diff --git a/windows/keep-secure/create-vpn-and-edp-policy-using-intune.md b/windows/keep-secure/create-vpn-and-edp-policy-using-intune.md
index 8170cd8fd8..91d076761a 100644
--- a/windows/keep-secure/create-vpn-and-edp-policy-using-intune.md
+++ b/windows/keep-secure/create-vpn-and-edp-policy-using-intune.md
@@ -99,6 +99,7 @@ The final step to making your VPN configuration work with EDP, is to link your t
6. Click **OK** to save your new OMA-URI setting, and then click **Save Policy.**
+
**To deploy your linked policy**
1. On the **Configuration policies** page, locate your newly-created policy, click to select it, and then click the **Manage Deployment** button.
diff --git a/windows/keep-secure/protect-enterprise-data-using-edp.md b/windows/keep-secure/protect-enterprise-data-using-edp.md
index 4bcf282711..d0c4802441 100644
--- a/windows/keep-secure/protect-enterprise-data-using-edp.md
+++ b/windows/keep-secure/protect-enterprise-data-using-edp.md
@@ -26,7 +26,7 @@ You’ll need this software to run EDP in your enterprise:
|Operating system | Management solution |
|-----------------|---------------------|
-|Windows 10 Insider Preview | Microsoft Intune
-OR-
System Center Configuration Manager (version 1511 or later)
-OR-
Your current company-wide 3rd party mobile device management (MDM) solution. For info about 3rd party MDM solutions, see the documentation that came with your product. If your 3rd party MDM does not have UI support for the policies, refer to the [EnterpriseDataProtection CSP](https://msdn.microsoft.com/en-us/library/windows/hardware/mt697634.aspx) topic.|
+|Windows 10 Insider Preview | Microsoft Intune
-OR-
System Center Configuration Manager (version 1511 or later)
-OR-
Your current company-wide 3rd party mobile device management (MDM) solution. For info about 3rd party MDM solutions, see the documentation that came with your product. If your 3rd party MDM does not have UI support for the policies, refer to the [EnterpriseDataProtection CSP](https://msdn.microsoft.com/en-us/library/windows/hardware/mt697634.aspx) documentation.|
## How EDP works
EDP helps address your everyday challenges in the enterprise. Including:
diff --git a/windows/keep-secure/testing-scenarios-for-edp.md b/windows/keep-secure/testing-scenarios-for-edp.md
index 7b52b7889d..3a44cb99ff 100644
--- a/windows/keep-secure/testing-scenarios-for-edp.md
+++ b/windows/keep-secure/testing-scenarios-for-edp.md
@@ -25,7 +25,7 @@ You can try any of the processes included in these scenarios, but you should foc
|Scenario |Processes |
|---------|----------|
|Automatically encrypt files from enterprise apps |
**Note**
Some file types, like .exe and .dll, along with some file paths, like `%windir%` and `%programfiles%`, are excluded from automatic encryption.
The app shouldn't be able to access the file.
If your default app association is an app not your **Protected Apps** list, you should get an **Access Denied** error message.
The app shouldn't be able to access the file.
If your default app association is an app not on your **Protected Apps** list, you should get an **Access Denied** error message.
You should see an EDP-related warning box, asking you to click either **Got it** or **Cancel**.
The content isn't pasted into the non-enterprise app.
The content is pasted into the non-enterprise app.
The content should copy and paste between apps without any warning messages.
You should see an EDP-related warning box, asking you to click either **Drag Anyway** or **Cancel**.
The content isn't dropped into the non-enterprise app.
The content is dropped into the non-enterprise app.
The content should move between the apps without any warning messages.
You should see an EDP-related warning box, asking you to click either **Share Anyway** or **Cancel**.
The content isn't shared into Facebook.
The content is shared into Facebook.
The content should share between the apps without any warning messages.