You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/troubleshoot-asr.md
+7-9Lines changed: 7 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ ms.localizationpriority: medium
6
6
audience: ITPro
7
7
author: denisebmsft
8
8
ms.author: deniseb
9
-
ms.date: 11/05/2024
9
+
ms.date: 01/10/2025
10
10
ms.reviewer:
11
11
manager: deniseb
12
12
ms.custom: asr
@@ -25,11 +25,9 @@ search.appverid: met150
25
25
26
26
27
27
**Applies to:**
28
-
-[Microsoft Defender for Endpoint Plan 1](microsoft-defender-endpoint.md)
29
-
-[Microsoft Defender for Endpoint Plan 2](microsoft-defender-endpoint.md)
30
-
-[Microsoft Defender XDR](/defender-xdr)
31
28
32
-
> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-pullalerts-abovefoldlink)
29
+
-[Microsoft Defender for Endpoint Plan 1 and 2](microsoft-defender-endpoint.md)
30
+
-[Microsoft Defender XDR](/defender-xdr)
33
31
34
32
When you use [attack surface reduction rules](attack-surface-reduction.md) you might run into issues, such as:
35
33
@@ -72,7 +70,7 @@ Follow these instructions in [Use the demo tool to see how attack surface reduct
72
70
73
71
3.[Review the attack surface reduction rule event logs](attack-surface-reduction.md) to see if the rule would block the file or process if the rule were set to `Enabled`.
74
72
75
-
If a rule isn't blocking a file or process that you're expecting it should block, first check to see if audit mode is enabled. Audit mode might be enabled for testing another feature, or by an automated PowerShell script, and might not be disabled after the tests were completed.
73
+
If a rule isn't blocking a file or process that you're expecting it should block, first check to see if audit mode is enabled. Audit mode might be enabled for testing another feature, or by an automated PowerShell script, and might not be disabled after the tests were completed.
76
74
77
75
If you've tested the rule with the demo tool and with audit mode, and attack surface reduction rules are working on preconfigured scenarios, but the rule isn't working as expected, proceed to either of the following sections based on your situation:
78
76
@@ -86,16 +84,16 @@ If the attack surface reduction rule is blocking something that it shouldn't blo
86
84
To add an exclusion, see [Customize attack surface reduction](attack-surface-reduction-rules-deployment-implement.md#customize-attack-surface-reduction-rules).
87
85
88
86
> [!IMPORTANT]
89
-
> You can specify individual files and folders to be excluded, but you cannot specify individual rules.
90
-
> This means any files or folders that are excluded will be excluded from all ASR rules.
87
+
> You can specify individual files and folders to be excluded, but you can't specify individual rules.
88
+
> This means any files or folders that are excluded are excluded from all ASR rules.
91
89
92
90
## Report a false positive or false negative
93
91
94
92
Use the [Microsoft Security Intelligence web-based submission form](https://www.microsoft.com/wdsi/support/report-exploit-guard) to report a false negative or false positive for network protection. With a Windows E5 subscription, you can also [provide a link to any associated alert](alerts-queue.md).
95
93
96
94
## Collect diagnostic data for file submissions
97
95
98
-
When you report a problem with attack surface reduction rules, you're asked to collect and submit diagnostic data that can be used by Microsoft support and engineering teams to help troubleshoot issues.
96
+
When you report a problem with attack surface reduction rules, you're asked to collect and submit diagnostic data for Microsoft support and engineering teams to help troubleshoot issues.
99
97
100
98
1. Open Command Prompt as an administrator and open the Windows Defender directory:
0 commit comments