Revoke blockage of risky action. #50
-
Windows Security's Attack surface reduction blocks the execution of executables given that they are untrusted and unsigned processes that ran from USB. Is there an easier way to mark the flagging as false-positive or creating an exception to the rule, other than than adding the executable to Exclude files and paths from Attack surface reduction rules via Group Policy Editor as described here? |
Beta Was this translation helpful? Give feedback.
Replies: 1 comment
-
Ideally you shouldn't be running any untrusted or unsigned software nor should you really be launching any software from a USB device. However this can be needed in some development environments. |
Beta Was this translation helpful? Give feedback.
Ideally you shouldn't be running any untrusted or unsigned software nor should you really be launching any software from a USB device. However this can be needed in some development environments.
You can set the attack surface reduction to audit only if it gives you issues, create a rule exception, or copy the file from the USB to the system and try to run it from there.