Skip to content

Commit 2de9b84

Browse files
Merge pull request #3983 from MicrosoftDocs/1194b457-68be-4f41-b706-de6a6fbb6742_54
[METADATA UPDATE][Merge by 2025-06-11] Magic metadata update - new values for ms.topic
2 parents bec9ed1 + 87d5cfb commit 2de9b84

File tree

105 files changed

+147
-154
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

105 files changed

+147
-154
lines changed

defender-endpoint/access-mssp-portal.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ audience: ITPro
1111
ms.collection:
1212
- m365-security
1313
- tier3
14-
ms.topic: conceptual
14+
ms.topic: how-to
1515
search.appverid: met150
1616
ms.date: 03/21/2025
1717
---

defender-endpoint/adv-tech-of-mdav.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ audience: ITPro
2424
- [Microsoft Defender for Business](https://www.microsoft.com/security/business/endpoint-security/microsoft-defender-business)
2525
- [Microsoft Defender for Endpoint Plan 1](microsoft-defender-endpoint.md)
2626
- Microsoft Defender Antivirus
27-
- [Microsoft Defender for Individuals](https://www.microsoft.com/microsoft-365/microsoft-defender-for-individuals)
27+
- [Microsoft Defender for Individuals](https://www.microsoft.com/microsoft-365/microsoft-defender-for-individuals?msockid=0f1c3b9963366db31ba02e78621b6c1e#Overview)
2828

2929
Microsoft Defender Antivirus and the multiple engines that lead to the advanced detection and prevention technologies under the hood to detect and stop a wide range of threats and attacker techniques at multiple points, as depicted in the following diagram:
3030

@@ -82,7 +82,7 @@ An additional layer to help prevent memory-based attacks is to use the Attack Su
8282

8383
### How many malware threats does Microsoft Defender Antivirus block per month?
8484

85-
[Five billion threats on devices every month](https://www.microsoft.com/en-us/security/blog/2019/05/14/executing-vision-microsoft-threat-protection/).
85+
[Five billion threats on devices every month](https://www.microsoft.com/security/blog/2019/05/14/executing-vision-microsoft-threat-protection/).
8686

8787
### How does Microsoft Defender Antivirus memory protection help?
8888

defender-endpoint/analyzer-feedback.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ audience: ITPro
1313
ms.collection:
1414
- m365-security
1515
- tier2
16-
ms.topic: conceptual
16+
ms.topic: how-to
1717
ms.subservice: ngp
1818
search.appverid: met150
1919
ms.date: 03/26/2025

defender-endpoint/android-configure.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.collection:
1212
- m365-security
1313
- tier3
1414
- mde-android
15-
ms.topic: conceptual
15+
ms.topic: how-to
1616
ms.subservice: android
1717
search.appverid: met150
1818
ms.date: 06/05/2025

defender-endpoint/android-whatsnew.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -210,7 +210,7 @@ If you encounter any issues, [submit in-app feedback](android-support-signin.md#
210210

211211
## The Microsoft Defender for Endpoint app is now Microsoft Defender in the Play store
212212

213-
Microsoft Defender for Endpoint is now available as **Microsoft Defender** in the play store. With this update, the app is available as preview for **Consumers in the US region**. Based on how you log into the app with your work or personal account, you have access to features for Microsoft Defender for Endpoint or for Microsoft Defender for individuals. For more information, see [this blog](https://www.microsoft.com/microsoft-365/microsoft-defender-for-individuals).
213+
Microsoft Defender for Endpoint is now available as **Microsoft Defender** in the play store. With this update, the app is available as preview for **Consumers in the US region**. Based on how you log into the app with your work or personal account, you have access to features for Microsoft Defender for Endpoint or for Microsoft Defender for individuals. For more information, see [this blog](https://www.microsoft.com/microsoft-365/microsoft-defender-for-individuals?msockid=0f1c3b9963366db31ba02e78621b6c1e#Overview).
214214

215215
## Vulnerability management
216216

defender-endpoint/attack-surface-reduction-rules-deployment-implement.md

Lines changed: 35 additions & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -10,14 +10,14 @@ ms.author: ewalsh
1010
ms.reviewer: sugamar
1111
manager: deniseb
1212
ms.custom: asr
13-
ms.topic: conceptual
13+
ms.topic: how-to
1414
ms.collection:
1515
- m365-security
1616
- m365solution-asr-rules
1717
- highpri
1818
- tier1
1919
- mde-asr
20-
ms.date: 03/27/2025
20+
ms.date: 06/10/2025
2121
search.appverid: met150
2222
---
2323

@@ -36,15 +36,18 @@ Implementing attack surface reduction rules move the first test ring into an ena
3636
## Step 1: Transition attack surface reduction rules from Audit to Block
3737

3838
1. After all exclusions are determined while in audit mode, start setting some attack surface reduction rules to "block" mode, starting with the rule that has the fewest triggered events. See [Enable attack surface reduction rules](enable-attack-surface-reduction.md).
39+
3940
2. Review the reporting page in the Microsoft Defender portal; see [Threat protection report in Microsoft Defender for Endpoint](threat-protection-reports.md). Also review feedback from your champions.
41+
4042
3. Refine exclusions or create new exclusions as determined necessary.
43+
4144
4. Switch problematic rules back to Audit.
4245

43-
> [!NOTE]
44-
> For problematic rules (rules creating too much noise), it is better to create exclusions than to turn rules off or switching back to Audit. You will have to determine what is best for your environment.
46+
> [!NOTE]
47+
> For problematic rules (rules creating too much noise), it's better to create exclusions than to turn off rules or switching back to Audit. You'll have to determine what is best for your environment.
4548
46-
> [!TIP]
47-
> When available, take advantage of the Warn mode setting in rules to limit disruptions. Enabling attack surface reduction rules in Warn mode enables you to capture triggered events and view their potential disruptions, without actually blocking end-user access. Learn more: [Warn mode for users](attack-surface-reduction.md#warn-mode-for-users).
49+
> [!TIP]
50+
> When available, take advantage of the Warn mode setting in rules to limit disruptions. Enabling attack surface reduction rules in Warn mode enables you to capture triggered events and view their potential disruptions, without actually blocking end-user access. Learn more: [Warn mode for users](attack-surface-reduction.md#warn-mode-for-users).
4851
4952
### How does Warn mode work?
5053

@@ -54,33 +57,40 @@ Warn mode is effectively a Block instruction, but with the option for the user t
5457

5558
When you're confident that you've correctly configured the attack surface reduction rules for ring 1, you can widen the scope of your deployment to the next ring (ring n + 1).
5659

57-
The deployment process, steps 1 – 3, is essentially the same for each subsequent ring:
60+
In the follwing deployment process, steps 1 – 3 are essentially the same for each subsequent ring:
61+
62+
1. Test rules in Audit mode.
63+
64+
2. Review attack surface reduction-triggered audit events in the Microsoft Defender portal.
65+
66+
3. Create exclusions.
67+
68+
4. Review: refine, add, or remove exclusions as necessary.
69+
70+
5. Set rules to "block" mode.
5871

59-
1. Test rules in Audit
60-
2. Review attack surface reduction-triggered audit events in the Microsoft Defender portal
61-
3. Create exclusions
62-
4. Review: refine, add, or remove exclusions as necessary
63-
5. Set rules to "block"
6472
6. Review the reporting page in the Microsoft Defender portal.
73+
6574
7. Create exclusions.
75+
6676
8. Disable problematic rules or switch them back to Audit.
6777

6878
#### Customize attack surface reduction rules
6979

70-
As you continue to expand your attack surface reduction rules deployment, you may find it necessary or beneficial to customize the attack surface reduction rules that you've enabled.
80+
As you continue to expand your attack surface reduction rules deployment, you might find it necessary or beneficial to customize the attack surface reduction rules that you've enabled.
7181

7282
##### Exclude files and folders
7383

7484
You can choose to exclude files and folders from being evaluated by attack surface reduction rules. When excluded, the file isn't blocked from running even if an attack surface reduction rule detects that the file contains malicious behavior.
7585

7686
For example, consider the ransomware rule:
7787

78-
The ransomware rule is designed to help enterprise customers reduce risks of ransomware attacks while ensuring business continuity. By default, the ransomware rule errors on the side of caution and protect against files that haven't yet attained sufficient reputation and trust. To reemphasize, the ransomware rule only triggers on files that haven't gained enough positive reputation and prevalence, based on usage metrics of millions of our customers. Usually, the blocks are self resolved, because each file's "reputation and trust" values are incrementally upgraded as non-problematic usage increases.
88+
The ransomware rule is designed to help enterprise customers reduce risks of ransomware attacks while ensuring business continuity. By default, the ransomware rule errors on the side of caution and protect against files that haven't yet attained sufficient reputation and trust. To re-emphasize, the ransomware rule only triggers on files that haven't gained enough positive reputation and prevalence, based on usage metrics of millions of our customers. Usually, the blocks are self resolved, because each file's "reputation and trust" values are incrementally upgraded as nonproblematic usage increases.
7989

8090
In cases in which blocks aren't self resolved in a timely manner, customers can - _at their own risk_ - make use of either the self-service mechanism or an Indicator of Compromise (IOC)-based "allowlist" capability to unblock the files themselves.
8191

8292
> [!WARNING]
83-
> Excluding or unblocking files or folders could potentially allow unsafe files to run and infect your devices. Excluding files or folders can severely reduce the protection provided by attack surface reduction rules. Files that would have been blocked by a rule will be allowed to run, and there will be no report or event recorded.
93+
> Excluding or unblocking files or folders could potentially allow unsafe files to run and infect your devices. Excluding files or folders can severely reduce the protection provided by attack surface reduction rules. Files that would be blocked by a rule are allowed to run, and there's no report or event recorded.
8494
8595
An exclusion can apply to all rules that allow exclusions or apply to specific rules using [per-rule exclusions](attack-surface-reduction-rules-deployment-test.md#configure-attack-surface-reduction-per-rule-exclusions). You can specify an individual file, folder path, or the fully qualified domain name for a resource.
8696

@@ -102,22 +112,22 @@ See the [attack surface reduction rules reference](attack-surface-reduction-rule
102112
4. Double-click the **Exclude files and paths from Attack surface reduction Rules** setting and set the option to **Enabled**. Select **Show** and enter each file or folder in the **Value name** column. Enter **0** in the **Value** column for each item.
103113

104114
> [!WARNING]
105-
> Do not use quotes as they are not supported for either the **Value name** column or the **Value** column.
115+
> Don't use quotes as they aren't supported for either the **Value name** column or the **Value** column.
106116
107117
##### Use PowerShell to exclude files and folders
108118

109-
1. Type **powershell** in the Start menu, right-click **Windows PowerShell** and select **Run as administrator**.
119+
1. Type **powershell** in the Start menu, right-click **Windows PowerShell**, and then select **Run as administrator**.
110120

111121
2. Enter the following cmdlet:
112122

113-
```PowerShell
114-
Add-MpPreference -AttackSurfaceReductionOnlyExclusions "<fully qualified path or resource>"
115-
```
123+
```PowerShell
124+
Add-MpPreference -AttackSurfaceReductionOnlyExclusions "<fully qualified path or resource>"
125+
```
116126

117-
Continue to use `Add-MpPreference -AttackSurfaceReductionOnlyExclusions` to add more folders to the list.
127+
Continue to use `Add-MpPreference -AttackSurfaceReductionOnlyExclusions` to add more folders to the list.
118128

119-
> [!IMPORTANT]
120-
> Use `Add-MpPreference` to append or add apps to the list. Using the `Set-MpPreference` cmdlet will overwrite the existing list.
129+
> [!IMPORTANT]
130+
> Use `Add-MpPreference` to append or add apps to the list. Using the `Set-MpPreference` cmdlet overwrites the existing list.
121131
122132
##### Use MDM CSPs to exclude files and folders
123133

@@ -127,7 +137,7 @@ Use the [./Vendor/MSFT/Policy/Config/Defender/AttackSurfaceReductionOnlyExclusio
127137

128138
You can customize the notification for when a rule is triggered and blocks an app or file. See the [Windows Security](/windows/security/threat-protection/windows-defender-security-center/windows-defender-security-center#customize-notifications-from-the-windows-defender-security-center) article.
129139

130-
## Additional articles in this deployment collection
140+
## More articles in this deployment collection
131141

132142
[Attack surface reduction rules deployment overview](attack-surface-reduction-rules-deployment.md)
133143

@@ -142,4 +152,5 @@ You can customize the notification for when a rule is triggered and blocks an ap
142152
## See also
143153

144154
- [Exclusions for Microsoft Defender for Endpoint and Microsoft Defender Antivirus](defender-endpoint-antivirus-exclusions.md)
155+
145156
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]

defender-endpoint/attack-surface-reduction-rules-deployment-test.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.author: ewalsh
1010
ms.reviewer: sugamar
1111
manager: deniseb
1212
ms.custom: asr
13-
ms.topic: conceptual
13+
ms.topic: how-to
1414
ms.collection:
1515
- m365-security
1616
- m365solution-asr-rules

defender-endpoint/attack-surface-reduction-rules-report.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.author: ewalsh
1010
ms.reviewer: sugamar,
1111
manager: deniseb
1212
ms.custom: asr
13-
ms.topic: conceptual
13+
ms.topic: how-to
1414
ms.collection:
1515
- m365-security
1616
- tier2

defender-endpoint/attack-surface-reduction.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.author: ewalsh
1010
ms.reviewer: sugamar
1111
manager: deniseb
1212
ms.custom: admindeeplinkDEFENDER
13-
ms.topic: conceptual
13+
ms.topic: how-to
1414
ms.collection:
1515
- m365-security
1616
- tier2

defender-endpoint/autoir-investigation-results.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
- m365-security
1616
- tier3
1717
- mde-edr
18-
ms.topic: conceptual
18+
ms.topic: how-to
1919
ms.custom:
2020
- autoir
2121
- admindeeplinkDEFENDER

0 commit comments

Comments
 (0)