diff --git a/windows/security/threat-protection/microsoft-defender-atp/customize-exploit-protection.md b/windows/security/threat-protection/microsoft-defender-atp/customize-exploit-protection.md index 64a77031bf..30dd08b49c 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/customize-exploit-protection.md +++ b/windows/security/threat-protection/microsoft-defender-atp/customize-exploit-protection.md @@ -89,7 +89,7 @@ Validate stack integrity (StackPivot) | Ensures that the stack has not been redi > > Mikael then adds the app *test.exe* to the **Program settings** section. In the options for that app, under **Data Execution Prevention (DEP)**, he enables the **Override system settings** option and sets the switch to **On**. There are no other apps listed in the **Program settings** section. > -> The result will be that DEP only will be enabled for *test.exe*. All other apps will not have DEP applied. +> The result will be that DEP only will be enabled for *test.exe*. All other apps will not have DEP applied. > > > * **Example 2** @@ -100,8 +100,7 @@ Validate stack integrity (StackPivot) | Ensures that the stack has not been redi > > Josie also adds the app *miles.exe* to the **Program settings** section and configures **Control flow guard (CFG)** to **On**. She doesn't enable the **Override system settings** option for DEP or any other mitigations for that app. > ->The result will be that DEP will be enabled for *test.exe*. DEP will not be enabled for any other app, including *miles.exe*. ->CFG will be enabled for *miles.exe*. +> The result will be that DEP will be enabled for *test.exe*. DEP will not be enabled for any other app, including *miles.exe*. CFG will be enabled for *miles.exe*. > [!NOTE] > If you have found any issues in this article, you can report it directly to a Windows Server/Windows Client partner or use the Microsoft technical support numbers for your country.