Skip to content

Commit e66a9cf

Browse files
Merge pull request #4601 from MicrosoftDocs/main
[AutoPublish] main to live - 07/29 01:35 PDT | 07/29 14:05 IST
2 parents 2d30404 + 187aa9a commit e66a9cf

File tree

2 files changed

+9
-9
lines changed

2 files changed

+9
-9
lines changed

defender-endpoint/attack-surface-reduction-rules-reference.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -406,8 +406,8 @@ This rule blocks executable files, such as .exe, .dll, or .scr, from launching.
406406

407407
> [!IMPORTANT]
408408
> You must [enable cloud-delivered protection](/windows/security/threat-protection/microsoft-defender-antivirus/enable-cloud-protection-microsoft-defender-antivirus) to use this rule.
409-
> The rule **Block executable files from running unless they meet a prevalence, age, or trusted list criterion** with GUID `01443614-cd74-433a-b99e-2ecdc07bfc25` is owned by Microsoft and isn't specified by admins. This rule uses cloud-delivered protection to update its trusted list regularly.
410-
> You can specify individual files or folders (using folder paths or fully qualified resource names) but you can't specify which rules or exclusions apply to.
409+
> This rule uses cloud-delivered protection to update its trusted list regularly.
410+
> You can specify individual files or folders by using folder paths or fully qualified resource names. It also supports the **ASROnlyPerRuleExclusions** setting.
411411
412412
Intune name: `Executables that don't meet a prevalence, age, or trusted list criteria`
413413

defender-xdr/custom-detection-rules.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -6,10 +6,10 @@ ms.service: defender-xdr
66
ms.subservice: adv-hunting
77
f1.keywords:
88
- NOCSH
9-
ms.author: maccruz
10-
author: schmurky
9+
ms.author: pauloliveria
10+
author: poliveria
1111
ms.localizationpriority: medium
12-
manager: dansimp
12+
manager: orspodek
1313
audience: ITPro
1414
ms.collection:
1515
- m365-security
@@ -22,7 +22,7 @@ appliesto:
2222
- Microsoft Defender XDR
2323
- Microsoft Sentinel in the Microsoft Defender portal
2424
ms.topic: how-to
25-
ms.date: 05/07/2025
25+
ms.date: 07/29/2025
2626
---
2727

2828
# Create custom detection rules
@@ -127,13 +127,13 @@ DeviceEvents
127127
With the query in the query editor, select **Create detection rule** and specify the following alert details:
128128

129129
- **Detection name** - Name of the detection rule; should be unique
130-
- **Frequency** -Interval for running the query and taking action. [See more guidance in the rule frequency section](#rule-frequency)
131-
- **Alert title** - Title displayed with alerts triggered by the rule; should be unique and in plaintext. Strings are sanitized for security purposes so HTML, Markdown, and other code won't work.
130+
- **Frequency** - Interval for running the query and taking action. [See more guidance in the rule frequency section](#rule-frequency)
131+
- **Alert title** - Title displayed with alerts triggered by the rule; should be unique and in plaintext. Strings are sanitized for security purposes so HTML, Markdown, and other code won't work. Any URLs included in the title should follow the [percent-encoding format](https://en.m.wikipedia.org/wiki/Percent-encoding) for them to display properly.
132132
- **Severity** - Potential risk of the component or activity identified by the rule.
133133
- **Category** - Threat component or activity identified by the rule.
134134
- **MITRE ATT&CK techniques** - One or more attack techniques identified by the rule as documented in the [MITRE ATT&CK framework](https://attack.mitre.org/). This section is hidden for certain alert categories, including malware, ransomware, suspicious activity, and unwanted software.
135135
- **Threat analytics report** - Link the generated alert to an existing threat analytics report so that it appears in the [Related incidents](threat-analytics.md#set-up-custom-detections-and-link-them-to-threat-analytics-reports) tab in threat analytics
136-
- **Description** - More information about the component or activity identified by the rule. Strings are sanitized for security purposes so HTML, Markdown, and other code won't work.
136+
- **Description** - More information about the component or activity identified by the rule. Strings are sanitized for security purposes so HTML, Markdown, and other code won't work. Any URLs included in the description should follow the percent-encoding format for them to display properly.
137137
- **Recommended actions** - Additional actions that responders might take in response to an alert.
138138

139139

0 commit comments

Comments
 (0)