mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-28 13:17:23 +00:00
Corrected E3 rules list
This commit is contained in:
parent
83d06de81c
commit
6bcbff0e4e
@ -108,15 +108,6 @@ Malware can use macro code in Office files to import and load Win32 DLLs, which
|
||||
|
||||
This rule attempts to block Office files that contain macro code that is capable of importing Win32 DLLs.
|
||||
|
||||
### Rule: Block executable files from running unless they meet a prevalence, age, or trusted list criteria
|
||||
|
||||
This rule blocks the following file types from being run or launched unless they meet prevalence or age criteria set by admins, or they are in a trusted list or exclusion list:
|
||||
|
||||
- Executable files (such as .exe, .dll, or .scr)
|
||||
|
||||
>[!NOTE]
|
||||
>You must [enable cloud-delivered protection](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-antivirus/enable-cloud-protection-windows-defender-antivirus) to use this rule.
|
||||
|
||||
### Rule: Use advanced protection against ransomware
|
||||
|
||||
This rule provides an extra layer of protection against ransomware. Executable files that enter the system will be scanned to determine whether they are trustworthy. If the files exhibit characteristics that closely resemble ransomware, they are blocked from being run or launched, provided they are not already in the trusted list or exception list.
|
||||
|
Loading…
x
Reference in New Issue
Block a user