diff --git a/website/docs/commands/taint.html.markdown b/website/docs/commands/taint.html.markdown
index 8086ffefc..65c758d9c 100644
--- a/website/docs/commands/taint.html.markdown
+++ b/website/docs/commands/taint.html.markdown
@@ -76,14 +76,18 @@ The resource aws_security_group.allow_all in the module root has been marked as
## Example: Tainting a single resource created with for_each
-It is necessary to wrap the resource in single quotes and escape the quotes.
This example will taint a single resource created with for_each:
```
-$ terraform taint "module.route_tables.azurerm_route_table.rt[\"DefaultSubnet\"]"
+$ terraform taint 'module.route_tables.azurerm_route_table.rt["DefaultSubnet"]'
The resource module.route_tables.azurerm_route_table.rt["DefaultSubnet"] in the module root has been marked as tainted.
```
+~> Note: In most `sh` compatible shells, double quotes and spaces can be
+escaped by wrapping the argument in single quotes. This however varies between
+other shells and operating systems, and users should use the appropriate escape
+characters based on the applicable quoting rules for their shell to pass the
+address string, including quotes, to Terraform.
## Example: Tainting a Resource within a Module