From b8e624196a11e6a93a7ade71bbd40ef0c03db8f0 Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Tue, 10 Jul 2018 15:43:19 -0700 Subject: [PATCH] edits --- .../create-and-verify-an-efs-dra-certificate.md | 7 ++----- 1 file changed, 2 insertions(+), 5 deletions(-) diff --git a/windows/security/information-protection/windows-information-protection/create-and-verify-an-efs-dra-certificate.md b/windows/security/information-protection/windows-information-protection/create-and-verify-an-efs-dra-certificate.md index 1fa8a3afba..0743b419b6 100644 --- a/windows/security/information-protection/windows-information-protection/create-and-verify-an-efs-dra-certificate.md +++ b/windows/security/information-protection/windows-information-protection/create-and-verify-an-efs-dra-certificate.md @@ -41,10 +41,7 @@ The recovery process included in this topic only works for desktop devices. WIP >[!Important] >Because the private keys in your DRA .pfx files can be used to decrypt any WIP file, you must protect them accordingly. We highly recommend storing these files offline, keeping copies on a smart card with strong protection for normal use and master copies in a secured physical location. -4. Add your EFS DRA certificate to your WIP policy using a deployment tool, such as Microsoft Intune or System Center Configuration Manager. - - >[!Note] - >To add your EFS DRA certificate to your policy by using Microsoft Intune, see the [Create a Windows Information Protection (WIP) policy using Microsoft Intune](create-wip-policy-using-intune.md) topic. To add your EFS DRA certificate to your policy by using System Center Configuration Manager, see the [Create a Windows Information Protection (WIP) policy using System Center Configuration Manager](create-wip-policy-using-sccm.md) topic. +4. Add your EFS DRA certificate to your WIP policy using a deployment tool, such as [Microsoft Intune](create-wip-policy-using-intune.md) or [System Center Configuration Manager](create-wip-policy-using-sccm.md). ## Verify your data recovery certificate is correctly set up on a WIP client computer @@ -52,7 +49,7 @@ The recovery process included in this topic only works for desktop devices. WIP 2. Open an app on your protected app list, and then create and save a file so that it’s encrypted by WIP. -3. Open a command prompt with elevated rights, navigate to where you stored the file you just created, and then run this command: +3. Open a command prompt with elevated rights, navigate to where you stored the file you just created, and then run this command: cipher /c filename