From efbfd6eaaae3de9818882ddd13bfab7be0028a64 Mon Sep 17 00:00:00 2001 From: Thomas Raya Date: Thu, 21 Nov 2019 15:33:45 -0800 Subject: [PATCH] Update line 174 bookmark link --- .../create-wdac-policy-for-lightly-managed-devices.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/windows-defender-application-control/create-wdac-policy-for-lightly-managed-devices.md b/windows/security/threat-protection/windows-defender-application-control/create-wdac-policy-for-lightly-managed-devices.md index cd0886c8ad..6c2e789a0f 100644 --- a/windows/security/threat-protection/windows-defender-application-control/create-wdac-policy-for-lightly-managed-devices.md +++ b/windows/security/threat-protection/windows-defender-application-control/create-wdac-policy-for-lightly-managed-devices.md @@ -171,7 +171,7 @@ In order to minimize user productivity impact, Alice has defined a policy that m - Use signed WDAC policies which allow authorized signed supplemental policies only. - Use a restrictive audit mode policy to audit app usage and augment vulnerability detection. - **FilePath rules**
- See [more information about filepath rules](select-types-of-rules-to-create.md#More-information-about-filepath-rules) + See [more information about filepath rules](select-types-of-rules-to-create.md#more-information-about-filepath-rules) Possible mitigations: - Limit who can elevate to administrator on the device.