Skip to content

Commit 6f4e4bb

Browse files
authored
Merge pull request #1041 from mghicho/docs-editor/indicator-certificates-1722278144
remove reference to cfa from indicators
2 parents ab76658 + ed66315 commit 6f4e4bb

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

defender-endpoint/indicator-certificates.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
ms.topic: conceptual
1616
ms.subservice: asr
1717
search.appverid: met150
18-
ms.date: 12/18/2020
18+
ms.date: 07/31/2024
1919
---
2020

2121
# Create indicators based on certificates
@@ -33,7 +33,7 @@ ms.date: 12/18/2020
3333
3434
You can create indicators for certificates. Some common use cases include:
3535

36-
- Scenarios when you need to deploy blocking technologies, such as [attack surface reduction rules](attack-surface-reduction.md) and [controlled folder access](controlled-folders.md) but need to allow behaviors from signed applications by adding the certificate in the allow list.
36+
- Scenarios when you need to deploy blocking technologies, such as [attack surface reduction rules](attack-surface-reduction.md) but need to allow behaviors from signed applications by adding the certificate in the allow list.
3737
- Blocking the use of a specific signed application across your organization. By creating an indicator to block the certificate of the application, Windows Defender AV will prevent file executions (block and remediate) and the Automated Investigation and Remediation behave the same.
3838

3939
## Before you begin

0 commit comments

Comments
 (0)