mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-21 17:57:22 +00:00
Update behavioral-blocking-containment.md
This commit is contained in:
parent
21044f6fb7
commit
92fdd2de43
@ -26,4 +26,10 @@ ms.collection:
|
||||
|
||||
## Overview of behavioral blocking and containment
|
||||
|
||||
As you know, not all cyberattacks involve a simple piece of malware that's found and removed. Some attacks, such as fileless attacks, are much more difficult to identify, let alone contain. Microsoft Defender ATP includes behavioral blocking and containment capabilities that can help identify and stop threats
|
||||
As you know, not all cyberattacks involve a simple piece of malware that's found and removed. Some attacks, such as fileless attacks, are much more difficult to identify, let alone contain. Microsoft Defender ATP includes behavioral blocking and containment capabilities that can help identify and stop threats
|
||||
|
||||
Behavioral blocking and containment capabilities offer protection in all of the following scenarios:
|
||||
- Client behavioral blocking. Enabled by default, threats that are detected through machine learning are blocked and remediated automatically
|
||||
- Feedback-loop blocking (also referred to as Rapid Protection). Enabled by default, detections that are assumed to be false negatives are observed through behavioral intelligence.
|
||||
- On-client, policy driven attack surface reduction rules. When enabled, predefined common attack behaviors are prevented from executing, according to your ASR policies (e.g. no child processes from Office applications). Alerts on attempts to execute these behaviors surface in the Microsoft Defender ATP portal (https://securitycenter.windows.com) as informational alerts.
|
||||
- Endpoint detection and response (EDR) in block mode. When enabled,
|
||||
|
Loading…
x
Reference in New Issue
Block a user