mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-23 22:33:41 +00:00
2.9 KiB
2.9 KiB
title, ms.reviewer, description, keywords, search.product, search.appverid, ms.prod, ms.mktglfcycl, ms.sitesec, ms.pagetype, ms.author, author, ms.localizationpriority, manager, audience, ms.collection, ms.custom, ms.topic
title | ms.reviewer | description | keywords | search.product | search.appverid | ms.prod | ms.mktglfcycl | ms.sitesec | ms.pagetype | ms.author | author | ms.localizationpriority | manager | audience | ms.collection | ms.custom | ms.topic |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Overview of attack surface reduction | Learn about the attack surface reduction capabilities of Microsoft Defender ATP. | asr, attack surface reduction, microsoft defender atp, microsoft defender advanced threat protection, microsoft defender, antivirus, av, windows defender | eADQiWindows 10XVcnh | met150 | w10 | deploy | library | security | deniseb | denisebmsft | medium | dansimp | ITPro | M365-security-compliance | asr | conceptual |
Overview of attack surface reduction
Applies to:
Help reduce your attack surfaces, by minimizing the places where your organization is vulnerable to cyberthreats and attacks. Use the following resources to configure protection for the devices and applications in your organization.
Article | Description |
---|---|
Attack surface reduction | Reduce vulnerabilities (attack surfaces) in your applications with intelligent rules that help stop malware. (Requires Windows Defender Antivirus). |
Hardware-based isolation | Protect and maintain the integrity of a system as it starts and while it's running. Validate system integrity through local and remote attestation. And, use container isolation for Microsoft Edge to help guard against malicious websites. |
Application control | Use application control so that your applications must earn trust in order to run. |
Exploit protection | Help protect operating systems and apps your organization uses from being exploited. Exploit protection also works with third-party antivirus solutions. |
Network protection | Extend protection to your network traffic and connectivity on your organization's devices. (Requires Windows Defender Antivirus) |
Web protection | Secure your machines against web threats and help you regulate unwanted content. |
Controlled folder access | Help prevent malicious or suspicious apps (including file-encrypting ransomware malware) from making changes to files in your key system folders (Requires Windows Defender Antivirus) |
Network firewall | Prevent unauthorized traffic from flowing to or from your organization's devices with two-way network traffic filtering. |
Attack surface reduction FAQ | Frequently asked questions about Attack surface reduction rules, licensing, and more. |