We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent b8e503a commit b5383c6Copy full SHA for b5383c6
defender-business/mdb-mtd.md
@@ -46,7 +46,7 @@ The following table summarizes the capabilities that are included in mobile thre
46
>
47
> 1. Use Intune to configure or manage an allow list of root certification authority and private root certification authority certificates.
48
49
-3. See [Prerequisites for the Microsoft Tunnel in Intune](/mem/intune/protect/microsoft-tunnel-prerequisites).
+> 3. See [Prerequisites for the Microsoft Tunnel in Intune](/mem/intune/protect/microsoft-tunnel-prerequisites).
50
51
52
## How to get mobile threat defense capabilities
0 commit comments