Skip to content

Commit 1066ad7

Browse files
authored
Merge pull request #1840 from YongRhee-MSFT/docs-editor/attack-surface-reduction-rules-1731083423
Update attack-surface-reduction-rules-reference.md
2 parents b39da3a + 0b9a4f6 commit 1066ad7

File tree

1 file changed

+18
-1
lines changed

1 file changed

+18
-1
lines changed

defender-endpoint/attack-surface-reduction-rules-reference.md

Lines changed: 18 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
- m365-security
1616
- tier2
1717
- mde-asr
18-
ms.date: 11/05/2024
18+
ms.date: 11/10/2024
1919
search.appverid: met150
2020
---
2121

@@ -348,6 +348,14 @@ Advanced hunting action type:
348348

349349
Dependencies: Microsoft Defender Antivirus
350350

351+
Known issues: These applications and "Block credential stealing from the Windows local security authority subsystem" rule, are incompatible:
352+
353+
|Application name|For information|
354+
| -------- | -------- |
355+
|Quest Dirsync Password Sync|[Dirsync Password Sync isn’t working when Windows Defender is installed, error: "VirtualAllocEx failed: 5" (4253914)](https://support.quest.com/kb/4253914/dirsync-password-sync-isn-t-working-when-windows-defender-is-installed-error-virtualallocex-failed-5)|
356+
357+
For technical support, contact the software vendor.
358+
351359
### Block executable content from email client and webmail
352360

353361
This rule blocks email opened within the Microsoft Outlook application, or Outlook.com and other popular webmail providers from propagating the following file types:
@@ -482,6 +490,15 @@ Advanced hunting action type:
482490

483491
Dependencies: Microsoft Defender Antivirus
484492

493+
Known issues: These applications and "Block Office applications from injecting code into other processes" rule, are incompatible:
494+
495+
|Application name|For information|
496+
| -------- | -------- |
497+
|Avecto (BeyondTrust) Privilege Guard|[September-2024 (Platform: 4.18.24090.11 | Engine 1.1.24090.11)](/defender-endpoint/microsoft-defender-antivirus-updates). |
498+
|Heimdal security|n/a|
499+
500+
For technical support, contact the software vendor.
501+
485502
### Block Office communication application from creating child processes
486503

487504
This rule prevents Outlook from creating child processes, while still allowing legitimate Outlook functions. This rule protects against social engineering attacks and prevents exploiting code from abusing vulnerabilities in Outlook. It also protects against [Outlook rules and forms exploits](https://blogs.technet.microsoft.com/office365security/defending-against-rules-and-forms-injection/) that attackers can use when a user's credentials are compromised.

0 commit comments

Comments
 (0)