From 1f665fef2f38ab8ef43f74132d9bb24e6fe44fb5 Mon Sep 17 00:00:00 2001 From: Paolo Matarazzo <74918781+paolomatarazzo@users.noreply.github.com> Date: Mon, 28 Nov 2022 10:45:31 -0500 Subject: [PATCH] Update hello-deployment-rdp-certs.md --- .../hello-for-business/hello-deployment-rdp-certs.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/identity-protection/hello-for-business/hello-deployment-rdp-certs.md b/windows/security/identity-protection/hello-for-business/hello-deployment-rdp-certs.md index 6d15bed176..62f11e2460 100644 --- a/windows/security/identity-protection/hello-for-business/hello-deployment-rdp-certs.md +++ b/windows/security/identity-protection/hello-for-business/hello-deployment-rdp-certs.md @@ -55,7 +55,7 @@ Follow these steps to create a certificate template: | *Compatibility* | | | *General* | | | *Extensions* | Verify the **Application Policies** extension includes **Smart Card Logon**| - | *Subject Name* | | + | *Subject Name* |
**Note:** If you deploy certificates via Intune, select **Supply in the request** instead of * Build from this Active Directory*.| |*Request Handling*|| |*Cryptography*|| |*Security*|Add the security group that you want to give **Enroll** access to. For example, if you want to give access to all users, select the **Authenticated** users group, and then select Enroll permissions for them|