diff --git a/windows/security/threat-protection/microsoft-defender-atp/deployment-strategy.md b/windows/security/threat-protection/microsoft-defender-atp/deployment-strategy.md
index 3020e15349..3ad476d512 100644
--- a/windows/security/threat-protection/microsoft-defender-atp/deployment-strategy.md
+++ b/windows/security/threat-protection/microsoft-defender-atp/deployment-strategy.md
@@ -57,7 +57,7 @@ The following table lists the supported endpoints and the corresponding deployme
| Endpoint | Deployment tool |
|--------------|------------------------------------------|
| **Windows** | [Local script (up to 10 devices)](configure-endpoints-script.md)
[Group Policy](configure-endpoints-gp.md)
[Microsoft Endpoint Manager/ Mobile Device Manager](configure-endpoints-mdm.md)
[Microsoft Endpoint Configuration Manager](configure-endpoints-sccm.md)
[VDI scripts](configure-endpoints-vdi.md) |
-| **macOS** | [Local scripts](mac-install-manually.md)
[Microsoft Endpoint Manager](mac-install-with-intune.md)
[JAMF Pro](mac-install-with-jamf.md)
[Mobile Device Management](mac-install-with-other-mdm.md) |
+| **macOS** | [Local script](mac-install-manually.md)
[Microsoft Endpoint Manager](mac-install-with-intune.md)
[JAMF Pro](mac-install-with-jamf.md)
[Mobile Device Management](mac-install-with-other-mdm.md) |
| **Linux Server** | [Local script](linux-install-manually.md)
[Puppet](linux-install-with-puppet.md)
[Ansible](linux-install-with-ansible.md)|
| **iOS** | [App-based](ios-install.md) |
| **Android** | [Microsoft Endpoint Manager](android-intune.md) |
@@ -65,16 +65,15 @@ The following table lists the supported endpoints and the corresponding deployme
## Step 3: Configure capabilities
-After onboarding endpoints, configure the security capabilities in Microsoft Defender ATP so that you can maximize the robust security protection available in the suite.
+After onboarding endpoints, configure the security capabilities in Microsoft Defender ATP so that you can maximize the robust security protection available in the suite.
-You'll be guided in configuring capabilities such as:
+Maximize the security features of the suite by configuring capabilities such as:
- Endpoint detection and response
- Next-generation protection
- Attack surface reduction
-
## Related topics
- [Deployment phases](deployment-phases.md)
diff --git a/windows/security/threat-protection/microsoft-defender-atp/onboarding.md b/windows/security/threat-protection/microsoft-defender-atp/onboarding.md
index 3e4c5e7b8a..edaf3b64ed 100644
--- a/windows/security/threat-protection/microsoft-defender-atp/onboarding.md
+++ b/windows/security/threat-protection/microsoft-defender-atp/onboarding.md
@@ -56,10 +56,10 @@ You are currently in the onboarding phase.
These are the steps you need to take to deploy Microsoft Defender ATP:
-- Onboard endpoints to the service using management tools
-- Configure capabilities
+- Step 1: Onboard endpoints to the service
+- Step 2: Configure capabilities
-## Step 1: Onboard endpoints using management tools
+## Step 1: Onboard endpoints using any of the supported management tools
The [Plan deployment]() topic outlines the general steps you need to take to deploy Microsoft Defender ATP.
After identifying your architecture, you'll need to decide on the deployment method. The deployment tool you choose dictates how you onboard endpoints to the service.