mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-15 14:57:23 +00:00
More voice and tone edits.
This commit is contained in:
parent
7e4849b99e
commit
d579eaa2ae
@ -28,16 +28,16 @@ Attack surface reduction rules work best with [Windows Defender Advanced Threat
|
|||||||
Attack surface reduction rules each target specific behaviors that malware and malicious apps typically use to infect computers, including:
|
Attack surface reduction rules each target specific behaviors that malware and malicious apps typically use to infect computers, including:
|
||||||
|
|
||||||
- Executable files and scripts used in Office apps or web mail that attempt to download or run files
|
- Executable files and scripts used in Office apps or web mail that attempt to download or run files
|
||||||
- Scripts that are obfuscated or otherwise suspicious
|
- Obfuscated or otherwise suspicious scripts
|
||||||
- Behaviors that apps undertake that are not usually initiated during normal day-to-day work
|
- Behaviors that apps don't usually initiate during normal day-to-day work
|
||||||
|
|
||||||
When a rule triggers, the Action Center displays a notification. You can [customize the notification](customize-attack-surface-reduction.md#customize-the-notification) with your company details and contact information.
|
Triggered rules display a notification. You can [customize the notification](customize-attack-surface-reduction.md#customize-the-notification) with your company details and contact information.
|
||||||
|
|
||||||
You can use [audit mode](audit-windows-defender-exploit-guard.md) to evaluate how attack surface reduction rules would impact your organization if they were enabled.
|
You can use [audit mode](audit-windows-defender-exploit-guard.md) to evaluate how attack surface reduction rules would impact your organization once enabled.
|
||||||
|
|
||||||
## Attack surface reduction rules
|
## Attack surface reduction rules
|
||||||
|
|
||||||
The following sections describe what each rule does. Each rule is identified by a rule GUID, as in the following table:
|
The following sections describe each attack surface reduction rule. This table shows their corresponding GUIDs, which you use if you're configuring the rules with Group Policy:
|
||||||
|
|
||||||
Rule name | GUID
|
Rule name | GUID
|
||||||
-|-
|
-|-
|
||||||
@ -56,7 +56,7 @@ Block untrusted and unsigned processes that run from USB | b2b3f03d-6a65-4f7b-a9
|
|||||||
Block Office communication application from creating child processes | 26190899-1602-49e8-8b27-eb1d0a1ce869
|
Block Office communication application from creating child processes | 26190899-1602-49e8-8b27-eb1d0a1ce869
|
||||||
Block Adobe Reader from creating child processes | 7674ba52-37eb-4a4f-a9a1-f0f9a1619a2c
|
Block Adobe Reader from creating child processes | 7674ba52-37eb-4a4f-a9a1-f0f9a1619a2c
|
||||||
|
|
||||||
The rules apply to the following Office apps:
|
In general, attack surface reduction rules apply to the following Office apps:
|
||||||
|
|
||||||
- Microsoft Word
|
- Microsoft Word
|
||||||
- Microsoft Excel
|
- Microsoft Excel
|
||||||
|
Loading…
x
Reference in New Issue
Block a user