diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/windows-defender-exploit-guard.md b/windows/security/threat-protection/windows-defender-exploit-guard/windows-defender-exploit-guard.md
index 4d1691e73d..8357dea48f 100644
--- a/windows/security/threat-protection/windows-defender-exploit-guard/windows-defender-exploit-guard.md
+++ b/windows/security/threat-protection/windows-defender-exploit-guard/windows-defender-exploit-guard.md
@@ -80,7 +80,7 @@ Controlled folder access | [Real-time protection](../windows-defender-antivirus/
| Controlled Folder Access | 2 | 2 | 2 |  |
> [!NOTE]
-> 1 - Exploit Protection is better shielded with [HVCI protection] (https://docs.microsoft.com/windows/security/threat-protection/windows-defender-exploit-guard/enable-virtualization-based-protection-of-code-integrity) in Windows 10 Enterprise.
+> 1 - Exploit Protection is better shielded in Windows 10 Enterprise because of the additional [HVCI protection] (https://docs.microsoft.com/windows/security/threat-protection/windows-defender-exploit-guard/enable-virtualization-based-protection-of-code-integrity) functionality.
> 2 - Limited reporting functionality through Event Viewer. Windows 10 E5 is required for automated reporting in the Windows Defender ATP console
> Each feature's requirements are further described in the individual topics in this library.