From 8fbceeb5aa1a41fef72db5f755a9a4e5826b9779 Mon Sep 17 00:00:00 2001 From: MaratMussabekov <48041687+MaratMussabekov@users.noreply.github.com> Date: Mon, 30 Sep 2019 10:05:17 +0500 Subject: [PATCH] Update windows/security/information-protection/windows-information-protection/create-and-verify-an-efs-dra-certificate.md Co-Authored-By: Trond B. Krokli <38162891+illfated@users.noreply.github.com> --- .../create-and-verify-an-efs-dra-certificate.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/information-protection/windows-information-protection/create-and-verify-an-efs-dra-certificate.md b/windows/security/information-protection/windows-information-protection/create-and-verify-an-efs-dra-certificate.md index 9f03272cbf..6644dc13d6 100644 --- a/windows/security/information-protection/windows-information-protection/create-and-verify-an-efs-dra-certificate.md +++ b/windows/security/information-protection/windows-information-protection/create-and-verify-an-efs-dra-certificate.md @@ -50,7 +50,7 @@ The recovery process included in this topic only works for desktop devices. WIP 4. Add your EFS DRA certificate to your WIP policy using a deployment tool, such as [Microsoft Intune](create-wip-policy-using-intune-azure.md) or [System Center Configuration Manager](create-wip-policy-using-sccm.md). > [!NOTE] ->This certificate could be used in Intune for both policies with device enrollment (MDM) and without device enrollment (MAM). +> This certificate can be used in Intune for policies both _with_ device enrollment (MDM) and _without_ device enrollment (MAM). ## Verify your data recovery certificate is correctly set up on a WIP client computer