diff --git a/windows/security/threat-protection/microsoft-defender-atp/mac-device-control-intune.md b/windows/security/threat-protection/microsoft-defender-atp/mac-device-control-intune.md index 72163a199c..11476d1334 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/mac-device-control-intune.md +++ b/windows/security/threat-protection/microsoft-defender-atp/mac-device-control-intune.md @@ -33,7 +33,7 @@ ms.technology: mde > [!IMPORTANT] > **Device control for macOS is currently in public preview**
> This preview version is provided without a service level agreement, and it's not recommended for production workloads. Certain features might not be supported or might have constrained capabilities. -> See [Microsoft Defender for Endpoint preview features](preview.md) for more information. +> For more information, see [Microsoft Defender for Endpoint preview features](preview.md). This document contains examples of device control policies that you can customize in your own organization. These examples are applicable if you are using Intune to manage your enterprise. diff --git a/windows/security/threat-protection/microsoft-defender-atp/mac-device-control-jamf.md b/windows/security/threat-protection/microsoft-defender-atp/mac-device-control-jamf.md index eb82180726..e6281ebe59 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/mac-device-control-jamf.md +++ b/windows/security/threat-protection/microsoft-defender-atp/mac-device-control-jamf.md @@ -33,7 +33,7 @@ ms.technology: mde > [!IMPORTANT] > **Device control for macOS is currently in public preview**
> This preview version is provided without a service level agreement, and it's not recommended for production workloads. Certain features might not be supported or might have constrained capabilities. -> See [Microsoft Defender for Endpoint preview features](preview.md) for more information. +> For more information, see [Microsoft Defender for Endpoint preview features](preview.md). This document contains examples of device control policies that you can customize in your own organization. These examples are applicable if you are using JAMF to manage your enterprise.