Skip to content

Commit 3e8d8ed

Browse files
authored
Merge pull request #3925 from YongRhee-MSFT/docs-editor/enable-attack-surface-reductio-1748445794
Update enable-attack-surface-reduction.md
2 parents a431a29 + 33f45d0 commit 3e8d8ed

File tree

1 file changed

+28
-19
lines changed

1 file changed

+28
-19
lines changed

defender-endpoint/enable-attack-surface-reduction.md

Lines changed: 28 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
- mde-asr
1616
ms.custom: admindeeplinkDEFENDER
1717
search.appverid: met150
18-
ms.date: 05/08/2025
18+
ms.date: 06/05/2025
1919
---
2020

2121
# Enable attack surface reduction rules
@@ -54,20 +54,29 @@ You can set attack surface reduction rules for devices that are running any of t
5454

5555
To use the entire feature-set of attack surface reduction rules, you need:
5656

57-
- Microsoft Defender Antivirus as primary antivirus (real-time protection on)
58-
- [Cloud-Delivery Protection](/windows/security/threat-protection/microsoft-defender-antivirus/enable-cloud-protection-microsoft-defender-antivirus) on (some rules require that)
59-
- Windows 10 Enterprise E5 or E3 License
57+
- Microsoft Defender Antivirus as primary antivirus. Microsoft Defender Antivirus can't be running in passive mode or be disabled.
6058

61-
Although attack surface reduction rules don't require a [Windows E5 license](/windows/deployment/deploy-enterprise-licenses), with a Windows E5 license, you get advanced management capabilities including monitoring, analytics, and workflows available in Defender for Endpoint, as well as reporting and configuration capabilities in the [Microsoft Defender XDR](https://go.microsoft.com/fwlink/p/?linkid=2077139) portal. These advanced capabilities aren't available with an E3 license, but you can still use Event Viewer to review attack surface reduction rule events.
59+
- [Real-time protection](/defender-endpoint/configure-real-time-protection-microsoft-defender-antivirus) to be on
60+
61+
- [Cloud-Delivery Protection](/windows/security/threat-protection/microsoft-defender-antivirus/enable-cloud-protection-microsoft-defender-antivirus) to be on (some rules require Cloud Protection)
62+
63+
- [Cloud Protection network connectivity](/defender-endpoint/configure-network-connections-microsoft-defender-antivirus)
64+
65+
- Microsoft 365 E5 or E3 License
66+
67+
> [!IMPORTANT]
68+
> The prerequisites listed in this article are necessary in order for Attack Surface Reduction rules to work properly.
69+
70+
Although attack surface reduction rules don't require a [Microsoft 365 E5 license](/microsoft-365/commerce/licenses/e3-extra-features-licenses), with Microsoft 365 E5 license, you get advanced management capabilities including monitoring, analytics, and workflows available in Defender for Endpoint, as well as reporting and configuration capabilities in the [Microsoft Defender XDR](https://go.microsoft.com/fwlink/p/?linkid=2077139) portal. These advanced capabilities aren't available with an E3 license, but you can still use Event Viewer to review attack surface reduction rule events.
6271

6372
Each attack surface reduction rule contains one of four settings:
6473

65-
- **Not configured** | **Disabled**: Disable the attack surface reduction rule
74+
- **Not configured** or **Disabled**: Disable the attack surface reduction rule
6675
- **Block**: Enable the attack surface reduction rule
6776
- **Audit**: Evaluate how the attack surface reduction rule would impact your organization if enabled
6877
- **Warn**: Enable the attack surface reduction rule but allow the end user to bypass the block
6978

70-
We recommend using attack surface reduction rules with a Windows E5 license (or similar licensing SKU) to take advantage of the advanced monitoring and reporting capabilities available in [Microsoft Defender for Endpoint](microsoft-defender-endpoint.md) (Defender for Endpoint). However, if you have another license, such as Windows Professional or Windows E3 that doesn't include advanced monitoring and reporting capabilities, you can develop your own monitoring and reporting tools on top of the events that are generated at each endpoint when attack surface reduction rules are triggered (for example, Event Forwarding).
79+
We recommend using attack surface reduction rules with a Microsoft 365 E5 license (or similar licensing SKU) to take advantage of the advanced monitoring and reporting capabilities available in [Microsoft Defender for Endpoint](microsoft-defender-endpoint.md) (Defender for Endpoint). However, if you have another license, such as Windows Professional or Microsoft 365 E3 that doesn't include advanced monitoring and reporting capabilities, you can develop your own monitoring and reporting tools on top of the events that are generated at each endpoint when attack surface reduction rules are triggered (for example, Event Forwarding).
7180

7281
> [!TIP]
7382
> To learn more about Windows licensing, see [Windows 10 Licensing](https://www.microsoft.com/licensing/product-licensing/windows10?activetab=windows10-pivot:primaryr5) and get the [Volume Licensing guide for Windows 10](https://www.microsoft.com/en-us/download/details.aspx?id=11091).
@@ -88,15 +97,14 @@ You can exclude files and folders from being evaluated by most attack surface re
8897

8998
> [!IMPORTANT]
9099
> Excluding files or folders can severely reduce the protection provided by attack surface reduction rules. Excluded files are allowed to run, and no report or event are recorded. If attack surface reduction rules are detecting files that you believe shouldn't be detected, you should [use audit mode first to test the rule](attack-surface-reduction-rules-deployment-test.md#step-1-test-attack-surface-reduction-rules-using-audit).
91-
An exclusion is applied only when the excluded application or service starts. For example, if you add an exclusion for an update service that is already running, the update service continues to trigger events until the service is stopped and restarted.
100+
> An exclusion is applied only when the excluded application or service starts. For example, if you add an exclusion for an update service that is already running, the update service continues to trigger events until the service is stopped and restarted.
92101
93102
When adding exclusions, keep these points in mind:
94103

95-
* Exclusions are typically based on individual files or folders (using folder paths or the full path of the file to be excluded).
96-
* Exclusion paths can use environment variables and wildcards. See [Use wildcards in the file name and folder path or extension exclusion lists](configure-extension-file-exclusions-microsoft-defender-antivirus.md#use-wildcards-in-the-file-name-and-folder-path-or-extension-exclusion-lists)
97-
* When deployed through group policy or PowerShell, exclusions apply to all attack surface reduction rules. Using Intune, it's possible to configure an exclusion for a specific attack surface reduction rule. See [Configure attack surface reduction rules per-rule exclusions](attack-surface-reduction-rules-deployment-test.md#configure-attack-surface-reduction-per-rule-exclusions).
98-
99-
* Exclusions can be added based on certificate and file hashes, by allowing specified Defender for Endpoint file and certificate indicators. See [Overview of indicators](indicators-overview.md).
104+
- Exclusions are typically based on individual files or folders (using folder paths or the full path of the file to be excluded).
105+
- Exclusion paths can use environment variables and wildcards. See [Use wildcards in the file name and folder path or extension exclusion lists](configure-extension-file-exclusions-microsoft-defender-antivirus.md#use-wildcards-in-the-file-name-and-folder-path-or-extension-exclusion-lists)
106+
- When deployed through group policy or PowerShell, exclusions apply to all attack surface reduction rules. Using Intune, it's possible to configure an exclusion for a specific attack surface reduction rule. See [Configure attack surface reduction rules per-rule exclusions](attack-surface-reduction-rules-deployment-test.md#configure-attack-surface-reduction-per-rule-exclusions).
107+
- Exclusions can be added based on certificate and file hashes, by allowing specified Defender for Endpoint file and certificate indicators. See [Overview of indicators](indicators-overview.md).
100108

101109
## Policy conflicts
102110

@@ -143,6 +151,7 @@ The following procedures for enabling attack surface reduction rules include ins
143151
- [Block Webshell creation for Servers](/defender-endpoint/attack-surface-reduction-rules-reference), this isn't supported on Windows Server 2012 R2, but it is supported on Windows Server 2016. It only applies to the Exchange server role.
144152

145153
#### Endpoint security policy (Preferred)
154+
146155
1. Select **Endpoint Security** > **Attack surface reduction**. Choose an existing attack surface reduction rule or create a new one. To create a new one, select **Create Policy** and enter information for this profile. For **Profile type**, select **Attack surface reduction rules**. If you've chosen an existing profile, select **Properties** and then select **Settings**.
147156

148157
1. In the **Configuration settings** pane, select **Attack Surface Reduction** and then select the desired setting for each attack surface reduction rule.
@@ -229,17 +238,17 @@ You can use Microsoft Intune OMA-URI to configure custom attack surface reductio
229238

230239
10. In step **5 Applicability Rules** for the following settings, do the following:
231240

232-
1. In **Rule**, select either **Assign profile if**, or **Don't assign profile if**.
241+
1. In **Rule**, select either **Assign profile if**, or **Don't assign profile if**.
233242

234-
2. In **Property**, select the property to which you want this rule to apply.
243+
2. In **Property**, select the property to which you want this rule to apply.
235244

236-
3. In **Value**, enter the applicable value or value range.
245+
3. In **Value**, enter the applicable value or value range.
237246

238-
:::image type="content" source="media/mem07-5-applicability-rules.png" alt-text="The applicability rules in the Microsoft Intune admin center portal." lightbox="media/mem07-5-applicability-rules.png":::
247+
:::image type="content" source="media/mem07-5-applicability-rules.png" alt-text="The applicability rules in the Microsoft Intune admin center portal." lightbox="media/mem07-5-applicability-rules.png":::
239248

240249
11. Select **Next**. In step **6 Review + create**, review the settings and information you've selected and entered, and then select **Create**.
241250

242-
:::image type="content" source="media/mem08-6-review-create.png" alt-text="Screenshot showing the Review and create option in the Microsoft Intune admin center portal." lightbox="media/mem08-6-review-create.png":::
251+
:::image type="content" source="media/mem08-6-review-create.png" alt-text="Screenshot showing the Review and create option in the Microsoft Intune admin center portal." lightbox="media/mem08-6-review-create.png":::
243252

244253
Rules are active and live within minutes.
245254

@@ -318,7 +327,7 @@ Example:
318327
- 2: Audit (Evaluate how the attack surface reduction rule would impact your organization if enabled)
319328
- 6: Warn (Enable the attack surface reduction rule but allow the end-user to bypass the block)
320329

321-
:::image type="content" source="media/asr-rules-gp.png" alt-text="attack surface reduction rules in Group Policy" lightbox="media/asr-rules-gp.png":::
330+
:::image type="content" source="media/asr-rules-gp.png" alt-text="attack surface reduction rules in Group Policy" lightbox="media/asr-rules-gp.png":::
322331

323332
5. To exclude files and folders from attack surface reduction rules, select the **Exclude files and paths from Attack surface reduction rules** setting and set the option to **Enabled**. Select **Show** and enter each file or folder in the **Value name** column. Enter **0** in the **Value** column for each item.
324333

0 commit comments

Comments
 (0)