Skip to content

Commit 2cf6d7c

Browse files
authored
Merge pull request #2424 from kurtsarens/docs-editor/enable-attack-surface-reductio-1736764796
uppercase lowercase fixes -- Emm is reviewing
2 parents 891eaa9 + cdb3db1 commit 2cf6d7c

File tree

1 file changed

+8
-7
lines changed

1 file changed

+8
-7
lines changed

defender-endpoint/enable-attack-surface-reduction.md

Lines changed: 8 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -76,10 +76,10 @@ You can enable attack surface reduction rules by using any of these methods:
7676
- [Microsoft Intune](#intune)
7777
- [Mobile Device Management (MDM)](#mdm)
7878
- [Microsoft Configuration Manager](#microsoft-configuration-manager)
79-
- [Group Policy](#group-policy)
79+
- [Group policy (GP)](#group-policy)
8080
- [PowerShell](#powershell)
8181

82-
Enterprise-level management such as Intune or Microsoft Configuration Manager is recommended. Enterprise-level management overwrites any conflicting Group Policy or PowerShell settings on startup.
82+
Enterprise-level management such as Intune or Microsoft Configuration Manager is recommended. Enterprise-level management overwrites any conflicting group policy or PowerShell settings on startup.
8383

8484
## Exclude files and folders from attack surface reduction rules
8585

@@ -93,7 +93,8 @@ When adding exclusions, keep these points in mind:
9393

9494
* Exclusions are typically based on individual files or folders (using folder paths or the full path of the file to be excluded).
9595
* Exclusion paths can use environment variables and wildcards. See [Use wildcards in the file name and folder path or extension exclusion lists](configure-extension-file-exclusions-microsoft-defender-antivirus.md#use-wildcards-in-the-file-name-and-folder-path-or-extension-exclusion-lists)
96-
* When deployed through Group Policy or PowerShell, exclusions apply to all attack surface reduction rules. Using Intune, it is possible to configure an exclusion for a specific attack surface reduction rule. See [Configure attack surface reduction rules per-rule exclusions](attack-surface-reduction-rules-deployment-test.md#configure-attack-surface-reduction-per-rule-exclusions)
96+
* When deployed through group policy or PowerShell, exclusions apply to all attack surface reduction rules. Using Intune, it is possible to configure an exclusion for a specific attack surface reduction rule. See [Configure attack surface reduction rules per-rule exclusions](attack-surface-reduction-rules-deployment-test.md#configure-attack-surface-reduction-per-rule-exclusions).
97+
9798
* Exclusions can be added based on certificate and file hashes, by allowing specified Defender for Endpoint file and certificate indicators. See [Overview of indicators](indicators-overview.md).
9899

99100
## Policy Conflict
@@ -117,7 +118,7 @@ This section provides configuration details for the following configuration meth
117118
- [Custom profile in Intune](#custom-profile-in-intune)
118119
- [MDM](#mdm)
119120
- [Microsoft Configuration Manager](#microsoft-configuration-manager)
120-
- [Group Policy](#group-policy)
121+
- [Group policy](#group-policy)
121122
- [PowerShell](#powershell)
122123

123124
The following procedures for enabling attack surface reduction rules include instructions for how to exclude files and folders.
@@ -267,12 +268,12 @@ Example:
267268
6. After the policy is created, select **Close**.
268269

269270
> [!WARNING]
270-
> There is a known issue with the applicability of Attack Surface Reduction on Server OS versions which is marked as compliant without any actual enforcement. Currently, there is no ETA for when this will be fixed.
271+
> There is a known issue with the applicability of attack surface reduction on Server OS versions which is marked as compliant without any actual enforcement. Currently, there is no defined release date for when this will be fixed.
271272
272-
### Group Policy
273+
### Group policy
273274

274275
> [!WARNING]
275-
> If you manage your computers and devices with Intune, Configuration Manager, or other enterprise-level management platform, the management software will overwrite any conflicting Group Policy settings on startup.
276+
> If you manage your computers and devices with Intune, Configuration Manager, or other enterprise-level management platform, the management software will overwrite any conflicting group policy settings on startup.
276277
277278
1. On your Group Policy management computer, open the [Group Policy Management Console](https://technet.microsoft.com/library/cc731212.aspx), right-click the Group Policy Object you want to configure and select **Edit**.
278279

0 commit comments

Comments
 (0)