Skip to content

Commit 546586e

Browse files
committed
Update attack-surface-reduction-rules-deployment-test.md
1 parent abe1315 commit 546586e

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

defender-endpoint/attack-surface-reduction-rules-deployment-test.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -151,7 +151,7 @@ The **GroupBy** returns results set to the following groups:
151151
152152
### Configuration tab
153153

154-
Listson a per-computer basisthe aggregate state of attack surface reduction rules: Off, Audit, Block.
154+
Lists, on a per-computer basis, the aggregate state of attack surface reduction rules: Off, Audit, Block.
155155

156156
>:::image type="content" source="media/attack-surface-reduction-rules-report-main-configuration-tab.png" alt-text="Screenshot that shows the attack surface reduction rules report main configuration tab." lightbox="media/attack-surface-reduction-rules-report-main-configuration-tab.png":::
157157
@@ -188,15 +188,15 @@ This tab provides a method to select detected entities (for example, false posit
188188
> :::image type="content" source="media/asr-defender365-06d.png" alt-text="The pane for exclusion of the detected file" lightbox="media/asr-defender365-06d.png":::
189189
190190
> [!NOTE]
191-
> If you have a Microsoft Defender 365 E5 (or Windows E5?) License, this link will open the Microsoft Defender 365 Reports > Attack surface reductions > [Exclusions](https://security.microsoft.com/asr?viewid=exclusions) tab.
191+
> If you have an appropriate license and permissions, this link opens the Microsoft Defender portal with [Exclusions visible](https://security.microsoft.com/asr?viewid=exclusions).
192192
193193
For more information about using the attack surface reduction rules report, see [Attack surface reduction rules reports](attack-surface-reduction-rules-report.md).
194194

195195
## Configure attack surface reduction per-rule exclusions
196196

197197
Attack surface reduction rules now provide the capability to configure rule-specific exclusions, known as "Per Rule Exclusions."
198198

199-
To configure specific rule exclusions, you have the choices of using the MDE Security Settings Management, Intune, and Group Policy.
199+
To configure specific rule exclusions, you have the choices of using the Defender for Endpoint Security Settings Management, Intune, and Group Policy.
200200

201201
> [!NOTE]
202202
> When configuring Attack Surface Reduction per-rule exclusions, please note that specifying only the file or application name (e.g., test1.exe) is not sufficient. You must provide the full file or application path (e.g., C:\test1.exe) to ensure the exclusion is applied correctly.

0 commit comments

Comments
 (0)