Skip to content

Commit 51c76bd

Browse files
committed
Learn Editor: Update attack-surface-reduction-rules-reference.md
1 parent 40eb80b commit 51c76bd

File tree

1 file changed

+6
-6
lines changed

1 file changed

+6
-6
lines changed

defender-endpoint/attack-surface-reduction-rules-reference.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -183,28 +183,28 @@ For rules with the "Rule State" specified:
183183
- ASR rules with \<ASR Rule, Rule State\> combinations are used to surface alerts (toast notifications) on Microsoft Defender for Endpoint only for devices at cloud block level **High**. Devices not at High cloud block level won't generate alerts for any <ASR Rule, Rule State> combinations
184184
- EDR alerts are generated for ASR rules in the specified states, for devices at cloud block level **High+**
185185

186-
| Rule name: | Rule state: | Generates alerts in EDR? <br> (Yes&nbsp;\|&nbsp;No) | Generates toast notifications? <br> (Yes&nbsp;\|&nbsp;No) |
186+
| Rule name: | Rule state: | Generates alerts in EDR? <br> (Yes&nbsp;|&nbsp;No) | Generates toast notifications? <br> (Yes&nbsp;|&nbsp;No) |
187187
|---|:---:|:---:|:---:|
188188
| | | _Only for devices at cloud block level **High+**_ | _In Block mode only_ and _only for devices at cloud block level **High**_|
189189
|[Block abuse of exploited vulnerable signed drivers](#block-abuse-of-exploited-vulnerable-signed-drivers) | | N | Y |
190190
|[Block Adobe Reader from creating child processes](#block-adobe-reader-from-creating-child-processes) | Block | Y | Y |
191191
|[Block all Office applications from creating child processes](#block-all-office-applications-from-creating-child-processes) | | N | Y |
192-
|[Block credential stealing from the Windows local security authority subsystem (lsass.exe)](#block-credential-stealing-from-the-windows-local-security-authority-subsystem) | | N | Y |
192+
|[Block credential stealing from the Windows local security authority subsystem (lsass.exe)](#block-credential-stealing-from-the-windows-local-security-authority-subsystem) | | N | N |
193193
|[Block executable content from email client and webmail](#block-executable-content-from-email-client-and-webmail) | | Y | Y |
194194
|[Block executable files from running unless they meet a prevalence, age, or trusted list criterion](#block-executable-files-from-running-unless-they-meet-a-prevalence-age-or-trusted-list-criterion) | | N | Y |
195-
|[Block execution of potentially obfuscated scripts](#block-execution-of-potentially-obfuscated-scripts) | Audit&nbsp;\|&nbsp;Block | Y \| Y | N \| Y |
195+
|[Block execution of potentially obfuscated scripts](#block-execution-of-potentially-obfuscated-scripts) | Audit&nbsp;|&nbsp;Block | Y | Y | N | Y |
196196
|[Block JavaScript or VBScript from launching downloaded executable content](#block-javascript-or-vbscript-from-launching-downloaded-executable-content) | Block | Y | Y |
197197
|[Block Office applications from creating executable content](#block-office-applications-from-creating-executable-content) | | N | Y |
198198
|[Block Office applications from injecting code into other processes](#block-office-applications-from-injecting-code-into-other-processes) | | N | Y |
199199
|[Block Office communication application from creating child processes](#block-office-communication-application-from-creating-child-processes) | | N | Y |
200-
|[Block persistence through WMI event subscription](#block-persistence-through-wmi-event-subscription) | Audit&nbsp;\|&nbsp;Block | Y \| Y | N \| Y |
200+
|[Block persistence through WMI event subscription](#block-persistence-through-wmi-event-subscription) | Audit&nbsp;|&nbsp;Block | Y | Y | N | Y |
201201
|[Block process creations originating from PSExec and WMI commands](#block-process-creations-originating-from-psexec-and-wmi-commands) | | N | Y |
202202
|[Block rebooting machine in Safe Mode (preview)](#block-rebooting-machine-in-safe-mode-preview) | | N | N |
203-
|[Block untrusted and unsigned processes that run from USB](#block-untrusted-and-unsigned-processes-that-run-from-usb) | Audit&nbsp;\|&nbsp;Block | Y \| Y | N \| Y |
203+
|[Block untrusted and unsigned processes that run from USB](#block-untrusted-and-unsigned-processes-that-run-from-usb) | Audit&nbsp;|&nbsp;Block | Y | Y | N | Y |
204204
|[Block use of copied or impersonated system tools (preview)](#block-use-of-copied-or-impersonated-system-tools-preview) | | N | N |
205205
|[Block Webshell creation for Servers](#block-webshell-creation-for-servers) | | N | N |
206206
|[Block Win32 API calls from Office macros](#block-win32-api-calls-from-office-macros) | | N | Y |
207-
|[Use advanced protection against ransomware](#use-advanced-protection-against-ransomware) | Audit&nbsp;\|&nbsp;Block | Y \| Y | N \| Y |
207+
|[Use advanced protection against ransomware](#use-advanced-protection-against-ransomware) | Audit&nbsp;|&nbsp;Block | Y | Y | N | Y |
208208

209209
## ASR rule to GUID matrix
210210

0 commit comments

Comments
 (0)