Configure attack surface reduction

You can configure attack surface reduction with a number of tools, including:

  • Microsoft Intune
  • System Center Configuration Manager
  • Group Policy
  • PowerShell cmdlets

The topics in this section describe how to configure attack surface reduction. Each topic includes instructions for the applicable configuration tool (or tools).

In this section

Topic Description
Enable hardware-based isolation for Microsoft Edge How to preprare for and install Application Guard, including hardware and softeware requirements
Enable application control How to control applications run by users and potect kernel mode processes
Exploit protection How to automatically apply exploit mitigation techniques on both operating system processes and on individual apps
Network protection How to prevent users from using any apps to acces dangerous domains
Controlled folder access How to protect valuable data from malicious apps
Attack surface reduction How to prevent actions and apps that are typically used for by exploit-seeking malware
Network firewall How to protect devices and data across a network