Adaptive Protection is designed to reduce the attack surface by managing suspicious behaviors
performed by trusted applications. This feature provides dynamic, behavior-based protection that
allows trusted applications to operate normally while monitoring and controlling any suspicious
actions they might perform.
Purpose of Adaptive Protection: It monitors and restricts potentially harmful behaviors in
applications that are generally trusted, thus reducing the risk of misuse or exploitation.
Attack Surface Reduction: By focusing on behavior rather than solely on known malicious files,
Adaptive Protection effectively minimizes the risk of attacks that exploit legitimate applications.
Explanation of Why Other Options Are Less Likely:
Option A (Malware Prevention Configuration) targets malware but does not specifically control
trusted applications’ behaviors.
Option B (Host Integrity Configuration) focuses on policy compliance rather than behavioral
monitoring.
Option D (Network Integrity Configuration) deals with network-level threats, not application
behaviors.
Therefore, Adaptive Protection is the feature best suited to reduce the attack surface by managing
suspicious behaviors in trusted applications.