diff --git a/windows/security/threat-protection/microsoft-defender-atp/enable-exploit-protection.md b/windows/security/threat-protection/microsoft-defender-atp/enable-exploit-protection.md index 4530161e10..7b1c044a64 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/enable-exploit-protection.md +++ b/windows/security/threat-protection/microsoft-defender-atp/enable-exploit-protection.md @@ -226,7 +226,7 @@ This table lists the PowerShell cmdlets (and associated audit mode cmdlet) that |Disable Win32k system calls | App-level only | DisableWin32kSystemCalls | AuditSystemCall |Do not allow child processes | App-level only | DisallowChildProcessCreation | AuditChildProcess |Export address filtering (EAF) | App-level only | EnableExportAddressFilterPlus, EnableExportAddressFilter \[1\] | Audit not available\[2\] | -||Import address filtering (IAF) | App-level only | EnableImportAddressFilter | Audit not available\[2\] | +|Import address filtering (IAF) | App-level only | EnableImportAddressFilter | Audit not available\[2\] | |Simulate execution (SimExec) | App-level only | EnableRopSimExec | Audit not available\[2\] | |Validate API invocation (CallerCheck) | App-level only | EnableRopCallerCheck | Audit not available\[2\] | |Validate handle usage | App-level only | StrictHandle | Audit not available |