Skip to content

Commit 79a77a8

Browse files
authored
Merge pull request #2401 from kurtsarens/docs-editor/troubleshoot-asr-1736519781
this is a troubleshooting article, customers already are using ASR and run into issues. No need to advertise a trial
2 parents 9d7f6b8 + 79bb351 commit 79a77a8

File tree

1 file changed

+7
-9
lines changed

1 file changed

+7
-9
lines changed

defender-endpoint/troubleshoot-asr.md

Lines changed: 7 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.localizationpriority: medium
66
audience: ITPro
77
author: denisebmsft
88
ms.author: deniseb
9-
ms.date: 11/05/2024
9+
ms.date: 01/10/2025
1010
ms.reviewer:
1111
manager: deniseb
1212
ms.custom: asr
@@ -25,11 +25,9 @@ search.appverid: met150
2525

2626

2727
**Applies to:**
28-
- [Microsoft Defender for Endpoint Plan 1](microsoft-defender-endpoint.md)
29-
- [Microsoft Defender for Endpoint Plan 2](microsoft-defender-endpoint.md)
30-
- [Microsoft Defender XDR](/defender-xdr)
3128

32-
> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-pullalerts-abovefoldlink)
29+
- [Microsoft Defender for Endpoint Plan 1 and 2](microsoft-defender-endpoint.md)
30+
- [Microsoft Defender XDR](/defender-xdr)
3331

3432
When you use [attack surface reduction rules](attack-surface-reduction.md) you might run into issues, such as:
3533

@@ -72,7 +70,7 @@ Follow these instructions in [Use the demo tool to see how attack surface reduct
7270

7371
3. [Review the attack surface reduction rule event logs](attack-surface-reduction.md) to see if the rule would block the file or process if the rule were set to `Enabled`.
7472

75-
If a rule isn't blocking a file or process that you're expecting it should block, first check to see if audit mode is enabled. Audit mode might be enabled for testing another feature, or by an automated PowerShell script, and might not be disabled after the tests were completed.
73+
If a rule isn't blocking a file or process that you're expecting it should block, first check to see if audit mode is enabled. Audit mode might be enabled for testing another feature, or by an automated PowerShell script, and might not be disabled after the tests were completed.
7674

7775
If you've tested the rule with the demo tool and with audit mode, and attack surface reduction rules are working on preconfigured scenarios, but the rule isn't working as expected, proceed to either of the following sections based on your situation:
7876

@@ -86,16 +84,16 @@ If the attack surface reduction rule is blocking something that it shouldn't blo
8684
To add an exclusion, see [Customize attack surface reduction](attack-surface-reduction-rules-deployment-implement.md#customize-attack-surface-reduction-rules).
8785

8886
> [!IMPORTANT]
89-
> You can specify individual files and folders to be excluded, but you cannot specify individual rules.
90-
> This means any files or folders that are excluded will be excluded from all ASR rules.
87+
> You can specify individual files and folders to be excluded, but you can't specify individual rules.
88+
> This means any files or folders that are excluded are excluded from all ASR rules.
9189
9290
## Report a false positive or false negative
9391

9492
Use the [Microsoft Security Intelligence web-based submission form](https://www.microsoft.com/wdsi/support/report-exploit-guard) to report a false negative or false positive for network protection. With a Windows E5 subscription, you can also [provide a link to any associated alert](alerts-queue.md).
9593

9694
## Collect diagnostic data for file submissions
9795

98-
When you report a problem with attack surface reduction rules, you're asked to collect and submit diagnostic data that can be used by Microsoft support and engineering teams to help troubleshoot issues.
96+
When you report a problem with attack surface reduction rules, you're asked to collect and submit diagnostic data for Microsoft support and engineering teams to help troubleshoot issues.
9997

10098
1. Open Command Prompt as an administrator and open the Windows Defender directory:
10199

0 commit comments

Comments
 (0)