From aff5fc379ee9465f939853f6796d1d901c90aeae Mon Sep 17 00:00:00 2001 From: martyav Date: Mon, 5 Aug 2019 15:26:23 -0400 Subject: [PATCH] corrected link --- .../controlled-folders-exploit-guard.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/controlled-folders-exploit-guard.md b/windows/security/threat-protection/windows-defender-exploit-guard/controlled-folders-exploit-guard.md index 3f579d8377..61b7ac4720 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/controlled-folders-exploit-guard.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/controlled-folders-exploit-guard.md @@ -30,7 +30,7 @@ Controlled folder access is especially useful in helping to protect your documen Apps are added to the trusted list based upon their prevalence and reputation. Apps that are highly prevalent throughout your organization, and that have never displayed any malicious behavior, are deemed trustworthy and automatically added to the list. -Apps can also be manually added via System Center Configuration Manager (SCCM) and Intune. Additional actions, such as [adding a file indicator](../microsoft-defender-atp/respond-file-alerts#add-indicator-to-block-or-allow-a-file), can be performed from the Security Center Console. +Apps can also be manually added via System Center Configuration Manager (SCCM) and Intune. Additional actions, such as [adding a file indicator](../microsoft-defender-atp/respond-file-alerts.md#add-indicator-to-block-or-allow-a-file), can be performed from the Security Center Console. With Controlled folder access in place, a notification will appear on the computer where the app attempted to make changes to a protected folder. You can [customize the notification](customize-attack-surface-reduction.md#customize-the-notification) with your company details and contact information. You can also enable the rules individually to customize what techniques the feature monitors.