diff --git a/windows/security/threat-protection/windows-defender-atp/conditional-access-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/conditional-access-windows-defender-advanced-threat-protection.md index 2c10912c51..9aed4f71fb 100644 --- a/windows/security/threat-protection/windows-defender-atp/conditional-access-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/conditional-access-windows-defender-advanced-threat-protection.md @@ -65,7 +65,7 @@ The following example sequence of events explains conditional access in action: ## Configure conditional access > [!NOTE] -> You'll need a valid Intune license to enable conditional access. +> You'll need a Microsoft Intune environment, with Intune managed and Azure AD joined Windows 10 devices. You'll need to take the following steps to enable conditional access: - Step 1: Turn on the Microsoft Intune connection from the Windows Defender ATP portal @@ -119,7 +119,7 @@ You'll need to take the following steps to enable conditional access: 6. Select **Enable policy**, and then **Create** to save your changes. - +For more information, see [Enable Windows Defender ATP with conditional access in Inune](https://docs.microsoft.com/intune/advanced-threat-protection). >Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-conditionalaccess-belowfoldlink)