diff --git a/windows/security/threat-protection/windows-defender-application-control/select-types-of-rules-to-create.md b/windows/security/threat-protection/windows-defender-application-control/select-types-of-rules-to-create.md index 146ad43afe..36393e5187 100644 --- a/windows/security/threat-protection/windows-defender-application-control/select-types-of-rules-to-create.md +++ b/windows/security/threat-protection/windows-defender-application-control/select-types-of-rules-to-create.md @@ -141,6 +141,9 @@ You can also use the following macros when the exact volume may vary: `%OSDRIVE% > [!NOTE] > For others to better understand the WDAC policies that has been deployed, we recommend maintaining separate ALLOW and DENY policies on Windows 10, version 1903 and later. +> [!NOTE] +> There is currently a bug where MSIs cannot be allow listed in file path rules. + ## More information about hashes ### Why does scan create four hash rules per XML file?