Skip to content

Commit 8fa2358

Browse files
Learn Editor: Update attack-surface-reduction-rules-deployment-test.md
1 parent 803cc08 commit 8fa2358

File tree

1 file changed

+7
-6
lines changed

1 file changed

+7
-6
lines changed

defender-endpoint/attack-surface-reduction-rules-deployment-test.md

Lines changed: 7 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -87,7 +87,7 @@ You can use Microsoft Intune Endpoint Security to configure custom attack surfac
8787
Your new attack surface reduction policy for attack surface reduction rules is listed in **Endpoint security | Attack surface reduction**.
8888

8989
> [!div class="mx-imgBorder"]
90-
> :::image type="content" source="media/asr-mem-my-asr-rules.png" alt-text=" The Attack surface reduction page" lightbox="media/asr-mem-my-asr-rules.png":::
90+
> :::image type="content" source="media/asr-mem-my-asr-rules.png" alt-text=" The Attack surface reduction page" lightbox="media/asr-mem-my-asr-rules.png":::
9191
9292
<a name='step-2-understand-the-asr-rules-reporting-page-in-the-microsoft-365-defender-portal'></a>
9393

@@ -192,6 +192,9 @@ Attack surface reduction rules now provide the capability to configure rule-spec
192192

193193
To configure specific rule exclusions, you have the choices of using the MDE Security Settings Management, Intune, and Group Policy.
194194

195+
> [!NOTE]
196+
> When configuring Attack Surface Reduction per-rule exclusions, please note that specifying only the file or application name (e.g., test1.exe) is not sufficient. You must provide the full file or application path (e.g., C:\test1.exe) to ensure the exclusion is applied correctly.
197+
195198
#### Via Intune:
196199

197200
1. Open the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), and navigate to **Home** > **Endpoint security** > **Attack surface reduction**.
@@ -208,10 +211,8 @@ To configure specific rule exclusions, you have the choices of using the MDE Sec
208211
209212
> [!TIP]
210213
> Use the checkboxes next to your list of exclusion entries to select items to **Delete**, **Sort**, **Import**, or **Export**.
211-
212-
### Via Group Policy
213-
214-
214+
>
215+
**Via Group Policy**
215216

216217
Use Group Policy to set the per-user ASR rule exclusions
217218

@@ -238,7 +239,7 @@ Use Group Policy to set the per-user ASR rule exclusions
238239
1. select **OK**. This setting allows the processes that are being blocked by the particular ASR Rule to continue running.
239240

240241
> [!NOTE]
241-
> "If policies aren't applying, review [Troubleshoot Microsoft Defender Antivirus settings](/defender-endpoint/troubleshoot-settings)
242+
> If policies aren't applying, review [Troubleshoot Microsoft Defender Antivirus settings](/defender-endpoint/troubleshoot-settings).
242243
243244
### Use PowerShell as an alternative method to enable attack surface reduction rules
244245

0 commit comments

Comments
 (0)