mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-14 06:17:22 +00:00
lint/cleaned configure machines
This commit is contained in:
parent
54901becf6
commit
d3beae478a
@ -20,34 +20,36 @@ ms.topic: article
|
||||
# Optimize ASR rule deployment and detections
|
||||
|
||||
**Applies to:**
|
||||
- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559)
|
||||
|
||||
>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-onboardconfigure-abovefoldlink)
|
||||
* [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559)
|
||||
|
||||
[Attack surface reduction (ASR) rules](../windows-defender-exploit-guard/attack-surface-reduction-exploit-guard.md) identify and prevent actions that are typically taken by malware during exploitation. These rules control when and how potentially malicious code can run. For example, you can prevent JavaScript or VBScript from launching a downloaded executable, block Win32 API calls from Office macros, or block processes that run from USB drives.
|
||||
> Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-onboardconfigure-abovefoldlink)
|
||||
|
||||
[Attack surface reduction (ASR) rules](../windows-defender-exploit-guard/attack-surface-reduction.md) identify and prevent actions that are typically taken by malware during exploitation. These rules control when and how potentially malicious code can run. For example, you can prevent JavaScript or VBScript from launching a downloaded executable, block Win32 API calls from Office macros, or block processes that run from USB drives.
|
||||
|
||||
<br>
|
||||
*Attack surface management card*
|
||||
|
||||
The **Attack surface management** card is an entry point to tools in Microsoft 365 security center that you can use to:
|
||||
|
||||
- Understand how ASR rules are currently deployed in your organization
|
||||
- Review ASR detections and identify possible incorrect detections
|
||||
- Analyze the impact of exclusions and generate the list of file paths to exclude
|
||||
* Understand how ASR rules are currently deployed in your organization
|
||||
* Review ASR detections and identify possible incorrect detections
|
||||
* Analyze the impact of exclusions and generate the list of file paths to exclude
|
||||
|
||||
Selecting **Go to attack surface management** takes you to **Monitoring & reports > Attack surface reduction rules > Add exclusions**. From there, you can navigate to other sections of Microsoft 365 security center.
|
||||
|
||||
<br>
|
||||
*Add exclusions tab in the Attack surface reduction rules page in Microsoft 365 security center*
|
||||
|
||||
>[!NOTE]
|
||||
>To access Microsoft 365 security center, you need a Microsoft 365 E3 or E5 license and an account that has certain roles on Azure Active Directory. [Read more about required licenses and permissions](https://docs.microsoft.com/office365/securitycompliance/microsoft-security-and-compliance#required-licenses-and-permissions)
|
||||
> [!NOTE]
|
||||
> To access Microsoft 365 security center, you need a Microsoft 365 E3 or E5 license and an account that has certain roles on Azure Active Directory. [Read more about required licenses and permissions](https://docs.microsoft.com/office365/securitycompliance/microsoft-security-and-compliance#required-licenses-and-permissions)
|
||||
|
||||
For more information about optimizing ASR rule deployment in Microsoft 365 security center, read [Monitor and manage ASR rule deployment and detections](https://docs.microsoft.com/office365/securitycompliance/monitor-devices#monitor-and-manage-asr-rule-deployment-and-detections)
|
||||
For more information about optimizing ASR rule deployment in Microsoft 365 security center, read [Monitor and manage ASR rule deployment and detections](https://docs.microsoft.com/office365/securitycompliance/monitor-devices#monitor-and-manage-asr-rule-deployment-and-detections)
|
||||
|
||||
>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-onboardconfigure-belowfoldlink)
|
||||
> Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-onboardconfigure-belowfoldlink)
|
||||
|
||||
# Related topics
|
||||
- [Ensure your machines are configured properly](configure-machines.md)
|
||||
- [Get machines onboarded to Microsoft Defender ATP](configure-machines-onboarding.md)
|
||||
- [Increase compliance to the Microsoft Defender ATP security baseline](configure-machines-security-baseline.md)
|
||||
|
||||
* [Ensure your machines are configured properly](configure-machines.md)
|
||||
* [Get machines onboarded to Microsoft Defender ATP](configure-machines-onboarding.md)
|
||||
* [Increase compliance to the Microsoft Defender ATP security baseline](configure-machines-security-baseline.md)
|
||||
|
Loading…
x
Reference in New Issue
Block a user