mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-23 22:33:41 +00:00
Corrected capitalization, changed ASR to ASR rules
This commit is contained in:
@ -14,20 +14,12 @@ ms.author: v-anbic
|
||||
ms.date: 08/09/2018
|
||||
---
|
||||
|
||||
|
||||
|
||||
# Windows Defender Exploit Guard
|
||||
|
||||
|
||||
**Applies to:**
|
||||
|
||||
- Windows Defender Advanced Threat Protection (Windows Defender ATP)
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
Windows Defender Exploit Guard (Windows Defender EG) is a new set of host intrusion prevention capabilities for Windows 10, allowing you to manage and reduce the attack surface of apps used by your employees.
|
||||
|
||||
There are four features in Windows Defender EG:
|
||||
@ -63,13 +55,12 @@ This section covers requirements for each feature in Windows Defender EG.
|
||||
|--------|---------|
|
||||
|  | Not supported |
|
||||
|  | Supported |
|
||||
|  | Recommended. Includes full, automated reporting into the Windows Defender ATP console. Provides additional cloud-powered capabilities, including the Network protection ability to block apps from accessing low-reputation websites and an Attack surface reduction rule that blocks executable files that meet age or prevalence criteria.|
|
||||
|
||||
|  | Recommended. Includes full, automated reporting into the Windows Defender ATP console. Provides additional cloud-powered capabilities, including the Network protection ability to block apps from accessing low-reputation websites and an attack surface reduction rule that blocks executable files that meet age or prevalence criteria.|
|
||||
|
||||
| Feature | Windows 10 Home | Windows 10 Professional | Windows 10 E3 | Windows 10 E5 |
|
||||
| ----------------- | :------------------------------------: | :---------------------------: | :-------------------------: | :--------------------------------------: |
|
||||
| Exploit protection |  |  |  |  |
|
||||
| Attack surface reduction |  |  |  |  |
|
||||
| Attack surface reduction rules |  |  |  |  |
|
||||
| Network protection |  |  |  |  |
|
||||
| Controlled folder access |  |  |  |  |
|
||||
|
||||
@ -78,7 +69,7 @@ The following table lists which features in Windows Defender EG require enabling
|
||||
| Feature | Real-time protection |
|
||||
|-----------------| ------------------------------------ |
|
||||
| Exploit protection | No requirement |
|
||||
| Attack surface reduction | Must be enabled |
|
||||
| Attack surface reduction rules | Must be enabled |
|
||||
| Network protection | Must be enabled |
|
||||
| Controlled folder access | Must be enabled |
|
||||
|
||||
@ -87,8 +78,8 @@ The following table lists which features in Windows Defender EG require enabling
|
||||
Topic | Description
|
||||
---|---
|
||||
[Protect devices from exploits](exploit-protection-exploit-guard.md) | Exploit protection provides you with many of the features in now-retired Enhanced Mitigations Experience Toolkit - and adds additional configuration and technologies. These features can help prevent threats from using vulnerabilities to gain access to your network and devices. You can create a template of settings that can be exported and copied to multiple machines in your network at once.
|
||||
[Reduce attack surfaces](attack-surface-reduction-exploit-guard.md) | Use pre-built rules to manage mitigations for key attack and infection vectors, such as Office-based malicious macro code and PowerShell, VBScript, and JavaScript scripts.
|
||||
[Reduce attack surfaces with attack surface reduction rules](attack-surface-reduction-exploit-guard.md) | Use pre-built rules to manage mitigations for key attack and infection vectors, such as Office-based malicious macro code and PowerShell, VBScript, and JavaScript scripts.
|
||||
[Protect your network](network-protection-exploit-guard.md) | Minimize the exposure of your devices from network and web-based infection vectors.
|
||||
[Protect important folders with Controlled folder access](controlled-folders-exploit-guard.md) | Prevent unknown or unauthorized apps (including ransomware encryption malware) from writing to sensitive folders, such as folders containing sensitive or business-critical data.
|
||||
[Protect important folders with controlled folder access](controlled-folders-exploit-guard.md) | Prevent unknown or unauthorized apps (including ransomware encryption malware) from writing to sensitive folders, such as folders containing sensitive or business-critical data.
|
||||
|
||||
|
||||
|
Reference in New Issue
Block a user