mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-18 20:03:40 +00:00
Update attack-surface-reduction-exploit-guard.md
Added "Intune names" for "Block Office communication application from creating child processes" and "Block Adobe Reader from creating child processes".
This commit is contained in:
@ -219,7 +219,7 @@ This rule prevents Outlook from creating child processes. It protects against so
|
||||
>[!NOTE]
|
||||
>This rule applies to Outlook and Outlook.com only.
|
||||
|
||||
Intune name: Not yet available
|
||||
Intune name: Process creation from Office communication products (beta)
|
||||
|
||||
SCCM name: Not yet available
|
||||
|
||||
@ -229,7 +229,7 @@ GUID: 26190899-1602-49e8-8b27-eb1d0a1ce869
|
||||
|
||||
Through social engineering or exploits, malware can download and launch additional payloads and break out of Adobe Reader. This rule prevents attacks like this by blocking Adobe Reader from creating additional processes.
|
||||
|
||||
Intune name: Not applicable
|
||||
Intune name: Process creation from Adobe Reader (beta)
|
||||
|
||||
SCCM name: Not applicable
|
||||
|
||||
@ -238,4 +238,4 @@ GUID: 7674ba52-37eb-4a4f-a9a1-f0f9a1619a2c
|
||||
## Related topics
|
||||
|
||||
- [Enable attack surface reduction rules](enable-attack-surface-reduction.md)
|
||||
- [Evaluate attack surface reduction rules](evaluate-attack-surface-reduction.md)
|
||||
- [Evaluate attack surface reduction rules](evaluate-attack-surface-reduction.md)
|
||||
|
Reference in New Issue
Block a user