From 161b98ac44b9c011314382518b11f8f3b286262d Mon Sep 17 00:00:00 2001 From: ImranHabib <47118050+joinimran@users.noreply.github.com> Date: Fri, 1 Jan 2021 21:03:33 +0500 Subject: [PATCH] Update windows/security/threat-protection/microsoft-defender-atp/attack-surface-reduction.md Co-authored-by: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com> --- .../microsoft-defender-atp/attack-surface-reduction.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/attack-surface-reduction.md b/windows/security/threat-protection/microsoft-defender-atp/attack-surface-reduction.md index 56bb500c7a..a879459cd9 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/attack-surface-reduction.md +++ b/windows/security/threat-protection/microsoft-defender-atp/attack-surface-reduction.md @@ -247,7 +247,7 @@ GUID: `BE9BA2D9-53EA-4CDC-84E5-9B1EEEE46550` > The rule **Block executable content from email client and webmail** has the following separate descriptions, depending on which application you use: - > Intune (Configuration Profiles): Execution of executable content (exe, dll, ps, js, vbs, etc.) dropped from email (webmail/mail client) (no exceptions). - > Endpoint Manager: Block executable content download from email and webmail clients. -> Group Policy: Block executable content from email client and webmail +- > Group Policy: Block executable content from email client and webmail. ### Block executable files from running unless they meet a prevalence, age, or trusted list criterion