From bea0ba71425301f85f6e1eda5c146ae29109c016 Mon Sep 17 00:00:00 2001 From: jsuther1974 Date: Wed, 14 Jun 2023 09:46:21 -0700 Subject: [PATCH] Add ARM deny rules for vulnerable HVCIScan --- .../microsoft-recommended-block-rules.md | 24 +++++++++++++++++-- 1 file changed, 22 insertions(+), 2 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-application-control/microsoft-recommended-block-rules.md b/windows/security/threat-protection/windows-defender-application-control/microsoft-recommended-block-rules.md index 26b82ac4e89..3b7f22c1dfc 100644 --- a/windows/security/threat-protection/windows-defender-application-control/microsoft-recommended-block-rules.md +++ b/windows/security/threat-protection/windows-defender-application-control/microsoft-recommended-block-rules.md @@ -8,7 +8,7 @@ author: jsuther1974 ms.reviewer: jgeurten ms.author: vinpa manager: aaroncz -ms.date: 06/13/2023 +ms.date: 06/14/2023 ms.topic: reference --- @@ -118,7 +118,7 @@ The blocklist policy that follows includes "Allow all" rules for both kernel and ```xml - 10.1.0.1 + 10.1.0.2 {A244370E-44C9-4C06-B551-F6016E563076} {2E07F7E4-194C-4D20-B7C9-6F44A6C5A234} @@ -163,6 +163,10 @@ The blocklist policy that follows includes "Allow all" rules for both kernel and + + + + @@ -1508,6 +1512,10 @@ The blocklist policy that follows includes "Allow all" rules for both kernel and + + + + @@ -1515,6 +1523,18 @@ The blocklist policy that follows includes "Allow all" rules for both kernel and 0 + + + + Microsoft Windows Recommended User Mode BlockList + + + + + 10.1.0.2 + + + ```