Need help? See Manage device security with endpoint security policies in Microsoft Intune. Select the link to go to your policy configuration page. Your threat protection policies need to be configured. The following table describes actions that you might see. When you view details about specific threats or devices, you'll see recommendations and one or more actions you can take. How many threats are currently active, mitigated, or resolved.
0 Comments
Leave a Reply. |