This commit is contained in:
Denise Vangel-MSFT
2019-11-18 15:30:40 -08:00
parent 301e6adcfe
commit e330b00fe4
2 changed files with 7 additions and 5 deletions

View File

@ -9,11 +9,12 @@ ms.mktglfcycl: manage
ms.sitesec: library ms.sitesec: library
ms.pagetype: security ms.pagetype: security
ms.localizationpriority: medium ms.localizationpriority: medium
author: levinec author: denisebmsft
ms.author: ellevin ms.author: deniseb
ms.date: 10/15/2018 ms.date: 10/15/2018
ms.reviewer: ms.reviewer:
manager: dansimp manager: dansimp
ms.custom: asr
--- ---
# Use attack surface reduction rules in Windows 10 Enterprise E3 # Use attack surface reduction rules in Windows 10 Enterprise E3
@ -42,7 +43,7 @@ The limited subset of rules that can be used in Windows 10 Enterprise E3 include
- Block process creations originating from PSExec and WMI commands - Block process creations originating from PSExec and WMI commands
- Block untrusted and unsigned processes that run from USB - Block untrusted and unsigned processes that run from USB
For more information about these rules, see [Reduce attack surfaces with attack surface reduction rules](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard). For more information about these rules, see [Reduce attack surfaces with attack surface reduction rules](attack-surface-reduction.md).
## Related topics ## Related topics

View File

@ -10,10 +10,11 @@ ms.sitesec: library
ms.pagetype: security ms.pagetype: security
ms.localizationpriority: medium ms.localizationpriority: medium
audience: ITPro audience: ITPro
author: levinec author: denisebmsft
ms.author: ellevin ms.author: deniseb
ms.reviewer: ms.reviewer:
manager: dansimp manager: dansimp
ms.custom: asr
--- ---
# Reduce attack surfaces with attack surface reduction rules # Reduce attack surfaces with attack surface reduction rules