Skip to content

Commit 340195d

Browse files
committed
Learn Editor: Update attack-surface-reduction-rules-reference.md
1 parent 6cdd39e commit 340195d

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

defender-endpoint/attack-surface-reduction-rules-reference.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.localizationpriority: medium
77
audience: ITPro
88
author: paulinbar
99
ms.author: painbar
10-
ms.reviewer: sugamar, yongrhee
10+
ms.reviewer: sugamar, ericlaw
1111
manager: bagol
1212
ms.custom: asr
1313
ms.topic: reference
@@ -462,7 +462,7 @@ Dependencies: Microsoft Defender Antivirus, AMSI
462462

463463
### Block Office applications from creating executable content
464464

465-
This rule prevents Office apps, including Word, Excel, and PowerPoint, from creating potentially malicious executable content, by blocking malicious code from being written to disk. Malware that abuses Office as a vector might attempt to break out of Office and save malicious components to disk. These malicious components would survive a computer reboot and persist on the system. Therefore, this rule defends against a common persistence technique. This rule also blocks execution of untrusted files that might have been saved by Office macros that are allowed to run in Office files.
465+
This rule prevents Office apps, including Word, Excel, and PowerPoint, from being used as a vector to persist malicious code on disk. Malware that abuses Office as a vector might attempt to save malicious components to disk that would survive a computer reboot and persist on the system. This rule defends against this persistence technique by blocking access (open/execute) to the code written to disk. This rule also blocks execution of untrusted files that might have been saved by Office macros that are allowed to run in Office files.
466466

467467
Intune name: `Office apps/macros creating executable content`
468468

0 commit comments

Comments
 (0)