Skip to content

Commit dfd7bc3

Browse files
committed
Learn Editor: Update attack-surface-reduction-rules-reference.md
1 parent 6a60bba commit dfd7bc3

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

defender-endpoint/attack-surface-reduction-rules-reference.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -544,7 +544,7 @@ This rule prevents malware from abusing WMI to attain persistence on a device.
544544
Fileless threats employ various tactics to stay hidden, to avoid being seen in the file system, and to gain periodic execution control. Some threats can abuse the WMI repository and event model to stay hidden.
545545

546546
> [!NOTE]
547-
> If `CcmExec.exe` (SCCM Agent) is detected on the device, the ASR rule is classified as "not applicable" in Defender for Endpoint settings in the Microsoft Defender portal.
547+
> If you are using Configuration Manager (CM, formerly MEMCM or SCCM) `CcmExec.exe` (SCCM Agent), we encourage you to run in audit mode for 60 days at a minimum and when ready to run in block mode, deploy appropriate ASR rules per rule exclusions as appropriate.
548548
549549
Intune name: `Persistence through WMI event subscription`
550550

0 commit comments

Comments
 (0)