Skip to content

Commit 4deae57

Browse files
committed
Update attack-surface-reduction-rules-deployment-test.md
1 parent 546586e commit 4deae57

File tree

1 file changed

+7
-9
lines changed

1 file changed

+7
-9
lines changed

defender-endpoint/attack-surface-reduction-rules-deployment-test.md

Lines changed: 7 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -80,7 +80,7 @@ You can use Microsoft Intune Endpoint Security to configure custom attack surfac
8080
8181
8. [Optional] In the **Scope tags** pane, you can add tag information to specific devices. You can also use role-based access control and scope tags to make sure that the right admins have the right access and visibility to the correct Intune objects. Learn more: [Use role-based access control (RBAC) and scope tags for distributed IT in Intune](/mem/intune/fundamentals/scope-tags).
8282

83-
9. In the **Assignments** pane, you can deploy or "assign" the profile to your user or device groups. For more information, see [Assign device profiles in Microsoft Intune](/mem/intune/configuration/device-profile-assign#exclude-groups-from-a-profile-assignment).
83+
9. In the **Assignments** pane, you can deploy or assign the profile to your user or device groups. For more information, see [Assign device profiles in Microsoft Intune](/mem/intune/configuration/device-profile-assign#exclude-groups-from-a-profile-assignment).
8484

8585
> [!NOTE]
8686
> Device group creation is supported in Defender for Endpoint Plan 1 and Plan 2.
@@ -199,7 +199,7 @@ Attack surface reduction rules now provide the capability to configure rule-spec
199199
To configure specific rule exclusions, you have the choices of using the Defender for Endpoint Security Settings Management, Intune, and Group Policy.
200200

201201
> [!NOTE]
202-
> When configuring Attack Surface Reduction per-rule exclusions, please note that specifying only the file or application name (e.g., test1.exe) is not sufficient. You must provide the full file or application path (e.g., C:\test1.exe) to ensure the exclusion is applied correctly.
202+
> When configuring Attack Surface Reduction per-rule exclusions, keep in mind that specifying only the file or application name (e.g., `test1.exe`) is not sufficient. You must provide the full file or application path (e.g., `C:\test1.exe`) to ensure the exclusion is applied correctly.
203203
204204
#### Via Intune
205205

@@ -217,10 +217,10 @@ To configure specific rule exclusions, you have the choices of using the Defende
217217
218218
> [!TIP]
219219
> Use the checkboxes next to your list of exclusion entries to select items to **Delete**, **Sort**, **Import**, or **Export**.
220-
>
220+
221221
#### Via Group Policy
222222

223-
Use Group Policy to set the per-user ASR rule exclusions
223+
Use Group Policy to set the per-user ASR rule exclusions.
224224

225225
1. On your Group Policy management computer, open the [Group Policy Management Console](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc731212(v=ws.11)).
226226

@@ -234,13 +234,11 @@ Use Group Policy to set the per-user ASR rule exclusions
234234

235235
1. Double-click **Apply a list of exclusions to specific attack surface reduction (ASR) rules**, and set the option to **Enabled**.
236236

237-
1. Then click on **Show...**
238-
239-
1. Under "**Value Name**", enter "GUID for the ASR Rule" without the double quotes
237+
1. Then click on **Show...**.
240238

241-
1. Under "**Value**", enter the <drive_letter:\Path\ProcessName>. In order to add multiple processes, it's separated by a greater than sign (>)
239+
1. Under **Value Name**, enter GUID for the ASR Rule.
242240

243-
e.g., "C:\Notepad.exe>c:\regedit.exe>C:\SomeFolder\test.exe" without the double quotes
241+
1. Under **Value**, enter the <drive_letter:\Path\ProcessName>. In order to add multiple processes, it's separated by a greater than sign (>). For example, `C:\Notepad.exe>c:\regedit.exe>C:\SomeFolder\test.exe`.
244242

245243
1. select **OK**. This setting allows the processes that are being blocked by the particular ASR Rule to continue running.
246244

0 commit comments

Comments
 (0)