diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/determine-your-application-control-objectives.md b/windows/security/threat-protection/windows-defender-application-control/applocker/determine-your-application-control-objectives.md index b42a538517..adcfdab2e0 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/determine-your-application-control-objectives.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/determine-your-application-control-objectives.md @@ -77,7 +77,7 @@ Use the following table to develop your own objectives and determine which appli
SRP can control the following file types:
Executables
Dlls
DLLs
Scripts
Windows Installers
AppLocker can control the following file types:
Executables
Dlls
DLLs
Scripts
Windows Installers
Packaged apps and installers
AppLocker does not support this. AppLocker currently supports the following file extensions:
Executables (.exe, .com)
Dlls (.ocx, .dll)
DLLs (.ocx, .dll)
Scripts (.vbs, .js, .ps1, .cmd, .bat)
Windows Installers (.msi, .mst, .msp)
Packaged app installers (.appx)
Editing the hash value
SRP allows you to select a file to hash.
AppLocker computes the hash value itself. Internally it uses the SHA2 Authenticode hash for Portable Executables (Exe and Dll) and Windows Installers and a SHA2 flat file hash for the rest.
AppLocker computes the hash value itself. Internally it uses the SHA2 Authenticode hash for Portable Executables (exe and DLL) and Windows Installers and a SHA2 flat file hash for the rest.
Support for different security levels