You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/attack-surface-reduction-rules-reference.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,7 +15,7 @@ ms.collection:
15
15
- m365-security
16
16
- tier2
17
17
- mde-asr
18
-
ms.date: 12/02/2024
18
+
ms.date: 01/07/2025
19
19
search.appverid: met150
20
20
---
21
21
@@ -51,7 +51,7 @@ Attack surface reduction rules are categorized as one of two types:
51
51
52
52
-**Standard protection rules**: Are the minimum set of rules which Microsoft recommends you always enable, while you're evaluating the effect and configuration needs of the other ASR rules. These rules typically have minimal-to-no noticeable impact on the end user.
53
53
54
-
-**Other rules**: Rules that require some measure of following the documented deployment steps [Plan > Test (audit) > Enable (block/warn modes)], as documented in the [Attack surface reduction rules deployment guide](attack-surface-reduction-rules-deployment.md)
54
+
-**Other rules**: Rules that require some measure of following the documented deployment steps [Plan > Test (audit) > Enable (block/warn modes)], as documented in the [Attack surface reduction rules deployment guide](attack-surface-reduction-rules-deployment.md).
55
55
56
56
For the easiest method to enable the standard protection rules, see: [Simplified standard protection option](attack-surface-reduction-rules-report.md#simplified-standard-protection-option).
57
57
@@ -180,7 +180,7 @@ Toast notifications are generated for all rules in Block mode. Rules in any othe
180
180
181
181
For rules with the "Rule State" specified:
182
182
183
-
- ASR rules with `\ASR Rule, Rule State\` combinations are used to surface alerts (toast notifications) on Microsoft Defender for Endpoint only for devices at cloud block level "High".
183
+
- ASR rules with `\ASR Rule, Rule State\` combinations are used to surface alerts (toast notifications) on Microsoft Defender for Endpoint only for devices at cloud block level "High"
184
184
- Devices that not at the high cloud block level don't generate alerts for any `ASR Rule, Rule State` combinations
185
185
- EDR alerts are generated for ASR rules in the specified states, for devices at cloud block level "High+"
186
186
- Toast notifications occur in block mode only and for devices at cloud block level "High"
@@ -320,7 +320,7 @@ Dependencies: Microsoft Defender Antivirus
320
320
### Block credential stealing from the Windows local security authority subsystem
321
321
322
322
> [!NOTE]
323
-
> If you have [LSA protection](/windows-server/security/credentials-protection-and-management/configuring-additional-lsa-protection) enabled and [Credential Guard](/windows/security/identity-protection/credential-guard)enabled, this attack surface reduction rule is not required.
323
+
> If you have [LSA protection](/windows-server/security/credentials-protection-and-management/configuring-additional-lsa-protection) enabled, this attack surface reduction rule is not required. For a more secure posture, we also recommend enabling [Credential Guard](/windows/security/identity-protection/credential-guard)with the LSA protection.
324
324
325
325
This rule helps prevent credential stealing by locking down Local Security Authority Subsystem Service (LSASS).
326
326
@@ -634,7 +634,7 @@ Dependencies: Microsoft Defender Antivirus
634
634
635
635
### Block Webshell creation for Servers
636
636
637
-
This rule blocks web shell script creation on Microsoft Server, Exchange Role. A web shell script is a specifically crafted script that allows an attacker to control the compromised server. A web shell may include functionalities such as receiving and executing malicious commands, downloading and executing malicious files, stealing and exfiltrating credentials and sensitive information, identifying potential targets etc.
637
+
This rule blocks web shell script creation on Microsoft Server, Exchange Role. A web shell script is a specifically crafted script that allows an attacker to control the compromised server. A web shell may include functionalities such as receiving and executing malicious commands, downloading and executing malicious files, stealing and exfiltrating credentials and sensitive information, and identifying potential targets.
638
638
639
639
Intune name: `Block Webshell creation for Servers`
Copy file name to clipboardExpand all lines: defender-endpoint/ios-whatsnew.md
+46-8Lines changed: 46 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,9 +4,9 @@ description: Learn about the major changes for previous versions of Microsoft De
4
4
ms.service: defender-endpoint
5
5
ms.author: deniseb
6
6
author: denisebmsft
7
-
ms.reviewer: sunasing
7
+
ms.reviewer: sunasing; denishdonga
8
8
ms.localizationpriority: medium
9
-
ms.date: 12/11/2024
9
+
ms.date: 01/07/2025
10
10
manager: deniseb
11
11
audience: ITPro
12
12
ms.collection:
@@ -30,6 +30,41 @@ search.appverid: met150
30
30
Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
31
31
32
32
33
+
## Upgrading your experience: UX enhancements you should know about
34
+
35
+
January 2025
36
+
37
+
**Key changes**
38
+
39
+
We are pleased to introduce the new dashboard for our enterprise users, which has been designed to be more user-friendly and accessible. The updated dashboard structure now includes recommendation cards for alerts and feature tiles.
40
+
41
+
Recommendation cards prominently display any active alerts, ensuring you stay informed. Additionally, features are now presented in the form of tiles, enhancing ease of use and navigation.
42
+
43
+
The following screenshot is an example of what the user sees in their dashboard:
44
+
45
+
:::image type="content" source="media/ios-whatsnew/ios-dashboard.png" alt-text="Screenshot showing the user's dashboard.":::
46
+
47
+
**Recommendation cards for alerts**
48
+
49
+
The structure of the dashboard has been updated to include a recommendation card that contains active alerts (if any). In case there are multiple alerts, resolving the top alert will bring forward the next one. Recommendation cards have been implemented to provide a more cohesive user experience. These cards are designed to display important alerts and notifications prominently on the dashboard, as shown in the following table.
50
+
51
+
| Card | Description |
52
+
|--|--|
53
+
| :::image type="content" source="media/ios-whatsnew/ios-network-protection-unsafe-connection.png" alt-text="Screenshot of a card indicating an unsafe network connection."::: |**Network protection** <br/>The user is prompted to connect to a secure network. |
54
+
| :::image type="content" source="media/ios-whatsnew/ios-web-protection.png" alt-text="Screenshot of a card prompting the user to turn on web protection."::: |**Web protection** <br/>The user is prompted to turn on web protection. |
55
+
| :::image type="content" source="media/ios-whatsnew/ios-update.png" alt-text="Screenshot of a card telling the user an iOS update is available."::: |**Device health** <br/>The user is prompted to update their device. |
56
+
57
+
**Feature tiles**
58
+
59
+
We have enhanced the current enterprise dashboard experience, featuring a new tile view. The following table lists some examples of tiles:
60
+
61
+
| Tile | Description |
62
+
|--|--|
63
+
| :::image type="content" source="media/ios-whatsnew/ios-tile-network.png" alt-text="Screenshot of the network protection tile."::: |**Network protection** <br/>The user sees whether or not their connection is secure. |
64
+
| :::image type="content" source="media/ios-whatsnew/ios-tile-web-protection.png" alt-text="Screenshot of the web protection tile."::: |**Web protection** <br/>The user sees their current status of web protection. If it's not enabled, the tile indicates action is needed. |
65
+
| :::image type="content" source="media/ios-whatsnew/ios-tile-device-health.png" alt-text="Screenshot of the device health tile."::: |**Device health** <br/>The user sees their device health status. If an iOS update is available, the tile indicates that action is needed. |
66
+
| :::image type="content" source="media/ios-whatsnew/ios-tile-global-secure-access.png" alt-text="Screenshot of the Global Secure Access tile."::: |**Global Secure Access** <br/>The user sees their current status of Global Secure Access. |
67
+
33
68
## Defender for Endpoint on iOS now supports iOS/iPadOS 16.x as the minimum version
34
69
35
70
Defender for Endpoint is ending support for iOS/iPadOS 15 on January 31, 2025. Moving forward, only devices running iOS/iPadOS 16 and later are supported.
@@ -75,19 +110,19 @@ With **Disable Web Protection**, customers who don't want to set up a VPN can co
75
110
76
111
## Integration with Tunnel
77
112
78
-
Microsoft Defender for Endpoint on iOS can now integrate with Microsoft Tunnel, a VPN gateway solution to enable security and connectivity in a single app. Integration with Tunnel provides a simpler, secure VPN experience on iOS with just one app. This feature was earlier available only on Android. For more information, [see the techcommunity post here](https://techcommunity.microsoft.com/t5/microsoft-endpoint-manager-blog/what-s-new-in-microsoft-endpoint-manager-2204-april-edition/ba-p/3297995).
113
+
Microsoft Defender for Endpoint on iOS can now integrate with Microsoft Tunnel, a VPN gateway solution to enable security and connectivity in a single app. Integration with Tunnel provides a simpler, secure VPN experience on iOS with just one app. This feature was earlier available only on Android. For more information, see [Tech Community: What's new in Microsoft Endpoint Manager - 2204 (April) edition](https://techcommunity.microsoft.com/t5/microsoft-endpoint-manager-blog/what-s-new-in-microsoft-endpoint-manager-2204-april-edition/ba-p/3297995).
79
114
80
115
## Improved experience on supervised iOS devices
81
116
82
-
Microsoft Defender for Endpoint on iOS now has specialized ability on supervised iOS/iPadOS devices, given the increased management capabilities provided by the platform on these types of devices. It can also provide Web Protection **without setting up a local VPN on the device**. This gives end-users a seamless experience while still being protected from phishing and other web-based attacks. For more information, see [this documentation](ios-install.md#complete-deployment-for-supervised-devices).
117
+
Microsoft Defender for Endpoint on iOS now has specialized ability on supervised iOS/iPadOS devices, given the increased management capabilities provided by the platform on these types of devices. It can also provide Web Protection **without setting up a local VPN on the device**. This gives end-users a seamless experience while still being protected from phishing and other web-based attacks. For more information, see [Complete deployment for supervised devices](ios-install.md#complete-deployment-for-supervised-devices).
83
118
84
119
## Microsoft Defender for Endpoint is now Microsoft Defender in the App store
85
120
86
-
Microsoft Defender for Endpoint is now available as **Microsoft Defender** in the app store. With this update, the app is available as preview for **Consumers in the US region**. Based on how you log into the app with your work or personal account, you'll have access to features for Microsoft Defender for Endpoint or to features for Microsoft Defender for individuals. For more information, see [this blog](https://www.microsoft.com/microsoft-365/microsoft-defender-for-individuals).
121
+
Microsoft Defender for Endpoint is now available as **Microsoft Defender** in the app store. With this update, the app is available as preview for **Consumers in the US region**. Based on how you log into the app with your work or personal account, you'll have access to features for Microsoft Defender for Endpoint or to features for Microsoft Defender for individuals. For more information, see [Microsoft Defender](https://www.microsoft.com/microsoft-365/microsoft-defender-for-individuals).
87
122
88
123
## Vulnerability Management
89
124
90
-
On January 25, 2022, we announced the general availability of Vulnerability management on Android and iOS. For more information, see [the techcommunity post here](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/announcing-general-availability-of-vulnerability-management/ba-p/3071663).
125
+
On January 25, 2022, we announced the general availability of Vulnerability management on Android and iOS. For more information, see [Tech Community: Announcing general availability of vulnerability management support for Android and iOS](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/announcing-general-availability-of-vulnerability-management/ba-p/3071663).
91
126
92
127
## 1.1.28250101
93
128
@@ -103,24 +138,27 @@ On January 25, 2022, we announced the general availability of Vulnerability mana
103
138
## 1.1.23250104
104
139
105
140
- Performance optimizations - Test battery performance with this version and let us know your feedback.
106
-
-**Zero-touch onboard for enrolled iOS devices** - With this version, the preview of Zero-touch onboard for devices enrolled through Microsoft Intune has been added. For more information, see this [documentation](ios-install.md#zero-touch-silent-onboarding-of-microsoft-defender-for-endpoint) for more details on setup and configuration.
141
+
-**Zero-touch onboard for enrolled iOS devices** - With this version, the preview of Zero-touch onboard for devices enrolled through Microsoft Intune has been added. For more information, see this [Zero-touch (Silent) onboarding of Microsoft Defender for Endpoint](ios-install.md#zero-touch-silent-onboarding-of-microsoft-defender-for-endpoint).
107
142
-**Privacy Controls** - Configure privacy controls for phish alert report. For more information, see [Configure iOS features](ios-configure-features.md).
108
143
109
144
## 1.1.23010101
110
145
111
146
- Bug fixes and performance improvements
112
-
- Performance optimizations were made in this release. Test battery performance with this version and let us know your feedback.
147
+
- Performance optimizations were made in this release. Test battery performance with this version and let us know your feedback.
113
148
114
149
## 1.1.20240103
150
+
115
151
- Device Health card - Device Health card notifies end-users about any pending software updates.
116
152
- Usability enhancements - End-users can now disable the Defender for Endpoint VPN from the Microsoft Defender app itself. Prior to this update, end-users had to disable VPN only from the Settings app.
117
153
- Bug fixes.
118
154
119
155
## 1.1.20020101
156
+
120
157
- UX Enhancements - Microsoft Defender for Endpoint has a new look.
121
158
- Bug fixes.
122
159
123
160
## 1.1.17240101
161
+
124
162
- Support for Mobile Application Management (MAM) via Intune is generally available with this version. For more information, see [Microsoft Defender for Endpoint risk signals available for your App protection policies](https://techcommunity.microsoft.com/t5/intune-customer-success/microsoft-defender-for-endpoint-risk-signals-available-for-your/ba-p/2186322)
125
163
-**Jailbreak Detection** is generally available. For more information, see [Setup Conditional Access Policy based on device risk signals](ios-configure-features.md#conditional-access-with-defender-for-endpoint-on-ios).
126
164
-**Auto-setup of VPN profile** for enrolled devices via Microsoft Intune is generally available. For more information, see [Auto-Setup VPN profile for enrolled iOS devices](ios-install.md#auto-onboarding-of-vpn-profile-simplified-onboarding).
0 commit comments