Skip to content

Commit 00d1541

Browse files
committed
Update troubleshoot-asr.md
1 parent e90c5ec commit 00d1541

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

defender-endpoint/troubleshoot-asr.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -112,7 +112,7 @@ If you tested the rule with the demo tool and with audit mode, and attack surfac
112112

113113
### Querying blocking and auditing events
114114

115-
attack surface reduction rule events can be viewed within the Windows Defender log.
115+
Attack surface reduction rule events can be viewed within the Windows Defender log.
116116

117117
To access it, open Windows Event Viewer, and browse to **Applications and Services Logs** \> **Microsoft** \> **Windows** \> **Windows Defender** \> **Operational**.
118118

@@ -126,13 +126,13 @@ To add an exclusion, see [Customize attack surface reduction](attack-surface-red
126126

127127
> [!IMPORTANT]
128128
> You can specify individual files and folders to be excluded, but you can't specify individual rules.
129-
> This means any files or folders that are excluded are excluded from all ASR rules.
129+
> This means any files or folders that are excluded from all ASR rules.
130130
131131
## Report a false positive or false negative
132132

133133
Use the [Microsoft Security Intelligence web-based submission form](https://www.microsoft.com/wdsi/support/report-exploit-guard) to report a false negative or false positive for network protection. With a Windows E5 subscription, you can also [provide a link to any associated alert](alerts-queue.md).
134134

135-
## Collect Microsoft Defender Antimalware Protection diagnostic data for file submissions
135+
## Collect Microsoft Defender Anti-malware Protection diagnostic data for file submissions
136136

137137
When you report a problem with attack surface reduction rules, you're asked to collect and submit diagnostic data for Microsoft support and engineering teams to help troubleshoot issues.
138138

@@ -155,7 +155,7 @@ You can also view rule events through the Microsoft Defender Antivirus dedicated
155155

156156
You can find this utility in *%ProgramFiles%\Windows Defender\MpCmdRun.exe*. You must run it from an elevated command prompt (that is, run as Admin).
157157

158-
To generate the support information, type *MpCmdRun.exe -getfiles*. After a while, several logs will be packaged into an archive (MpSupportFiles.cab) and made available in *C:\ProgramData\Microsoft\Windows Defender\Support*.
158+
To generate the support information, type `MpCmdRun.exe -getfiles`. After a while, several logs will be packaged into an archive (MpSupportFiles.cab) and made available at `C:\ProgramData\Microsoft\Windows Defender\Support`.
159159

160160
:::image type="content" source="media/malware-prot-logsnew.png" alt-text="The malware protection logs" lightbox="media/malware-prot-logsnew.png":::
161161

0 commit comments

Comments
 (0)