This commit is contained in:
Justin Hall 2018-11-29 15:26:05 -08:00
parent f4ce766d07
commit bc31d085f9

View File

@ -69,7 +69,7 @@ However, we recommend enabling real-time protection for improved scanning perfor
End-users might plug in removable devices that are infected with malware. End-users might plug in removable devices that are infected with malware.
In order to prevent infections, a company can block files from usb devices which are not signed or are untrusted. In order to prevent infections, a company can block files from usb devices which are not signed or are untrusted.
Alternatively, companies can leverage the audit feature of attack surface reduction rules to monitor the USB activity of untrusted and unsigned processes that execute on a USB device. Alternatively, companies can leverage the audit feature of attack surface reduction rules to monitor the USB activity of untrusted and unsigned processes that execute on a USB device.
This can be done by using the **Block untrusted and unsigned processes that run from USB** rule. This can be done by setting **Untrusted and unsigned processes that run from USB** to either **Block** or **Audit only**, respectively.
With this rule, admins can prevent unsigned or untrusted executable files from running from USB removable drives, including SD cards. With this rule, admins can prevent unsigned or untrusted executable files from running from USB removable drives, including SD cards.
Blocked file types include executable files (such as .exe, .dll, or .scr) and script files such as a PowerShell (.ps), VisualBasic (.vbs), or JavaScript (.js) files. Blocked file types include executable files (such as .exe, .dll, or .scr) and script files such as a PowerShell (.ps), VisualBasic (.vbs), or JavaScript (.js) files.