Category | Microsoft Docs article | Related commit history on GitHub | Change details |
---|---|---|---|
commerce | Tax Information | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/commerce/billing-and-payments/tax-information.md | For example: If you qualify for tax-exempt status in your market, [start a service request](../../admin/get-help-support.md) to establish tax exempt status for your organization. -|Country or locale | Documentation | +|Country or region | Documentation | ||-| | Canada | Certificate of Exemption (or equivalent letter of authorization) | | Chile | IVA status/RUT (Registro Unico Tributario) | |
security | Attack Surface Reduction Rules Reference | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/attack-surface-reduction-rules-reference.md | Microsoft Defender Antivirus exclusions apply to some Microsoft Defender for End Following is a list of ASR rules that honor Microsoft Defender Antivirus exclusions: -|exclusion name | ASR rules name | -|:|:| -| BlockAdobeCreateProcessRule | [Block Adobe Reader from creating child processes](#block-adobe-reader-from-creating-child-processes) | -| BlockKnownRemotingToolCreateProcessRule | [Block process creations originating from PSExec and WMI commands](#block-process-creations-originating-from-psexec-and-wmi-commands) | -| BlockLsassCredentialTheft | [Block credential stealing from the Windows local security authority subsystem (lsass.exe)](#block-credential-stealing-from-the-windows-local-security-authority-subsystem) | -| BlockOfficeCreateProcessRule | [Block Office applications from creating executable content](#block-office-applications-from-creating-executable-content) | -| BlockOfficeInjectionRule | [Block Office applications from injecting code into other processes](#block-office-applications-from-injecting-code-into-other-processes) | -| BlockOutlookCreateProcessRule | [Block Office communication application from creating child processes](#block-office-communication-application-from-creating-child-processes) | +| ASR rules name: | +|:| +| [Block Adobe Reader from creating child processes](#block-adobe-reader-from-creating-child-processes) | +| [Block process creations originating from PSExec and WMI commands](#block-process-creations-originating-from-psexec-and-wmi-commands) | +| [Block credential stealing from the Windows local security authority subsystem (lsass.exe)](#block-credential-stealing-from-the-windows-local-security-authority-subsystem) | +| [Block Office applications from creating executable content](#block-office-applications-from-creating-executable-content) | +| [Block Office applications from injecting code into other processes](#block-office-applications-from-injecting-code-into-other-processes) | +| [Block Office communication application from creating child processes](#block-office-communication-application-from-creating-child-processes) | ## ASR rules supported operating systems |