Skip to content

Commit 2fc33f0

Browse files
Merge pull request #3033 from MicrosoftDocs/main
Publish main to live, 03/05/25, 3:30 PM PT
2 parents 95dc6c8 + 372fdb6 commit 2fc33f0

File tree

3 files changed

+114
-92
lines changed

3 files changed

+114
-92
lines changed

defender-endpoint/attack-surface-reduction-rules-reference.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
- m365-security
1616
- tier2
1717
- mde-asr
18-
ms.date: 02/26/2025
18+
ms.date: 03/05/2025
1919
search.appverid: met150
2020
---
2121

@@ -93,7 +93,7 @@ The following ASR rules DO NOT honor Microsoft Defender Antivirus exclusions:
9393
| [Block Office communication application from creating child processes](#block-office-communication-application-from-creating-child-processes) |
9494

9595
> [!NOTE]
96-
> For information about configuring per-rule exclusions, see the section titled **Configure ASR rules per-rule exclusions** in the topic [Test attack surface reduction rules](attack-surface-reduction-rules-deployment-test.md).
96+
> For information about configuring per-rule exclusions, see the section titled **Configure ASR rules per-rule exclusions** in the article [Test attack surface reduction rules](attack-surface-reduction-rules-deployment-test.md).
9797
9898
## ASR rules and Defender for Endpoint Indicators of Compromise (IOC)
9999

@@ -179,10 +179,10 @@ Toast notifications are generated for all rules in Block mode. Rules in any othe
179179

180180
For rules with the "Rule State" specified:
181181

182-
- ASR rules with `\ASR Rule, Rule State\` combinations are used to surface alerts (toast notifications) on Microsoft Defender for Endpoint only for devices at cloud block level "High"
183-
- Devices that not at the high cloud block level don't generate alerts for any `ASR Rule, Rule State` combinations
184-
- EDR alerts are generated for ASR rules in the specified states, for devices at cloud block level "High+"
185-
- Toast notifications occur in block mode only and for devices at cloud block level "High"
182+
- ASR rules with `\ASR Rule, Rule State\` combinations are used to surface alerts (toast notifications) on Microsoft Defender for Endpoint only for devices set at the cloud block level `High`.
183+
- Devices that are not set at the cloud block level `High` don't generate alerts for any `ASR Rule, Rule State` combinations.
184+
- EDR alerts are generated for ASR rules in the specified states, for devices set at the cloud block level `High+`.
185+
- Toast notifications occur in block mode only and for devices set at the cloud block level `High`.
186186

187187
| Rule name | Rule state | EDR alerts | Toast notifications |
188188
|---|---|---|---|
@@ -256,7 +256,7 @@ This rule prevents an application from writing a vulnerable signed driver to dis
256256
The **Block abuse of exploited vulnerable signed drivers** rule doesn't block a driver already existing on the system from being loaded.
257257

258258
> [!NOTE]
259-
> You can configure this rule using Intune OMA-URI. See [Intune OMA-URI](enable-attack-surface-reduction.md#custom-profile-in-intune) for configuring custom rules.
259+
> You can configure this rule using Intune OMA-URI. See [Intune OMA-URI](enable-attack-surface-reduction.md#custom-profile-in-intune-alternative-2) for configuring custom rules.
260260
> You can also configure this rule using [PowerShell](enable-attack-surface-reduction.md#powershell).
261261
> To have a driver examined, use this Web site to [Submit a driver for analysis](https://www.microsoft.com/en-us/wdsi/driversubmission).
262262

0 commit comments

Comments
 (0)