From f355c144d2ab1ad3f8c337fc488376063a480abe Mon Sep 17 00:00:00 2001 From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com> Date: Fri, 23 Dec 2022 20:52:58 +0530 Subject: [PATCH] added windows 11 after reading this article, i confirmed windows 11 is supported --- ...rol-only-elevate-executables-that-are-signed-and-validated.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/security/threat-protection/security-policy-settings/user-account-control-only-elevate-executables-that-are-signed-and-validated.md b/windows/security/threat-protection/security-policy-settings/user-account-control-only-elevate-executables-that-are-signed-and-validated.md index 5b94f9db23..674025df05 100644 --- a/windows/security/threat-protection/security-policy-settings/user-account-control-only-elevate-executables-that-are-signed-and-validated.md +++ b/windows/security/threat-protection/security-policy-settings/user-account-control-only-elevate-executables-that-are-signed-and-validated.md @@ -20,6 +20,7 @@ ms.technology: itpro-security # User Account Control: Only elevate executables that are signed and validated **Applies to** +- Windows 11 - Windows 10 Describes the best practices, location, values, policy management, and security considerations for the **User Account Control: Only elevate executables that are signed and validated** security policy setting.