Skip to content

Commit 1a1a3c0

Browse files
committed
Update detect-block-potentially-unwanted-apps-microsoft-defender-antivirus.md
1 parent 908be94 commit 1a1a3c0

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

defender-endpoint/detect-block-potentially-unwanted-apps-microsoft-defender-antivirus.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -123,7 +123,7 @@ Scenarios and default settings for PUA protection depend on whether devices are
123123
| -------- | -------- | -------- | -------- |
124124
| Windows 10, version 2004 or later<br/>Windows Server 2012 R2 and Windows Server 2016 with the unified Microsoft Defender for Endpoint client<br/>Windows Server 2019 or later | older than 1.329.495.0 | Feature not available | Audit mode (2)|
125125
| Windows 11, version 22H2 or later | 1.329.495.0 or later | Available | Audit mode (1)|
126-
| Windows 10, version 2004 or later<br/>Windows Server 2012 R2 and Windows Server 2016 with the unified Microsoft Defender for Endpoint client<br/>Windows Serer 2019 or later | 1.329.495.0 or later | Feature not available | Block mode (1)|
126+
| Windows 10, version 2004 or later<br/>Windows Server 2012 R2 and Windows Server 2016 with the unified Microsoft Defender for Endpoint client<br/>Windows Server 2019 or later | 1.329.495.0 or later | Feature not available | Block mode (1)|
127127

128128
> [!TIP]
129129
> To enforce PUA protection in block mode, use any of the following management methods:

0 commit comments

Comments
 (0)