Update attack-surface-reduction-exploit-guard.md

Added "Intune names" for "Block Office communication application from creating child processes" and "Block Adobe Reader from creating child processes".
This commit is contained in:
Philip Reschke
2019-03-03 10:03:15 +01:00
committed by GitHub
parent b70e0ecf28
commit 328efa9339

View File

@ -219,7 +219,7 @@ This rule prevents Outlook from creating child processes. It protects against so
>[!NOTE]
>This rule applies to Outlook and Outlook.com only.
Intune name: Not yet available
Intune name: Process creation from Office communication products (beta)
SCCM name: Not yet available
@ -229,7 +229,7 @@ GUID: 26190899-1602-49e8-8b27-eb1d0a1ce869
Through social engineering or exploits, malware can download and launch additional payloads and break out of Adobe Reader. This rule prevents attacks like this by blocking Adobe Reader from creating additional processes.
Intune name: Not applicable
Intune name: Process creation from Adobe Reader (beta)
SCCM name: Not applicable
@ -238,4 +238,4 @@ GUID: 7674ba52-37eb-4a4f-a9a1-f0f9a1619a2c
## Related topics
- [Enable attack surface reduction rules](enable-attack-surface-reduction.md)
- [Evaluate attack surface reduction rules](evaluate-attack-surface-reduction.md)
- [Evaluate attack surface reduction rules](evaluate-attack-surface-reduction.md)