From 0f6551c614a07b63210b0344f18e23af599f0b10 Mon Sep 17 00:00:00 2001 From: ImranHabib <47118050+joinimran@users.noreply.github.com> Date: Thu, 31 Oct 2019 12:55:49 +0500 Subject: [PATCH] Update windows/security/identity-protection/hello-for-business/hello-cert-trust-adfs.md Co-Authored-By: Trond B. Krokli <38162891+illfated@users.noreply.github.com> --- .../hello-for-business/hello-cert-trust-adfs.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/identity-protection/hello-for-business/hello-cert-trust-adfs.md b/windows/security/identity-protection/hello-for-business/hello-cert-trust-adfs.md index 91d3354350..0bceea2876 100644 --- a/windows/security/identity-protection/hello-for-business/hello-cert-trust-adfs.md +++ b/windows/security/identity-protection/hello-for-business/hello-cert-trust-adfs.md @@ -368,7 +368,7 @@ Approximately 60 days prior to enrollment agent certificate’s expiration, the Now you will add the Service connection Point to ADFS device registration Service for your Active directory by running the following script: ->[!TIP] +> [!TIP] > Make sure to change the $enrollmentService and $configNC variables before running the script. ```Powershell