Skip to content

Commit 7077b7d

Browse files
committed
Update troubleshoot-asr.md
1 parent 0605c07 commit 7077b7d

File tree

1 file changed

+9
-9
lines changed

1 file changed

+9
-9
lines changed

defender-endpoint/troubleshoot-asr.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -4,9 +4,9 @@ description: Resources and sample code to troubleshoot issues with attack surfac
44
ms.service: defender-endpoint
55
ms.localizationpriority: medium
66
audience: ITPro
7-
author: denisebmsft
8-
ms.author: deniseb
9-
ms.date: 03/10/2025
7+
author: emmwalshh
8+
ms.author: ewalsh
9+
ms.date: 03/11/2025
1010
ms.reviewer:
1111
manager: deniseb
1212
ms.custom: asr
@@ -69,7 +69,7 @@ One of the easiest ways to determine if attack surface reduction rules are alrea
6969

7070
Here's an example:
7171

72-
:::image type="content" source="media/getmpreferencescriptnew.png" alt-text="The get mppreference script" lightbox="media/getmpreferencescriptnew.png":::
72+
:::image type="content" source="media/getmpreferencescriptnew.png" alt-text="Screenshot showing the get mppreference script" lightbox="media/getmpreferencescriptnew.png":::
7373

7474
There are multiple attack surface reduction rules active, with different configured actions.
7575

@@ -81,7 +81,7 @@ Example:
8181
Get-MPPreference | Select-Object -ExpandProperty AttackSurfaceReductionRules_Ids
8282
```
8383

84-
:::image type="content" source="media/getmpref-examplenew.png" alt-text="The get mpreference example" lightbox="media/getmpref-examplenew.png":::
84+
:::image type="content" source="media/getmpref-examplenew.png" alt-text="Screenshot showing the get mpreference example" lightbox="media/getmpref-examplenew.png":::
8585

8686
The preceding image shows all the IDs for attack surface reduction rules that have a setting different from 0 (Not Configured).
8787

@@ -91,7 +91,7 @@ The next step is then to list the actual actions (Block or Audit) that each rule
9191
Get-MPPreference | Select-Object -ExpandProperty AttackSurfaceReductionRules_Actions
9292
```
9393

94-
:::image type="content" source="media/getmpref-example2new.png" alt-text="The get mppreference example2" lightbox="media/getmpref-example2new.png":::
94+
:::image type="content" source="media/getmpref-example2new.png" alt-text="Screenshot that shows the get mppreference example2" lightbox="media/getmpref-example2new.png":::
9595

9696
## Use audit mode to test the rule
9797

@@ -116,7 +116,7 @@ Attack surface reduction rule events can be viewed within the Windows Defender l
116116

117117
To access it, open Windows Event Viewer, and browse to **Applications and Services Logs** \> **Microsoft** \> **Windows** \> **Windows Defender** \> **Operational**.
118118

119-
:::image type="content" source="media/eventviewerscrnew.png" alt-text="The Event Viewer page" lightbox="media/eventviewerscrnew.png":::
119+
:::image type="content" source="media/eventviewerscrnew.png" alt-text="Image that shows the Event Viewer page" lightbox="media/eventviewerscrnew.png":::
120120

121121
## Add exclusions for a false positive
122122

@@ -157,14 +157,14 @@ You can find this utility in *%ProgramFiles%\Windows Defender\MpCmdRun.exe*. You
157157

158158
To generate the support information, type `MpCmdRun.exe -getfiles`. After a while, several logs will be packaged into an archive (MpSupportFiles.cab) and made available at `C:\ProgramData\Microsoft\Windows Defender\Support`.
159159

160-
:::image type="content" source="media/malware-prot-logsnew.png" alt-text="The malware protection logs" lightbox="media/malware-prot-logsnew.png":::
160+
:::image type="content" source="media/malware-prot-logsnew.png" alt-text="Screenshot that shows the malware protection logs" lightbox="media/malware-prot-logsnew.png":::
161161

162162
Extract that archive and you have many files available for troubleshooting purposes.
163163

164164
The most relevant files are as follows:
165165

166166
- `MPOperationalEvents.txt`: This file contains same level of information found in Event Viewer for Windows Defender's Operational log.
167-
- `MPRegistry.txt`: In this file you can analyze all the current Windows Defender configurations, from the moment the support logs were captured.
167+
- `MPRegistry.txt`: In this file you can analyze all the current Windows Defender configurations, from the moment, the support logs were captured.
168168
- `MPLog.txt`: This log contains more verbose information about all the actions/operations of the Windows Defender.
169169

170170
## Related articles

0 commit comments

Comments
 (0)