diff --git a/windows/security/identity-protection/remote-credential-guard.md b/windows/security/identity-protection/remote-credential-guard.md
index 35ee69ef0c..c7e23f0bfa 100644
--- a/windows/security/identity-protection/remote-credential-guard.md
+++ b/windows/security/identity-protection/remote-credential-guard.md
@@ -101,7 +101,7 @@ Alternatively, you can configure devices using a [custom policy][INT-3] with the
| Setting |
|--------|
-| - OMA-URI: `./Device/Vendor/MSFT/Policy/Config/CredentialsDelegation/RemoteHostAllowsDelegationOfNonExportableCredentials`
- Data type: string
- Value: ``|
+| **OMA-URI:** `./Device/Vendor/MSFT/Policy/Config/CredentialsDelegation/RemoteHostAllowsDelegationOfNonExportableCredentials`
- **Data type:** string
**Value:** ``
|
#### [:::image type="icon" source="../images/icons/group-policy.svg" border="false"::: **Group policy**](#tab/gpo)
@@ -112,14 +112,13 @@ Alternatively, you can configure devices using a [custom policy][INT-3] with the
| **Computer Configuration\Administrative Templates\System\Credentials Delegation** | Remote host allows delegation of nonexportable credentials | Enabled |
[!INCLUDE [gpo-settings-2](../../../includes/configure/gpo-settings-2.md)]
-
#### [:::image type="icon" source="../images/icons/windows-os.svg" border="false"::: **Registry**](#tab/reg)
To configure devices using the registry, use the following settings:
| Setting |
|-|
-| Key path: `HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa` Key name: `DisableRestrictedAdmin`Type: `REG_DWORD`Value:`0`|
+| Key path: `HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa` - Key name: `DisableRestrictedAdmin`
- Type: `REG_DWORD`
- Value: `0`
|
You can add this by running the following command from an elevated command prompt:
@@ -162,7 +161,7 @@ To configure your clients, you can use:
| Category | Setting name | Value |
|--|--|--|
-| Administrative Templates > System > Credentials Delegation | Restrict delegation of credentials to remote servers | Select **Enabled** and in the dropdown, select one of the options:
- **Restrict Credential Delegation**
- **Require Remote Credential Guard** |
+| **Administrative Templates > System > Credentials Delegation** | Restrict delegation of credentials to remote servers | Select **Enabled** and in the dropdown, select one of the options:- **Restrict Credential Delegation**
- **Require Remote Credential Guard**
|
[!INCLUDE [intune-settings-catalog-2](../../../includes/configure/intune-settings-catalog-2.md)]
@@ -170,7 +169,7 @@ Alternatively, you can configure devices using a [custom policy][INT-3] with the
| Setting |
|--|
-|- OMA-URI: `./Device/Vendor/MSFT/Policy/Config/ADMX_CredSsp/RestrictedRemoteAdministration`
- Data type: string
- Value: `` |
+|- OMA-URI: `./Device/Vendor/MSFT/Policy/Config/ADMX_CredSsp/RestrictedRemoteAdministration`
- Data type: string
- Value: ``
|
Possible values for `RestrictedRemoteAdministrationDrop` are: