From 680a97f20169430ada42d431bc6fc76937e7b1c5 Mon Sep 17 00:00:00 2001 From: MaratMussabekov <48041687+MaratMussabekov@users.noreply.github.com> Date: Mon, 30 Sep 2019 10:05:10 +0500 Subject: [PATCH] Update windows/security/information-protection/windows-information-protection/create-and-verify-an-efs-dra-certificate.md Co-Authored-By: Trond B. Krokli <38162891+illfated@users.noreply.github.com> --- .../create-and-verify-an-efs-dra-certificate.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/information-protection/windows-information-protection/create-and-verify-an-efs-dra-certificate.md b/windows/security/information-protection/windows-information-protection/create-and-verify-an-efs-dra-certificate.md index f5e18e80fa..9f03272cbf 100644 --- a/windows/security/information-protection/windows-information-protection/create-and-verify-an-efs-dra-certificate.md +++ b/windows/security/information-protection/windows-information-protection/create-and-verify-an-efs-dra-certificate.md @@ -49,7 +49,7 @@ The recovery process included in this topic only works for desktop devices. WIP 4. Add your EFS DRA certificate to your WIP policy using a deployment tool, such as [Microsoft Intune](create-wip-policy-using-intune-azure.md) or [System Center Configuration Manager](create-wip-policy-using-sccm.md). ->[!NOTE] +> [!NOTE] >This certificate could be used in Intune for both policies with device enrollment (MDM) and without device enrollment (MAM). ## Verify your data recovery certificate is correctly set up on a WIP client computer