Skip to content

Commit 126038f

Browse files
committed
Update attack-surface-reduction-rules-reference.md
1 parent 1919ffb commit 126038f

File tree

1 file changed

+6
-4
lines changed

1 file changed

+6
-4
lines changed

defender-endpoint/attack-surface-reduction-rules-reference.md

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
- m365-security
1616
- tier2
1717
- mde-asr
18-
ms.date: 04/04/2025
18+
ms.date: 04/30/2025
1919
search.appverid: met150
2020
---
2121

@@ -253,8 +253,8 @@ For rules with the "Rule State" specified:
253253

254254
> [!NOTE]
255255
> To protect your environment from vulnerable drivers, you should first implement these:
256-
> For Windows 10 or later, Windows Server 2016 or later using [Microsoft App Control for Business](/windows/security/application-security/application-control/app-control-for-business/design/microsoft-recommended-driver-block-rules), you should block all drivers by default and only allow drivers that you deem necessary and are not known to be vulnerable.
257-
> For Windows 8.1 or older, Windows Server 2012 R2 or older, using [Microsoft AppLocker](/windows/security/application-security/application-control/app-control-for-business/applocker/understanding-applocker-allow-and-deny-actions-on-rules), you should block all drivers by default and only allow drivers that you deem necessary and are not known to be vulnerable.
256+
> For Windows 10 or later, Windows Server 2016 or later using [Microsoft App Control for Business](/windows/security/application-security/application-control/app-control-for-business/design/microsoft-recommended-driver-block-rules), you should block all drivers by default and only allow drivers that you deem necessary and aren't known to be vulnerable.
257+
> For Windows 8.1 or older, Windows Server 2012 R2 or older, using [Microsoft AppLocker](/windows/security/application-security/application-control/app-control-for-business/applocker/understanding-applocker-allow-and-deny-actions-on-rules), you should block all drivers by default and only allow drivers that you deem necessary and aren't known to be vulnerable.
258258
> For Windows 11 or later, and Windows Server core 1809 or later, or Windows Server 2019 or later, you should also enable [Microsoft Windows vulnerable driver blocklist](/windows/security/application-security/application-control/app-control-for-business/design/microsoft-recommended-driver-block-rules),
259259
> Then as another layer of defense, you should enable this attack surface reduction rule.
260260
@@ -544,7 +544,9 @@ This rule prevents malware from abusing WMI to attain persistence on a device.
544544
Fileless threats employ various tactics to stay hidden, to avoid being seen in the file system, and to gain periodic execution control. Some threats can abuse the WMI repository and event model to stay hidden.
545545

546546
> [!NOTE]
547-
> If you are using Configuration Manager (CM, formerly MEMCM or SCCM) `CcmExec.exe` (SCCM Agent), we encourage you to run in audit mode for 60 days at a minimum and when ready to run in block mode, deploy appropriate ASR rules per rule exclusions as appropriate.
547+
> If you're utilizing Configuration Manager (CM, previously known as MEMCM or SCCM) with CcmExec.exe` (SCCM Agent), we recommend running it in audit mode for at least 60 days.
548+
> Once you're prepared to switch to block mode, ensure you deploy the appropriate ASR rules, considering any necessary rule exclusions.
549+
548550

549551
Intune name: `Persistence through WMI event subscription`
550552

0 commit comments

Comments
 (0)