diff --git a/windows/security/threat-protection/microsoft-defender-atp/onboarding-endpoint-manager.md b/windows/security/threat-protection/microsoft-defender-atp/onboarding-endpoint-manager.md
index a0bbbf41cc..1bdf12f7cd 100644
--- a/windows/security/threat-protection/microsoft-defender-atp/onboarding-endpoint-manager.md
+++ b/windows/security/threat-protection/microsoft-defender-atp/onboarding-endpoint-manager.md
@@ -76,9 +76,6 @@ needs.
4. Add your test user or device.
- >[!NOTE]
- >Azure Active Directory groups can contain users or devices, not combinations of both.
-
5. From the **Groups > All groups** pane, open your new group.
6. Select **Members > Add members**.
@@ -89,7 +86,7 @@ needs.
8. Your testing group now has a member to test.
-## Create a configuration policy
+## Create configuration policies
In the following section, you'll create a number of configuration policies.
First is a configuration policy to select which groups of users or devices will
be onboarded to Microsoft Defender ATP. Then you will continue by creating several
@@ -116,10 +113,8 @@ different types of Endpoint security policies.

>[!NOTE]
- >In this instance, this has been auto populated as Microsoft Defender ATP has already been integrated with Intune. For more information on the integration, see [Enable Microsoft Defender ATP in Intune](https://docs.microsoft.com/mem/intune/protect/advanced-threat-protection#enable-microsoft-defender-atp-in-intune).
- >If you have not integrated Microsoft Defender ATP and Intune, complete [these
- steps](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-mdm#onboard-machines-using-microsoft-intune)
- to create and upload an onboarding blob.
+ >In this instance, this has been auto populated as Microsoft Defender ATP has already been integrated with Intune. For more information on the integration, see [Enable Microsoft Defender ATP in Intune](https://docs.microsoft.com/mem/intune/protect/advanced-threat-protection-configure#to-enable-microsoft-defender-atp).
+

@@ -184,9 +179,6 @@ different types of Endpoint security policies.
3. Select **Create Policy**.
- >[!NOTE]
- >We will be setting these as Audit.
-
4. Select **Platform - Windows 10 and Later – Profile - Attack surface reduction
rules > Create**.
@@ -339,13 +331,13 @@ To confirm that the configuration policy has been applied to your test device, f
1. Before applying the policy on a test device, pen a PowerShell Window and type `Get-MpPreference`.
-2. This should respond with the following lines with no content
+2. This should respond with the following lines with no content:
- 1. AttackSurfaceReductionOnlyExclusions:
+ AttackSurfaceReductionOnlyExclusions:
- 2. AttackSurfaceReductionRules_Actions:
+ AttackSurfaceReductionRules_Actions:
- 3. AttackSurfaceReductionRules_Ids:
+ AttackSurfaceReductionRules_Ids:
