diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/enable-virtualization-based-protection-of-code-integrity.md b/windows/security/threat-protection/windows-defender-exploit-guard/enable-virtualization-based-protection-of-code-integrity.md index e3edc38db7..e9ac774ccc 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/enable-virtualization-based-protection-of-code-integrity.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/enable-virtualization-based-protection-of-code-integrity.md @@ -182,6 +182,9 @@ Windows 10 and Windows Server 2016 have a WMI class for related properties and f > [!NOTE] > The *Win32\_DeviceGuard* WMI class is only available on the Enterprise edition of Windows 10. +> [!NOTE] +> Mode Based Execution Control property will only be listed as available starting with Windows 10 version 1709. + The output of this command provides details of the available hardware-based security features as well as those features that are currently enabled. #### AvailableSecurityProperties