Skip to content

Commit 751f069

Browse files
committed
Update attack-surface-reduction-rules-deployment-test.md
1 parent 7d1764d commit 751f069

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

defender-endpoint/attack-surface-reduction-rules-deployment-test.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -234,11 +234,11 @@ Use Group Policy to set the per-user ASR rule exclusions.
234234

235235
1. Double-click **Apply a list of exclusions to specific attack surface reduction (ASR) rules**, and set the option to **Enabled**.
236236

237-
1. Then click on **Show...**.
237+
1. Then select **Show...**.
238238

239239
1. Under **Value Name**, enter GUID for the ASR Rule.
240240

241-
1. Under **Value**, enter the <drive_letter:\Path\ProcessName>. In order to add multiple processes, it's separated by a greater than sign (>). For example, `C:\Notepad.exe>c:\regedit.exe>C:\SomeFolder\test.exe`.
241+
1. Under **Value**, enter the <drive_letter:\Path\ProcessName>. In order to add multiple processes, it's separated by a greater than sign (>). For example, `C:\Notepad.exe>c:\regedit.exe>C:\SomeFolder\test.exe`.
242242

243243
1. select **OK**. This setting allows the processes that are being blocked by the particular ASR Rule to continue running.
244244

@@ -247,7 +247,7 @@ Use Group Policy to set the per-user ASR rule exclusions.
247247
248248
### Use PowerShell as an alternative method to enable attack surface reduction rules
249249

250-
Use PowerShell, as an alternative to Intune, to enable attack surface reduction rules in audit mode. This allows you to view a record of apps that would have been blocked if the feature was fully enabled. You can also see how often the rules fire during normal use.
250+
Use PowerShell, as an alternative to Intune, to enable attack surface reduction rules in audit mode. This configuration allows you to view a record of apps that would have been blocked if the feature was fully enabled. You can also see how often the rules fire during normal use.
251251

252252
To enable an attack surface reduction rule in audit mode, use the following PowerShell cmdlet:
253253

@@ -264,15 +264,15 @@ To enable all the added attack surface reduction rules in audit mode, use the fo
264264
```
265265

266266
> [!TIP]
267-
> If you want to fully audit how attack surface reduction rules work in your organization, you'll need to use a management tool to deploy this setting to devices in your network.
267+
> If you want to fully audit how attack surface reduction rules work in your organization, you need to use a management tool to deploy this setting to devices in your network.
268268
269269
You can also use Group Policy, Intune, or mobile device management (MDM) configuration service providers (CSPs) to configure and deploy the setting. Learn more in the main [Attack surface reduction rules](attack-surface-reduction.md) article.
270270

271271
<a name='use-windows-event-viewer-review-as-an-alternative-to-the-attack-surface-reduction-rules-reporting-page-in-the-microsoft-365-defender-portal'></a>
272272

273273
## Use Windows Event Viewer Review as an alternative to the attack surface reduction rules reporting page in the Microsoft Defender portal
274274

275-
To review apps that would have been blocked, open Event Viewer and filter for Event ID 1121 in the Microsoft-Windows-Windows Defender/Operational log. The following table lists all network protection events.
275+
To review apps that would be blocked, open Event Viewer and filter for Event ID 1121 in the Microsoft-Windows-Windows Defender/Operational log. The following table lists all network protection events.
276276

277277
Event ID | Description
278278
-|-

0 commit comments

Comments
 (0)