diff --git a/windows/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard.md b/windows/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard.md index 9bf3316aeb..79d18a0881 100644 --- a/windows/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard.md +++ b/windows/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard.md @@ -94,7 +94,7 @@ This rule blocks the following file types from being run or launched from an ema - Script archive files >[!IMPORTANT] ->Exclusions do not apply to this rule. +>[Exclusions do not apply to this rule](customize-attack-surface-reduction.md#exclude-files-and-folders). ### Rule: Block Office applications from creating child processes @@ -118,7 +118,7 @@ This is typically used by malware to run malicious code in an attempt to hide th >[!IMPORTANT] ->Exclusions do not apply to this rule. +>[Exclusions do not apply to this rule](customize-attack-surface-reduction.md#exclude-files-and-folders). ### Rule: Block JavaScript or VBScript From launching downloaded executable content @@ -128,7 +128,7 @@ This rule prevents these scripts from being allowed to launch apps, thus prevent >[!IMPORTANT] ->Exclusions do not apply to this rule. +>[Exclusions do not apply to this rule](customize-attack-surface-reduction.md#exclude-files-and-folders). ### Rule: Block execution of potentially obfuscated scripts