Skip to content

Commit 181bea9

Browse files
committed
Update defender-endpoint-demonstration-attack-surface-reduction-rules.md
1 parent 2fcb4a4 commit 181bea9

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

defender-endpoint/defender-endpoint-demonstration-attack-surface-reduction-rules.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -36,9 +36,9 @@ Attack surface reduction rules target specific behaviors that are typically used
3636
## Scenario requirements and setup
3737

3838
- Windows client devices must be running Windows 11, Windows 10 1709 build 16273, or later
39-
- Windows server devices must be running Windows Server 2025, Windows Server 2022, Windows Server 2019, Windows Server 2016, or Windows Server 2012 R2 (with the unified MDE client).
39+
- Windows server devices must be running Windows Server 2025, Windows Server 2022, Windows Server 2019, Windows Server 2016, or Windows Server 2012 R2 (with the [modern, unified solution](/defender-endpoint/configure-server-endpoints#functionality-in-the-modern-unified-solution)).
4040
- Microsoft Defender Antivirus
41-
- Microsoft 365 Apps (Office; required for Office rules and sample)
41+
- Microsoft 365 Apps (formerly referred to as Office apps; required for Office rules and sample)
4242
- [Download attack surface reduction PowerShell scripts](https://demo.wd.microsoft.com/Content/WindowsDefender_ASR_scripts.zip)
4343

4444
## PowerShell commands

0 commit comments

Comments
 (0)