Skip to content

Commit 01db68e

Browse files
committed
Merge branches 'diannegali-updateurbacmde' and 'diannegali-updateurbacmde' of https://github.com/MicrosoftDocs/defender-docs-pr into diannegali-updateurbacmde
2 parents 28123f6 + 9e3012a commit 01db68e

16 files changed

+27
-33
lines changed

ATADocs/index.yml

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,6 @@ metadata:
88
description: Protect your enterprise using information from multiple network data-sources to learn the behavior of users and entities in your organization.
99
services: service
1010
ms.service: advanced-threat-analytics
11-
ms.subservice: ms.subservice
1211
ms.topic: landing-page
1312
ms.collection: M365-security-compliance
1413
author: batamig

CloudAppSecurityDocs/index.yml

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,6 @@ metadata:
88
description: Microsoft Defender for Cloud Apps delivers full protection for SaaS applications, helping you monitor and protect your cloud app data, using fundamental cloud access security broker (CASB) functionality, SaaS Security Posture Management (SSPM) features, advanced threat protection, and app-to-app protection.
99
services: na
1010
ms.service: defender-for-cloud-apps
11-
ms.subservice: na
1211
ms.topic: landing-page
1312
ms.collection: na
1413
author: batamig

defender-endpoint/attack-surface-reduction-rules-reference.md

Lines changed: 18 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
- m365-security
1616
- tier2
1717
- mde-asr
18-
ms.date: 01/07/2025
18+
ms.date: 01/28/2025
1919
search.appverid: met150
2020
---
2121

@@ -53,7 +53,7 @@ Attack surface reduction rules are categorized as one of two types:
5353

5454
- **Other rules**: Rules that require some measure of following the documented deployment steps [Plan > Test (audit) > Enable (block/warn modes)], as documented in the [Attack surface reduction rules deployment guide](attack-surface-reduction-rules-deployment.md).
5555

56-
For the easiest method to enable the standard protection rules, see: [Simplified standard protection option](attack-surface-reduction-rules-report.md#simplified-standard-protection-option).
56+
For the easiest method to enable the standard protection rules, see [Simplified standard protection option](attack-surface-reduction-rules-report.md#simplified-standard-protection-option).
5757

5858
| ASR rule name: | Standard protection rule? | Other rule? |
5959
|---|---|---|
@@ -110,7 +110,7 @@ The following ASR rules DO NOT honor Microsoft Defender for Endpoint Indicators
110110
The following table lists the supported operating systems for rules that are currently released to general availability. The rules are listed alphabetical order in this table.
111111

112112
> [!NOTE]
113-
> Unless otherwise indicated, the minimum Windows10 build is version 1709 (RS3, build 16299) or later; the minimum Windows Server build is version 1809 or later.
113+
> Unless otherwise indicated, the minimum Windows 10 build is version 1709 (RS3, build 16299) or later; the minimum Windows Server build is version 1809 or later.
114114
> Attack surface reduction rules in Windows Server 2012 R2 and Windows Server 2016 are available for devices onboarded using the modern unified solution package. For more information, see [New Windows Server 2012 R2 and 2016 functionality in the modern unified solution](configure-server-endpoints.md#functionality-in-the-modern-unified-solution).
115115
116116
| Rule name| Windows 11 <br>and<br> Windows 10 | Windows Server 2022 <br>and<br> Windows Server 2019 | Windows Server | Windows Server 2016 <sup>[[1, 2](#fn1)]</sup> | Windows Server <br> 2012 R2 <sup>[[1, 2](#fn1)]</sup> |
@@ -236,17 +236,17 @@ For rules with the "Rule State" specified:
236236
- **Not configured** or **Disable**: The state in which the ASR rule isn't enabled or is disabled. The code for this state = 0.
237237
- **Block**: The state in which the ASR rule is enabled. The code for this state is 1.
238238
- **Audit**: The state in which the ASR rule is evaluated for the effect it would have on the organization or environment if enabled (set to block or warn). The code for this state is 2.
239-
- **Warn** The state in which the ASR rule is enabled and presents a notification to the end-user, but permits the end-user to bypass the block. The code for this state is 6.
239+
- **Warn**: The state in which the ASR rule is enabled and presents a notification to the end-user, but permits the end-user to bypass the block. The code for this state is 6.
240240

241-
_Warn mode_ is a block-mode type that alerts users about potentially risky actions. Users can choose to bypass the block warning message and allow the underlying action. Users can select **OK** to enforce the block, or select the bypass option - **Unblock** - through the end-user pop-up toast notification that is generated at the time of the block. After the warning is unblocked, the operation is allowed until the next time the warning message occurs, at which time the end-user will need to reperform the action.
241+
_Warn mode_ is a block-mode type that alerts users about potentially risky actions. Users can choose to bypass the block warning message and allow the underlying action. Users can select **OK** to enforce the block, or select the bypass option - **Unblock** - through the end-user pop-up toast notification that is generated at the time of the block. After the warning is unblocked, the operation is allowed until the next time the warning message occurs, at which time the end-user will need to reperform the action.
242242

243-
When the allow button is clicked, the block is suppressed for 24 hours. After 24 hours, the end-user will need to allow the block again. The warn mode for ASR rules is only supported for RS5+ (1809+) devices. If bypass is assigned to ASR rules on devices with older versions, the rule is in blocked mode.
243+
When the allow button is clicked, the block is suppressed for 24 hours. After 24 hours, the end-user will need to allow the block again. The warn mode for ASR rules is only supported for RS5+ (1809+) devices. If bypass is assigned to ASR rules on devices with older versions, the rule is in blocked mode.
244244

245-
You can also set a rule in warn mode via PowerShell by specifying the `AttackSurfaceReductionRules_Actions` as "Warn". For example:
245+
You can also set a rule in warn mode via PowerShell by specifying the `AttackSurfaceReductionRules_Actions` as "Warn". For example:
246246

247-
```powershell
248-
Add-MpPreference -AttackSurfaceReductionRules_Ids 56a863a9-875e-4185-98a7-b882c64b5ce5 -AttackSurfaceReductionRules_Actions Warn
249-
```
247+
```powershell
248+
Add-MpPreference -AttackSurfaceReductionRules_Ids 56a863a9-875e-4185-98a7-b882c64b5ce5 -AttackSurfaceReductionRules_Actions Warn
249+
```
250250

251251
## Per rule descriptions
252252

@@ -320,26 +320,26 @@ Dependencies: Microsoft Defender Antivirus
320320
### Block credential stealing from the Windows local security authority subsystem
321321

322322
> [!NOTE]
323-
> If you have [LSA protection](/windows-server/security/credentials-protection-and-management/configuring-additional-lsa-protection) enabled, this attack surface reduction rule is not required. For a more secure posture, we also recommend enabling [Credential Guard](/windows/security/identity-protection/credential-guard) with the LSA protection.
323+
> If you have [LSA protection](/windows-server/security/credentials-protection-and-management/configuring-additional-lsa-protection) enabled, this attack surface reduction rule isn't required. For a more secure posture, we also recommend enabling [Credential Guard](/windows/security/identity-protection/credential-guard) with the LSA protection.
324+
> If the LSA protection is enabled, the ASR rule is classified as *not applicable* in Defender for Endpoint management settings in the [Microsoft Defender portal](https://security.microsoft.com).
324325
325326
This rule helps prevent credential stealing by locking down Local Security Authority Subsystem Service (LSASS).
326327

327328
LSASS authenticates users who sign in on a Windows computer. Microsoft Defender Credential Guard in Windows normally prevents attempts to extract credentials from LSASS. Some organizations can't enable Credential Guard on all of their computers because of compatibility issues with custom smartcard drivers or other programs that load into the Local Security Authority (LSA). In these cases, attackers can use tools like Mimikatz to scrape cleartext passwords and NTLM hashes from LSASS.
328329

329-
By default the state of this rule is set to block. In most cases, many processes make calls to LSASS for access rights that are not needed. For example, such as when the initial block from the ASR rule results in a subsequent call for a lesser privilege which subsequently succeeds. For information about the types of rights that are typically requested in process calls to LSASS, see: [Process Security and Access Rights](/windows/win32/procthread/process-security-and-access-rights).
330+
By default the state of this rule is set to block. In most cases, many processes make calls to LSASS for access rights that are not needed. For example, such as when the initial block from the ASR rule results in a subsequent call for a lesser privilege which subsequently succeeds. For information about the types of rights that are typically requested in process calls to LSASS, see [Process Security and Access Rights](/windows/win32/procthread/process-security-and-access-rights).
330331

331332
Enabling this rule doesn't provide additional protection if you have LSA protection enabled since the ASR rule and LSA protection work similarly. However, when LSA protection cannot be enabled, this rule can be configured to provide equivalent protection against malware that target `lsass.exe`.
332333

333334
> [!TIP]
334335
> 1. ASR audit events don't generate toast notifications. However, since the LSASS ASR rule produces large volume of audit events, almost all of which are safe to ignore when the rule is enabled in block mode, you can choose to skip the audit mode evaluation and proceed to block mode deployment, beginning with a small set of devices and gradually expanding to cover the rest.
335336
> 2. The rule is designed to suppress block reports/toasts for friendly processes. It is also designed to drop reports for duplicate blocks. As such, the rule is well suited to be enabled in block mode, irrespective of whether toast notifications are enabled or disabled. 
336-
> 3. ASR in warn mode is designed to present users with a block toast notification that includes an "Unblock" button. Due to the "safe to ignore" nature of LSASS ASR blocks and their large volume, WARN mode is not advisable for this rule (irrespective of whether toast notifications are enabled or disabled).
337+
> 3. ASR in warn mode is designed to present users with a block toast notification that includes an "Unblock" button. Due to the "safe to ignore" nature of LSASS ASR blocks and their large volume, WARN mode isn't advisable for this rule (irrespective of whether toast notifications are enabled or disabled).
337338
338339
> [!NOTE]
339340
> In this scenario, the ASR rule is classified as "not applicable" in Defender for Endpoint settings in the Microsoft Defender portal.
340341
> The *Block credential stealing from the Windows local security authority subsystem* ASR rule doesn't support WARN mode.
341-
> In some apps, the code enumerates all running processes and attempts to open them with exhaustive permissions. This rule denies the app's process open action and logs the details to the security event log. This rule can generate a lot of noise. If you have an app that simply enumerates LSASS, but has no real impact in functionality, there is no need to add it to the exclusion list. By itself, this event log entry doesn't necessarily indicate a malicious threat.
342-
342+
> In some apps, the code enumerates all running processes and attempts to open them with exhaustive permissions. This rule denies the app's process open action and logs the details to the security event log. This rule can generate a lot of noise. If you have an app that simply enumerates LSASS, but has no real impact in functionality, there's no need to add it to the exclusion list. By itself, this event log entry doesn't necessarily indicate a malicious threat.
343343
Intune name: `Flag credential stealing from the Windows local security authority subsystem`
344344

345345
Configuration Manager name: `Block credential stealing from the Windows local security authority subsystem`
@@ -393,7 +393,7 @@ This rule blocks executable files, such as .exe, .dll, or .scr, from launching.
393393

394394
> [!IMPORTANT]
395395
> You must [enable cloud-delivered protection](/windows/security/threat-protection/microsoft-defender-antivirus/enable-cloud-protection-microsoft-defender-antivirus) to use this rule.
396-
> The rule **Block executable files from running unless they meet a prevalence, age, or trusted list criterion** with GUID `01443614-cd74-433a-b99e-2ecdc07bfc25` is owned by Microsoft and is not specified by admins. This rule uses cloud-delivered protection to update its trusted list regularly.
396+
> The rule **Block executable files from running unless they meet a prevalence, age, or trusted list criterion** with GUID `01443614-cd74-433a-b99e-2ecdc07bfc25` is owned by Microsoft and isn't specified by admins. This rule uses cloud-delivered protection to update its trusted list regularly.
397397
> You can specify individual files or folders (using folder paths or fully qualified resource names) but you can't specify which rules or exclusions apply to.
398398
399399
Intune name: `Executables that don't meet a prevalence, age, or trusted list criteria`
@@ -473,7 +473,7 @@ Dependencies: Microsoft Defender Antivirus, RPC
473473
This rule blocks code injection attempts from Office apps into other processes.
474474

475475
> [!NOTE]
476-
> The Block applications from injecting code into other processes ASR rule does not support WARN mode.
476+
> The Block applications from injecting code into other processes ASR rule doesn't support WARN mode.
477477
478478
> [!IMPORTANT]
479479
> This rule requires restarting Microsoft 365 Apps (Office applications) for the configuration changes to take effect.
@@ -568,7 +568,7 @@ Dependencies: Microsoft Defender Antivirus
568568

569569
### Block rebooting machine in Safe Mode (preview)
570570

571-
This rule prevents the execution of commands to restart machines in Safe Mode. Safe Mode is a diagnostic mode that only loads the essential files and drivers needed for Windows to run. However, in Safe Mode, many security products are either disabled or operate in a limited capacity, which allows attackers to further launch tampering commands, or simply execute and encrypt all files on the machine. This rule blocks such attacks by preventing processes from restarting machines in Safe Mode.
571+
This rule prevents the execution of commands to restart machines in Safe Mode. Safe Mode is a diagnostic mode that only loads the essential files and drivers needed for Windows to run. However, in Safe Mode, many security products are either disabled or operate in a limited capacity, which allows attackers to further launch tampering commands, or execute and encrypt all files on the machine. This rule blocks such attacks by preventing processes from restarting machines in Safe Mode.
572572

573573
> [!NOTE]
574574
> This capability is currently in preview. Additional upgrades to improve efficacy are under development.

defender-office-365/anti-malware-protection-faq.yml

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,6 @@ metadata:
1919
ms.custom:
2020
- seo-marvel-apr2020
2121
description: Admins can view frequently asked questions and answers about anti-malware protection in Exchange Online Protection (EOP).
22-
ms.subservice: mdo
2322
ms.service: defender-office-365
2423
title: Anti-malware protection FAQ
2524
summary: |

defender-office-365/anti-phishing-protection-spoofing-faq.yml

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,6 @@ metadata:
1717
- m365-security
1818
- tier2
1919
description: Admins can view frequently asked questions and answers about anti-spoofing protection in Exchange Online Protection (EOP).
20-
ms.subservice: mdo
2120
ms.service: defender-office-365
2221
title: Anti-spoofing protection FAQ
2322
summary: |

defender-office-365/anti-spam-protection-faq.yml

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,6 @@ metadata:
1919
ms.custom:
2020
- seo-marvel-apr2020
2121
description: Admins can view frequently asked questions and answers about anti-spam protection in Exchange Online Protection (EOP).
22-
ms.subservice: mdo
2322
ms.service: defender-office-365
2423
title: Anti-spam protection FAQ
2524
summary: |

defender-office-365/configure-junk-email-settings-on-exo-mailboxes.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -174,8 +174,8 @@ As you can see, enabling the **Trust email from my contacts** setting reduces th
174174
- Policy setting: **Trust e-mail from contacts**
175175

176176
> [!IMPORTANT]
177-
> The following button helps identify and resolve issues with the safelist collection in user mailboxes (the Safe Senders list and Bloxked Senders list, which includes individual senders and domains):
177+
> The following button helps identify and resolve issues with the safelist collection in user mailboxes (the Safe Senders list and Blocked Senders list, which includes individual senders and domains):
178178
>
179179
<div class="nextstepaction">
180180
<p><a href="https://aka.ms/safeblockdiag" data-linktype="external">Run Tests: Mailbox safe/blocked sender list</a></p>
181-
</div>
181+
</div>

defender-office-365/delegated-administration-faq.yml

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,6 @@ metadata:
1717
ms.custom:
1818
- seo-marvel-apr2020
1919
description: Admins can view frequently asked questions and answers about delegated administration tasks in Microsoft 365 for Microsoft partners and resellers.
20-
ms.subservice: mdo
2120
ms.service: defender-office-365
2221

2322
title: Delegated administration FAQ

defender-office-365/index.yml

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,6 @@ metadata:
88
description: Learn about the robust security solutions in Defender for Office 365 to better protect your email and collaboration tools. # Required; article description that is displayed in search results. < 160 chars.
99
services: office-365-security-compliance
1010
ms.service: defender-office-365
11-
ms.subservice: mdo
1211
ms.topic: landing-page # Required
1312
ms.collection:
1413
- m365-security

defender-office-365/quarantine-faq.yml

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,6 @@ metadata:
99
ms.date: 10/07/2024
1010
audience: ITPro
1111
ms.topic: faq
12-
1312
ms.localizationpriority: medium
1413
search.appverid:
1514
- MET150
@@ -19,7 +18,6 @@ metadata:
1918
- tier2
2019
description: Admins can view frequently asked questions and answers about quarantined messages in Exchange Online Protection (EOP).
2120
ms.custom: seo-marvel-apr2020
22-
ms.subservice: mdo
2321
ms.service: defender-office-365
2422

2523
title: Quarantined messages FAQ

0 commit comments

Comments
 (0)