diff --git a/windows/security/threat-protection/windows-defender-application-control/microsoft-recommended-block-rules.md b/windows/security/threat-protection/windows-defender-application-control/microsoft-recommended-block-rules.md
index 8aae066fd4..6ec7694669 100644
--- a/windows/security/threat-protection/windows-defender-application-control/microsoft-recommended-block-rules.md
+++ b/windows/security/threat-protection/windows-defender-application-control/microsoft-recommended-block-rules.md
@@ -18,6 +18,7 @@ ms.author: dansimp
**Applies to**
- Windows 10
- Windows Server 2016
+- Windows Server 2019
Members of the security community\* continuously collaborate with Microsoft to help protect customers. With the help of their valuable reports, Microsoft has identified a list of valid applications that an attacker could also potentially use to bypass Windows Defender Application Control.
@@ -69,8 +70,8 @@ Unless your use scenarios explicitly require them, Microsoft recommends that you
->[!Note]
->This application list will be updated with the latest vendor information as application vulnerabilities are resolved and new issues are discovered.
+> [!Note]
+> This application list will be updated with the latest vendor information as application vulnerabilities are resolved and new issues are discovered.
Certain software applications may allow additional code to run by design.
These types of applications should be blocked by your Windows Defender Application Control policy.
@@ -1511,3 +1512,10 @@ Pick the correct version of each .dll for the Windows release you plan to suppor
```
+
+> [!Note]
+> To create a policy that works on both version 1803 and 1809, you can create two diff policies, or merge them into one broader policy.
+
+## Further reading (How-To)
+
+- [Merge Windows Defender Application Control policies](merge-windows-defender-application-control-policies.md)