diff --git a/Docs/NONINTERACTIVE-MODE.md b/Docs/NONINTERACTIVE-MODE.md index 64f21b4..7ae74e6 100644 --- a/Docs/NONINTERACTIVE-MODE.md +++ b/Docs/NONINTERACTIVE-MODE.md @@ -57,7 +57,7 @@ The framework automatically enters non-interactive mode when all required parame **Valid mode values:** - `"MSRecommended"` (default, fully supported, production-ready) -- `"Strict"` (maximum privacy, breaks some apps) +- `"Strict"` (maximum privacy, Teams/Zoom work) - `"Paranoid"` (hardcore, not recommended for production) **When mode is set:** diff --git a/Docs/SECURITY-ANALYSIS.md b/Docs/SECURITY-ANALYSIS.md index 256b777..d01f148 100644 --- a/Docs/SECURITY-ANALYSIS.md +++ b/Docs/SECURITY-ANALYSIS.md @@ -58,7 +58,7 @@ Set-ItemProperty -Path "HKLM:\SOFTWARE\Policies\Microsoft\Windows\DeviceInstall\ ## 4. Attack Surface Reduction (ASR) -**Setting:** 19 Defender Rules (Block Mode) +**Setting:** 19 Defender Rules (17 Block + 2 Configurable) ### 🏠 Home User Impact: **Low** - **Blocked:** running `.exe` files directly from an email attachment (Outlook).