You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/adv-tech-of-mdav.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -24,7 +24,7 @@ audience: ITPro
24
24
-[Microsoft Defender for Business](https://www.microsoft.com/security/business/endpoint-security/microsoft-defender-business)
25
25
-[Microsoft Defender for Endpoint Plan 1](microsoft-defender-endpoint.md)
26
26
- Microsoft Defender Antivirus
27
-
-[Microsoft Defender for Individuals](https://www.microsoft.com/microsoft-365/microsoft-defender-for-individuals)
27
+
-[Microsoft Defender for Individuals](https://www.microsoft.com/microsoft-365/microsoft-defender-for-individuals?msockid=0f1c3b9963366db31ba02e78621b6c1e#Overview)
28
28
29
29
Microsoft Defender Antivirus and the multiple engines that lead to the advanced detection and prevention technologies under the hood to detect and stop a wide range of threats and attacker techniques at multiple points, as depicted in the following diagram:
30
30
@@ -82,7 +82,7 @@ An additional layer to help prevent memory-based attacks is to use the Attack Su
82
82
83
83
### How many malware threats does Microsoft Defender Antivirus block per month?
84
84
85
-
[Five billion threats on devices every month](https://www.microsoft.com/en-us/security/blog/2019/05/14/executing-vision-microsoft-threat-protection/).
85
+
[Five billion threats on devices every month](https://www.microsoft.com/security/blog/2019/05/14/executing-vision-microsoft-threat-protection/).
86
86
87
87
### How does Microsoft Defender Antivirus memory protection help?
Copy file name to clipboardExpand all lines: defender-endpoint/android-whatsnew.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -210,7 +210,7 @@ If you encounter any issues, [submit in-app feedback](android-support-signin.md#
210
210
211
211
## The Microsoft Defender for Endpoint app is now Microsoft Defender in the Play store
212
212
213
-
Microsoft Defender for Endpoint is now available as **Microsoft Defender** in the play store. With this update, the app is available as preview for **Consumers in the US region**. Based on how you log into the app with your work or personal account, you have access to features for Microsoft Defender for Endpoint or for Microsoft Defender for individuals. For more information, see [this blog](https://www.microsoft.com/microsoft-365/microsoft-defender-for-individuals).
213
+
Microsoft Defender for Endpoint is now available as **Microsoft Defender** in the play store. With this update, the app is available as preview for **Consumers in the US region**. Based on how you log into the app with your work or personal account, you have access to features for Microsoft Defender for Endpoint or for Microsoft Defender for individuals. For more information, see [this blog](https://www.microsoft.com/microsoft-365/microsoft-defender-for-individuals?msockid=0f1c3b9963366db31ba02e78621b6c1e#Overview).
Copy file name to clipboardExpand all lines: defender-endpoint/attack-surface-reduction-rules-deployment-implement.md
+35-24Lines changed: 35 additions & 24 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,14 +10,14 @@ ms.author: ewalsh
10
10
ms.reviewer: sugamar
11
11
manager: deniseb
12
12
ms.custom: asr
13
-
ms.topic: conceptual
13
+
ms.topic: how-to
14
14
ms.collection:
15
15
- m365-security
16
16
- m365solution-asr-rules
17
17
- highpri
18
18
- tier1
19
19
- mde-asr
20
-
ms.date: 03/27/2025
20
+
ms.date: 06/10/2025
21
21
search.appverid: met150
22
22
---
23
23
@@ -36,15 +36,18 @@ Implementing attack surface reduction rules move the first test ring into an ena
36
36
## Step 1: Transition attack surface reduction rules from Audit to Block
37
37
38
38
1. After all exclusions are determined while in audit mode, start setting some attack surface reduction rules to "block" mode, starting with the rule that has the fewest triggered events. See [Enable attack surface reduction rules](enable-attack-surface-reduction.md).
39
+
39
40
2. Review the reporting page in the Microsoft Defender portal; see [Threat protection report in Microsoft Defender for Endpoint](threat-protection-reports.md). Also review feedback from your champions.
41
+
40
42
3. Refine exclusions or create new exclusions as determined necessary.
43
+
41
44
4. Switch problematic rules back to Audit.
42
45
43
-
> [!NOTE]
44
-
> For problematic rules (rules creating too much noise), it is better to create exclusions than to turn rules off or switching back to Audit. You will have to determine what is best for your environment.
46
+
> [!NOTE]
47
+
> For problematic rules (rules creating too much noise), it's better to create exclusions than to turn off rules or switching back to Audit. You'll have to determine what is best for your environment.
45
48
46
-
> [!TIP]
47
-
> When available, take advantage of the Warn mode setting in rules to limit disruptions. Enabling attack surface reduction rules in Warn mode enables you to capture triggered events and view their potential disruptions, without actually blocking end-user access. Learn more: [Warn mode for users](attack-surface-reduction.md#warn-mode-for-users).
49
+
> [!TIP]
50
+
> When available, take advantage of the Warn mode setting in rules to limit disruptions. Enabling attack surface reduction rules in Warn mode enables you to capture triggered events and view their potential disruptions, without actually blocking end-user access. Learn more: [Warn mode for users](attack-surface-reduction.md#warn-mode-for-users).
48
51
49
52
### How does Warn mode work?
50
53
@@ -54,33 +57,40 @@ Warn mode is effectively a Block instruction, but with the option for the user t
54
57
55
58
When you're confident that you've correctly configured the attack surface reduction rules for ring 1, you can widen the scope of your deployment to the next ring (ring n + 1).
56
59
57
-
The deployment process, steps 1 – 3, is essentially the same for each subsequent ring:
60
+
In the follwing deployment process, steps 1 – 3 are essentially the same for each subsequent ring:
61
+
62
+
1. Test rules in Audit mode.
63
+
64
+
2. Review attack surface reduction-triggered audit events in the Microsoft Defender portal.
65
+
66
+
3. Create exclusions.
67
+
68
+
4. Review: refine, add, or remove exclusions as necessary.
69
+
70
+
5. Set rules to "block" mode.
58
71
59
-
1. Test rules in Audit
60
-
2. Review attack surface reduction-triggered audit events in the Microsoft Defender portal
61
-
3. Create exclusions
62
-
4. Review: refine, add, or remove exclusions as necessary
63
-
5. Set rules to "block"
64
72
6. Review the reporting page in the Microsoft Defender portal.
73
+
65
74
7. Create exclusions.
75
+
66
76
8. Disable problematic rules or switch them back to Audit.
67
77
68
78
#### Customize attack surface reduction rules
69
79
70
-
As you continue to expand your attack surface reduction rules deployment, you may find it necessary or beneficial to customize the attack surface reduction rules that you've enabled.
80
+
As you continue to expand your attack surface reduction rules deployment, you might find it necessary or beneficial to customize the attack surface reduction rules that you've enabled.
71
81
72
82
##### Exclude files and folders
73
83
74
84
You can choose to exclude files and folders from being evaluated by attack surface reduction rules. When excluded, the file isn't blocked from running even if an attack surface reduction rule detects that the file contains malicious behavior.
75
85
76
86
For example, consider the ransomware rule:
77
87
78
-
The ransomware rule is designed to help enterprise customers reduce risks of ransomware attacks while ensuring business continuity. By default, the ransomware rule errors on the side of caution and protect against files that haven't yet attained sufficient reputation and trust. To reemphasize, the ransomware rule only triggers on files that haven't gained enough positive reputation and prevalence, based on usage metrics of millions of our customers. Usually, the blocks are self resolved, because each file's "reputation and trust" values are incrementally upgraded as non-problematic usage increases.
88
+
The ransomware rule is designed to help enterprise customers reduce risks of ransomware attacks while ensuring business continuity. By default, the ransomware rule errors on the side of caution and protect against files that haven't yet attained sufficient reputation and trust. To re-emphasize, the ransomware rule only triggers on files that haven't gained enough positive reputation and prevalence, based on usage metrics of millions of our customers. Usually, the blocks are self resolved, because each file's "reputation and trust" values are incrementally upgraded as nonproblematic usage increases.
79
89
80
90
In cases in which blocks aren't self resolved in a timely manner, customers can - _at their own risk_ - make use of either the self-service mechanism or an Indicator of Compromise (IOC)-based "allowlist" capability to unblock the files themselves.
81
91
82
92
> [!WARNING]
83
-
> Excluding or unblocking files or folders could potentially allow unsafe files to run and infect your devices. Excluding files or folders can severely reduce the protection provided by attack surface reduction rules. Files that would have been blocked by a rule will be allowed to run, and there will be no report or event recorded.
93
+
> Excluding or unblocking files or folders could potentially allow unsafe files to run and infect your devices. Excluding files or folders can severely reduce the protection provided by attack surface reduction rules. Files that would be blocked by a rule are allowed to run, and there's no report or event recorded.
84
94
85
95
An exclusion can apply to all rules that allow exclusions or apply to specific rules using [per-rule exclusions](attack-surface-reduction-rules-deployment-test.md#configure-attack-surface-reduction-per-rule-exclusions). You can specify an individual file, folder path, or the fully qualified domain name for a resource.
86
96
@@ -102,22 +112,22 @@ See the [attack surface reduction rules reference](attack-surface-reduction-rule
102
112
4. Double-click the **Exclude files and paths from Attack surface reduction Rules** setting and set the option to **Enabled**. Select **Show** and enter each file or folder in the **Value name** column. Enter **0** in the **Value** column for each item.
103
113
104
114
> [!WARNING]
105
-
> Do not use quotes as they are not supported for either the **Value name** column or the **Value** column.
115
+
> Don't use quotes as they aren't supported for either the **Value name** column or the **Value** column.
106
116
107
117
##### Use PowerShell to exclude files and folders
108
118
109
-
1. Type **powershell** in the Start menu, right-click **Windows PowerShell** and select **Run as administrator**.
119
+
1. Type **powershell** in the Start menu, right-click **Windows PowerShell**, and then select **Run as administrator**.
110
120
111
121
2. Enter the following cmdlet:
112
122
113
-
```PowerShell
114
-
Add-MpPreference -AttackSurfaceReductionOnlyExclusions "<fully qualified path or resource>"
115
-
```
123
+
```PowerShell
124
+
Add-MpPreference -AttackSurfaceReductionOnlyExclusions "<fully qualified path or resource>"
125
+
```
116
126
117
-
Continue to use `Add-MpPreference -AttackSurfaceReductionOnlyExclusions` to add more folders to the list.
127
+
Continue to use `Add-MpPreference -AttackSurfaceReductionOnlyExclusions` to add more folders to the list.
118
128
119
-
> [!IMPORTANT]
120
-
> Use `Add-MpPreference` to append or add apps to the list. Using the `Set-MpPreference` cmdlet will overwrite the existing list.
129
+
> [!IMPORTANT]
130
+
> Use `Add-MpPreference` to append or add apps to the list. Using the `Set-MpPreference` cmdlet overwrites the existing list.
121
131
122
132
##### Use MDM CSPs to exclude files and folders
123
133
@@ -127,7 +137,7 @@ Use the [./Vendor/MSFT/Policy/Config/Defender/AttackSurfaceReductionOnlyExclusio
127
137
128
138
You can customize the notification for when a rule is triggered and blocks an app or file. See the [Windows Security](/windows/security/threat-protection/windows-defender-security-center/windows-defender-security-center#customize-notifications-from-the-windows-defender-security-center) article.
129
139
130
-
## Additional articles in this deployment collection
0 commit comments