From c85619f933801f70bdfa8316e3e841867f96a87c Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Wed, 24 Jan 2018 18:44:29 -0800 Subject: [PATCH] fixed links --- .../steps-to-deploy-windows-defender-application-control.md | 2 +- .../threat-protection/windows-defender-application-control.md | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/device-security/device-guard/steps-to-deploy-windows-defender-application-control.md b/windows/device-security/device-guard/steps-to-deploy-windows-defender-application-control.md index a43a5c8855..380dfc0e0c 100644 --- a/windows/device-security/device-guard/steps-to-deploy-windows-defender-application-control.md +++ b/windows/device-security/device-guard/steps-to-deploy-windows-defender-application-control.md @@ -808,7 +808,7 @@ You can now use this file to update the existing WDAC policy that you ran in aud > [!Note] > You may have noticed that you did not generate a binary version of this policy as you did in [Create a Windows Defender Application Control policy from a reference computer](#create-a-windows-defender-application-control-policy-from-a-reference-computer). This is because WDAC policies created from an audit log are not intended to run as stand-alone policies but rather to update existing WDAC policies. -## Use a Windows Defender Application Control policy to control specific plug-ins, add-ins, and modules +## Use a Windows Defender Application Control policy to control specific plug-ins, add-ins, and modules As of Windows 10, version 1703, you can use WDAC policies not only to control applications, but also to control whether specific plug-ins, add-ins, and modules can run from specific apps (such as a line-of-business application or a browser): diff --git a/windows/threat-protection/windows-defender-application-control.md b/windows/threat-protection/windows-defender-application-control.md index 5e9201d107..510a795563 100644 --- a/windows/threat-protection/windows-defender-application-control.md +++ b/windows/threat-protection/windows-defender-application-control.md @@ -44,6 +44,6 @@ Group Policy can also be used to distribute Group Policy Objects that contain WD Prior to Windows 10, version 1709, Windows Defender Application Control was known as Windows Defender Device Guard configurable code integrity policies. Beginning with Windows 10, version 1703, you can use WDAC not only to control applications, but also to control whether specific plug-ins, add-ins, and modules can run from specific apps (such as a line-of-business application or a browser). -For more information, see [Use a WDAC policy to control specific plug-ins, add-ins, and modules](windows\device-security\device-guard\steps-to-deploy-windows-defender-application-control.md#a-href-idplug-insause-a-windows-defender-application-control-policy-to-control-specific-plug-ins-add-ins-and-modules). +For more information, see [Use a WDAC policy to control specific plug-ins, add-ins, and modules](windows\device-security\device-guard\steps-to-deploy-windows-defender-application-control.md#use-a-windows-defender-application-control-policy-to-control-specific-plug-ins-add-ins-and-modules).