Skip to content

Commit 2acd0f4

Browse files
committed
Further changes
1 parent e57567d commit 2acd0f4

File tree

1 file changed

+15
-7
lines changed

1 file changed

+15
-7
lines changed

defender-endpoint/enable-attack-surface-reduction.md

Lines changed: 15 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,13 @@ ms.date: 09/10/2025
3333
> [!TIP]
3434
> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://go.microsoft.com/fwlink/p/?linkid=2225630)
3535
36-
[Attack surface reduction rules](attack-surface-reduction.md) help prevent actions that malware often abuses to compromise devices and networks.
36+
[Attack surface reduction rules](attack-surface-reduction.md) help prevent actions that malware often abuses to compromise devices and networks. This article describes how to enable and configure attack surface reduction rules via:
37+
38+
- [Microsoft Intune](#intune)
39+
- [Mobile Device Management (MDM)](#mdm)
40+
- [Microsoft Configuration Manager](#microsoft-configuration-manager)
41+
- [Group policy (GP)](#group-policy)
42+
- [PowerShell](#powershell)
3743

3844
## Prerequisites
3945

@@ -65,15 +71,15 @@ To use the entire feature-set of attack surface reduction rules:
6571

6672
- You must have [Cloud Protection network connectivity](/defender-endpoint/configure-network-connections-microsoft-defender-antivirus)
6773

68-
- Recommended: Microsoft 365 E5 or E3 License
74+
- Recommended: Microsoft 365 E5
6975

70-
Although attack surface reduction rules don't require a [Microsoft 365 E5 license](/microsoft-365/commerce/licenses/e3-extra-features-licenses), it is recommended to use attack surface reduction rules with a Microsoft 365 E5 license (or similar licensing SKU) to take advantage of advanced management capabilities, including monitoring, analytics, and workflows available in Defender for Endpoint, as well as reporting and configuration capabilities in the [Microsoft Defender XDR](https://go.microsoft.com/fwlink/p/?linkid=2077139) portal.
76+
Although attack surface reduction rules don't require a [Microsoft 365 E5 license](/microsoft-365/commerce/licenses/e3-extra-features-licenses), it is recommended to use attack surface reduction rules with a Microsoft 365 E5 license (or similar licensing SKU) to take advantage of advanced management capabilities, including monitoring, analytics, and workflows available in Defender for Endpoint, as well as reporting and configuration capabilities in the [Microsoft Defender XDR](https://go.microsoft.com/fwlink/p/?linkid=2077139) portal. While these advanced capabilities aren't available with an E3 license, with an E3 license you can still use Event Viewer to review attack surface reduction rule events.
7177

7278
If you have another license, such as Windows Professional or Microsoft 365 E3 that doesn't include advanced monitoring and reporting capabilities, you can develop your own monitoring and reporting tools on top of the events that are generated at each endpoint when attack surface reduction rules are triggered (for example, Event Forwarding).
7379

7480
To learn more about Windows licensing, see [Windows 10 Licensing](https://www.microsoft.com/licensing/product-licensing/windows10?activetab=windows10-pivot:primaryr5) and get the [Volume Licensing guide for Windows 10](https://www.microsoft.com/en-us/download/details.aspx?id=11091).
7581

76-
> [!WARNING]
82+
> [!NOTE]
7783
> The following ASR rules are only enforced if Office executables are installed under the system-defined `%ProgramFiles%` or `%ProgramFiles(x86)%` directories (on most systems, `%ProgramFiles%` points to `C:\Program Files`).
7884
>
7985
> - Block Office communication applications from creating child processes (26190899-1602-49e8-8b27-eb1d0a1ce869)
@@ -82,6 +88,8 @@ To use the entire feature-set of attack surface reduction rules:
8288
>
8389
>If Office is installed in a custom path outside one of the above-mentioned system-defined directories, these rules won't apply.
8490
91+
## Enabling attack surface reduction rules
92+
8593
Each attack surface reduction rule contains one of four settings:
8694

8795
- **Not configured** or **Disabled**: Disable the attack surface reduction rule
@@ -99,7 +107,7 @@ You can enable attack surface reduction rules by using any of these methods:
99107

100108
Enterprise-level management such as Intune or Microsoft Configuration Manager is recommended. Enterprise-level management overwrites any conflicting group policy or PowerShell settings on startup.
101109

102-
## Exclude files and folders from attack surface reduction rules
110+
### Excluding files and folders from attack surface reduction rules
103111

104112
You can exclude files and folders from being evaluated by most attack surface reduction rules. This means that even if an attack surface reduction rule determines the file or folder contains malicious behavior, it doesn't block the file from running.
105113

@@ -114,11 +122,11 @@ When adding exclusions, keep these points in mind:
114122
- When deployed through group policy or PowerShell, exclusions apply to all attack surface reduction rules. Using Intune, it's possible to configure an exclusion for a specific attack surface reduction rule. See [Configure attack surface reduction rules per-rule exclusions](attack-surface-reduction-rules-deployment-test.md#configure-attack-surface-reduction-per-rule-exclusions).
115123
- Exclusions can be added based on certificate and file hashes, by allowing specified Defender for Endpoint file and certificate indicators. See [Overview of indicators](indicators-overview.md).
116124

117-
## Policy conflicts
125+
### How policy conflicts are handled
118126

119127
If a conflicting policy is applied via MDM and GP, the setting applied from Group Policy takes precedence.
120128

121-
Attack surface reduction rules for managed devices now support behavior for merging settings from different policies to create a policy superset for each device. Only the settings that aren't in conflict are merged, whereas policy conflicts aren't added to the superset of rules. Previously, if two policies included conflicts for a single setting, both policies were flagged as being in conflict, and no settings from either profile were deployed.
129+
Attack surface reduction rules for managed devices support behavior for merging settings from different policies to create a policy superset for each device. Only the settings that aren't in conflict are merged, whereas policy conflicts aren't added to the superset of rules. Previously, if two policies included conflicts for a single setting, both policies were flagged as being in conflict, and no settings from either profile were deployed.
122130

123131
Attack surface reduction rule merge behavior works as follows:
124132

0 commit comments

Comments
 (0)