From 328efa93395ab413462940ee333ed8cb8394e431 Mon Sep 17 00:00:00 2001 From: Philip Reschke Date: Sun, 3 Mar 2019 10:03:15 +0100 Subject: [PATCH] Update attack-surface-reduction-exploit-guard.md Added "Intune names" for "Block Office communication application from creating child processes" and "Block Adobe Reader from creating child processes". --- .../attack-surface-reduction-exploit-guard.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard.md b/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard.md index f010ab338b..8a7cb93d2b 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard.md @@ -219,7 +219,7 @@ This rule prevents Outlook from creating child processes. It protects against so >[!NOTE] >This rule applies to Outlook and Outlook.com only. -Intune name: Not yet available +Intune name: Process creation from Office communication products (beta) SCCM name: Not yet available @@ -229,7 +229,7 @@ GUID: 26190899-1602-49e8-8b27-eb1d0a1ce869 Through social engineering or exploits, malware can download and launch additional payloads and break out of Adobe Reader. This rule prevents attacks like this by blocking Adobe Reader from creating additional processes. -Intune name: Not applicable +Intune name: Process creation from Adobe Reader (beta) SCCM name: Not applicable @@ -238,4 +238,4 @@ GUID: 7674ba52-37eb-4a4f-a9a1-f0f9a1619a2c ## Related topics - [Enable attack surface reduction rules](enable-attack-surface-reduction.md) -- [Evaluate attack surface reduction rules](evaluate-attack-surface-reduction.md) \ No newline at end of file +- [Evaluate attack surface reduction rules](evaluate-attack-surface-reduction.md)