From ca964f9f6b753c3b075f9500dcaad4cf349b6a70 Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Mon, 23 Aug 2021 10:08:27 -0700 Subject: [PATCH] Update microsoft-recommended-block-rules.md --- .../microsoft-recommended-block-rules.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-application-control/microsoft-recommended-block-rules.md b/windows/security/threat-protection/windows-defender-application-control/microsoft-recommended-block-rules.md index 64ac22bc1a..655bd9a6df 100644 --- a/windows/security/threat-protection/windows-defender-application-control/microsoft-recommended-block-rules.md +++ b/windows/security/threat-protection/windows-defender-application-control/microsoft-recommended-block-rules.md @@ -14,7 +14,7 @@ author: jsuther1974 ms.reviewer: isbrahm ms.author: dansimp manager: dansimp -ms.date: 04/09/2019 +ms.date: 08/23/2021 --- # Microsoft recommended block rules @@ -22,7 +22,7 @@ ms.date: 04/09/2019 **Applies to:** - Windows 10 -- Windows Server 2016 and above +- Windows Server 2016 or later Members of the security community* continuously collaborate with Microsoft to help protect customers. With the help of their valuable reports, Microsoft has identified a list of valid applications that an attacker could also potentially use to bypass Windows Defender Application Control.