We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent 682393c commit 11b1cfbCopy full SHA for 11b1cfb
reference/docs-conceptual/security/app-control/application-control.md
@@ -21,7 +21,7 @@ allowed to run on Windows.
21
PowerShell detects both AppLocker and WDAC system wide policies. AppLocker doesn't have way to query
22
the policy enforcement status. To detect if a system wide application control policy is being
23
enforced by AppLocker, PowerShell creates two temporary files and tests if they can be executed. The
24
-files use the following name format:
+filenames use the following name format:
25
26
- `$env:TEMP/__PSAppLockerTest__<random-8dot3-name>.ps1`
27
- `$env:TEMP/__PSAppLockerTest__<random-8dot3-name>.psm1`
0 commit comments