Skip to content

Commit 5cd3d10

Browse files
committed
Learn Editor: Update enable-attack-surface-reduction.md
1 parent 803cc08 commit 5cd3d10

File tree

1 file changed

+8
-2
lines changed

1 file changed

+8
-2
lines changed

defender-endpoint/enable-attack-surface-reduction.md

Lines changed: 8 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -54,8 +54,14 @@ You can set attack surface reduction rules for devices that are running any of t
5454

5555
To use the entire feature-set of attack surface reduction rules, you need:
5656

57-
- Microsoft Defender Antivirus as primary antivirus (real-time protection on)
58-
- [Cloud-Delivery Protection](/windows/security/threat-protection/microsoft-defender-antivirus/enable-cloud-protection-microsoft-defender-antivirus) on (some rules require that)
57+
- Microsoft Defender Antivirus as primary antivirus Note: Microsoft Defender Antivirus cannot be running in "Passive Mode" or "Disabled"
58+
59+
- Real-time protection needs to be on
60+
61+
- [Cloud-Delivery Protection](/windows/security/threat-protection/microsoft-defender-antivirus/enable-cloud-protection-microsoft-defender-antivirus) on (some rules require Cloud Protection)
62+
63+
- [Cloud Protection network connectivity](/defender-endpoint/configure-network-connections-microsoft-defender-antivirus) is required
64+
5965
- Windows 10 Enterprise E5 or E3 License
6066

6167
Although attack surface reduction rules don't require a [Windows E5 license](/windows/deployment/deploy-enterprise-licenses), with a Windows E5 license, you get advanced management capabilities including monitoring, analytics, and workflows available in Defender for Endpoint, as well as reporting and configuration capabilities in the [Microsoft Defender XDR](https://go.microsoft.com/fwlink/p/?linkid=2077139) portal. These advanced capabilities aren't available with an E3 license, but you can still use Event Viewer to review attack surface reduction rule events.

0 commit comments

Comments
 (0)