You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/attack-surface-reduction-rules-reference.md
+12-12Lines changed: 12 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,7 +15,7 @@ ms.collection:
15
15
- m365-security
16
16
- tier2
17
17
- mde-asr
18
-
ms.date: 04/16/2024
18
+
ms.date: 04/26/2024
19
19
search.appverid: met150
20
20
---
21
21
@@ -113,27 +113,27 @@ The following table lists the supported operating systems for rules that are cur
113
113
>
114
114
> Attack surface reduction rules in Windows Server 2012 R2 and Windows Server 2016 are available for devices onboarded using the modern unified solution package. For more information, see [New functionality in the modern unified solution for Windows Server 2012 R2 and 2016 Preview](/defender-endpoint/configure-server-endpoints#new-functionality-in-the-modern-unified-solution-for-windows-server-2012-r2-and-2016-preview).
|[Block abuse of exploited vulnerable signed drivers](#block-abuse-of-exploited-vulnerable-signed-drivers)| Y | Y | Y <br> version 1803 (Semi-Annual Enterprise Channel) or later | Y | Y |
119
-
|[Block Adobe Reader from creating child processes](#block-adobe-reader-from-creating-child-processes)| Y <br> version 1809 or later <sup>[[3](#fn1)]<sup></sup> | Y | Y | Y | Y |
119
+
|[Block Adobe Reader from creating child processes](#block-adobe-reader-from-creating-child-processes)| Y <br> version 1809 or later <sup>[[3](#fn1)]</sup> | Y | Y | Y | Y |
120
120
|[Block all Office applications from creating child processes](#block-all-office-applications-from-creating-child-processes)| Y | Y | Y | Y | Y |
121
-
|[Block credential stealing from the Windows local security authority subsystem (lsass.exe)](#block-credential-stealing-from-the-windows-local-security-authority-subsystem)| Y <br> version 1803 or later <sup>[[3](#fn1)]<sup></sup> | Y | Y | Y | Y |
121
+
|[Block credential stealing from the Windows local security authority subsystem (lsass.exe)](#block-credential-stealing-from-the-windows-local-security-authority-subsystem)| Y <br> version 1803 or later <sup>[[3](#fn1)]</sup> | Y | Y | Y | Y |
122
122
|[Block executable content from email client and webmail](#block-executable-content-from-email-client-and-webmail)| Y | Y | Y | Y | Y |
123
-
|[Block executable files from running unless they meet a prevalence, age, or trusted list criterion](#block-executable-files-from-running-unless-they-meet-a-prevalence-age-or-trusted-list-criterion)| Y <br> version 1803 or later <sup>[[3](#fn1)]<sup></sup> | Y | Y | Y | Y |
123
+
|[Block executable files from running unless they meet a prevalence, age, or trusted list criterion](#block-executable-files-from-running-unless-they-meet-a-prevalence-age-or-trusted-list-criterion)| Y <br> version 1803 or later <sup>[[3](#fn1)]</sup> | Y | Y | Y | Y |
124
124
|[Block execution of potentially obfuscated scripts](#block-execution-of-potentially-obfuscated-scripts)| Y | Y | Y | Y | Y |
125
-
|[Block JavaScript or VBScript from launching downloaded executable content](#block-javascript-or-vbscript-from-launching-downloaded-executable-content)| Y | Y | Y | N | Y |
126
-
|[Block Office applications from creating executable content](#block-office-applications-from-creating-executable-content)| Y | Y | Y | Y | Y |
125
+
|[Block JavaScript or VBScript from launching downloaded executable content](#block-javascript-or-vbscript-from-launching-downloaded-executable-content)| Y | Y | Y | N |N|
126
+
|[Block Office applications from creating executable content](#block-office-applications-from-creating-executable-content)| Y | Y | Y | Y | Y |
127
127
|[Block Office applications from injecting code into other processes](#block-office-applications-from-injecting-code-into-other-processes)| Y | Y | Y | Y | Y |
128
128
|[Block Office communication application from creating child processes](#block-office-communication-application-from-creating-child-processes)| Y | Y | Y | Y | Y |
129
-
|[Block persistence through Windows Management Instrumentation (WMI) event subscription](#block-persistence-through-wmi-event-subscription)| Y <br> version 1903 (build 18362) or later <sup>[[3](#fn1)]<sup></sup> | Y | Y <br> version 1903 (build 18362) or later | N | Y |
130
-
|[Block process creations originating from PSExec and WMI commands](#block-process-creations-originating-from-psexec-and-wmi-commands)| Y <br> version 1803 or later <sup>[[3](#fn1)]<sup></sup> | Y | Y | Y | Y |
129
+
|[Block persistence through Windows Management Instrumentation (WMI) event subscription](#block-persistence-through-wmi-event-subscription)| Y <br> version 1903 (build 18362) or later <sup>[[3](#fn1)]</sup> | Y | Y <br> version 1903 (build 18362) or later | N |N|
130
+
|[Block process creations originating from PSExec and WMI commands](#block-process-creations-originating-from-psexec-and-wmi-commands)| Y <br> version 1803 or later <sup>[[3](#fn1)]</sup> | Y | Y | Y | Y |
131
131
|[Block rebooting machine in Safe Mode (preview)](#block-rebooting-machine-in-safe-mode-preview)| Y | Y | Y | Y | Y |
132
132
|[Block untrusted and unsigned processes that run from USB](#block-untrusted-and-unsigned-processes-that-run-from-usb)| Y | Y | Y | Y | Y |
133
133
|[Block use of copied or impersonated system tools (preview)](#block-use-of-copied-or-impersonated-system-tools-preview)| Y | Y | Y | Y | Y |
134
134
|[Block Webshell creation for Servers](#block-webshell-creation-for-servers)| N | Y <br>Exchange Role Only | Y <br>Exchange Role Only | Y <br>Exchange Role Only | N |
135
135
|[Block Win32 API calls from Office macros](#block-win32-api-calls-from-office-macros)| Y | N | N | N | N |
136
-
|[Use advanced protection against ransomware](#use-advanced-protection-against-ransomware)| Y <br> version 1803 or later <sup>[[3](#fn1)]<sup></sup> | Y | Y | Y | Y |
136
+
|[Use advanced protection against ransomware](#use-advanced-protection-against-ransomware)| Y <br> version 1803 or later <sup>[[3](#fn1)]</sup> | Y | Y | Y | Y |
137
137
138
138
(<aid="fn1">1</a>) Refers to the modern unified solution for Windows Server 2012 and 2016. For more information, see [Onboard Windows Servers to the Defender for Endpoint service](configure-server-endpoints.md).
139
139
@@ -145,7 +145,7 @@ The following table lists the supported operating systems for rules that are cur
145
145
146
146
Links to information about configuration management system versions referenced in this table are listed below this table.
147
147
148
-
|Rule name | Microsoft Intune | Microsoft Endpoint Configuration Manager |Group Policy<sup>[[1](#fn1)]<sup></sup> | PowerShell<sup>[[1](#fn1)]<sup></sup> |
148
+
|Rule name | Microsoft Intune | Microsoft Endpoint Configuration Manager |Group Policy<sup>[[1](#fn1)]</sup> | PowerShell<sup>[[1](#fn1)]</sup> |
149
149
|---|:---:|:---:|:---:|:---:|
150
150
|[Block abuse of exploited vulnerable signed drivers](#block-abuse-of-exploited-vulnerable-signed-drivers)| Y || Y | Y |
151
151
|[Block Adobe Reader from creating child processes](#block-adobe-reader-from-creating-child-processes)| Y || Y | Y |
@@ -159,7 +159,7 @@ Links to information about configuration management system versions referenced i
159
159
|[Block Office applications from injecting code into other processes](#block-office-applications-from-injecting-code-into-other-processes)| Y |Y <br><br> CB 1710 | Y | Y |
160
160
|[Block Office communication application from creating child processes](#block-office-communication-application-from-creating-child-processes)| Y |Y <br><br> CB 1710 | Y | Y |
161
161
|[Block persistence through WMI event subscription](#block-persistence-through-wmi-event-subscription)|Y ||Y | Y |
162
-
|[Block process creations originating from PSExec and WMI commands](#block-process-creations-originating-from-psexec-and-wmi-commands)| Y ||Y | Y |
162
+
|[Block process creations originating from PSExec and WMI commands](#block-process-creations-originating-from-psexec-and-wmi-commands)| Y ||Y | Y |
163
163
|[Block rebooting machine in Safe Mode (preview)](#block-rebooting-machine-in-safe-mode-preview)| Y || Y | Y |
164
164
|[Block untrusted and unsigned processes that run from USB](#block-untrusted-and-unsigned-processes-that-run-from-usb)| Y |Y <br><br> CB 1802 | Y | Y |
165
165
|[Block use of copied or impersonated system tools (preview)](#block-use-of-copied-or-impersonated-system-tools-preview)| Y || Y | Y |
0 commit comments