From 2a31574d28554e45b7f6b29740c2b4e57e401477 Mon Sep 17 00:00:00 2001 From: niwelton <75342701+niwelton@users.noreply.github.com> Date: Thu, 1 Feb 2024 15:49:24 -0800 Subject: [PATCH] Update dynamic-keywords.md Updated language to match the use of prehyrdation in the script explanation section. Removed the Edge 109 requirement. There was a fix which removes this requirement. --- .../network-security/windows-firewall/dynamic-keywords.md | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/windows/security/operating-system-security/network-security/windows-firewall/dynamic-keywords.md b/windows/security/operating-system-security/network-security/windows-firewall/dynamic-keywords.md index 3bb0d451da..de2bc38d56 100644 --- a/windows/security/operating-system-security/network-security/windows-firewall/dynamic-keywords.md +++ b/windows/security/operating-system-security/network-security/windows-firewall/dynamic-keywords.md @@ -82,7 +82,6 @@ The following are requirements for the FQDN feature: - [Chrome][HTTP-1] - [Firefox][HTTP-2] - The device's default DNS resolution settings apply. This feature doesn't provide DNS security or functionality changes - - For Microsoft Edge version 109 and later, configure the browser to use the default system DNS through [this policy][EDGE-2]. For more information, see [Configure Microsoft Edge policy settings on Windows devices][EDGE-3] > [!TIP] > You can also download the ADMX file from there, follow the directions, and configure it via gpedit.msc for local testing. @@ -136,7 +135,7 @@ Get-NetFirewallDynamicKeywordAddress -AllAutoResolve ### Hydrate FQDN rules -The following sample scripts read the current Windows Firewall configuration, extract FQDN-based rules, and perform DNS resolution on each domain. The result is that the IP addresses for those rules get populated. +The following sample scripts read the current Windows Firewall configuration, extract FQDN-based rules, and perform DNS resolution on each domain. The result is that the IP addresses for those rules get "prehydrated." ```PowerShell Get-NetFirewallDynamicKeywordAddress -AllAutoResolve |`