Skip to content

Commit 9d51881

Browse files
committed
Update attack-surface-reduction-rules-reference.md
1 parent f717a0b commit 9d51881

File tree

1 file changed

+4
-3
lines changed

1 file changed

+4
-3
lines changed

defender-endpoint/attack-surface-reduction-rules-reference.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -180,12 +180,13 @@ Toast notifications are generated for all rules in Block mode. Rules in any othe
180180

181181
For rules with the "Rule State" specified:
182182

183-
- ASR rules with `\ASR Rule, Rule State\` combinations are used to surface alerts (toast notifications) on Microsoft Defender for Endpoint only for devices at cloud block level **High**. Devices not at the high cloud block level don't generate alerts for any `ASR Rule, Rule State` combinations
184-
- EDR alerts are generated for ASR rules in the specified states, for devices at cloud block level **High+**
183+
- ASR rules with `\ASR Rule, Rule State\` combinations are used to surface alerts (toast notifications) on Microsoft Defender for Endpoint only for devices at cloud block level "High".
184+
- Devices that not at the high cloud block level don't generate alerts for any `ASR Rule, Rule State` combinations
185+
- EDR alerts are generated for ASR rules in the specified states, for devices at cloud block level "High+"
186+
- Toast notifications occur in block mode only and for devices at cloud block level "High"
185187

186188
| Rule name | Rule state | EDR alerts? | Toast notifications? |
187189
|---|---|---|---|
188-
| | | _Only for devices at cloud block level **High+**_ | _In Block mode only_ and _only for devices at cloud block level **High**_|
189190
|[Block abuse of exploited vulnerable signed drivers](#block-abuse-of-exploited-vulnerable-signed-drivers) | | N | Y |
190191
|[Block Adobe Reader from creating child processes](#block-adobe-reader-from-creating-child-processes) | Block | Y | Y |
191192
|[Block all Office applications from creating child processes](#block-all-office-applications-from-creating-child-processes) | | N | Y |

0 commit comments

Comments
 (0)