diff --git a/defender-endpoint/comprehensive-guidance-on-linux-deployment.md b/defender-endpoint/comprehensive-guidance-on-linux-deployment.md index 582cbe9b7c..4766c177d3 100644 --- a/defender-endpoint/comprehensive-guidance-on-linux-deployment.md +++ b/defender-endpoint/comprehensive-guidance-on-linux-deployment.md @@ -14,7 +14,7 @@ ms.collection: ms.topic: conceptual ms.subservice: linux search.appverid: met150 -ms.date: 05/08/2024 +ms.date: 09/10/2024 --- # Advanced deployment guidance for Microsoft Defender for Endpoint on Linux @@ -130,7 +130,7 @@ The following table lists the supported proxy settings: #### Step 3: Verify SSL inspection isn't being performed on the network traffic -To prevent man-in-the-middle attacks, all Microsoft Azure hosted traffic uses certificate pinning. As a result, SSL inspections by major firewall systems aren't allowed. You have to bypass SSL inspection for Microsoft Defender for Endpoint URLs. +To prevent man-in-the-middle attacks, all Microsoft Azure hosted traffic uses certificate pinning. As a result, SSL inspections by major firewall systems aren't allowed. You must bypass SSL inspection for Microsoft Defender for Endpoint URLs. For additional information about the certificate pinning process, see [enterprise-certificate-pinning] (/windows/security/identity-protection/enterprise-certificate-pinning). ##### Troubleshoot cloud connectivity issues