mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-16 10:53:43 +00:00
Changed Microsoft Recommended Block list article
This commit is contained in:
@ -55,7 +55,7 @@
|
||||
href: design/create-wdac-policy-using-reference-computer.md
|
||||
- name: Create a WDAC deny list policy
|
||||
href: design/create-wdac-deny-policy.md
|
||||
- name: Microsoft recommended block rules
|
||||
- name: Applications that can bypass WDAC and how to block them
|
||||
href: design/microsoft-recommended-block-rules.md
|
||||
- name: Microsoft recommended driver block rules
|
||||
href: design/microsoft-recommended-driver-block-rules.md
|
||||
|
@ -1,15 +1,15 @@
|
||||
---
|
||||
title: Microsoft recommended block rules
|
||||
title: Applications that can bypass WDAC and how to block them
|
||||
description: View a list of recommended block rules, based on knowledge shared between Microsoft and the wider security community.
|
||||
ms.localizationpriority: medium
|
||||
ms.date: 06/14/2023
|
||||
ms.topic: reference
|
||||
---
|
||||
|
||||
# Microsoft recommended block rules
|
||||
# Applications that can bypass WDAC and how to block them
|
||||
|
||||
>[!NOTE]
|
||||
>Some capabilities of Windows Defender Application Control (WDAC) are only available on specific Windows versions. Learn more about the [WDAC feature availability](../feature-availability.md).
|
||||
> [!NOTE]
|
||||
> Some capabilities of Windows Defender Application Control (WDAC) are only available on specific Windows versions. Learn more about the [WDAC feature availability](../feature-availability.md).
|
||||
|
||||
Members of the security community<sup>*</sup> continuously collaborate with Microsoft to help protect customers. With the help of their valuable reports, Microsoft has identified a list of valid applications that an attacker could also potentially use to bypass WDAC.
|
||||
|
Reference in New Issue
Block a user