Skip to content

Commit 6371035

Browse files
authored
Merge pull request #1814 from MicrosoftDocs/main
Publish main to live, Tuesday 10:30 AM PST, 11/05
2 parents 90e19e2 + 1375437 commit 6371035

File tree

6 files changed

+70
-63
lines changed

6 files changed

+70
-63
lines changed

defender-endpoint/attack-surface-reduction-rules-reference.md

Lines changed: 18 additions & 39 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
- m365-security
1616
- tier2
1717
- mde-asr
18-
ms.date: 10/07/2024
18+
ms.date: 11/05/2024
1919
search.appverid: met150
2020
---
2121

@@ -42,6 +42,7 @@ This article provides information about Microsoft Defender for Endpoint attack s
4242
- [Per-rule-descriptions](#per-rule-descriptions)
4343

4444
[!Include[Prerelease information](../includes/prerelease.md)]
45+
4546
[!Include [defender-endpoint-setup-guide.md](../includes/mde-automated-setup-guide.md)]
4647

4748
## Attack surface reduction rules by type
@@ -109,11 +110,10 @@ The following ASR rules DO NOT honor Microsoft Defender for Endpoint Indicators
109110
The following table lists the supported operating systems for rules that are currently released to general availability. The rules are listed alphabetical order in this table.
110111

111112
> [!NOTE]
112-
> Unless otherwise indicated, the minimum Windows10 build is version 1709 (RS3, build 16299) or later; the minimum WindowsServer build is version 1809 or later.
113-
>
114-
> Attack surface reduction rules in WindowsServer2012R2 and WindowsServer2016 are available for devices onboarded using the modern unified solution package. For more information, see [New Windows Server 2012 R2 and 2016 functionality in the modern unified solution](configure-server-endpoints.md#functionality-in-the-modern-unified-solution).
113+
> Unless otherwise indicated, the minimum Windows10 build is version 1709 (RS3, build 16299) or later; the minimum Windows Server build is version 1809 or later.
114+
> Attack surface reduction rules in Windows Server 2012 R2 and Windows Server 2016 are available for devices onboarded using the modern unified solution package. For more information, see [New Windows Server 2012 R2 and 2016 functionality in the modern unified solution](configure-server-endpoints.md#functionality-in-the-modern-unified-solution).
115115
116-
| Rule name| Windows11 <br>and<br> Windows10 | WindowsServer <br> 2022 <br>and<br> WindowsServer <br> 2019 | Windows Server | WindowsServer <br> 2016 <sup>[[1, 2](#fn1)]</sup> | WindowsServer <br> 2012R2 <sup>[[1, 2](#fn1)]</sup> |
116+
| Rule name| Windows 11 <br>and<br> Windows 10 | Windows Server 2022 <br>and<br> Windows Server 2019 | Windows Server | Windows Server 2016 <sup>[[1, 2](#fn1)]</sup> | Windows Server <br> 2012 R2 <sup>[[1, 2](#fn1)]</sup> |
117117
|:---|:---:|:---:|:---:|:---:|:---:|
118118
| [Block abuse of exploited vulnerable signed drivers](#block-abuse-of-exploited-vulnerable-signed-drivers) | Y | Y | Y <br> version 1803 (Semi-Annual Enterprise Channel) or later | Y | Y |
119119
| [Block Adobe Reader from creating child processes](#block-adobe-reader-from-creating-child-processes) | Y <br> version 1809 or later <sup>[[3](#fn1)]</sup> | Y | Y | Y | Y |
@@ -137,7 +137,7 @@ The following table lists the supported operating systems for rules that are cur
137137

138138
(<a id="fn1">1</a>) Refers to the modern unified solution for Windows Server 2012 and 2016. For more information, see [Onboard Windows Servers to the Defender for Endpoint service](configure-server-endpoints.md).
139139

140-
(<a id="fn1">2</a>) For WindowsServer 2016 and WindowsServer 2012R2, the minimum required version of Microsoft Endpoint Configuration Manager is version 2111.
140+
(<a id="fn1">2</a>) For Windows Server 2016 and Windows Server 2012 R2, the minimum required version of Microsoft Endpoint Configuration Manager is version 2111.
141141

142142
(<a id="fn1">3</a>) Version and build number apply only to Windows10.
143143

@@ -258,9 +258,7 @@ The **Block abuse of exploited vulnerable signed drivers** rule doesn't block a
258258

259259
> [!NOTE]
260260
> You can configure this rule using Intune OMA-URI. See [Intune OMA-URI](enable-attack-surface-reduction.md#custom-profile-in-intune) for configuring custom rules.
261-
>
262261
> You can also configure this rule using [PowerShell](enable-attack-surface-reduction.md#powershell).
263-
>
264262
> To have a driver examined, use this Web site to [Submit a driver for analysis](https://www.microsoft.com/en-us/wdsi/driversubmission).
265263
266264
<!--The above link is the 'only link' that exists for having drivers examined. The 'en-us' component is required to make the link work. Any alterations to this link will result in a 404.
@@ -333,11 +331,8 @@ By default the state of this rule is set to block. In most cases, many processes
333331
Enabling this rule doesn't provide additional protection if you have LSA protection enabled since the ASR rule and LSA protection work similarly. However, when LSA protection cannot be enabled, this rule can be configured to provide equivalent protection against malware that target `lsass.exe`.
334332

335333
> [!NOTE]
336-
>
337334
> In this scenario, the ASR rule is classified as "not applicable" in Defender for Endpoint settings in the Microsoft Defender portal.
338-
>
339335
> The *Block credential stealing from the Windows local security authority subsystem* ASR rule doesn't support WARN mode.
340-
>
341336
> In some apps, the code enumerates all running processes and attempts to open them with exhaustive permissions. This rule denies the app's process open action and logs the details to the security event log. This rule can generate a lot of noise. If you have an app that simply enumerates LSASS, but has no real impact in functionality, there is no need to add it to the exclusion list. By itself, this event log entry doesn't necessarily indicate a malicious threat.
342337
343338
Intune name: `Flag credential stealing from the Windows local security authority subsystem`
@@ -375,7 +370,6 @@ Dependencies: Microsoft Defender Antivirus
375370

376371
> [!NOTE]
377372
> The rule **Block executable content from email client and webmail** has the following alternative descriptions, depending on which application you use:
378-
>
379373
> - Intune (Configuration Profiles): Execution of executable content (exe, dll, ps, js, vbs, etc.) dropped from email (webmail/mail client) (no exceptions).
380374
> - Configuration Manager: Block executable content download from email and webmail clients.
381375
> - Group Policy: Block executable content from email client and webmail.
@@ -386,9 +380,7 @@ This rule blocks executable files, such as .exe, .dll, or .scr, from launching.
386380

387381
> [!IMPORTANT]
388382
> You must [enable cloud-delivered protection](/windows/security/threat-protection/microsoft-defender-antivirus/enable-cloud-protection-microsoft-defender-antivirus) to use this rule.
389-
>
390383
> The rule **Block executable files from running unless they meet a prevalence, age, or trusted list criterion** with GUID `01443614-cd74-433a-b99e-2ecdc07bfc25` is owned by Microsoft and is not specified by admins. This rule uses cloud-delivered protection to update its trusted list regularly.
391-
>
392384
> You can specify individual files or folders (using folder paths or fully qualified resource names) but you can't specify which rules or exclusions apply to.
393385
394386
Intune name: `Executables that don't meet a prevalence, age, or trusted list criteria`
@@ -408,8 +400,11 @@ Dependencies: Microsoft Defender Antivirus, Cloud Protection
408400

409401
This rule detects suspicious properties within an obfuscated script.
410402

403+
> [!NOTE]
404+
> PowerShell scripts are now supported for the "Block execution of potentially obfuscated scripts" rule.
405+
411406
> [!IMPORTANT]
412-
> PowerShell scripts are now supported for the "Block execution of potentially obfuscated scripts" rule.
407+
> You must enable cloud-delivered protection to use this rule.
413408
414409
Script obfuscation is a common technique that both malware authors and legitimate applications use to hide intellectual property or decrease script loading times. Malware authors also use obfuscation to make malicious code harder to read, which hampers close scrutiny by humans and security software.
415410

@@ -428,9 +423,7 @@ Dependencies: Microsoft Defender Antivirus, AntiMalware Scan Interface (AMSI)
428423

429424
### Block JavaScript or VBScript from launching downloaded executable content
430425

431-
This rule prevents scripts from launching potentially malicious downloaded content. Malware written in JavaScript or VBScript often acts as a downloader to fetch and launch other malware from the Internet.
432-
433-
Although not common, line-of-business applications sometimes use scripts to download and launch installers.
426+
This rule prevents scripts from launching potentially malicious downloaded content. Malware written in JavaScript or VBScript often acts as a downloader to fetch and launch other malware from the Internet. Although not common, line-of-business applications sometimes use scripts to download and launch installers.
434427

435428
Intune name: `js/vbs executing payload downloaded from Internet (no exceptions)`
436429

@@ -447,9 +440,7 @@ Dependencies: Microsoft Defender Antivirus, AMSI
447440

448441
### Block Office applications from creating executable content
449442

450-
This rule prevents Office apps, including Word, Excel, and PowerPoint, from creating potentially malicious executable content, by blocking malicious code from being written to disk.
451-
452-
Malware that abuses Office as a vector might attempt to break out of Office and save malicious components to disk. These malicious components would survive a computer reboot and persist on the system. Therefore, this rule defends against a common persistence technique. This rule also blocks execution of untrusted files that may have been saved by Office macros that are allowed to run in Office files.
443+
This rule prevents Office apps, including Word, Excel, and PowerPoint, from creating potentially malicious executable content, by blocking malicious code from being written to disk. Malware that abuses Office as a vector might attempt to break out of Office and save malicious components to disk. These malicious components would survive a computer reboot and persist on the system. Therefore, this rule defends against a common persistence technique. This rule also blocks execution of untrusted files that may have been saved by Office macros that are allowed to run in Office files.
453444

454445
Intune name: `Office apps/macros creating executable content`
455446

@@ -474,9 +465,7 @@ This rule blocks code injection attempts from Office apps into other processes.
474465
> [!IMPORTANT]
475466
> This rule requires restarting Microsoft 365 Apps (Office applications) for the configuration changes to take effect.
476467
477-
Attackers might attempt to use Office apps to migrate malicious code into other processes through code injection, so the code can masquerade as a clean process.
478-
479-
There are no known legitimate business purposes for using code injection.
468+
Attackers might attempt to use Office apps to migrate malicious code into other processes through code injection, so the code can masquerade as a clean process. There are no known legitimate business purposes for using code injection.
480469

481470
This rule applies to Word, Excel, OneNote, and PowerPoint.
482471

@@ -495,9 +484,7 @@ Dependencies: Microsoft Defender Antivirus
495484

496485
### Block Office communication application from creating child processes
497486

498-
This rule prevents Outlook from creating child processes, while still allowing legitimate Outlook functions.
499-
500-
This rule protects against social engineering attacks and prevents exploiting code from abusing vulnerabilities in Outlook. It also protects against [Outlook rules and forms exploits](https://blogs.technet.microsoft.com/office365security/defending-against-rules-and-forms-injection/) that attackers can use when a user's credentials are compromised.
487+
This rule prevents Outlook from creating child processes, while still allowing legitimate Outlook functions. This rule protects against social engineering attacks and prevents exploiting code from abusing vulnerabilities in Outlook. It also protects against [Outlook rules and forms exploits](https://blogs.technet.microsoft.com/office365security/defending-against-rules-and-forms-injection/) that attackers can use when a user's credentials are compromised.
501488

502489
> [!NOTE]
503490
> This rule blocks DLP policy tips and ToolTips in Outlook. This rule applies to Outlook and Outlook.com only.
@@ -562,9 +549,7 @@ Dependencies: Microsoft Defender Antivirus
562549

563550
### Block rebooting machine in Safe Mode (preview)
564551

565-
This rule prevents the execution of commands to restart machines in Safe Mode.
566-
567-
Safe Mode is a diagnostic mode that only loads the essential files and drivers needed for Windows to run. However, in Safe Mode, many security products are either disabled or operate in a limited capacity, which allows attackers to further launch tampering commands, or simply execute and encrypt all files on the machine. This rule blocks such attacks by preventing processes from restarting machines in Safe Mode.
552+
This rule prevents the execution of commands to restart machines in Safe Mode. Safe Mode is a diagnostic mode that only loads the essential files and drivers needed for Windows to run. However, in Safe Mode, many security products are either disabled or operate in a limited capacity, which allows attackers to further launch tampering commands, or simply execute and encrypt all files on the machine. This rule blocks such attacks by preventing processes from restarting machines in Safe Mode.
568553

569554
> [!NOTE]
570555
> This capability is currently in preview. Additional upgrades to improve efficacy are under development.
@@ -607,9 +592,7 @@ Dependencies: Microsoft Defender Antivirus
607592

608593
### Block use of copied or impersonated system tools (preview)
609594

610-
This rule blocks the use of executable files that are identified as copies of Windows system tools. These files are either duplicates or impostors of the original system tools.
611-
612-
Some malicious programs may try to copy or impersonate Windows system tools to avoid detection or gain privileges. Allowing such executable files can lead to potential attacks. This rule prevents propagation and execution of such duplicates and impostors of the system tools on Windows machines.
595+
This rule blocks the use of executable files that are identified as copies of Windows system tools. These files are either duplicates or impostors of the original system tools. Some malicious programs may try to copy or impersonate Windows system tools to avoid detection or gain privileges. Allowing such executable files can lead to potential attacks. This rule prevents propagation and execution of such duplicates and impostors of the system tools on Windows machines.
613596

614597
> [!NOTE]
615598
> This capability is currently in preview. Additional upgrades to improve efficacy are under development.
@@ -632,9 +615,7 @@ Dependencies: Microsoft Defender Antivirus
632615

633616
### Block Webshell creation for Servers
634617

635-
This rule blocks web shell script creation on Microsoft Server, Exchange Role.
636-
637-
A web shell script is a specifically crafted script that allows an attacker to control the compromised server. A web shell may include functionalities such as receiving and executing malicious commands, downloading and executing malicious files, stealing and exfiltrating credentials and sensitive information, identifying potential targets etc.
618+
This rule blocks web shell script creation on Microsoft Server, Exchange Role. A web shell script is a specifically crafted script that allows an attacker to control the compromised server. A web shell may include functionalities such as receiving and executing malicious commands, downloading and executing malicious files, stealing and exfiltrating credentials and sensitive information, identifying potential targets etc.
638619

639620
Intune name: `Block Webshell creation for Servers`
640621

@@ -644,9 +625,7 @@ Dependencies: Microsoft Defender Antivirus
644625

645626
### Block Win32 API calls from Office macros
646627

647-
This rule prevents VBA macros from calling Win32 APIs.
648-
649-
Office VBA enables Win32 API calls. Malware can abuse this capability, such as [calling Win32 APIs to launch malicious shellcode](https://www.microsoft.com/security/blog/2018/09/12/office-vba-amsi-parting-the-veil-on-malicious-macros/) without writing anything directly to disk. Most organizations don't rely on the ability to call Win32 APIs in their day-to-day functioning, even if they use macros in other ways.
628+
This rule prevents VBA macros from calling Win32 APIs. Office VBA enables Win32 API calls. Malware can abuse this capability, such as [calling Win32 APIs to launch malicious shellcode](https://www.microsoft.com/security/blog/2018/09/12/office-vba-amsi-parting-the-veil-on-malicious-macros/) without writing anything directly to disk. Most organizations don't rely on the ability to call Win32 APIs in their day-to-day functioning, even if they use macros in other ways.
650629

651630
Intune name: `Win32 imports from Office macro code`
652631

0 commit comments

Comments
 (0)