diff --git a/windows/security/identity-protection/hello-for-business/hello-deployment-rdp-certs.md b/windows/security/identity-protection/hello-for-business/hello-deployment-rdp-certs.md
index afb40516e5..39f0b9693b 100644
--- a/windows/security/identity-protection/hello-for-business/hello-deployment-rdp-certs.md
+++ b/windows/security/identity-protection/hello-for-business/hello-deployment-rdp-certs.md
@@ -164,9 +164,9 @@ Proceed as follows:
Request a certificate
-Once the configuration profile has been created, targeted clients will receive the profile from Intune on their next refresh cycle. You should find a new certificate in the user store. To validate the certificate is present, do the following steps:
+Once the Intune policy is created, targeted clients will request a certificate during their next policy refresh cycle. To validate that the certificate is present in the user store, follow these steps:
-1. Sign in to a client that is targeted by the Intune policy
+1. Sign in to a client targeted by the Intune policy
1. Open the **Certificates - Current User** Microsoft Management Console (MMC). To do so, you can execute the command `certmgr.msc`
1. In the left pane of the MMC, expand **Personal** and select **Certificates**
1. In the right-hand pane of the MMC, check for the new certificate
diff --git a/windows/security/identity-protection/hello-for-business/toc.yml b/windows/security/identity-protection/hello-for-business/toc.yml
index 17b5735a4f..da68032fe4 100644
--- a/windows/security/identity-protection/hello-for-business/toc.yml
+++ b/windows/security/identity-protection/hello-for-business/toc.yml
@@ -35,13 +35,21 @@
href: hello-prepare-people-to-use.md
- name: Deployment guides
items:
- - name: Cloud-only deployment
- href: hello-aad-join-cloud-only-deploy.md
- name: Hybrid cloud Kerberos trust deployment
href: hello-hybrid-cloud-kerberos-trust.md
- - name: Hybrid Azure AD Join key trust
+ - name: Azure AD join
items:
- - name: Hybrid Azure AD join key trust deployment
+ - name: Cloud-only deployment
+ href: hello-aad-join-cloud-only-deploy.md
+ - name: On-premises SSO for Azure AD joined devices
+ href: hello-hybrid-aadj-sso.md
+ - name: Configure Azure AD joined devices for on-premises SSO
+ href: hello-hybrid-aadj-sso-base.md
+ - name: Using certificates for on-premises SSO
+ href: hello-hybrid-aadj-sso-cert.md
+ - name: Hybrid Azure AD join key trust
+ items:
+ - name: Hybrid Azure AD join with key trust
href: hello-hybrid-key-trust.md
- name: Prerequisites
href: hello-hybrid-key-trust-prereqs.md
@@ -55,7 +63,7 @@
href: hello-hybrid-key-whfb-settings.md
- name: Sign-in and provisioning
href: hello-hybrid-key-whfb-provision.md
- - name: Hybrid Azure AD join certificate trust
+ - name: Hybrid Azure AD join with certificate trust
items:
- name: Hybrid Azure AD join certificate trust deployment
href: hello-hybrid-cert-trust.md
@@ -69,15 +77,7 @@
href: hello-hybrid-cert-whfb-settings.md
- name: Sign-in and provisioning
href: hello-hybrid-cert-whfb-provision.md
- - name: On-premises single-sign-on (SSO) for Azure AD joined devices
- items:
- - name: On-premises SSO for Azure AD joined devices
- href: hello-hybrid-aadj-sso.md
- - name: Configure Azure AD joined devices for on-premises SSO
- href: hello-hybrid-aadj-sso-base.md
- - name: Using certificates for on-premises SSO
- href: hello-hybrid-aadj-sso-cert.md
- - name: On-premises key trust
+ - name: Active Directory domain join with key trust
items:
- name: Key trust deployment
href: hello-deployment-key-trust.md
@@ -91,7 +91,7 @@
href: hello-key-trust-validate-deploy-mfa.md
- name: Configure Windows Hello for Business policy settings
href: hello-key-trust-policy-settings.md
- - name: On-premises certificate trust
+ - name: Active Directory domain join with certificate trust deployment
items:
- name: Certificate trust deployment
href: hello-deployment-cert-trust.md