diff --git a/website/content/api-docs/system/config-control-group.mdx b/website/content/api-docs/system/config-control-group.mdx
index ae7e270503..c7602e682c 100644
--- a/website/content/api-docs/system/config-control-group.mdx
+++ b/website/content/api-docs/system/config-control-group.mdx
@@ -6,7 +6,7 @@ description: The '/sys/config/control-group' endpoint configures control groups.
# `/sys/config/control-group`
-@include 'alerts/enterprise-and-hcp.mdx'
+@include 'alerts/enterprise-and-hcp-plus.mdx'
The `/sys/config/control-group` endpoint is used to configure Control Group
settings.
diff --git a/website/content/api-docs/system/config-group-policy-application.mdx b/website/content/api-docs/system/config-group-policy-application.mdx
index 80fabd0ff1..6946657b52 100644
--- a/website/content/api-docs/system/config-group-policy-application.mdx
+++ b/website/content/api-docs/system/config-group-policy-application.mdx
@@ -6,7 +6,7 @@ description: The '/sys/config/group-policy-application' endpoint is used to conf
# `/sys/config/group-policy-application`
-@include 'alerts/enterprise-and-hcp.mdx'
+@include 'alerts/enterprise-and-hcp-plus.mdx'
The `sys/config/group-policy-application` endpoint can be used to configure the
mode of policy application for identity groups in Vault. This setting dictates
diff --git a/website/content/api-docs/system/control-group.mdx b/website/content/api-docs/system/control-group.mdx
index 8ffd0f5870..02aa6b6c13 100644
--- a/website/content/api-docs/system/control-group.mdx
+++ b/website/content/api-docs/system/control-group.mdx
@@ -6,7 +6,7 @@ description: The '/sys/control-group' endpoint handles the Control Group workflo
## Authorize control group request
-@include 'alerts/enterprise-and-hcp.mdx'
+@include 'alerts/enterprise-and-hcp-plus.mdx'
This endpoint authorizes a control group request.
diff --git a/website/content/api-docs/system/lease-count-quotas.mdx b/website/content/api-docs/system/lease-count-quotas.mdx
index 82b8e74916..e090939561 100644
--- a/website/content/api-docs/system/lease-count-quotas.mdx
+++ b/website/content/api-docs/system/lease-count-quotas.mdx
@@ -6,7 +6,7 @@ description: The `/sys/quotas/lease-count` endpoint is used to create, edit and
# `/sys/quotas/lease-count`
-@include 'alerts/enterprise-and-hcp.mdx'
+@include 'alerts/enterprise-and-hcp-plus.mdx'
The `/sys/quotas/lease-count` endpoint is used to create, edit and delete lease count quotas.
diff --git a/website/content/api-docs/system/license.mdx b/website/content/api-docs/system/license.mdx
index abc803e55a..cca96f148f 100644
--- a/website/content/api-docs/system/license.mdx
+++ b/website/content/api-docs/system/license.mdx
@@ -8,7 +8,7 @@ description: |-
# `/sys/license/status`
-@include 'alerts/enterprise-and-hcp.mdx'
+@include 'alerts/enterprise-and-hcp-plus.mdx'
The `/sys/license/status` endpoint is used to view update the license used in
Vault.
diff --git a/website/content/api-docs/system/replication/index.mdx b/website/content/api-docs/system/replication/index.mdx
index b18813fc72..77346d076d 100644
--- a/website/content/api-docs/system/replication/index.mdx
+++ b/website/content/api-docs/system/replication/index.mdx
@@ -8,7 +8,7 @@ description: >-
# `/sys/replication`
-@include 'alerts/enterprise-and-hcp.mdx'
+@include 'alerts/enterprise-and-hcp-plus.mdx'
## Attempt recovery
diff --git a/website/content/api-docs/system/replication/replication-performance.mdx b/website/content/api-docs/system/replication/replication-performance.mdx
index e08f18447d..2f09ec9409 100644
--- a/website/content/api-docs/system/replication/replication-performance.mdx
+++ b/website/content/api-docs/system/replication/replication-performance.mdx
@@ -8,7 +8,7 @@ description: >-
# `/sys/replication/performance`
-@include 'alerts/enterprise-and-hcp.mdx'
+@include 'alerts/enterprise-and-hcp-plus.mdx'
## Check performance status
diff --git a/website/content/api-docs/system/sealwrap-rewrap.mdx b/website/content/api-docs/system/sealwrap-rewrap.mdx
index 5efe23e98f..cbcd4b2df7 100644
--- a/website/content/api-docs/system/sealwrap-rewrap.mdx
+++ b/website/content/api-docs/system/sealwrap-rewrap.mdx
@@ -8,7 +8,7 @@ description: >-
# `/sys/sealwrap/rewrap`
-@include 'alerts/enterprise-and-hcp.mdx'
+@include 'alerts/enterprise-and-hcp-plus.mdx'
The `/sys/sealwrap/rewrap` endpoint is used to rewrap all seal wrapped entries.
This is useful when you want to upgrade seal wrapped entries to use the latest
diff --git a/website/content/api-docs/system/storage/raftautosnapshots.mdx b/website/content/api-docs/system/storage/raftautosnapshots.mdx
index 5dbf7374bf..f67c324cd5 100644
--- a/website/content/api-docs/system/storage/raftautosnapshots.mdx
+++ b/website/content/api-docs/system/storage/raftautosnapshots.mdx
@@ -16,7 +16,7 @@ snapshots with Vault's Raft storage backend.
## Create/update an automated snapshots config
-@include 'alerts/enterprise-and-hcp.mdx'
+@include 'alerts/enterprise-and-hcp-plus.mdx'
**This endpoint requires sudo capability.**
diff --git a/website/content/docs/enterprise/automated-integrated-storage-snapshots.mdx b/website/content/docs/enterprise/automated-integrated-storage-snapshots.mdx
index 774be135a0..18fef818af 100644
--- a/website/content/docs/enterprise/automated-integrated-storage-snapshots.mdx
+++ b/website/content/docs/enterprise/automated-integrated-storage-snapshots.mdx
@@ -9,7 +9,7 @@ description: |-
# Automated integrated storage snapshots
-@include 'alerts/enterprise-and-hcp.mdx'
+@include 'alerts/enterprise-and-hcp-plus.mdx'
Any production system should include a provision for taking regular backups.
Vault Enterprise can be configured to take and store snapshots at a specific
diff --git a/website/content/docs/enterprise/consistency.mdx b/website/content/docs/enterprise/consistency.mdx
index 40e92cb505..bd0b87e3d7 100644
--- a/website/content/docs/enterprise/consistency.mdx
+++ b/website/content/docs/enterprise/consistency.mdx
@@ -6,7 +6,7 @@ description: Vault Enterprise Consistency Model
# Vault eventual consistency
-@include 'alerts/enterprise-and-hcp.mdx'
+@include 'alerts/enterprise-and-hcp-plus.mdx'
When running in a cluster, Vault has an eventual consistency model.
Only one node (the leader) can write to Vault's storage.
diff --git a/website/content/docs/enterprise/control-groups.mdx b/website/content/docs/enterprise/control-groups.mdx
index 3f91e1acc7..2a05543978 100644
--- a/website/content/docs/enterprise/control-groups.mdx
+++ b/website/content/docs/enterprise/control-groups.mdx
@@ -6,7 +6,7 @@ description: Vault Enterprise has support for Control Group Authorization.
# Vault Enterprise control groups
-@include 'alerts/enterprise-and-hcp.mdx'
+@include 'alerts/enterprise-and-hcp-plus.mdx'
Vault Enterprise has support for Control Group Authorization. Control Groups
add additional authorization factors to be required before satisfying a request.
diff --git a/website/content/docs/enterprise/hsm/behavior.mdx b/website/content/docs/enterprise/hsm/behavior.mdx
index 2e0a0c1e8a..43b91515ac 100644
--- a/website/content/docs/enterprise/hsm/behavior.mdx
+++ b/website/content/docs/enterprise/hsm/behavior.mdx
@@ -8,7 +8,7 @@ description: >-
# Vault enterprise HSM behavioral changes
-@include 'alerts/enterprise-and-hcp.mdx'
+@include 'alerts/enterprise-and-hcp-plus.mdx'
This page contains information about the behavioral differences that take
effect when using Vault with an HSM.
diff --git a/website/content/docs/enterprise/hsm/index.mdx b/website/content/docs/enterprise/hsm/index.mdx
index 608e791f6c..09f123ea74 100644
--- a/website/content/docs/enterprise/hsm/index.mdx
+++ b/website/content/docs/enterprise/hsm/index.mdx
@@ -8,7 +8,7 @@ description: >-
# Vault enterprise HSM support
-@include 'alerts/enterprise-and-hcp.mdx'
+@include 'alerts/enterprise-and-hcp-plus.mdx'
- Root key Wrapping: Vault protects its root key by transiting it through
the HSM for encryption rather than splitting into key shares
diff --git a/website/content/docs/enterprise/hsm/security.mdx b/website/content/docs/enterprise/hsm/security.mdx
index cd12571dbf..72fb2730a0 100644
--- a/website/content/docs/enterprise/hsm/security.mdx
+++ b/website/content/docs/enterprise/hsm/security.mdx
@@ -6,7 +6,7 @@ description: Recommendations to ensure the security of a Vault Enterprise HSM de
# Vault enterprise HSM security details
-@include 'alerts/enterprise-and-hcp.mdx'
+@include 'alerts/enterprise-and-hcp-plus.mdx'
This page provides information to help ensure that a Vault HSM deployment is
performed as securely as possible.
diff --git a/website/content/docs/enterprise/license/autoloading.mdx b/website/content/docs/enterprise/license/autoloading.mdx
index 450e8cedcf..ea1155f1fe 100644
--- a/website/content/docs/enterprise/license/autoloading.mdx
+++ b/website/content/docs/enterprise/license/autoloading.mdx
@@ -6,7 +6,7 @@ description: An overview of license autoloading.
# License autoloading
-@include 'alerts/enterprise-and-hcp.mdx'
+@include 'alerts/enterprise-and-hcp-plus.mdx'
Prior to Vault 1.8, Vault Enterprise would be licensed using special binaries
that contained embedded licenses, or via a license written into Vault storage
diff --git a/website/content/docs/enterprise/license/index.mdx b/website/content/docs/enterprise/license/index.mdx
index c5bb7b81ec..a1b44b848c 100644
--- a/website/content/docs/enterprise/license/index.mdx
+++ b/website/content/docs/enterprise/license/index.mdx
@@ -6,7 +6,7 @@ description: An overview of license.
# Vault license
-@include 'alerts/enterprise-and-hcp.mdx'
+@include 'alerts/enterprise-and-hcp-plus.mdx'
Licenses and EULA enhancements have been introduced in Vault 1.8 release. Please refer to the [FAQ](/vault/docs/enterprise/license/faq) for common questions concerning these changes.
diff --git a/website/content/docs/enterprise/license/utilization-reporting.mdx b/website/content/docs/enterprise/license/utilization-reporting.mdx
index da3994eae4..0a52d2f11a 100644
--- a/website/content/docs/enterprise/license/utilization-reporting.mdx
+++ b/website/content/docs/enterprise/license/utilization-reporting.mdx
@@ -7,7 +7,7 @@ description: >-
# Automated license utilization reporting
-@include 'alerts/enterprise-and-hcp.mdx'
+@include 'alerts/enterprise-and-hcp-plus.mdx'
Automated license utilization reporting sends license utilization data to
HashiCorp without requiring you to manually collect and report them. It also
diff --git a/website/content/docs/enterprise/managed-keys.mdx b/website/content/docs/enterprise/managed-keys.mdx
index 688c65285d..714a35950c 100644
--- a/website/content/docs/enterprise/managed-keys.mdx
+++ b/website/content/docs/enterprise/managed-keys.mdx
@@ -7,7 +7,7 @@ description: >-
# Managed keys
-@include 'alerts/enterprise-and-hcp.mdx'
+@include 'alerts/enterprise-and-hcp-plus.mdx'
Within certain environments, customers want to leverage key management systems
external to Vault, when handling, storing, and interacting with
diff --git a/website/content/docs/enterprise/mfa/index.mdx b/website/content/docs/enterprise/mfa/index.mdx
index 2b7c9d1321..0ed18dab2b 100644
--- a/website/content/docs/enterprise/mfa/index.mdx
+++ b/website/content/docs/enterprise/mfa/index.mdx
@@ -8,7 +8,7 @@ description: >-
# Vault enterprise MFA support
-@include 'alerts/enterprise-and-hcp.mdx'
+@include 'alerts/enterprise-and-hcp-plus.mdx'
Vault Enterprise has support for Multi-factor Authentication (MFA), using
different authentication types. MFA is built on top of the Identity system of
diff --git a/website/content/docs/enterprise/mfa/mfa-duo.mdx b/website/content/docs/enterprise/mfa/mfa-duo.mdx
index 54f178c6a4..9f6c03f5a4 100644
--- a/website/content/docs/enterprise/mfa/mfa-duo.mdx
+++ b/website/content/docs/enterprise/mfa/mfa-duo.mdx
@@ -6,7 +6,7 @@ description: Vault Enterprise supports Duo MFA type.
# Duo MFA
-@include 'alerts/enterprise-and-hcp.mdx'
+@include 'alerts/enterprise-and-hcp-plus.mdx'
This page demonstrates the Duo MFA on ACL'd paths of Vault.
diff --git a/website/content/docs/enterprise/mfa/mfa-okta.mdx b/website/content/docs/enterprise/mfa/mfa-okta.mdx
index 12d0f68b5b..3370fcb6f3 100644
--- a/website/content/docs/enterprise/mfa/mfa-okta.mdx
+++ b/website/content/docs/enterprise/mfa/mfa-okta.mdx
@@ -6,7 +6,7 @@ description: Vault Enterprise supports Okta MFA type.
# Okta MFA
-@include 'alerts/enterprise-and-hcp.mdx'
+@include 'alerts/enterprise-and-hcp-plus.mdx'
This page demonstrates the Okta MFA on ACL'd paths of Vault.
diff --git a/website/content/docs/enterprise/mfa/mfa-pingid.mdx b/website/content/docs/enterprise/mfa/mfa-pingid.mdx
index 6020a6de23..bda5fbbd91 100644
--- a/website/content/docs/enterprise/mfa/mfa-pingid.mdx
+++ b/website/content/docs/enterprise/mfa/mfa-pingid.mdx
@@ -6,7 +6,7 @@ description: Vault Enterprise supports PingID MFA type.
# PingID MFA
-@include 'alerts/enterprise-and-hcp.mdx'
+@include 'alerts/enterprise-and-hcp-plus.mdx'
This page demonstrates PingID MFA on ACL'd paths of Vault.
diff --git a/website/content/docs/enterprise/mfa/mfa-totp.mdx b/website/content/docs/enterprise/mfa/mfa-totp.mdx
index d5383e24f4..6d3a69a769 100644
--- a/website/content/docs/enterprise/mfa/mfa-totp.mdx
+++ b/website/content/docs/enterprise/mfa/mfa-totp.mdx
@@ -6,7 +6,7 @@ description: Vault Enterprise supports TOTP MFA type.
# TOTP MFA
-@include 'alerts/enterprise-and-hcp.mdx'
+@include 'alerts/enterprise-and-hcp-plus.mdx'
This page demonstrates the TOTP MFA on ACL'd paths of Vault.
diff --git a/website/content/docs/enterprise/performance-standby.mdx b/website/content/docs/enterprise/performance-standby.mdx
index 4b25852b56..c02b7c552b 100644
--- a/website/content/docs/enterprise/performance-standby.mdx
+++ b/website/content/docs/enterprise/performance-standby.mdx
@@ -6,7 +6,7 @@ description: Performance Standby Nodes - Vault Enterprise
# Performance standby nodes
-@include 'alerts/enterprise-and-hcp.mdx'
+@include 'alerts/enterprise-and-hcp-plus.mdx'
Vault supports a multi-server mode for high availability. This mode protects
against outages by running multiple Vault servers. High availability mode
diff --git a/website/content/docs/enterprise/pkcs11-provider/aws-xks.mdx b/website/content/docs/enterprise/pkcs11-provider/aws-xks.mdx
index 6df9aac849..b546cac639 100644
--- a/website/content/docs/enterprise/pkcs11-provider/aws-xks.mdx
+++ b/website/content/docs/enterprise/pkcs11-provider/aws-xks.mdx
@@ -7,7 +7,7 @@ description: |-
# Vault with AWS KMS external key store (XKS) via PKCS#11 and XKS proxy
-@include 'alerts/enterprise-and-hcp.mdx'
+@include 'alerts/enterprise-and-hcp-plus.mdx'
~> **Note**: AWS [`xks-proxy`](https://github.com/aws-samples/aws-kms-xks-proxy) is used in this document as a sample implementation.
diff --git a/website/content/docs/enterprise/pkcs11-provider/index.mdx b/website/content/docs/enterprise/pkcs11-provider/index.mdx
index fe94f489c1..d239fb5be1 100644
--- a/website/content/docs/enterprise/pkcs11-provider/index.mdx
+++ b/website/content/docs/enterprise/pkcs11-provider/index.mdx
@@ -9,7 +9,7 @@ description: |-
# PKCS#11 provider
-@include 'alerts/enterprise-and-hcp.mdx'
+@include 'alerts/enterprise-and-hcp-plus.mdx'
-> **Note**: This feature is part of the [KMIP Secret Engine](/vault/docs/secrets/kmip), which requires [Vault Enterprise](https://www.hashicorp.com/products/vault/)
with the Advanced Data Protection Module.
diff --git a/website/content/docs/enterprise/pkcs11-provider/oracle-tde.mdx b/website/content/docs/enterprise/pkcs11-provider/oracle-tde.mdx
index 0f6caeaa59..12e9fb21fd 100644
--- a/website/content/docs/enterprise/pkcs11-provider/oracle-tde.mdx
+++ b/website/content/docs/enterprise/pkcs11-provider/oracle-tde.mdx
@@ -7,7 +7,7 @@ description: |-
# Oracle TDE
-@include 'alerts/enterprise-and-hcp.mdx'
+@include 'alerts/enterprise-and-hcp-plus.mdx'
[Oracle Transparent Data Encryption](https://docs.oracle.com/en/database/oracle/oracle-database/19/asoag/introduction-to-transparent-data-encryption.html) (TDE)
is supported with the [Vault PKCS#11 provider](/vault/docs/enterprise/pkcs11-provider).
diff --git a/website/content/docs/enterprise/redundancy-zones.mdx b/website/content/docs/enterprise/redundancy-zones.mdx
index e88ad1f27b..2d0aed0759 100644
--- a/website/content/docs/enterprise/redundancy-zones.mdx
+++ b/website/content/docs/enterprise/redundancy-zones.mdx
@@ -7,7 +7,7 @@ description: |-
# Redundancy zones
-@include 'alerts/enterprise-and-hcp.mdx'
+@include 'alerts/enterprise-and-hcp-plus.mdx'
Vault Enterprise Redundancy Zones provide both read scaling and resiliency benefits by enabling
the deployment of non-voting nodes alongside voting nodes on a per availability zone basis.
diff --git a/website/content/docs/enterprise/replication.mdx b/website/content/docs/enterprise/replication.mdx
index ad276cfa54..fee82d916e 100644
--- a/website/content/docs/enterprise/replication.mdx
+++ b/website/content/docs/enterprise/replication.mdx
@@ -83,7 +83,7 @@ secondaries to have a different configuration than their primary. Tokens and le
## Performance replication
-@include 'alerts/enterprise-and-hcp.mdx'
+@include 'alerts/enterprise-and-hcp-plus.mdx'
In Performance Replication, secondaries keep track of their own tokens and leases
but share the underlying configuration, policies, and supporting secrets (K/V values,
diff --git a/website/content/docs/enterprise/sealwrap.mdx b/website/content/docs/enterprise/sealwrap.mdx
index da7664017e..c5cc2367f0 100644
--- a/website/content/docs/enterprise/sealwrap.mdx
+++ b/website/content/docs/enterprise/sealwrap.mdx
@@ -8,7 +8,7 @@ description: |-
# Seal wrap
-@include 'alerts/enterprise-and-hcp.mdx'
+@include 'alerts/enterprise-and-hcp-plus.mdx'
Vault Enterprise features a mechanism to wrap values with an extra layer of
encryption for supporting [seals](/vault/docs/configuration/seal). This adds an
diff --git a/website/content/docs/enterprise/sentinel/examples.mdx b/website/content/docs/enterprise/sentinel/examples.mdx
index 8a562b4b23..449f805549 100644
--- a/website/content/docs/enterprise/sentinel/examples.mdx
+++ b/website/content/docs/enterprise/sentinel/examples.mdx
@@ -6,7 +6,7 @@ description: An overview of how Sentinel interacts with Vault Enterprise.
# Examples
-@include 'alerts/enterprise-and-hcp.mdx'
+@include 'alerts/enterprise-and-hcp-plus.mdx'
Following are some examples that help to introduce concepts. If you are
unfamiliar with writing Sentinel policies in Vault, please read through to
diff --git a/website/content/docs/enterprise/sentinel/index.mdx b/website/content/docs/enterprise/sentinel/index.mdx
index 7ad80e35ec..db3e102541 100644
--- a/website/content/docs/enterprise/sentinel/index.mdx
+++ b/website/content/docs/enterprise/sentinel/index.mdx
@@ -6,7 +6,7 @@ description: An overview of how Sentinel interacts with Vault Enterprise.
# Vault Enterprise and Sentinel integration
-@include 'alerts/enterprise-and-hcp.mdx'
+@include 'alerts/enterprise-and-hcp-plus.mdx'
Vault Enterprise integrates HashiCorp Sentinel to provide a rich set of access
control functionality. Because Vault is a security-focused product trusted with
diff --git a/website/content/docs/enterprise/sentinel/properties.mdx b/website/content/docs/enterprise/sentinel/properties.mdx
index b40582bb79..f821248849 100644
--- a/website/content/docs/enterprise/sentinel/properties.mdx
+++ b/website/content/docs/enterprise/sentinel/properties.mdx
@@ -6,7 +6,7 @@ description: An overview of how Sentinel interacts with Vault Enterprise.
# Properties
-@include 'alerts/enterprise-and-hcp.mdx'
+@include 'alerts/enterprise-and-hcp-plus.mdx'
Vault injects a rich set of data into the running Sentinel environment,
allowing for very fine-grained controls. The set of available properties are
diff --git a/website/content/partials/alerts/enterprise-and-hcp-plus.mdx b/website/content/partials/alerts/enterprise-and-hcp-plus.mdx
new file mode 100644
index 0000000000..df78e733b9
--- /dev/null
+++ b/website/content/partials/alerts/enterprise-and-hcp-plus.mdx
@@ -0,0 +1,7 @@
+
+
+ Vault Enterprise
+ license or
+ HCP Vault Plus
+ cluster required.
+
\ No newline at end of file
diff --git a/website/content/partials/alerts/enterprise-and-hcp.mdx b/website/content/partials/alerts/enterprise-and-hcp.mdx
index 3788d7890e..78374554d9 100644
--- a/website/content/partials/alerts/enterprise-and-hcp.mdx
+++ b/website/content/partials/alerts/enterprise-and-hcp.mdx
@@ -1,6 +1,7 @@
- Vault Enterprise
- license or
- HCP Vault Plus
- cluster required
+
+ Vault Enterprise
+ license or
+ HCP Vault
+ cluster required.
\ No newline at end of file