Skip to content

Commit cf02e0a

Browse files
committed
Merge branch 'main' into AIR-chrisda
2 parents ffc8b4f + 79a77a8 commit cf02e0a

File tree

3 files changed

+16
-18
lines changed

3 files changed

+16
-18
lines changed

defender-endpoint/attack-surface-reduction.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.collection:
1616
- tier2
1717
- mde-asr
1818
search.appverid: met150
19-
ms.date: 05/02/2024
19+
ms.date: 01/10/2025
2020
---
2121

2222
# Attack surface reduction rules overview
@@ -79,7 +79,7 @@ For information about configuring per-rule exclusions, see the section titled **
7979

8080
## Warn mode for users
8181

82-
(**NEW**!) Prior to warn mode capabilities, attack surface reduction rules that are enabled could be set to either audit mode or block mode. With the new warn mode, whenever content is blocked by an attack surface reduction rule, users see a dialog box that indicates the content is blocked. The dialog box also offers the user an option to unblock the content. The user can then retry their action, and the operation completes. When a user unblocks content, the content remains unblocked for 24 hours, and then blocking resumes.
82+
Whenever content is blocked by an attack surface reduction rule, users see a dialog box that indicates the content is blocked. The dialog box also offers the user an option to unblock the content. The user can then retry their action, and the operation completes. When a user unblocks content, the content remains unblocked for 24 hours, and then blocking resumes.
8383

8484
Warn mode helps your organization have attack surface reduction rules in place without preventing users from accessing the content they need to perform their tasks.
8585

defender-endpoint/minimum-requirements.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.author: deniseb
66
author: denisebmsft
77
ms.reviewer: pahuijbr
88
ms.localizationpriority: medium
9-
ms.date: 01/06/2025
9+
ms.date: 01/10/2025
1010
manager: deniseb
1111
audience: ITPro
1212
ms.collection:
@@ -85,7 +85,7 @@ Supported versions of Windows include:
8585
- Windows 10 Education
8686
- Windows 10 Pro
8787
- Windows 10 Pro Education
88-
- Windows server
88+
- Windows Server
8989
- Windows Server 2012 R2
9090
- Windows Server 2016
9191
- Windows Server, version 1803 or later
@@ -130,23 +130,23 @@ To add anti-malware protection to these older operating systems, you can use [Sy
130130

131131
The minimum hardware requirements for Defender for Endpoint on Windows devices are the same as the requirements for the operating system itself (that is, they aren't in addition to the requirements for the operating system).
132132

133-
- Cores: Two minimum, four preferred
134-
- Memory: One GB minimum, four preferred
133+
- Cores: 2 minimum, 4 preferred
134+
135+
- Memory: 1GB minimum, 4 GB preferred
135136

136137
### Network and data storage and configuration requirements
137138

138139
When you run the onboarding wizard for the first time, you must choose where your Microsoft Defender for Endpoint-related information is stored: in the European Union, the United Kingdom, or the United States datacenter.
139140

140141
> [!NOTE]
141-
>
142142
> - You can't change your data storage location after the first-time setup.
143143
> - Review the [Microsoft Defender for Endpoint data storage and privacy](data-storage-privacy.md) for more information on where and how Microsoft stores your data.
144144
145145
#### IP stack
146146

147-
IPv4 (Internet Protocol Version 4) stack must be enabled on devices for communication to the Defender for Endpoint cloud service to work as expected.
147+
Internet Protocol Version 4 (IPv4) stack must be enabled on devices for communication to the Defender for Endpoint cloud service to work as expected.
148148

149-
Alternatively, if you must use an IPv6-only configuration, consider adding dynamic IPv6/IPv4 transitional mechanisms, such as DNS64/NAT64 to ensure end-to-end IPv6 connectivity to Microsoft 365 without any other network reconfiguration.
149+
Alternatively, if you must use an Internet Protocol Version 6 (IPv6) only configuration, consider adding dynamic IPv6/IPv4 transitional mechanisms, such as DNS64/NAT64 to ensure end-to-end IPv6 connectivity to Microsoft 365 without any other network reconfiguration.
150150

151151
#### Internet connectivity
152152

defender-endpoint/troubleshoot-asr.md

Lines changed: 7 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.localizationpriority: medium
66
audience: ITPro
77
author: denisebmsft
88
ms.author: deniseb
9-
ms.date: 11/05/2024
9+
ms.date: 01/10/2025
1010
ms.reviewer:
1111
manager: deniseb
1212
ms.custom: asr
@@ -25,11 +25,9 @@ search.appverid: met150
2525

2626

2727
**Applies to:**
28-
- [Microsoft Defender for Endpoint Plan 1](microsoft-defender-endpoint.md)
29-
- [Microsoft Defender for Endpoint Plan 2](microsoft-defender-endpoint.md)
30-
- [Microsoft Defender XDR](/defender-xdr)
3128

32-
> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-pullalerts-abovefoldlink)
29+
- [Microsoft Defender for Endpoint Plan 1 and 2](microsoft-defender-endpoint.md)
30+
- [Microsoft Defender XDR](/defender-xdr)
3331

3432
When you use [attack surface reduction rules](attack-surface-reduction.md) you might run into issues, such as:
3533

@@ -72,7 +70,7 @@ Follow these instructions in [Use the demo tool to see how attack surface reduct
7270

7371
3. [Review the attack surface reduction rule event logs](attack-surface-reduction.md) to see if the rule would block the file or process if the rule were set to `Enabled`.
7472

75-
If a rule isn't blocking a file or process that you're expecting it should block, first check to see if audit mode is enabled. Audit mode might be enabled for testing another feature, or by an automated PowerShell script, and might not be disabled after the tests were completed.
73+
If a rule isn't blocking a file or process that you're expecting it should block, first check to see if audit mode is enabled. Audit mode might be enabled for testing another feature, or by an automated PowerShell script, and might not be disabled after the tests were completed.
7674

7775
If you've tested the rule with the demo tool and with audit mode, and attack surface reduction rules are working on preconfigured scenarios, but the rule isn't working as expected, proceed to either of the following sections based on your situation:
7876

@@ -86,16 +84,16 @@ If the attack surface reduction rule is blocking something that it shouldn't blo
8684
To add an exclusion, see [Customize attack surface reduction](attack-surface-reduction-rules-deployment-implement.md#customize-attack-surface-reduction-rules).
8785

8886
> [!IMPORTANT]
89-
> You can specify individual files and folders to be excluded, but you cannot specify individual rules.
90-
> This means any files or folders that are excluded will be excluded from all ASR rules.
87+
> You can specify individual files and folders to be excluded, but you can't specify individual rules.
88+
> This means any files or folders that are excluded are excluded from all ASR rules.
9189
9290
## Report a false positive or false negative
9391

9492
Use the [Microsoft Security Intelligence web-based submission form](https://www.microsoft.com/wdsi/support/report-exploit-guard) to report a false negative or false positive for network protection. With a Windows E5 subscription, you can also [provide a link to any associated alert](alerts-queue.md).
9593

9694
## Collect diagnostic data for file submissions
9795

98-
When you report a problem with attack surface reduction rules, you're asked to collect and submit diagnostic data that can be used by Microsoft support and engineering teams to help troubleshoot issues.
96+
When you report a problem with attack surface reduction rules, you're asked to collect and submit diagnostic data for Microsoft support and engineering teams to help troubleshoot issues.
9997

10098
1. Open Command Prompt as an administrator and open the Windows Defender directory:
10199

0 commit comments

Comments
 (0)