mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-29 05:37:22 +00:00
Update windows/security/threat-protection/windows-defender-application-control/select-types-of-rules-to-create.md
Line 189: Add "an" before "invalid format" and minor copy edit to remove duplicate phrasing in back-to-back sentences.
This commit is contained in:
parent
d181b7942a
commit
5dabc9220f
@ -186,7 +186,7 @@ Separate rules are created for UMCI and KMCI. If the cmdlets can't determine tha
|
||||
|
||||
### When does WDAC use the flat file hash value?
|
||||
|
||||
There are some rare cases where a file's format doesn't conform to the Authenticode spec and so WDAC falls back to use the flat file hash. There are a number of reasons this can occur, such as if changes are made to the in-memory version of the file at runtime. In such cases, you'll see that the hash shown in the correlated 3089 signature information event matches the flat file hash from the 3076/3077 block event. To create rules for files with invalid format, you can add hash rules to the policy for the flat file hash using the WDAC Wizard or by editing the policy XML directly.
|
||||
There are some rare cases where a file's format doesn't conform to the Authenticode spec and so WDAC falls back to use the flat file hash. This can occur for a number of reasons, such as if changes are made to the in-memory version of the file at runtime. In such cases, you'll see that the hash shown in the correlated 3089 signature information event matches the flat file hash from the 3076/3077 block event. To create rules for files with an invalid format, you can add hash rules to the policy for the flat file hash using the WDAC Wizard or by editing the policy XML directly.
|
||||
|
||||
## Windows Defender Application Control filename rules
|
||||
|
||||
|
Loading…
x
Reference in New Issue
Block a user