From 62ec4316445dbfc8ca690a44b989a9b290d9b214 Mon Sep 17 00:00:00 2001 From: Paolo Matarazzo <74918781+paolomatarazzo@users.noreply.github.com> Date: Fri, 24 Feb 2023 14:33:09 -0500 Subject: [PATCH] fixed link --- .../hello-hybrid-cloud-kerberos-trust-provision.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/security/identity-protection/hello-for-business/hello-hybrid-cloud-kerberos-trust-provision.md b/windows/security/identity-protection/hello-for-business/hello-hybrid-cloud-kerberos-trust-provision.md index 0b63b883b2..7a62af935e 100644 --- a/windows/security/identity-protection/hello-for-business/hello-hybrid-cloud-kerberos-trust-provision.md +++ b/windows/security/identity-protection/hello-for-business/hello-hybrid-cloud-kerberos-trust-provision.md @@ -1,7 +1,7 @@ --- title: Windows Hello for Business cloud Kerberos trust clients configuration and enrollment description: Learn how to configure devices and enroll them in Windows Hello for Business in a cloud Kerberos trust scenario. -ms.date: 02/22/2023 +ms.date: 02/24/2023 appliesto: - ✅ Windows 10, version 21H2 and later ms.topic: tutorial @@ -52,7 +52,7 @@ To check the Windows Hello for Business policy applied at enrollment time: :::image type="content" source="images/whfb-intune-disable.png" alt-text="Disablement of Windows Hello for Business from Microsoft Intune admin center." border="true" lightbox="images/whfb-intune-disable.png"::: -If the tenant-wide policy is enabled and configured to your needs, you can skip to [Configure cloud Kerberos trust policy](#configure-cloud-kerberos-trust-policy). Otherwise, follow the instructions below to create a policy using an *account protection* policy. +If the tenant-wide policy is enabled and configured to your needs, you can skip to [Configure cloud Kerberos trust policy](#configure-the-cloud-kerberos-trust-policy). Otherwise, follow the instructions below to create a policy using an *account protection* policy. ### Enable Windows Hello for Business