Skip to content

Commit 4514100

Browse files
Merge pull request #5012 from MicrosoftDocs/main
[AutoPublish] main to live - 09/11 19:44 PDT | 09/12 08:14 IST
2 parents ffd6d76 + 8f61a30 commit 4514100

File tree

4 files changed

+272
-33
lines changed

4 files changed

+272
-33
lines changed

defender-endpoint/enable-attack-surface-reduction.md

Lines changed: 40 additions & 33 deletions
Original file line numberDiff line numberDiff line change
@@ -4,8 +4,8 @@ description: Enable attack surface reduction rules to protect your devices from
44
ms.service: defender-endpoint
55
ms.localizationpriority: medium
66
audience: ITPro
7-
author: batamig
8-
ms.author: bagol
7+
author: paulinbar
8+
ms.author: painbar
99
manager: bagol
1010
ms.subservice: asr
1111
ms.topic: how-to
@@ -14,30 +14,30 @@ ms.collection:
1414
- tier2
1515
- mde-asr
1616
ms.custom: admindeeplinkDEFENDER
17+
appliesto:
18+
- Microsoft Defender for Endpoint Plan 1 and Plan 2
19+
- Microsoft Defender XDR
20+
- Microsoft Defender Antivirus
1721
search.appverid: met150
18-
ms.date: 06/05/2025
22+
ms.date: 09/12/2025
1923
---
2024

2125
# Enable attack surface reduction rules
2226

23-
**Applies to:**
24-
25-
- [Microsoft Defender for Endpoint Plan 1](microsoft-defender-endpoint.md)
26-
- [Microsoft Defender for Endpoint Plan 2](microsoft-defender-endpoint.md)
27-
- [Microsoft Defender XDR](/defender-xdr)
28-
- Microsoft Defender Antivirus
27+
[Attack surface reduction rules](attack-surface-reduction.md) help prevent actions that malware often abuses to compromise devices and networks. This article describes how to enable and configure attack surface reduction rules via:
2928

30-
**Platforms**
31-
- Windows
29+
- [Microsoft Intune](#intune)
30+
- [Mobile Device Management (MDM)](#mdm)
31+
- [Microsoft Configuration Manager](#microsoft-configuration-manager)
32+
- [Group policy (GP)](#group-policy)
33+
- [PowerShell](#powershell)
3234

3335
> [!TIP]
3436
> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://go.microsoft.com/fwlink/p/?linkid=2225630)
3537
36-
[Attack surface reduction rules](attack-surface-reduction.md) help prevent actions that malware often abuses to compromise devices and networks.
37-
38-
## Requirements
38+
## Prerequisites
3939

40-
Attack surface reduction features across Windows versions
40+
### Supported operating systems
4141

4242
You can set attack surface reduction rules for devices that are running any of the following editions and versions of Windows:
4343

@@ -53,22 +53,34 @@ You can set attack surface reduction rules for devices that are running any of t
5353
- Windows Server 2025
5454
- Azure Stack HCI OS, version 23H2 and later
5555

56-
To use the entire feature-set of attack surface reduction rules, you need:
56+
### Requirements
5757

58-
- Microsoft Defender Antivirus as primary antivirus. Microsoft Defender Antivirus can't be running in passive mode or be disabled.
58+
To use the entire feature-set of attack surface reduction rules, the following requirements must be met:
5959

60-
- [Real-time protection](/defender-endpoint/configure-real-time-protection-microsoft-defender-antivirus) to be on
60+
- Microsoft Defender Antivirus must be set as the primary antivirus. It must not be running in passive mode or be disabled.
6161

62-
- [Cloud-Delivery Protection](/windows/security/threat-protection/microsoft-defender-antivirus/enable-cloud-protection-microsoft-defender-antivirus) to be on (some rules require Cloud Protection)
62+
- [Real-time protection](/defender-endpoint/configure-real-time-protection-microsoft-defender-antivirus) must be on.
6363

64-
- [Cloud Protection network connectivity](/defender-endpoint/configure-network-connections-microsoft-defender-antivirus)
64+
- [Cloud-Delivery Protection](/windows/security/threat-protection/microsoft-defender-antivirus/enable-cloud-protection-microsoft-defender-antivirus) must be on (some rules require Cloud Protection).
6565

66-
- Microsoft 365 E5 or E3 License
66+
- You must have [Cloud Protection network connectivity](/defender-endpoint/configure-network-connections-microsoft-defender-antivirus)
6767

68-
> [!IMPORTANT]
69-
> The prerequisites listed in this article are necessary in order for Attack Surface Reduction rules to work properly.
68+
- Recommended: Microsoft 365 E5
69+
70+
Although attack surface reduction rules don't require a [Microsoft 365 E5 license](/microsoft-365/commerce/licenses/e3-extra-features-licenses), it is recommended to use attack surface reduction rules with a Microsoft 365 E5 license (or similar licensing SKU) to take advantage of advanced management capabilities, including monitoring, analytics, and workflows available in Defender for Endpoint, as well as reporting and configuration capabilities in the [Microsoft Defender XDR](https://go.microsoft.com/fwlink/p/?linkid=2077139) portal. While these advanced capabilities aren't available with an E3 license, with an E3 license you can still use Event Viewer to review attack surface reduction rule events.
71+
72+
If you have another license, such as Windows Professional or Microsoft 365 E3 that doesn't include advanced monitoring and reporting capabilities, you can develop your own monitoring and reporting tools on top of the events that are generated at each endpoint when attack surface reduction rules are triggered (for example, Event Forwarding).
7073

71-
Although attack surface reduction rules don't require a [Microsoft 365 E5 license](/microsoft-365/commerce/licenses/e3-extra-features-licenses), with Microsoft 365 E5 license, you get advanced management capabilities including monitoring, analytics, and workflows available in Defender for Endpoint, as well as reporting and configuration capabilities in the [Microsoft Defender XDR](https://go.microsoft.com/fwlink/p/?linkid=2077139) portal. These advanced capabilities aren't available with an E3 license, but you can still use Event Viewer to review attack surface reduction rule events.
74+
To learn more about Windows licensing, see [Windows 10 Licensing](https://www.microsoft.com/licensing/product-licensing/windows10?activetab=windows10-pivot:primaryr5) and get the [Volume Licensing guide for Windows 10](https://www.microsoft.com/en-us/download/details.aspx?id=11091).
75+
76+
> [!NOTE]
77+
> Some attack surface reduction rules are only enforced if Office executables are installed under the system-defined %ProgramFiles% or %ProgramFiles(x86)% directories (on most systems, %ProgramFiles% points to C:\Program Files). If Office is installed in a custom path outside one of these system-defined directories, these rules won't apply. The affected rules are:
78+
>
79+
> - Block Office communication applications from creating child processes (26190899-1602-49e8-8b27-eb1d0a1ce869)
80+
> - Block all Office applications from creating child processes (D4F940AB-401B-4EFC-AADC-AD5F3C50688A)
81+
> - Block Office applications from injecting code into other processes (75668C1F-73B5-4CF0-BB93-3ECF5CB7CC84)
82+
83+
## Enabling attack surface reduction rules
7284

7385
Each attack surface reduction rule contains one of four settings:
7486

@@ -77,12 +89,7 @@ Each attack surface reduction rule contains one of four settings:
7789
- **Audit**: Evaluate how the attack surface reduction rule would impact your organization if enabled
7890
- **Warn**: Enable the attack surface reduction rule but allow the end user to bypass the block
7991

80-
We recommend using attack surface reduction rules with a Microsoft 365 E5 license (or similar licensing SKU) to take advantage of the advanced monitoring and reporting capabilities available in [Microsoft Defender for Endpoint](microsoft-defender-endpoint.md) (Defender for Endpoint). However, if you have another license, such as Windows Professional or Microsoft 365 E3 that doesn't include advanced monitoring and reporting capabilities, you can develop your own monitoring and reporting tools on top of the events that are generated at each endpoint when attack surface reduction rules are triggered (for example, Event Forwarding).
81-
82-
> [!TIP]
83-
> To learn more about Windows licensing, see [Windows 10 Licensing](https://www.microsoft.com/licensing/product-licensing/windows10?activetab=windows10-pivot:primaryr5) and get the [Volume Licensing guide for Windows 10](https://www.microsoft.com/en-us/download/details.aspx?id=11091).
84-
85-
You can enable attack surface reduction rules by using any of these methods:
92+
You can enable attack surface reduction rules by using any of the following methods:
8693

8794
- [Microsoft Intune](#intune)
8895
- [Mobile Device Management (MDM)](#mdm)
@@ -92,7 +99,7 @@ You can enable attack surface reduction rules by using any of these methods:
9299

93100
Enterprise-level management such as Intune or Microsoft Configuration Manager is recommended. Enterprise-level management overwrites any conflicting group policy or PowerShell settings on startup.
94101

95-
## Exclude files and folders from attack surface reduction rules
102+
### Exclude files and folders from attack surface reduction rules
96103

97104
You can exclude files and folders from being evaluated by most attack surface reduction rules. This means that even if an attack surface reduction rule determines the file or folder contains malicious behavior, it doesn't block the file from running.
98105

@@ -107,11 +114,11 @@ When adding exclusions, keep these points in mind:
107114
- When deployed through group policy or PowerShell, exclusions apply to all attack surface reduction rules. Using Intune, it's possible to configure an exclusion for a specific attack surface reduction rule. See [Configure attack surface reduction rules per-rule exclusions](attack-surface-reduction-rules-deployment-test.md#configure-attack-surface-reduction-per-rule-exclusions).
108115
- Exclusions can be added based on certificate and file hashes, by allowing specified Defender for Endpoint file and certificate indicators. See [Overview of indicators](indicators-overview.md).
109116

110-
## Policy conflicts
117+
### How policy conflicts are handled
111118

112119
If a conflicting policy is applied via MDM and GP, the setting applied from Group Policy takes precedence.
113120

114-
Attack surface reduction rules for managed devices now support behavior for merging settings from different policies to create a policy superset for each device. Only the settings that aren't in conflict are merged, whereas policy conflicts aren't added to the superset of rules. Previously, if two policies included conflicts for a single setting, both policies were flagged as being in conflict, and no settings from either profile were deployed.
121+
Attack surface reduction rules for managed devices support behavior for merging settings from different policies to create a policy superset for each device. Only the settings that aren't in conflict are merged, whereas policy conflicts aren't added to the superset of rules. Previously, if two policies included conflicts for a single setting, both policies were flagged as being in conflict, and no settings from either profile were deployed.
115122

116123
Attack surface reduction rule merge behavior works as follows:
117124

0 commit comments

Comments
 (0)