Thanks, that helps a little. I agree with JUSTICE's comment that having them both compliment each other. And I'm not only citing x64 but x32 as well.
I had an x32 SEP 12.1 client get attacked by Smart Fortress 2012. I had the client in "test mode" so All Users\Application Data didn't get blocked. Looking at the log, the malware first tried to stop SEP... wait, I think I just answered my own question and confirmed greg12's comment. I didn't have this [AC1] rule but yet SEP 12.1 prevented the malware from terminating the SEP processes anyway. So, Tamper Protection must have worked. However the malware continued because All Users\Application Data wasn't blocked. Well, that's the risk of implementing rules. You have to leave them in test to see if any legitimate programs get blocked.
Thanks, Tom.