Skip to content

Commit 33f45d0

Browse files
committed
Update enable-attack-surface-reduction.md
1 parent 2d18702 commit 33f45d0

File tree

1 file changed

+12
-12
lines changed

1 file changed

+12
-12
lines changed

defender-endpoint/enable-attack-surface-reduction.md

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -97,15 +97,14 @@ You can exclude files and folders from being evaluated by most attack surface re
9797

9898
> [!IMPORTANT]
9999
> Excluding files or folders can severely reduce the protection provided by attack surface reduction rules. Excluded files are allowed to run, and no report or event are recorded. If attack surface reduction rules are detecting files that you believe shouldn't be detected, you should [use audit mode first to test the rule](attack-surface-reduction-rules-deployment-test.md#step-1-test-attack-surface-reduction-rules-using-audit).
100-
An exclusion is applied only when the excluded application or service starts. For example, if you add an exclusion for an update service that is already running, the update service continues to trigger events until the service is stopped and restarted.
100+
> An exclusion is applied only when the excluded application or service starts. For example, if you add an exclusion for an update service that is already running, the update service continues to trigger events until the service is stopped and restarted.
101101
102102
When adding exclusions, keep these points in mind:
103103

104-
* Exclusions are typically based on individual files or folders (using folder paths or the full path of the file to be excluded).
105-
* Exclusion paths can use environment variables and wildcards. See [Use wildcards in the file name and folder path or extension exclusion lists](configure-extension-file-exclusions-microsoft-defender-antivirus.md#use-wildcards-in-the-file-name-and-folder-path-or-extension-exclusion-lists)
106-
* When deployed through group policy or PowerShell, exclusions apply to all attack surface reduction rules. Using Intune, it's possible to configure an exclusion for a specific attack surface reduction rule. See [Configure attack surface reduction rules per-rule exclusions](attack-surface-reduction-rules-deployment-test.md#configure-attack-surface-reduction-per-rule-exclusions).
107-
108-
* Exclusions can be added based on certificate and file hashes, by allowing specified Defender for Endpoint file and certificate indicators. See [Overview of indicators](indicators-overview.md).
104+
- Exclusions are typically based on individual files or folders (using folder paths or the full path of the file to be excluded).
105+
- Exclusion paths can use environment variables and wildcards. See [Use wildcards in the file name and folder path or extension exclusion lists](configure-extension-file-exclusions-microsoft-defender-antivirus.md#use-wildcards-in-the-file-name-and-folder-path-or-extension-exclusion-lists)
106+
- When deployed through group policy or PowerShell, exclusions apply to all attack surface reduction rules. Using Intune, it's possible to configure an exclusion for a specific attack surface reduction rule. See [Configure attack surface reduction rules per-rule exclusions](attack-surface-reduction-rules-deployment-test.md#configure-attack-surface-reduction-per-rule-exclusions).
107+
- Exclusions can be added based on certificate and file hashes, by allowing specified Defender for Endpoint file and certificate indicators. See [Overview of indicators](indicators-overview.md).
109108

110109
## Policy conflicts
111110

@@ -152,6 +151,7 @@ The following procedures for enabling attack surface reduction rules include ins
152151
- [Block Webshell creation for Servers](/defender-endpoint/attack-surface-reduction-rules-reference), this isn't supported on Windows Server 2012 R2, but it is supported on Windows Server 2016. It only applies to the Exchange server role.
153152

154153
#### Endpoint security policy (Preferred)
154+
155155
1. Select **Endpoint Security** > **Attack surface reduction**. Choose an existing attack surface reduction rule or create a new one. To create a new one, select **Create Policy** and enter information for this profile. For **Profile type**, select **Attack surface reduction rules**. If you've chosen an existing profile, select **Properties** and then select **Settings**.
156156

157157
1. In the **Configuration settings** pane, select **Attack Surface Reduction** and then select the desired setting for each attack surface reduction rule.
@@ -238,17 +238,17 @@ You can use Microsoft Intune OMA-URI to configure custom attack surface reductio
238238

239239
10. In step **5 Applicability Rules** for the following settings, do the following:
240240

241-
1. In **Rule**, select either **Assign profile if**, or **Don't assign profile if**.
241+
1. In **Rule**, select either **Assign profile if**, or **Don't assign profile if**.
242242

243-
2. In **Property**, select the property to which you want this rule to apply.
243+
2. In **Property**, select the property to which you want this rule to apply.
244244

245-
3. In **Value**, enter the applicable value or value range.
245+
3. In **Value**, enter the applicable value or value range.
246246

247-
:::image type="content" source="media/mem07-5-applicability-rules.png" alt-text="The applicability rules in the Microsoft Intune admin center portal." lightbox="media/mem07-5-applicability-rules.png":::
247+
:::image type="content" source="media/mem07-5-applicability-rules.png" alt-text="The applicability rules in the Microsoft Intune admin center portal." lightbox="media/mem07-5-applicability-rules.png":::
248248

249249
11. Select **Next**. In step **6 Review + create**, review the settings and information you've selected and entered, and then select **Create**.
250250

251-
:::image type="content" source="media/mem08-6-review-create.png" alt-text="Screenshot showing the Review and create option in the Microsoft Intune admin center portal." lightbox="media/mem08-6-review-create.png":::
251+
:::image type="content" source="media/mem08-6-review-create.png" alt-text="Screenshot showing the Review and create option in the Microsoft Intune admin center portal." lightbox="media/mem08-6-review-create.png":::
252252

253253
Rules are active and live within minutes.
254254

@@ -327,7 +327,7 @@ Example:
327327
- 2: Audit (Evaluate how the attack surface reduction rule would impact your organization if enabled)
328328
- 6: Warn (Enable the attack surface reduction rule but allow the end-user to bypass the block)
329329

330-
:::image type="content" source="media/asr-rules-gp.png" alt-text="attack surface reduction rules in Group Policy" lightbox="media/asr-rules-gp.png":::
330+
:::image type="content" source="media/asr-rules-gp.png" alt-text="attack surface reduction rules in Group Policy" lightbox="media/asr-rules-gp.png":::
331331

332332
5. To exclude files and folders from attack surface reduction rules, select the **Exclude files and paths from Attack surface reduction rules** setting and set the option to **Enabled**. Select **Show** and enter each file or folder in the **Value name** column. Enter **0** in the **Value** column for each item.
333333

0 commit comments

Comments
 (0)