enrollment types to ensure app is installed on the device, onboarding is completed, and device is visible in the Microsoft Defender portal. It can be skipped for the zero touch (silent) onboarding.
6060

6161
## Deployment steps (applicable for both Supervised and Unsupervised devices)
6262

6363
Deploy Defender for Endpoint on iOS via Microsoft Intune Company Portal.
6464

6565
### Add iOS store app
6666

67-
1. In the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), go to **Apps** > **iOS/iPadOS** > **Add** > **iOS store app** and click **Select**.
67+
1. In the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), go to **Apps** > **iOS/iPadOS** > **Add** > **iOS store app** and select **Select**.
6868

6969
:::image type="content" source="media/ios-deploy-1.png" alt-text="The Add applications tab in the Microsoft Intune admin center" lightbox="media/ios-deploy-1.png":::
7070

71-
1. On the **Add app** page, click on **Search the App Store** and type **Microsoft Defender** in the search bar. In the search results section, click on *Microsoft Defender* and click **Select**.
71+
1. On the **Add app** page, select **Search the App Store** and type **Microsoft Defender** in the search bar. In the search results section, select *Microsoft Defender* and select **Select**.
7272

73-
1. Select **iOS 15.0** as the Minimum operating system. Review the rest of information about the app and click **Next**.
73+
1. Select **iOS 15.0** as the Minimum operating system. Review the rest of information about the app and select **Next**.
7474

75-
1. In the **Assignments** section, go to the **Required** section and select **Add group**. You can then choose the user group(s) that you would like to target Defender for Endpoint on iOS app. Click **Select** and then **Next**.
75+
1. In the **Assignments** section, go to the **Required** section and select **Add group**. You can then choose the user groups that you would like to target Defender for Endpoint on iOS app. Click **Select** and then **Next**.
7676

7777
> [!NOTE]
7878
> The selected user group should consist of Microsoft Intune enrolled users.
@@ -120,7 +120,7 @@ Configure the supervised mode for Defender for Endpoint app through an App confi
120120

121121
1. Select **Next** to open the **Scope tags** page. Scope tags are optional. Select **Next** to continue.
122122

123-
1. On the **Assignments** page, select the groups that will receive this profile. For this scenario, it is best practice to target **All Devices**. For more information on assigning profiles, see [Assign user and device profiles](/mem/intune/configuration/device-profile-assign).
123+
1. On the **Assignments** page, select the groups that receive this profile. For this scenario, it's best practice to target **All Devices**. For more information on assigning profiles, see [Assign user and device profiles](/mem/intune/configuration/device-profile-assign).
124124

125125
When deploying to user groups, a user must sign in to a device before the policy applies.
126126

defender-endpoint/linux-install-with-saltack.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -98,7 +98,7 @@ There are two ways you can create the Saltstack state files:
9898
```
9999

100100
> [!NOTE]
101-
> The installer script also supports other parameters such as channel (insiders-fast, insiders-slow, prod (default) ), realtime protection, version, etc. To select from the list of available options, check help through the following command:
101+
> The installer script also supports other parameters such as channel (insiders-fast, insiders-slow, prod (default) ), real-time protection, version, etc. To select from the list of available options, check help through the following command:
102102
>```./mde_installer.sh --help```
103103
104104
### Create Saltstack state files by manually configuring repositories
@@ -116,14 +116,14 @@ In this step, you create a SaltState state file in your configuration repository
116116
> In order to preview new features and provide early feedback, it's recommended that you configure some devices in your enterprise to use either *insiders-fast* or *insiders-slow*.
117117
118118
> [!WARNING]
119-
> Switching the channel after the initial installation requires the product to be reinstalled. To switch the product channel: uninstall the existing package, re-configure your device to use the new channel, and follow the steps in this document to install the package from the new location.
119+
> Switching the channel after the initial installation requires the product to be reinstalled. To switch the product channel: uninstall the existing package, reconfigure your device to use the new channel, and follow the steps in this document to install the package from the new location.
120120
121121
1. Note your distribution and version and identify the closest entry for it under `https://packages.microsoft.com/config/[distro]/`.
122122

123123
2. In the following commands, replace *[distro]* and *[version]* with your information.
124124

125125
> [!NOTE]
126-
> In case of Oracle Linux and Amazon Linux 2, replace *[distro]* with "rhel". For Amazon Linux 2, replace *[version]* with "7". For Oracle utilize, replace *[version]* with the version of Oracle Linux.
126+
> For Oracle Linux and Amazon Linux 2, replace *[distro]* with "rhel." For Amazon Linux 2, replace *[version]* with "7". For Oracle utilize, replace *[version]* with the version of Oracle Linux.
127127
128128
```bash
129129
cat /srv/salt/install_mdatp.sls

defender-endpoint/linux-static-proxy-configuration.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,7 @@ During installation, the `HTTPS_PROXY` environment variable must be passed to th
4848
```
4949

5050
> [!CAUTION]
51-
> Note that above two methods could define the proxy to use for other applications on your system. Use this method with caution, or only if this is meant to be a generally global configuration.
51+
> The above two methods could define the proxy to use for other applications on your system. Use this method with caution, or only if this is meant to be a global configuration.
5252
5353
- The `HTTPS_PROXY` variable is prepended to the installation or uninstallation commands. For example, with the APT package manager, prepend the variable as follows when installing Microsoft Defender for Endpoint:
5454

@@ -57,11 +57,11 @@ During installation, the `HTTPS_PROXY` environment variable must be passed to th
5757
```
5858

5959
> [!NOTE]
60-
> Do not add sudo between the environment variable definition and apt, otherwise the variable will not be propagated.
60+
> Don't add sudo between the environment variable definition and apt, otherwise the variable won't be propagated.
6161
6262
The `HTTPS_PROXY` environment variable may similarly be defined during uninstallation.
6363

64-
Note that installation and uninstallation will not necessarily fail if a proxy is required but not configured. However, telemetry won't be submitted, and the operation could take longer due to network timeouts.
64+
Installation and uninstallation won't necessarily fail if a proxy is required but not configured. However, telemetry won't be submitted, and the operation could take longer due to network timeouts.
6565

6666
## Post installation configuration
6767

0 commit comments

Comments
 (0)