From 924a3151da3bddeb2c0527321281c62126aed5bb Mon Sep 17 00:00:00 2001 From: Andrew Baker Date: Tue, 24 Oct 2017 14:34:51 +0100 Subject: [PATCH] Update evaluate-exploit-protection.md Corrected typo --- .../evaluate-exploit-protection.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/threat-protection/windows-defender-exploit-guard/evaluate-exploit-protection.md b/windows/threat-protection/windows-defender-exploit-guard/evaluate-exploit-protection.md index 3d46ca1532..6ab98f2f63 100644 --- a/windows/threat-protection/windows-defender-exploit-guard/evaluate-exploit-protection.md +++ b/windows/threat-protection/windows-defender-exploit-guard/evaluate-exploit-protection.md @@ -71,7 +71,7 @@ First, enable the mitigation using PowerShell, and then confirm that it has been Now that you know the mitigation has been enabled, you can test to see if it works and what the experience would be for an end user: -1. Type **run** in the Start menu andp ress **Enter** to open the run dialog box. +1. Type **run** in the Start menu and press **Enter** to open the run dialog box. 2. Type **iexplore.exe** and press **Enter** or click **OK** to attempt to open Internet Explorer. @@ -130,4 +130,4 @@ For further details on how audit mode works, and when you might want to use it, - [Comparison with Enhanced Mitigation Experience Toolkit](emet-exploit-protection-exploit-guard.md) - [Enable Exploit protection](enable-exploit-protection.md) - [Configure and audit Exploit protection mitigations](customize-exploit-protection.md) -- [Import, export, and deploy Exploit protection configurations](import-export-exploit-protection-emet-xml.md) \ No newline at end of file +- [Import, export, and deploy Exploit protection configurations](import-export-exploit-protection-emet-xml.md)