From d4df1feff3aafd99acbeb9b0c0af011386274027 Mon Sep 17 00:00:00 2001 From: jsuther1974 Date: Fri, 3 Mar 2023 12:08:58 -0800 Subject: [PATCH] Update select-types-of-rules-to-create.md --- .../select-types-of-rules-to-create.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/windows-defender-application-control/select-types-of-rules-to-create.md b/windows/security/threat-protection/windows-defender-application-control/select-types-of-rules-to-create.md index 1945e7f623..bfd2021af9 100644 --- a/windows/security/threat-protection/windows-defender-application-control/select-types-of-rules-to-create.md +++ b/windows/security/threat-protection/windows-defender-application-control/select-types-of-rules-to-create.md @@ -174,7 +174,7 @@ You can also use the following macros when the exact volume may vary: `%OSDRIVE% Without a wildcard, the filepath rule allows only a specific file (ex. `C:\foo\bar.exe`). > [!NOTE] -> When authoring WDAC policies with Microsoft Configuration Manager (ConfigMgr), you can instruct ConfigMgr to create rules for specified files and folders. These rules **aren't** WDAC filepath rules. Rather, ConfigMgr performs a one-time scan of the specified files and folders and builds rules for any binaries found in those locations at the time of that scan. File changes to those specified files and folders after that scan won't be allowed unless the ConfigMgr policy is reapplied. +> When authoring WDAC policies with Configuration Manager, there is an option to create rules for specified files and folders. These rules **aren't** WDAC filepath rules. Rather, Configuration Manager performs a one-time scan of the specified files and folders and builds rules for any binaries found in those locations at the time of that scan. File changes to those specified files and folders after that scan won't be allowed unless the Configuration Manager policy is reapplied. > [!NOTE] > There is currently a bug where MSIs cannot be allow listed in file path rules. MSIs must be allow listed using other rule types, for example, publisher rules or file attribute rules.