Based on your audit data, add exclusions for legitimate applications that are being incorrectly flagged.
Return to your ASR policy in the Intune admin center. Click Properties, then Edit next to Configuration settings.
Scroll down to find Attack Surface Reduction Rules Exclusions. Add file paths, folder paths, or file extensions that should be excluded from this rule.
Common exclusions might include:
- Specific executable paths:
C:\Program Files\YourApp\app.exe - Folder exclusions:
C:\Program Files\LegitimateApp\* - File extensions (use cautiously):
*.msi
Example exclusion configuration:
C:\Program Files\RemoteMonitoring\winagent.exe
C:\Program Files (x86)\BusinessApp\*
Warning: Avoid excluding system files like svchost.exe or broad exclusions like *.exe as these can significantly reduce security effectiveness.
Click Review + save to apply the exclusions.
Verification: Test previously blocked legitimate applications to ensure they now function correctly.