Skip to content

Commit dfa5d0d

Browse files
committed
Minor edit
1 parent 4ebc153 commit dfa5d0d

1 file changed

Lines changed: 2 additions & 2 deletions

File tree

intune/intune-service/protect/microsoft-defender-with-intune.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ Learn how integrating Microsoft Defender for Endpoint with Microsoft Intune can
1919
For example, if malware compromises a user's device, Microsoft Defender for Endpoint flags that device as high-risk and Intune can automatically cut off its access to corporate resources.
2020

2121
> [!TIP]
22-
> Before you begin, ensure your account is assigned an Intune role with sufficient permissions to configure these settings. For example, the built-in [Endpoint Security Manager](../fundamentals/role-based-access-control.md#built-in-roles) role has the necessary permissions.
22+
> Before you begin, ensure your account is assigned an Intune role with sufficient permissions to configure these settings. For example, the Intune built-in role of [Endpoint Security Manager](../fundamentals/role-based-access-control.md#built-in-roles) has the necessary permissions.
2323
2424
## Integration workflow
2525

@@ -65,7 +65,7 @@ For licensing and system requirements, see:
6565
- [Microsoft 365 E5 trial subscription setup](/microsoft-365/security/defender/setup-m365deval#enable-microsoft-365-trial-subscription)
6666
- [Microsoft Defender for Endpoint system requirements](/defender-endpoint/minimum-requirements#hardware-and-software-requirements)
6767

68-
## 📌 Real-world scenario: Stopping a phishing attack
68+
## Real-world scenario: Stopping a phishing attack
6969

7070
This example shows how Microsoft Defender for Endpoint and Intune work together to automatically contain threats. In this scenario, the integration is already configured.
7171

0 commit comments

Comments
 (0)