mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-17 11:23:45 +00:00
Update
This commit is contained in:
@ -34,6 +34,8 @@ You can exclude files and folders from being evaluated by most attack surface re
|
|||||||
>- Block process creations originating from PSExec and WMI commands
|
>- Block process creations originating from PSExec and WMI commands
|
||||||
>- Block JavaScript or VBScript from launching downloaded executable content
|
>- Block JavaScript or VBScript from launching downloaded executable content
|
||||||
|
|
||||||
|
You can specify individual files or folders (using folder paths or fully qualified resource names) but you can't specify which rules the exclusions apply to.
|
||||||
|
|
||||||
>[!IMPORTANT] The rule **Block executable files from running unless they meet a prevalence, age, or trusted list criterion** is owned by microsoft and is not specified by admins. It uses Microsoft CLoud's Protection to update its trusted list regularly.
|
>[!IMPORTANT] The rule **Block executable files from running unless they meet a prevalence, age, or trusted list criterion** is owned by microsoft and is not specified by admins. It uses Microsoft CLoud's Protection to update its trusted list regularly.
|
||||||
>You can specify individual files or folders (using folder paths or fully qualified resource names) but you can't specify which rules or exclusions apply to.
|
>You can specify individual files or folders (using folder paths or fully qualified resource names) but you can't specify which rules or exclusions apply to.
|
||||||
|
|
||||||
|
Reference in New Issue
Block a user