diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/maintain-applocker-policies.md b/windows/security/threat-protection/windows-defender-application-control/applocker/maintain-applocker-policies.md index 17cfe63472..2f56b9e1e8 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/maintain-applocker-policies.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/maintain-applocker-policies.md @@ -42,7 +42,7 @@ There are three methods you can use to maintain AppLocker policies: ## Maintaining AppLocker policies by using Mobile Device Management (MDM) Using the AppLocker configuration service provider, you can select which apps are allowed or blocked from running. Using the CSP, you can configure app restrictions based on grouping (such as EXE, MSI, DLL, Store apps and more) and then chose how to enforce different policies for different apps. -For more information, see the [AppLocker CSP](https://docs.microsoft.com/en-us/windows/client-management/mdm/applocker-csp). +For more information, see the [AppLocker CSP](https://docs.microsoft.com/windows/client-management/mdm/applocker-csp). ## Maintaining AppLocker policies by using Group Policy