Summary
In this chapter, we covered ASR rules, NP and CFA and their operating modes, and finally, exploit protection. From that, you’ve learned which options there are and are armed with enough best-practice information to work through implementation in your own network, focusing on what will be most effective, while avoiding potential impact where possible.
In the next chapter, we’ll discuss EDR features within MDE, laying a foundational understanding that we’ll leverage for practical application in Chapter 8, Establishing Security Operations.