Skip to content

Commit 22c0a5f

Browse files
authored
Merge pull request #4859 from paulinbar/painbar-attack-surface-reduction
Updated Per ASR rule alert and notification details table
2 parents a000f9f + 4366e9e commit 22c0a5f

File tree

1 file changed

+9
-9
lines changed

1 file changed

+9
-9
lines changed

defender-endpoint/attack-surface-reduction-rules-reference.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -5,17 +5,17 @@ ms.service: defender-endpoint
55
ms.subservice: asr
66
ms.localizationpriority: medium
77
audience: ITPro
8-
author: emmwalshh
9-
ms.author: ewalsh
8+
author: paulinbar
9+
ms.author: painbar
1010
ms.reviewer: sugamar, yongrhee
11-
manager: deniseb
11+
manager: bagol
1212
ms.custom: asr
1313
ms.topic: reference
1414
ms.collection:
1515
- m365-security
1616
- tier2
1717
- mde-asr
18-
ms.date: 06/10/2025
18+
ms.date: 08/28/2025
1919
search.appverid: met150
2020
---
2121

@@ -190,21 +190,21 @@ For rules with the "Rule State" specified:
190190
|[Block Adobe Reader from creating child processes](#block-adobe-reader-from-creating-child-processes) | Block | Y | Y |
191191
|[Block all Office applications from creating child processes](#block-all-office-applications-from-creating-child-processes) | | N | Y |
192192
|[Block credential stealing from the Windows local security authority subsystem (lsass.exe)](#block-credential-stealing-from-the-windows-local-security-authority-subsystem) | | N | N |
193-
|[Block executable content from email client and webmail](#block-executable-content-from-email-client-and-webmail) | | Y | Y |
193+
|[Block executable content from email client and webmail](#block-executable-content-from-email-client-and-webmail) | Audit or Block | Y (in block mode) <br/> N (in audit mode) | Y (in block mode) |
194194
|[Block executable files from running unless they meet a prevalence, age, or trusted list criterion](#block-executable-files-from-running-unless-they-meet-a-prevalence-age-or-trusted-list-criterion) | | N | Y |
195-
|[Block execution of potentially obfuscated scripts](#block-execution-of-potentially-obfuscated-scripts) | Audit or Block | Y (in block mode) <br/>N (in audit mode) | Y (in block mode) |
195+
|[Block execution of potentially obfuscated scripts](#block-execution-of-potentially-obfuscated-scripts) | | Y | Y (in block mode) |
196196
|[Block JavaScript or VBScript from launching downloaded executable content](#block-javascript-or-vbscript-from-launching-downloaded-executable-content) | Block | Y | Y |
197197
|[Block Office applications from creating executable content](#block-office-applications-from-creating-executable-content) | | N | Y |
198198
|[Block Office applications from injecting code into other processes](#block-office-applications-from-injecting-code-into-other-processes) | | N | Y |
199199
|[Block Office communication application from creating child processes](#block-office-communication-application-from-creating-child-processes) | | N | Y |
200-
|[Block persistence through WMI event subscription](#block-persistence-through-wmi-event-subscription) | Audit or Block | Y (in block mode) <br/> N (in audit mode) | Y (in block mode) |
200+
|[Block persistence through WMI event subscription](#block-persistence-through-wmi-event-subscription) | | Y | Y (in block mode) |
201201
|[Block process creations originating from PSExec and WMI commands](#block-process-creations-originating-from-psexec-and-wmi-commands) | | N | Y |
202202
|[Block rebooting machine in Safe Mode](#block-rebooting-machine-in-safe-mode)| | N | N |
203-
|[Block untrusted and unsigned processes that run from USB](#block-untrusted-and-unsigned-processes-that-run-from-usb) | Audit or Block | Y (in block mode) <br/> N (in audit mode) | Y (in block mode) |
203+
|[Block untrusted and unsigned processes that run from USB](#block-untrusted-and-unsigned-processes-that-run-from-usb) | | Y| Y (in block mode) |
204204
|[Block use of copied or impersonated system tools](#block-use-of-copied-or-impersonated-system-tools)| | N | N |
205205
|[Block Webshell creation for Servers](#block-webshell-creation-for-servers) | | N | N |
206206
|[Block Win32 API calls from Office macros](#block-win32-api-calls-from-office-macros) | | N | Y |
207-
|[Use advanced protection against ransomware](#use-advanced-protection-against-ransomware) | Audit or Block | Y (in block mode) <br/> N (in audit mode) | Y (in block mode) |
207+
|[Use advanced protection against ransomware](#use-advanced-protection-against-ransomware) | | Y | Y (in block mode) |
208208

209209
## ASR rule to GUID matrix
210210

0 commit comments

Comments
 (0)