Skip to content

Commit 88447a7

Browse files
committed
Learn Editor: Update enable-attack-surface-reduction.md
1 parent 5cd3d10 commit 88447a7

File tree

1 file changed

+4
-1
lines changed

1 file changed

+4
-1
lines changed

defender-endpoint/enable-attack-surface-reduction.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -56,14 +56,17 @@ To use the entire feature-set of attack surface reduction rules, you need:
5656

5757
- Microsoft Defender Antivirus as primary antivirus Note: Microsoft Defender Antivirus cannot be running in "Passive Mode" or "Disabled"
5858

59-
- Real-time protection needs to be on
59+
- [Real-time protection](/defender-endpoint/configure-real-time-protection-microsoft-defender-antivirus) needs to be on
6060

6161
- [Cloud-Delivery Protection](/windows/security/threat-protection/microsoft-defender-antivirus/enable-cloud-protection-microsoft-defender-antivirus) on (some rules require Cloud Protection)
6262

6363
- [Cloud Protection network connectivity](/defender-endpoint/configure-network-connections-microsoft-defender-antivirus) is required
6464

6565
- Windows 10 Enterprise E5 or E3 License
6666

67+
> [!IMPORTANT]
68+
> The pre-requisites above are necessary in order for Attack Surface Reduction rules to work appropriately.
69+
6770
Although attack surface reduction rules don't require a [Windows E5 license](/windows/deployment/deploy-enterprise-licenses), with a Windows E5 license, you get advanced management capabilities including monitoring, analytics, and workflows available in Defender for Endpoint, as well as reporting and configuration capabilities in the [Microsoft Defender XDR](https://go.microsoft.com/fwlink/p/?linkid=2077139) portal. These advanced capabilities aren't available with an E3 license, but you can still use Event Viewer to review attack surface reduction rule events.
6871

6972
Each attack surface reduction rule contains one of four settings:

0 commit comments

Comments
 (0)