Skip to content

Commit 7a269fa

Browse files
committed
Update attack-surface-reduction-rules-reference.md
1 parent 42544d8 commit 7a269fa

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

defender-endpoint/attack-surface-reduction-rules-reference.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -478,7 +478,7 @@ Dependencies: Microsoft Defender Antivirus, RPC
478478
This rule blocks code injection attempts from Office apps into other processes.
479479

480480
> [!NOTE]
481-
> The Block applications from injecting code into other processes ASR rule doesn't support WARN mode.
481+
> The Block applications from injecting code into other processes ASR rule don't support WARN mode.
482482
483483
> [!IMPORTANT]
484484
> This rule requires restarting Microsoft 365 Apps (Office applications) for the configuration changes to take effect.
@@ -597,7 +597,7 @@ Dependencies: Microsoft Defender Antivirus
597597
With this rule, admins can prevent unsigned or untrusted executable files from running from USB removable drives, including SD cards. Blocked file types include executable files (such as .exe, .dll, or .scr)
598598

599599
> [!IMPORTANT]
600-
> Files copied from the USB to the disk drive is blocked by this rule if and when it's about to be executed on the disk drive.
600+
> Files copied from the USB to the disk drive are blocked by this rule if and when it's about to be executed on the disk drive.
601601
602602
Intune name: `Untrusted and unsigned processes that run from USB`
603603

0 commit comments

Comments
 (0)