From f95667760a6e5919f398cb7b0e064d9f4aa654de Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Mon, 20 May 2019 15:47:14 -0700 Subject: [PATCH] update wildcards --- .../manage-automation-folder-exclusions.md | 5 ++++- 1 file changed, 4 insertions(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/manage-automation-folder-exclusions.md b/windows/security/threat-protection/microsoft-defender-atp/manage-automation-folder-exclusions.md index 217418bd99..a9c9599d8d 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/manage-automation-folder-exclusions.md +++ b/windows/security/threat-protection/microsoft-defender-atp/manage-automation-folder-exclusions.md @@ -37,7 +37,10 @@ You can control the following attributes about the folder that you'd like to be **Folders**
-You can specify a folder and its subfolders to be skipped. You can use wild cards so that all files under the directory is skipped by the automated investigation. +You can specify a folder and its subfolders to be skipped. + +>[!NOTE] +>At this time, use of wild cards as a way to exclude files under a directory is not yet supported. **Extensions**
You can specify the extensions to exclude in a specific directory. The extensions are a way to prevent an attacker from using an excluded folder to hide an exploit. The extensions explicitly define which files to ignore.