Skip to content

Commit c6d122e

Browse files
committed
Update tvm-block-vuln-apps.md
1 parent 66d95d9 commit c6d122e

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

defender-vulnerability-management/tvm-block-vuln-apps.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -132,14 +132,14 @@ After you've unblocked an application, refresh the page to see it removed from t
132132

133133
When users try to access a blocked application, they receive a message informing them that the application was by their organization. This message is customizable.
134134

135-
For applications where the warn mitigation option was applied, users receive a message informing them that the application has been blocked by their organization. The user has the option to bypass the block for subsequent launches, by choosing "Allow". This allow is only temporary, and the application will be blocked again after a while.
135+
For applications where the warn mitigation option was applied, users receive a message informing them that the application was blocked by their organization. The user can bypass the block for subsequent launches, by choosing "Allow". This allow action is only temporary, and the application is blocked again after a while.
136136

137137
> [!NOTE]
138-
> If your organization has deployed the DisableLocalAdminMerge group policy, you may experience instances where allowing an application does not take effect. This behavior will be fixed in an upcoming release.
138+
> If your organization has deployed the `DisableLocalAdminMerge` group policy, you could experience instances where allowing an application does not take effect.
139139
140140
## End-user updating blocked applications
141141

142-
A commonly asked question is how does an end-user update a blocked application? The block is enforced by blocking the executable file. Some applications, such as Firefox, rely on a separate update executable, which won't be blocked by this feature. In other cases when the application requires the main executable file to update, it's recommended to either implement the block in warn mode (so that the end-user can bypass the block) or the end-user can delete the application (if no vital information is stored on the client) and reinstalls the application.
142+
A commonly asked question is, "How does an end user update a blocked application?" The block is enforced by blocking the executable file. Some applications, such as Firefox, rely on a separate update executable, which isn't blocked by this feature. In other cases, when the application requires the main executable file to update, it's recommended to either implement the block in warn mode (so that the end user can bypass the block) or ask the end user to delete the application (if no vital information is stored on the client) and then reinstall it.
143143

144144
## Related articles
145145

0 commit comments

Comments
 (0)