diff --git a/README.md b/README.md index 8f4e843..5ccc107 100644 --- a/README.md +++ b/README.md @@ -23,7 +23,7 @@ The script connects to the Defender for Endpoint API, finds devices tagged with - `Machine.ReadWrite.All` (required if you want the script to remove the source tag and apply `CompletedTag`) - `Machine.Offboard` - These permissions appear under the WindowsDefenderATP API in the Azure portal and require admin consent to be granted. -- Offboarding via the Defender API is only supported for Windows 10/11 and Windows Server 2019 (or later) endpoints. Earlier OS versions must be offboarded through other supported methods. +- Offboarding via the Defender API is only supported for Windows 10/11 and Windows Server 2019 (or later) endpoints. Earlier OS versions as well as other OSs (macOS, Linux...) must be offboarded through other supported methods. - Correct Defender API base URL for your tenant: - Global: `https://api.securitycenter.microsoft.com` - EU: `https://eu.api.security.microsoft.com`