You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -109,11 +110,10 @@ The following ASR rules DO NOT honor Microsoft Defender for Endpoint Indicators
109
110
The following table lists the supported operating systems for rules that are currently released to general availability. The rules are listed alphabetical order in this table.
110
111
111
112
> [!NOTE]
112
-
> Unless otherwise indicated, the minimum Windows10 build is version 1709 (RS3, build 16299) or later; the minimum WindowsServer build is version 1809 or later.
113
-
>
114
-
> Attack surface reduction rules in WindowsServer2012R2 and WindowsServer2016 are available for devices onboarded using the modern unified solution package. For more information, see [New Windows Server 2012 R2 and 2016 functionality in the modern unified solution](configure-server-endpoints.md#functionality-in-the-modern-unified-solution).
113
+
> Unless otherwise indicated, the minimum Windows10 build is version 1709 (RS3, build 16299) or later; the minimum Windows Server build is version 1809 or later.
114
+
> Attack surface reduction rules in Windows Server 2012 R2 and Windows Server 2016 are available for devices onboarded using the modern unified solution package. For more information, see [New Windows Server 2012 R2 and 2016 functionality in the modern unified solution](configure-server-endpoints.md#functionality-in-the-modern-unified-solution).
| Rule name|Windows 11 <br>and<br> Windows 10 | Windows Server 2022 <br>and<br> Windows Server 2019 | Windows Server |Windows Server 2016 <sup>[[1, 2](#fn1)]</sup> |Windows Server <br> 2012 R2 <sup>[[1, 2](#fn1)]</sup> |
117
117
|:---|:---:|:---:|:---:|:---:|:---:|
118
118
|[Block abuse of exploited vulnerable signed drivers](#block-abuse-of-exploited-vulnerable-signed-drivers)| Y | Y | Y <br> version 1803 (Semi-Annual Enterprise Channel) or later | Y | Y |
119
119
|[Block Adobe Reader from creating child processes](#block-adobe-reader-from-creating-child-processes)| Y <br> version 1809 or later <sup>[[3](#fn1)]</sup> | Y | Y | Y | Y |
@@ -137,7 +137,7 @@ The following table lists the supported operating systems for rules that are cur
137
137
138
138
(<aid="fn1">1</a>) Refers to the modern unified solution for Windows Server 2012 and 2016. For more information, see [Onboard Windows Servers to the Defender for Endpoint service](configure-server-endpoints.md).
139
139
140
-
(<aid="fn1">2</a>) For WindowsServer 2016 and WindowsServer 2012R2, the minimum required version of Microsoft Endpoint Configuration Manager is version 2111.
140
+
(<aid="fn1">2</a>) For Windows Server 2016 and Windows Server 2012 R2, the minimum required version of Microsoft Endpoint Configuration Manager is version 2111.
141
141
142
142
(<aid="fn1">3</a>) Version and build number apply only to Windows10.
143
143
@@ -258,9 +258,7 @@ The **Block abuse of exploited vulnerable signed drivers** rule doesn't block a
258
258
259
259
> [!NOTE]
260
260
> You can configure this rule using Intune OMA-URI. See [Intune OMA-URI](enable-attack-surface-reduction.md#custom-profile-in-intune) for configuring custom rules.
261
-
>
262
261
> You can also configure this rule using [PowerShell](enable-attack-surface-reduction.md#powershell).
263
-
>
264
262
> To have a driver examined, use this Web site to [Submit a driver for analysis](https://www.microsoft.com/en-us/wdsi/driversubmission).
265
263
266
264
<!--The above link is the 'only link' that exists for having drivers examined. The 'en-us' component is required to make the link work. Any alterations to this link will result in a 404.
@@ -333,11 +331,8 @@ By default the state of this rule is set to block. In most cases, many processes
333
331
Enabling this rule doesn't provide additional protection if you have LSA protection enabled since the ASR rule and LSA protection work similarly. However, when LSA protection cannot be enabled, this rule can be configured to provide equivalent protection against malware that target `lsass.exe`.
334
332
335
333
> [!NOTE]
336
-
>
337
334
> In this scenario, the ASR rule is classified as "not applicable" in Defender for Endpoint settings in the Microsoft Defender portal.
338
-
>
339
335
> The *Block credential stealing from the Windows local security authority subsystem* ASR rule doesn't support WARN mode.
340
-
>
341
336
> In some apps, the code enumerates all running processes and attempts to open them with exhaustive permissions. This rule denies the app's process open action and logs the details to the security event log. This rule can generate a lot of noise. If you have an app that simply enumerates LSASS, but has no real impact in functionality, there is no need to add it to the exclusion list. By itself, this event log entry doesn't necessarily indicate a malicious threat.
342
337
343
338
Intune name: `Flag credential stealing from the Windows local security authority subsystem`
@@ -375,7 +370,6 @@ Dependencies: Microsoft Defender Antivirus
375
370
376
371
> [!NOTE]
377
372
> The rule **Block executable content from email client and webmail** has the following alternative descriptions, depending on which application you use:
378
-
>
379
373
> - Intune (Configuration Profiles): Execution of executable content (exe, dll, ps, js, vbs, etc.) dropped from email (webmail/mail client) (no exceptions).
380
374
> - Configuration Manager: Block executable content download from email and webmail clients.
381
375
> - Group Policy: Block executable content from email client and webmail.
@@ -386,9 +380,7 @@ This rule blocks executable files, such as .exe, .dll, or .scr, from launching.
386
380
387
381
> [!IMPORTANT]
388
382
> You must [enable cloud-delivered protection](/windows/security/threat-protection/microsoft-defender-antivirus/enable-cloud-protection-microsoft-defender-antivirus) to use this rule.
389
-
>
390
383
> The rule **Block executable files from running unless they meet a prevalence, age, or trusted list criterion** with GUID `01443614-cd74-433a-b99e-2ecdc07bfc25` is owned by Microsoft and is not specified by admins. This rule uses cloud-delivered protection to update its trusted list regularly.
391
-
>
392
384
> You can specify individual files or folders (using folder paths or fully qualified resource names) but you can't specify which rules or exclusions apply to.
393
385
394
386
Intune name: `Executables that don't meet a prevalence, age, or trusted list criteria`
@@ -408,8 +400,11 @@ Dependencies: Microsoft Defender Antivirus, Cloud Protection
408
400
409
401
This rule detects suspicious properties within an obfuscated script.
410
402
403
+
> [!NOTE]
404
+
> PowerShell scripts are now supported for the "Block execution of potentially obfuscated scripts" rule.
405
+
411
406
> [!IMPORTANT]
412
-
> PowerShell scripts are now supported for the "Block execution of potentially obfuscated scripts" rule.
407
+
> You must enable cloud-delivered protection to use this rule.
413
408
414
409
Script obfuscation is a common technique that both malware authors and legitimate applications use to hide intellectual property or decrease script loading times. Malware authors also use obfuscation to make malicious code harder to read, which hampers close scrutiny by humans and security software.
### Block JavaScript or VBScript from launching downloaded executable content
430
425
431
-
This rule prevents scripts from launching potentially malicious downloaded content. Malware written in JavaScript or VBScript often acts as a downloader to fetch and launch other malware from the Internet.
432
-
433
-
Although not common, line-of-business applications sometimes use scripts to download and launch installers.
426
+
This rule prevents scripts from launching potentially malicious downloaded content. Malware written in JavaScript or VBScript often acts as a downloader to fetch and launch other malware from the Internet. Although not common, line-of-business applications sometimes use scripts to download and launch installers.
434
427
435
428
Intune name: `js/vbs executing payload downloaded from Internet (no exceptions)`
436
429
@@ -447,9 +440,7 @@ Dependencies: Microsoft Defender Antivirus, AMSI
447
440
448
441
### Block Office applications from creating executable content
449
442
450
-
This rule prevents Office apps, including Word, Excel, and PowerPoint, from creating potentially malicious executable content, by blocking malicious code from being written to disk.
451
-
452
-
Malware that abuses Office as a vector might attempt to break out of Office and save malicious components to disk. These malicious components would survive a computer reboot and persist on the system. Therefore, this rule defends against a common persistence technique. This rule also blocks execution of untrusted files that may have been saved by Office macros that are allowed to run in Office files.
443
+
This rule prevents Office apps, including Word, Excel, and PowerPoint, from creating potentially malicious executable content, by blocking malicious code from being written to disk. Malware that abuses Office as a vector might attempt to break out of Office and save malicious components to disk. These malicious components would survive a computer reboot and persist on the system. Therefore, this rule defends against a common persistence technique. This rule also blocks execution of untrusted files that may have been saved by Office macros that are allowed to run in Office files.
@@ -474,9 +465,7 @@ This rule blocks code injection attempts from Office apps into other processes.
474
465
> [!IMPORTANT]
475
466
> This rule requires restarting Microsoft 365 Apps (Office applications) for the configuration changes to take effect.
476
467
477
-
Attackers might attempt to use Office apps to migrate malicious code into other processes through code injection, so the code can masquerade as a clean process.
478
-
479
-
There are no known legitimate business purposes for using code injection.
468
+
Attackers might attempt to use Office apps to migrate malicious code into other processes through code injection, so the code can masquerade as a clean process. There are no known legitimate business purposes for using code injection.
480
469
481
470
This rule applies to Word, Excel, OneNote, and PowerPoint.
482
471
@@ -495,9 +484,7 @@ Dependencies: Microsoft Defender Antivirus
495
484
496
485
### Block Office communication application from creating child processes
497
486
498
-
This rule prevents Outlook from creating child processes, while still allowing legitimate Outlook functions.
499
-
500
-
This rule protects against social engineering attacks and prevents exploiting code from abusing vulnerabilities in Outlook. It also protects against [Outlook rules and forms exploits](https://blogs.technet.microsoft.com/office365security/defending-against-rules-and-forms-injection/) that attackers can use when a user's credentials are compromised.
487
+
This rule prevents Outlook from creating child processes, while still allowing legitimate Outlook functions. This rule protects against social engineering attacks and prevents exploiting code from abusing vulnerabilities in Outlook. It also protects against [Outlook rules and forms exploits](https://blogs.technet.microsoft.com/office365security/defending-against-rules-and-forms-injection/) that attackers can use when a user's credentials are compromised.
501
488
502
489
> [!NOTE]
503
490
> This rule blocks DLP policy tips and ToolTips in Outlook. This rule applies to Outlook and Outlook.com only.
@@ -562,9 +549,7 @@ Dependencies: Microsoft Defender Antivirus
562
549
563
550
### Block rebooting machine in Safe Mode (preview)
564
551
565
-
This rule prevents the execution of commands to restart machines in Safe Mode.
566
-
567
-
Safe Mode is a diagnostic mode that only loads the essential files and drivers needed for Windows to run. However, in Safe Mode, many security products are either disabled or operate in a limited capacity, which allows attackers to further launch tampering commands, or simply execute and encrypt all files on the machine. This rule blocks such attacks by preventing processes from restarting machines in Safe Mode.
552
+
This rule prevents the execution of commands to restart machines in Safe Mode. Safe Mode is a diagnostic mode that only loads the essential files and drivers needed for Windows to run. However, in Safe Mode, many security products are either disabled or operate in a limited capacity, which allows attackers to further launch tampering commands, or simply execute and encrypt all files on the machine. This rule blocks such attacks by preventing processes from restarting machines in Safe Mode.
568
553
569
554
> [!NOTE]
570
555
> This capability is currently in preview. Additional upgrades to improve efficacy are under development.
@@ -607,9 +592,7 @@ Dependencies: Microsoft Defender Antivirus
607
592
608
593
### Block use of copied or impersonated system tools (preview)
609
594
610
-
This rule blocks the use of executable files that are identified as copies of Windows system tools. These files are either duplicates or impostors of the original system tools.
611
-
612
-
Some malicious programs may try to copy or impersonate Windows system tools to avoid detection or gain privileges. Allowing such executable files can lead to potential attacks. This rule prevents propagation and execution of such duplicates and impostors of the system tools on Windows machines.
595
+
This rule blocks the use of executable files that are identified as copies of Windows system tools. These files are either duplicates or impostors of the original system tools. Some malicious programs may try to copy or impersonate Windows system tools to avoid detection or gain privileges. Allowing such executable files can lead to potential attacks. This rule prevents propagation and execution of such duplicates and impostors of the system tools on Windows machines.
613
596
614
597
> [!NOTE]
615
598
> This capability is currently in preview. Additional upgrades to improve efficacy are under development.
@@ -632,9 +615,7 @@ Dependencies: Microsoft Defender Antivirus
632
615
633
616
### Block Webshell creation for Servers
634
617
635
-
This rule blocks web shell script creation on Microsoft Server, Exchange Role.
636
-
637
-
A web shell script is a specifically crafted script that allows an attacker to control the compromised server. A web shell may include functionalities such as receiving and executing malicious commands, downloading and executing malicious files, stealing and exfiltrating credentials and sensitive information, identifying potential targets etc.
618
+
This rule blocks web shell script creation on Microsoft Server, Exchange Role. A web shell script is a specifically crafted script that allows an attacker to control the compromised server. A web shell may include functionalities such as receiving and executing malicious commands, downloading and executing malicious files, stealing and exfiltrating credentials and sensitive information, identifying potential targets etc.
638
619
639
620
Intune name: `Block Webshell creation for Servers`
640
621
@@ -644,9 +625,7 @@ Dependencies: Microsoft Defender Antivirus
644
625
645
626
### Block Win32 API calls from Office macros
646
627
647
-
This rule prevents VBA macros from calling Win32 APIs.
648
-
649
-
Office VBA enables Win32 API calls. Malware can abuse this capability, such as [calling Win32 APIs to launch malicious shellcode](https://www.microsoft.com/security/blog/2018/09/12/office-vba-amsi-parting-the-veil-on-malicious-macros/) without writing anything directly to disk. Most organizations don't rely on the ability to call Win32 APIs in their day-to-day functioning, even if they use macros in other ways.
628
+
This rule prevents VBA macros from calling Win32 APIs. Office VBA enables Win32 API calls. Malware can abuse this capability, such as [calling Win32 APIs to launch malicious shellcode](https://www.microsoft.com/security/blog/2018/09/12/office-vba-amsi-parting-the-veil-on-malicious-macros/) without writing anything directly to disk. Most organizations don't rely on the ability to call Win32 APIs in their day-to-day functioning, even if they use macros in other ways.
650
629
651
630
Intune name: `Win32 imports from Office macro code`
0 commit comments