You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/attack-surface-reduction-rules-deployment-test.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -151,7 +151,7 @@ The **GroupBy** returns results set to the following groups:
151
151
152
152
### Configuration tab
153
153
154
-
Lists—on a per-computer basis—the aggregate state of attack surface reduction rules: Off, Audit, Block.
154
+
Lists, on a per-computer basis, the aggregate state of attack surface reduction rules: Off, Audit, Block.
155
155
156
156
>:::image type="content" source="media/attack-surface-reduction-rules-report-main-configuration-tab.png" alt-text="Screenshot that shows the attack surface reduction rules report main configuration tab." lightbox="media/attack-surface-reduction-rules-report-main-configuration-tab.png":::
157
157
@@ -188,15 +188,15 @@ This tab provides a method to select detected entities (for example, false posit
188
188
> :::image type="content" source="media/asr-defender365-06d.png" alt-text="The pane for exclusion of the detected file" lightbox="media/asr-defender365-06d.png":::
189
189
190
190
> [!NOTE]
191
-
> If you have a Microsoft Defender 365 E5 (or Windows E5?) License, this link will open the Microsoft Defender 365 Reports > Attack surface reductions > [Exclusions](https://security.microsoft.com/asr?viewid=exclusions) tab.
191
+
> If you have an appropriate license and permissions, this link opens the Microsoft Defender portal with [Exclusions visible](https://security.microsoft.com/asr?viewid=exclusions).
192
192
193
193
For more information about using the attack surface reduction rules report, see [Attack surface reduction rules reports](attack-surface-reduction-rules-report.md).
Attack surface reduction rules now provide the capability to configure rule-specific exclusions, known as "Per Rule Exclusions."
198
198
199
-
To configure specific rule exclusions, you have the choices of using the MDE Security Settings Management, Intune, and Group Policy.
199
+
To configure specific rule exclusions, you have the choices of using the Defender for Endpoint Security Settings Management, Intune, and Group Policy.
200
200
201
201
> [!NOTE]
202
202
> When configuring Attack Surface Reduction per-rule exclusions, please note that specifying only the file or application name (e.g., test1.exe) is not sufficient. You must provide the full file or application path (e.g., C:\test1.exe) to ensure the exclusion is applied correctly.
0 commit comments