Corrected E3 rules list

This commit is contained in:
Andrea Bichsel 2018-10-15 12:14:29 -07:00
parent 83d06de81c
commit 6bcbff0e4e

View File

@ -108,15 +108,6 @@ Malware can use macro code in Office files to import and load Win32 DLLs, which
This rule attempts to block Office files that contain macro code that is capable of importing Win32 DLLs.
### Rule: Block executable files from running unless they meet a prevalence, age, or trusted list criteria
This rule blocks the following file types from being run or launched unless they meet prevalence or age criteria set by admins, or they are in a trusted list or exclusion list:
- Executable files (such as .exe, .dll, or .scr)
>[!NOTE]
>You must [enable cloud-delivered protection](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-antivirus/enable-cloud-protection-windows-defender-antivirus) to use this rule.
### Rule: Use advanced protection against ransomware
This rule provides an extra layer of protection against ransomware. Executable files that enter the system will be scanned to determine whether they are trustworthy. If the files exhibit characteristics that closely resemble ransomware, they are blocked from being run or launched, provided they are not already in the trusted list or exception list.