Skip to content

Commit 691b9c7

Browse files
committed
minor updates
1 parent b7fa85b commit 691b9c7

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

defender-endpoint/attack-surface-reduction-rules-deployment-test.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -236,11 +236,11 @@ Use Group Policy to set the per-user ASR rule exclusions
236236
1. select **OK**. This setting allows the processes that are being blocked by the particular ASR Rule to continue running.
237237

238238
> [!NOTE]
239-
> If the policies are not applying, please review [Troubleshoot Microsoft Defender Antivirus settings](/defender-endpoint/troubleshoot-settings)
239+
> "If policies aren't applying, review [Troubleshoot Microsoft Defender Antivirus settings](/defender-endpoint/troubleshoot-settings)
240240
241241
### Use PowerShell as an alternative method to enable attack surface reduction rules
242242

243-
You can use PowerShell - as an alternative to Intune - to enable attack surface reduction rules in audit mode to view a record of apps that would have been blocked if the feature was fully enabled. You can also get an idea of how often the rules fire during normal use.
243+
Use PowerShell, as an alternative to Intune, to enable attack surface reduction rules in audit mode. This allows you to view a record of apps that would have been blocked if the feature was fully enabled. You can also see how often the rules fire during normal use.
244244

245245
To enable an attack surface reduction rule in audit mode, use the following PowerShell cmdlet:
246246

0 commit comments

Comments
 (0)