diff --git a/windows/security/threat-protection/microsoft-defender-atp/mac-device-control-intune.md b/windows/security/threat-protection/microsoft-defender-atp/mac-device-control-intune.md
index 72163a199c..11476d1334 100644
--- a/windows/security/threat-protection/microsoft-defender-atp/mac-device-control-intune.md
+++ b/windows/security/threat-protection/microsoft-defender-atp/mac-device-control-intune.md
@@ -33,7 +33,7 @@ ms.technology: mde
> [!IMPORTANT]
> **Device control for macOS is currently in public preview**
> This preview version is provided without a service level agreement, and it's not recommended for production workloads. Certain features might not be supported or might have constrained capabilities.
-> See [Microsoft Defender for Endpoint preview features](preview.md) for more information.
+> For more information, see [Microsoft Defender for Endpoint preview features](preview.md).
This document contains examples of device control policies that you can customize in your own organization. These examples are applicable if you are using Intune to manage your enterprise.
diff --git a/windows/security/threat-protection/microsoft-defender-atp/mac-device-control-jamf.md b/windows/security/threat-protection/microsoft-defender-atp/mac-device-control-jamf.md
index eb82180726..e6281ebe59 100644
--- a/windows/security/threat-protection/microsoft-defender-atp/mac-device-control-jamf.md
+++ b/windows/security/threat-protection/microsoft-defender-atp/mac-device-control-jamf.md
@@ -33,7 +33,7 @@ ms.technology: mde
> [!IMPORTANT]
> **Device control for macOS is currently in public preview**
> This preview version is provided without a service level agreement, and it's not recommended for production workloads. Certain features might not be supported or might have constrained capabilities.
-> See [Microsoft Defender for Endpoint preview features](preview.md) for more information.
+> For more information, see [Microsoft Defender for Endpoint preview features](preview.md).
This document contains examples of device control policies that you can customize in your own organization. These examples are applicable if you are using JAMF to manage your enterprise.