mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-24 14:53:44 +00:00
2.0 KiB
2.0 KiB
title, description, keywords, search.product, search.appverid, ms.prod, ms.mktglfcycl, ms.sitesec, ms.pagetype, ms.author, author, ms.localizationpriority, manager, audience, ms.collection, ms.topic, ms.date
title | description | keywords | search.product | search.appverid | ms.prod | ms.mktglfcycl | ms.sitesec | ms.pagetype | ms.author | author | ms.localizationpriority | manager | audience | ms.collection | ms.topic | ms.date |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Configure attack surface reduction | Configure attack surface reduction | asr, attack surface reduction, windows defender, microsoft defender, antivirus, av | eADQiWindows 10XVcnh | met150 | w10 | deploy | library | security | macapara | mjcaparas | medium | dansimp | ITPro | M365-security-compliance | conceptual | 07/01/2018 |
Configure attack surface reduction
You can configure attack surface reduction with a number of tools, including:
- Microsoft Intune
- Microsoft Endpoint Configuration Manager
- Group Policy
- PowerShell cmdlets
The topics in this section describe how to configure attack surface reduction. Each topic includes instructions for the applicable configuration tool (or tools).
In this section
Topic | Description |
---|---|
Enable hardware-based isolation for Microsoft Edge | How to prepare for and install Application Guard, including hardware and software requirements |
Enable application control | How to control applications run by users and protect kernel mode processes |
Exploit protection | How to automatically apply exploit mitigation techniques on both operating system processes and on individual apps |
Network protection | How to prevent users from using any apps to access dangerous domains |
Controlled folder access | How to protect valuable data from malicious apps |
Attack surface reduction | How to prevent actions and apps that are typically used by exploit-seeking malware |
Network firewall | How to protect devices and data across a network |