From 3bf8aad86f99519670cf4fde21898b6f63f78e8a Mon Sep 17 00:00:00 2001 From: Philippe Lagadec Date: Mon, 13 May 2019 13:49:59 +0200 Subject: [PATCH] added Microsoft recommended block rules --- README.md | 1 + 1 file changed, 1 insertion(+) diff --git a/README.md b/README.md index 44e41fc..69c09ce 100644 --- a/README.md +++ b/README.md @@ -92,6 +92,7 @@ This is work in progress: please contribute by forking, editing and sending pull - [Microsoft - Windows 10 Enterprise Security](https://docs.microsoft.com/en-us/windows/security/) - [Awesome Windows Domain Hardening](https://github.com/PaulSec/awesome-windows-domain-hardening) - [Microsoft - How to detect, enable and disable SMBv1, SMBv2, and SMBv3 in Windows and Windows Server](https://support.microsoft.com/en-gb/help/2696547/detect-enable-disable-smbv1-smbv2-smbv3-in-windows-and-windows-server) +- [Microsoft recommended block rules](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-application-control/microsoft-recommended-block-rules) - List of applications or files that can be used by an attacker to circumvent application whitelisting policies ## macOS