You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -192,6 +192,9 @@ Attack surface reduction rules now provide the capability to configure rule-spec
192
192
193
193
To configure specific rule exclusions, you have the choices of using the MDE Security Settings Management, Intune, and Group Policy.
194
194
195
+
> [!NOTE]
196
+
> When configuring Attack Surface Reduction per-rule exclusions, please note that specifying only the file or application name (e.g., test1.exe) is not sufficient. You must provide the full file or application path (e.g., C:\test1.exe) to ensure the exclusion is applied correctly.
197
+
195
198
#### Via Intune:
196
199
197
200
1. Open the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), and navigate to **Home** > **Endpoint security** > **Attack surface reduction**.
@@ -208,10 +211,8 @@ To configure specific rule exclusions, you have the choices of using the MDE Sec
208
211
209
212
> [!TIP]
210
213
> Use the checkboxes next to your list of exclusion entries to select items to **Delete**, **Sort**, **Import**, or **Export**.
211
-
212
-
### Via Group Policy
213
-
214
-
214
+
>
215
+
**Via Group Policy**
215
216
216
217
Use Group Policy to set the per-user ASR rule exclusions
217
218
@@ -238,7 +239,7 @@ Use Group Policy to set the per-user ASR rule exclusions
238
239
1. select **OK**. This setting allows the processes that are being blocked by the particular ASR Rule to continue running.
0 commit comments