From 8934e8daf63c89b6565df7750b155d1f9804ec80 Mon Sep 17 00:00:00 2001 From: Paolo Matarazzo <74918781+paolomatarazzo@users.noreply.github.com> Date: Wed, 16 Nov 2022 11:31:38 -0500 Subject: [PATCH] updates --- .../hello-for-business/hello-deployment-rdp-certs.md | 2 ++ 1 file changed, 2 insertions(+) diff --git a/windows/security/identity-protection/hello-for-business/hello-deployment-rdp-certs.md b/windows/security/identity-protection/hello-for-business/hello-deployment-rdp-certs.md index a4c916396b..7906bff218 100644 --- a/windows/security/identity-protection/hello-for-business/hello-deployment-rdp-certs.md +++ b/windows/security/identity-protection/hello-for-business/hello-deployment-rdp-certs.md @@ -134,6 +134,7 @@ This section describes how to configure a SCEP policy in Intune. Similar steps c 1. Select **Create** 1. In the *Basics* blade, provide a **Name** and, optionally, a **Description > Next** 1. In the *Configuration settings* blade, use the following table to configure the policy: + | Setting| Configurations | | --- | --- | |*Certificate Type*| User | @@ -148,6 +149,7 @@ This section describes how to configure a SCEP policy in Intune. Similar steps c |*Extended key usage*| | |*Renewal threshold (%)*|Configure a value of your choosing| |*SCEP Server URLs*|Provide the public endpoint(s) that you configured during the deployment of your SCEP infrastructure| + 1. Select **Next** 1. In the *Assignments* bladeAssign the policy to a security group that contains as members the devices or users that you want to configure and select **Next** 1. In the *Applicability Rules* blade, provide additional issuance restrictions, if needed, and select **Next**