Attack Surface Reduction Rules | Rule 1 | Block abuse of exploited vulnerable signed drivers

  Рет қаралды 2,638

Concepts Work

Concepts Work

Күн бұрын

Attack Surface Reduction | Rule 1 | Block abuse of exploited vulnerable signed drivers
Microsoft Article -
learn.microsof...
MITRE Article - attack.mitre.o...
Attack Surface Reduction Rules | Rule 1 | Block abuse of exploited vulnerable signed drivers
• Attack Surface Reducti...
Attack Surface Reduction Rules | Rule 2 | Block Adobe Reader from creating child processes - • Attack Surface Reducti...
Attack Surface Reduction Rules| Rule 3 | Block all Office applications from creating child processes - • Attack Surface Reducti...
Attack Surface Reduction|Rule -4|Block credential stealing from the Windows local security authority - • Attack Surface Reducti...
Attack Surface Reduction Rules | Rule 5 | Block executable content from email client and webmail - • Attack Surface Reducti...
Attack Surface Reduction|Rule-6|Block executable file from running unless they meet a prevalence,age - • Attack Surface Reducti...
Attack Surface Reduction Rules | Rule 7 | Block execution of potentially obfuscated scripts - • Attack Surface Reducti...
Attack Surface Reduction|Rules 8|Block JavaScript or VBScript from launching downloaded executable - • Attack Surface Reducti...
Attack Surface Reduction Rules | Rule 9 | Block Office applications from creating executable content - • Attack Surface Reducti...
Attack Surface Reduction | Rule 10 | Block Office application from injecting code into other process - • Attack Surface Reducti...
Attack Surface Reduction|Rule 11|Block Office communication application from creating child process - • Attack Surface Reducti...
Attack Surface Reduction Rules | Rule 12 | Block persistence through WMI event subscription - • Attack Surface Reducti...
Attack Surface Reduction Rule -13 | Block process creations originating from PSExec and WMI command - • Attack Surface Reducti...
Attack Surface Reduction Rules | Rule 14 | Block untrusted and unsigned processes that run from USB - • Attack Surface Reducti...
Attack Surface Reduction Rules | Rule 15 | Block Win32 API calls from Office macros - • Attack Surface Reducti...
Attack Surface Reduction Rules | Rule 16 | Use advanced protection against ransomware - • Attack Surface Reducti...

Пікірлер: 3
@angadsingh8862
@angadsingh8862 2 жыл бұрын
Can't watch 3 of your tutorials on Attack surface reduction under the defender series, it gives an error for some permissions level. Could you please assist.
@amitbahuguna3270
@amitbahuguna3270 Жыл бұрын
send pdf
@ConceptsWork
@ConceptsWork Жыл бұрын
Please send an email to learnconceptswork@gmail.com
What is SQLite ?
3:42
Rishi Labs
Рет қаралды 42
She made herself an ear of corn from his marmalade candies🌽🌽🌽
00:38
Valja & Maxim Family
Рет қаралды 18 МЛН
Каха и дочка
00:28
К-Media
Рет қаралды 3,4 МЛН
Deploy Attack Surface Reduction Rules from Microsoft Intune
23:58
Concepts Work
Рет қаралды 9 М.
How Hackers Exploit Vulnerable Drivers
23:58
John Hammond
Рет қаралды 50 М.
How to start working with Attack Surface Reduction rules like a boss
33:01
MSEndpointMgr - Jungling the Cloud
Рет қаралды 4,8 М.
SDLC Agile and WaterFall Models and DevOps
15:44
codewithvenkats
Рет қаралды 26
Attack surface reduction in Microsoft Defender for Endpoint
6:36
Microsoft Security
Рет қаралды 20 М.
She made herself an ear of corn from his marmalade candies🌽🌽🌽
00:38
Valja & Maxim Family
Рет қаралды 18 МЛН