From 81428b6a0c85a6e3eacec35eca96881b94c53ff9 Mon Sep 17 00:00:00 2001 From: Nilanjana Ganguly <74384702+ngangulyms@users.noreply.github.com> Date: Fri, 2 Aug 2024 10:10:44 -0700 Subject: [PATCH] test NG --- windows/security/book/application-security.md | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/windows/security/book/application-security.md b/windows/security/book/application-security.md index a23b836b09..dfe13e70b4 100644 --- a/windows/security/book/application-security.md +++ b/windows/security/book/application-security.md @@ -9,8 +9,10 @@ ms.date: 04/09/2024 :::image type="content" source="images/application-security-cover.png" alt-text="Cover of the application security chapter." border="false"::: -:::image type="content" source="images/application-security-on.png" alt-text="Diagram containing a list of security features." lightbox="images/application-security.png" border="false"::: +:::image type="content" source="images/application-security-on.png" alt-text="Diagram of containing a list of security features." lightbox="images/application-security.png" border="false"::: Cybercriminals can take advantage of poorly secured applications to access valuable resources. With Windows 11, IT admins can combat common application attacks from the moment a device is provisioned. For example, IT can remove local admin rights from user accounts so that PCs run with the least amount of privileges to prevent malicious applications from accessing sensitive resources. In addition, organizations can control which applications run on their devices with App Control for Business (previously called Windows Defender Application Control - WDAC). + +test \ No newline at end of file