Skip to content

Commit 5e0ed3f

Browse files
authored
Update ASR rules report formatting and instructions
1 parent 3b8979f commit 5e0ed3f

File tree

1 file changed

+46
-49
lines changed

1 file changed

+46
-49
lines changed

defender-endpoint/attack-surface-reduction-rules-report.md

Lines changed: 46 additions & 49 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
- m365-security
1616
- tier2
1717
- mde-asr
18-
ms.date: 06/25/2024
18+
ms.date: 02/17/2025
1919
search.appverid: met150
2020
---
2121

@@ -33,13 +33,13 @@ search.appverid: met150
3333

3434
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
3535

36-
The attack surface reduction rules report provides information about the _attack surface reduction rules_ that are applied to devices in your organization. This report also provides information about:
36+
The attack surface reduction rules report provides information about the attack surface reduction rules that are applied to devices in your organization. This report also provides information about:
3737

3838
- detected threats
3939
- blocked threats
4040
- devices that aren't configured to use the standard protection rules to block threats
4141

42-
Additionally, this report provides an easy-to-use interface that enables you to:
42+
In addition, this report provides an easy-to-use interface that enables you to:
4343

4444
- View threat detections
4545
- View the configuration of the ASR rules
@@ -59,41 +59,38 @@ For more information about individual attack surface reduction rules, see [Attac
5959
To access the attack surface reduction rules report in the Microsoft Defender portal, the following permissions are required:
6060

6161
| Permission name | Permission type |
62-
|:---|:---|
62+
|---|---|
6363
| View Data | Security operations |
6464

6565
> [!IMPORTANT]
6666
> Microsoft recommends that you use roles with the fewest permissions. This helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role.
6767
6868

69-
To Assign these permissions:
70-
71-
1. Sign in to the <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender portal</a> using account with Security administrator or Global administrator role assigned.
69+
To assign these permissions:
7270

73-
1. In the navigation pane, select **Settings** \> **Endpoints** \> **Roles** (under **Permissions**).
71+
1. Sign in to the [Microsoft Defender portal](https://security.microsoft.com].
7472

75-
1. Select the role you'd like to edit.
73+
2. In the navigation pane, select **Settings** \> **Endpoints** \> **Roles** (under **Permissions**).
7674

77-
1. Select **Edit**.
75+
3. Select the role you'd like to edit, and then select **Edit**.
7876

79-
1. In **Edit role**, on the **General** tab, in **Role name**, type a name for the role.
77+
4. In **Edit role**, on the **General** tab, in **Role name**, type a name for the role.
8078

81-
1. In **Description** type a brief summary of the role.
82-
83-
1. In **Permissions**, select **View Data**, and under **View Data** select **Security operations**.
79+
5. In **Description** type a brief summary of the role.
8480

81+
6. In **Permissions**, select **View Data**, and under **View Data** select **Security operations**.
8582

8683
## Navigate to the attack surface reduction rules report
8784

8885
To navigate to the summary cards for the attack surface reduction rules report
8986

90-
1. Open **Microsoft Defender XDR** portal.
91-
1. In the left panel, click**Reports**, and in the main section, under **Reports** select **Security report**.
92-
1. Scroll down to **Devices** to find the **Attack surface reduction rules** summary cards.
87+
1. Open the [Microsoft Defender portal](https://security.microsoft.com).
88+
89+
2. In the navigation pane, select **Reports**. In the main section, under **Reports**, select **Security report**.
9390

94-
The summary report cards for ASR rules are shown in the following figure.
91+
3. Scroll down to **Devices** to find the **Attack surface reduction rules** summary cards. The summary report cards for ASR rules resemble the following image:
9592

96-
>:::image type="content" source="media/attack-surface-reduction-rules-report-summary.png" alt-text="Shows the ASR rules report summary cards" lightbox="media/attack-surface-reduction-rules-report-summary.png":::
93+
:::image type="content" source="media/attack-surface-reduction-rules-report-summary.png" alt-text="Shows the ASR rules report summary cards" lightbox="media/attack-surface-reduction-rules-report-summary.png":::
9794

9895
## ASR rules report summary cards
9996

@@ -104,31 +101,29 @@ The ASR rules report summary is divided into two cards:
104101

105102
### ASR rules detections summary card
106103

107-
Shows a summary of the number of detected threats blocked by ASR rules.
104+
The ASR rules detections summary card shows a summary of the number of detected threats blocked by ASR rules. This card includes two action buttons:
108105

109-
Provides two 'action' buttons:
110-
111-
- View detections - opens the **Attack surface reduction rules** > main **Detections** tab
112-
- Add exclusions - Opens the **Attack surface reduction rules** > main **Exclusions** tab
106+
- **View detections**: Opens the **Detections** tab
107+
- **Add exclusions**: Opens the **Exclusions** tab
113108

114109
:::image type="content" source="media/attack-surface-reduction-rules-report-main-detections-card.png" alt-text="Screenshot that shows the ASR rules report summary detections card." lightbox="media/attack-surface-reduction-rules-report-main-detections-card.png":::
115110

116-
Clicking on the **ASR rules detections** link at the top of the card also opens the main [Attack surface reduction rules Detections tab](#attack-surface-reduction-rules-main-detections-tab).
111+
Selecting the **ASR rules detections** link at the top of the card also opens the main [Attack surface reduction rules Detections tab](#attack-surface-reduction-rules-main-detections-tab).
117112

118113
### ASR rules configuration summary card
119114

120-
**The top section** focuses on three recommended rules, which protect against common attack techniques. This card shows current-state information about the computers in your organization that have the following [Three \(ASR\) standard protection rules](#simplified-standard-protection-option) set in **Block mode**, **Audit mode**, or **off** (not configured).The **Protect devices** button will show full configuration details for only the three rules; customers can quickly take action to enable these rules.
115+
The top section focuses on three recommended rules, which protect against common attack techniques. This card shows current-state information about the computers in your organization that have the following [Three \(ASR\) standard protection rules](#simplified-standard-protection-option) set in **Block mode**, **Audit mode**, or **off** (not configured).The **Protect devices** button will show full configuration details for only the three rules; customers can quickly take action to enable these rules.
121116

122-
**The bottom section** surfaces six rules based on the number of unprotected devices per rule. The "View configuration" button surfaces all configuration details for all ASR rules. The "Add exclusion" button shows the add exclusion page with all detected file/process names listed for Security Operation Center (SOC) to evaluate. The **Add exclusion** page is linked to Microsoft Intune.
117+
The bottom section surfaces six rules based on the number of unprotected devices per rule. The "View configuration" button surfaces all configuration details for all ASR rules. The "Add exclusion" button shows the add exclusion page with all detected file/process names listed for Security Operation Center (SOC) to evaluate. The **Add exclusion** page is linked to Microsoft Intune.
123118

124-
Provides two 'action' buttons:
119+
The card also includes two action buttons:
125120

126-
- View configuration - opens the **Attack surface reduction rules** > main **Detections** tab
127-
- Add exclusions - Opens the **Attack surface reduction rules** > main **Exclusions** tab
121+
- **View configuration**: Opens the **Detections** tab
122+
- **Add exclusions**: Opens the **Exclusions** tab
128123

129124
:::image type="content" source="media/attack-surface-reduction-rules-report-main-detections-configuration-card.png" alt-text="Shows the ASR rules report summary configuration card." lightbox="media/attack-surface-reduction-rules-report-main-detections-configuration-card.png":::
130125

131-
Clicking on the **ASR rules configuration** link at the top of the card also opens the main [Attack surface reduction rules Configuration tab](#attack-surface-reduction-rules-main-configuration-tab).
126+
Selecting the **ASR rules configuration** link at the top of the card also opens the main [Attack surface reduction rules Configuration tab](#attack-surface-reduction-rules-main-configuration-tab).
132127

133128
#### Simplified standard protection option
134129

@@ -141,15 +136,17 @@ The configuration summary card provides a button to **Protect devices** with the
141136
To enable the three standard protection rules:
142137

143138
1. Select **Protect devices**. The main **Configuration** tab opens.
144-
1. On the **Configuration** tab, **Basic rules** automatically toggles from **All rules** to **Standard protection rules** enabled.
145-
1. In the **Devices** list, select the devices for which you want the standard protection rules to apply, and then select **Save**.
139+
140+
2. On the **Configuration** tab, **Basic rules** automatically toggles from **All rules** to **Standard protection rules** enabled.
141+
142+
3. In the **Devices** list, select the devices for which you want the standard protection rules to apply, and then select **Save**.
146143

147144
This card has two other navigation buttons:
148145

149-
- **View configuration** - Opens the **Attack surface reduction rules** > main **Configuration** tab.
150-
- **Add exclusions** - Opens the **Attack surface reduction rules** > main **Exclusions** tab.
146+
- **View configuration**: Opens the **Configuration** tab.
147+
- **Add exclusions**: Opens the **Exclusions** tab.
151148

152-
Clicking on the **ASR rules configuration** link at the top of the card also opens the main [Attack surface reduction rules Configuration tab](#attack-surface-reduction-rules-main-configuration-tab).
149+
Selecting the **ASR rules configuration** link at the top of the card also opens the main [Attack surface reduction rules Configuration tab](#attack-surface-reduction-rules-main-configuration-tab).
153150

154151
## Attack surface reduction rules main tabs
155152

@@ -185,11 +182,11 @@ Filtering provides a way for you to specify what results are returned:
185182
186183
### Attack surface reduction rules main detections tab
187184

188-
- **Audit Detections** Shows how many threat detections were captured by rules set in _Audit_ mode.
189-
- **Blocked Detections** Shows how many threat detections were blocked by rules set in _Block_ mode.
190-
- **Large, consolidated graph** Shows blocked and audited detections.
185+
- **Audit Detections**: Shows how many threat detections were captured by rules set in _Audit_ mode.
186+
- **Blocked Detections**: Shows how many threat detections were blocked by rules set in _Block_ mode.
187+
- **Large, consolidated graph**: Shows blocked and audited detections.
191188

192-
>:::image type="content" source="media/attack-surface-reduction-rules-report-main-detections-tab.png" alt-text="Shows the ASR rules report main detections tab, with _Audit detections_ and _Blocked detections_ outlined." lightbox="media/attack-surface-reduction-rules-report-main-detections-tab.png":::
189+
:::image type="content" source="media/attack-surface-reduction-rules-report-main-detections-tab.png" alt-text="Shows the ASR rules report main detections tab, with _Audit detections_ and _Blocked detections_ outlined." lightbox="media/attack-surface-reduction-rules-report-main-detections-tab.png":::
193190

194191
The graphs provide detection data over the displayed date range, with the capability to hover over a specific location to gather date-specific information.
195192

@@ -256,22 +253,21 @@ These elements are shown in the following figure.
256253
To enable ASR rules:
257254

258255
1. Under **Device**, select the device or devices for which you want to apply ASR rules.
259-
1. In the flyout window, verify your selections and then select **Add to policy**.
260256

261-
The **Configuration** tab and _add rule_ flyout are shown in the following image.
257+
2. In the flyout window, verify your selections and then select **Add to policy**. The **Configuration** tab and **add rule** flyout are shown in the following image.
262258

263-
> [NOTE!]
264-
> If you have devices that require that different ASR rules be applied, you should configure those devices individually.
259+
:::image type="content" source="media/attack-surface-reduction-rules-report-configuration-add-to-policy.png" alt-text="Shows the ASR rules fly-out to add ASR rules to devices" lightbox="media/attack-surface-reduction-rules-report-configuration-add-to-policy.png":::
265260

266-
>:::image type="content" source="media/attack-surface-reduction-rules-report-configuration-add-to-policy.png" alt-text="Shows the ASR rules fly-out to add ASR rules to devices" lightbox="media/attack-surface-reduction-rules-report-configuration-add-to-policy.png":::
261+
> [NOTE!]
262+
> If you have devices that require that different ASR rules be applied, you should configure those devices individually.
267263
268264
### Attack surface reduction rules Add exclusions tab
269265

270266
The **Add exclusions** tab presents a ranked list of detections by file name and provides a method to configure exclusions. By default, **Add exclusions** information is listed for three fields:
271267

272-
- **File name** The name of the file that triggered the ASR rules event.
273-
- **Detections** The total number of detected events for named file. Individual devices can trigger multiple ASR rules events.
274-
- **Devices** The number of devices on which the detection occurred.
268+
- **File name**: The name of the file that triggered the ASR rules event.
269+
- **Detections**: The total number of detected events for named file. Individual devices can trigger multiple ASR rules events.
270+
- **Devices**: The number of devices on which the detection occurred.
275271

276272
>:::image type="content" source="media/attack-surface-reduction-rules-report-exclusion-tab.png" alt-text="Shows the ASR rules report add exclusions tab" lightbox="media/attack-surface-reduction-rules-report-exclusion-tab.png":::
277273
@@ -290,7 +286,7 @@ The Add exclusion page has two buttons for actions that can be used on any detec
290286
- **Add exclusion** which will open Microsoft Intune ASR policy page. For more information, see: [Intune](enable-attack-surface-reduction.md) in "Enable ASR rules alternate configuration methods."
291287
- **Get exclusion paths** which will download file paths in a csv format
292288

293-
>:::image type="content" source="media/attack-surface-reduction-rules-report-main-add-exclusions-flyout.png" alt-text="Shows the ASR rules report add exclusions tab flyout impact summary" lightbox="media/attack-surface-reduction-rules-report-main-add-exclusions-flyout.png":::
289+
:::image type="content" source="media/attack-surface-reduction-rules-report-main-add-exclusions-flyout.png" alt-text="Shows the ASR rules report add exclusions tab flyout impact summary" lightbox="media/attack-surface-reduction-rules-report-main-add-exclusions-flyout.png":::
294290

295291
## See also
296292

@@ -301,4 +297,5 @@ The Add exclusion page has two buttons for actions that can be used on any detec
301297
- [Operationalize attack surface reduction rules](attack-surface-reduction-rules-deployment-operationalize.md)
302298
- [Attack surface reduction \(ASR\) rules report](attack-surface-reduction-rules-report.md)
303299
- [Attack surface reduction rules reference](attack-surface-reduction-rules-reference.md)
300+
304301
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]

0 commit comments

Comments
 (0)