You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
| Block untrusted and unsigned processes that run from USB || Yes |
75
-
| Block use of copied or impersonated system tools (preview) || Yes |
75
+
| Block use of copied or impersonated system tools|| Yes |
76
76
| Block Webshell creation for Servers || Yes |
77
77
| Block Win32 API calls from Office macros || Yes |
78
78
| Use advanced protection against ransomware || Yes |
@@ -128,9 +128,9 @@ The following table lists the supported operating systems for rules that are cur
128
128
|[Block Office communication application from creating child processes](#block-office-communication-application-from-creating-child-processes)| Y | Y | Y |
129
129
|[Block persistence through Windows Management Instrumentation (WMI) event subscription](#block-persistence-through-wmi-event-subscription)| Y <br> version 1903 (build 18362) or later | Y <br> version 1903 (build 18362) or later | N |
130
130
|[Block process creations originating from PSExec and WMI commands](#block-process-creations-originating-from-psexec-and-wmi-commands)| Y <br> version 1803 or later | Y | Y |
131
-
|[Block rebooting machine in Safe Mode (preview)](#block-rebooting-machine-in-safe-mode-preview)| Y | Y | Y |
131
+
|[Block rebooting machine in Safe Mode](#block-rebooting-machine-in-safe-mode)| Y | Y | Y |
132
132
|[Block untrusted and unsigned processes that run from USB](#block-untrusted-and-unsigned-processes-that-run-from-usb)| Y | Y | Y |
133
-
|[Block use of copied or impersonated system tools (preview)](#block-use-of-copied-or-impersonated-system-tools-preview)| Y | Y | Y |
133
+
|[Block use of copied or impersonated system tools](#block-use-of-copied-or-impersonated-system-tools)| Y | Y | Y |
134
134
|[Block Webshell creation for Servers](#block-webshell-creation-for-servers)| N | Y <br>Exchange role only | Y <br>Exchange role only |
135
135
|[Block Win32 API calls from Office macros](#block-win32-api-calls-from-office-macros)| Y | N | N |
136
136
|[Use advanced protection against ransomware](#use-advanced-protection-against-ransomware)| Y <br> version 1803 or later | Y | Y |
@@ -149,7 +149,7 @@ Links to information about configuration management system versions referenced i
149
149
|[Block Adobe Reader from creating child processes](#block-adobe-reader-from-creating-child-processes)| Y || Y | Y |
150
150
|[Block all Office applications from creating child processes](#block-all-office-applications-from-creating-child-processes)| Y |Y <br><br> CB 1710 | Y | Y |
151
151
|[Block credential stealing from the Windows local security authority subsystem (lsass.exe)](#block-credential-stealing-from-the-windows-local-security-authority-subsystem)| Y | Y <br><br>CB 1802 | Y | Y |
152
-
|[Block executable content from email client and webmail](#block-executable-content-from-email-client-and-webmail)| Y | Y <br><br> CB 1710 | Y |
152
+
|[Block executable content from email client and webmail](#block-executable-content-from-email-client-and-webmail)| Y | Y <br><br> CB 1710 | Y ||
153
153
|[Block executable files from running unless they meet a prevalence, age, or trusted list criterion](#block-executable-files-from-running-unless-they-meet-a-prevalence-age-or-trusted-list-criterion)| Y | Y <br><br> CB 1802 | Y | Y |
154
154
|[Block execution of potentially obfuscated scripts](#block-execution-of-potentially-obfuscated-scripts)| Y |Y <br><br> CB 1710 | Y | Y |
155
155
|[Block JavaScript or VBScript from launching downloaded executable content](#block-javascript-or-vbscript-from-launching-downloaded-executable-content)| Y |Y <br><br> CB 1710 | Y | Y |
@@ -158,9 +158,9 @@ Links to information about configuration management system versions referenced i
158
158
|[Block Office communication application from creating child processes](#block-office-communication-application-from-creating-child-processes)| Y |Y <br><br> CB 1710 | Y | Y |
159
159
|[Block persistence through WMI event subscription](#block-persistence-through-wmi-event-subscription)|Y ||Y | Y |
160
160
|[Block process creations originating from PSExec and WMI commands](#block-process-creations-originating-from-psexec-and-wmi-commands)| Y ||Y | Y |
161
-
|[Block rebooting machine in Safe Mode (preview)](#block-rebooting-machine-in-safe-mode-preview)| Y || Y | Y |
161
+
|[Block rebooting machine in Safe Mode](#block-rebooting-machine-in-safe-mode)| Y || Y | Y |
162
162
|[Block untrusted and unsigned processes that run from USB](#block-untrusted-and-unsigned-processes-that-run-from-usb)| Y |Y <br><br> CB 1802 | Y | Y |
163
-
|[Block use of copied or impersonated system tools (preview)](#block-use-of-copied-or-impersonated-system-tools-preview)| Y || Y | Y |
163
+
|[Block use of copied or impersonated system tools](#block-use-of-copied-or-impersonated-system-tools)| Y || Y | Y |
164
164
|[Block Webshell creation for Servers](#block-webshell-creation-for-servers)| Y || Y | Y |
165
165
|[Block Win32 API calls from Office macros](#block-win32-api-calls-from-office-macros)| Y |Y <br><br> CB 1710 | Y | Y |
166
166
|[Use advanced protection against ransomware](#use-advanced-protection-against-ransomware)| Y |Y <br><br> CB 1802 | Y | Y |
@@ -196,11 +196,11 @@ For rules with the "Rule State" specified:
196
196
|[Block Office applications from creating executable content](#block-office-applications-from-creating-executable-content)|| N | Y |
197
197
|[Block Office applications from injecting code into other processes](#block-office-applications-from-injecting-code-into-other-processes)|| N | Y |
198
198
|[Block Office communication application from creating child processes](#block-office-communication-application-from-creating-child-processes)|| N | Y |
199
-
|[Block persistence through WMI event subscription](#block-persistence-through-wmi-event-subscription)| Audit or Block | Y (in block mode) <br/> N (in audit mode) | Y (in block mode) |
199
+
|[Block persistence through WMI event subscription](#block-persistence-through-wmi-event-subscription)| Audit or Block | Y (in block mode) <br/> N (in audit mode) | Y (in block mode) |
200
200
|[Block process creations originating from PSExec and WMI commands](#block-process-creations-originating-from-psexec-and-wmi-commands)|| N | Y |
201
-
|[Block rebooting machine in Safe Mode (preview)](#block-rebooting-machine-in-safe-mode-preview)|| N | N |
201
+
|[Block rebooting machine in Safe Mode](#block-rebooting-machine-in-safe-mode)|| N | N |
202
202
|[Block untrusted and unsigned processes that run from USB](#block-untrusted-and-unsigned-processes-that-run-from-usb)| Audit or Block | Y (in block mode) <br/> N (in audit mode) | Y (in block mode) |
203
-
|[Block use of copied or impersonated system tools (preview)](#block-use-of-copied-or-impersonated-system-tools-preview)|| N | N |
203
+
|[Block use of copied or impersonated system tools](#block-use-of-copied-or-impersonated-system-tools)|| N | N |
204
204
|[Block Webshell creation for Servers](#block-webshell-creation-for-servers)|| N | N |
205
205
|[Block Win32 API calls from Office macros](#block-win32-api-calls-from-office-macros)|| N | Y |
206
206
|[Use advanced protection against ransomware](#use-advanced-protection-against-ransomware)| Audit or Block | Y (in block mode) <br/> N (in audit mode) | Y (in block mode) |
@@ -222,9 +222,9 @@ For rules with the "Rule State" specified:
222
222
| Block Office communication application from creating child processes | 26190899-1602-49e8-8b27-eb1d0a1ce869 |
223
223
| Block persistence through WMI event subscription <br>* File and folder exclusions not supported. | e6db77e5-3df2-4cf1-b95a-636979351e5b |
224
224
| Block process creations originating from PSExec and WMI commands | d1e49aac-8f56-4280-b9ba-993a6d77406c |
| Block rebooting machine in Safe Mode| 33ddedf1-c6e0-47cb-833e-de6133960387 |
226
226
| Block untrusted and unsigned processes that run from USB | b2b3f03d-6a65-4f7b-a9c7-1c7ef74a9ba4 |
227
-
| Block use of copied or impersonated system tools (preview) | c0033c00-d16d-4114-a5a0-dc9b3a7d2ceb |
227
+
| Block use of copied or impersonated system tools| c0033c00-d16d-4114-a5a0-dc9b3a7d2ceb |
228
228
| Block Webshell creation for Servers | a8f5898e-1dc8-49a9-9878-85004b8a61e6 |
229
229
| Block Win32 API calls from Office macros | 92e97fa1-2edf-4476-bdd6-9dd0b4dddc7b |
230
230
| Use advanced protection against ransomware | c1db55ab-c21a-4637-bb3f-a12568109d35 |
@@ -334,7 +334,7 @@ Enabling this rule doesn't provide additional protection if you have LSA protect
334
334
> 1. ASR audit events don't generate toast notifications. However, since the LSASS ASR rule produces large volume of audit events, almost all of which are safe to ignore when the rule is enabled in block mode, you can choose to skip the audit mode evaluation and proceed to block mode deployment, beginning with a small set of devices and gradually expanding to cover the rest.
335
335
> 2. The rule is designed to suppress block reports/toasts for friendly processes. It's also designed to drop reports for duplicate blocks. As such, the rule is well suited to be enabled in block mode, irrespective of whether toast notifications are enabled or disabled.
336
336
> 3. ASR in warn mode is designed to present users with a block toast notification that includes an "Unblock" button. Due to the "safe to ignore" nature of LSASS ASR blocks and their large volume, WARN mode isn't advisable for this rule (irrespective of whether toast notifications are enabled or disabled).
337
-
> 4. This rule is designed to block the processes from accessing LSASS.EXE process memory. It does not block them from running. If you see processes like svchost.exe being blocked, it is only blocking from accessing LSASS process memory. Thus, svchost.exe and other processes can be safely ignored. The 1 exception is in the known issues below.
337
+
> 4. This rule is designed to block the processes from accessing LSASS.EXE process memory. It doesn't block them from running. If you see processes like svchost.exe being blocked, it's only blocking from accessing LSASS process memory. Thus, svchost.exe and other processes can be safely ignored. The one exception is in the known issues below.
338
338
339
339
> [!NOTE]
340
340
> In this scenario, the ASR rule is classified as "not applicable" in Defender for Endpoint settings in the Microsoft Defender portal.
@@ -368,7 +368,7 @@ For technical support, contact the software vendor.
368
368
This rule blocks email opened within the Microsoft Outlook application, or Outlook.com and other popular webmail providers from propagating the following file types:
369
369
370
370
- Executable files (such as .exe, .dll, or .scr)
371
-
- Script files (such as a PowerShell.ps1, Visual Basic .vbs, or JavaScript .js file)
371
+
- Script files (such as a PowerShell.ps1, Visual Basic .vbs, or JavaScript .js file)
### Block rebooting machine in Safe Mode (preview)
574
+
### Block rebooting machine in Safe Mode
575
575
576
576
This rule prevents the execution of commands to restart machines in Safe Mode. Safe Mode is a diagnostic mode that only loads the essential files and drivers needed for Windows to run. However, in Safe Mode, many security products are either disabled or operate in a limited capacity, which allows attackers to further launch tampering commands, or execute and encrypt all files on the machine. This rule blocks such attacks by preventing processes from restarting machines in Safe Mode.
577
577
578
-
> [!NOTE]
579
-
> This capability is currently in preview. Extra upgrades to improve efficacy are under development.
580
-
581
-
Intune Name: `[PREVIEW] Block rebooting machine in Safe Mode`
578
+
Intune Name: ` Block rebooting machine in Safe Mode`
### Block use of copied or impersonated system tools (preview)
612
+
### Block use of copied or impersonated system tools
616
613
617
614
This rule blocks the use of executable files that are identified as copies of Windows system tools. These files are either duplicates or impostors of the original system tools. Some malicious programs might try to copy or impersonate Windows system tools to avoid detection or gain privileges. Allowing such executable files can lead to potential attacks. This rule prevents propagation and execution of such duplicates and impostors of the system tools on Windows machines.
618
615
619
-
> [!NOTE]
620
-
> This capability is currently in preview. Additional upgrades to improve efficacy are under development.
621
-
622
-
Intune Name: `[PREVIEW] Block use of copied or impersonated system tools`
616
+
Intune Name: `Block use of copied or impersonated system tools`
623
617
624
618
Configuration Manager name: Not yet available
625
619
@@ -701,4 +695,6 @@ Dependencies: Microsoft Defender Antivirus, Cloud Protection
Copy file name to clipboardExpand all lines: defender-endpoint/whats-new-in-microsoft-defender-endpoint.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,11 +3,11 @@ title: What's new in Microsoft Defender for Endpoint
3
3
description: See what features are generally available (GA) in the latest release of Microsoft Defender for Endpoint, and security features in Windows 10 and Windows Server.
4
4
search.appverid: met150
5
5
ms.service: defender-endpoint
6
-
ms.author: deniseb
7
-
author: denisebmsft
6
+
ms.author: ewalsh
7
+
author: emmwalshh
8
8
ms.reviewer: noamhadash, pahuijbr, yongrhee
9
9
ms.localizationpriority: medium
10
-
ms.date: 02/12/2025
10
+
ms.date: 04/04/2025
11
11
manager: deniseb
12
12
audience: ITPro
13
13
ms.collection:
@@ -65,7 +65,7 @@ For more information on what's new with other Microsoft Defender security produc
65
65
66
66
## August 2024
67
67
68
-
-**Network Protection feature is enabled by default** in Microsoft Defender for Endpoint on Android. As a result, users will be able to see a network protection card in the Defender for Endpoint app, along with App Protection and Web Protection. Users are also required to provide location permission to complete the setup process. Admins can change the default value for network protection if they decide not to use it via the Intune App Configuration policies. This feature was already enabled by default earlier on Microsoft Defender for Endpoint on iOS. For more information, see [network protection](/defender-endpoint/android-configure#network-protection).
68
+
-**Network Protection feature is enabled by default** in Microsoft Defender for Endpoint on Android. As a result, users are able to see a network protection card in the Defender for Endpoint app, along with App Protection and Web Protection. Users are also required to provide location permission to complete the setup process. Admins can change the default value for network protection if they decide not to use it via the Intune App Configuration policies. This feature was already enabled by default earlier on Microsoft Defender for Endpoint on iOS. For more information, see [network protection](/defender-endpoint/android-configure#network-protection).
69
69
70
70
## July 2024
71
71
@@ -107,8 +107,8 @@ For more information on what's new with other Microsoft Defender security produc
107
107
108
108
Two new ASR rules are now in public preview:
109
109
110
-
-[Block rebooting machine in Safe Mode (preview)](attack-surface-reduction-rules-reference.md#block-rebooting-machine-in-safe-mode-preview): This rule prevents the execution of commands to restart machines in Safe Mode.
111
-
-[Block use of copied or impersonated system tools (preview)](attack-surface-reduction-rules-reference.md#block-use-of-copied-or-impersonated-system-tools-preview): This rule blocks the use of executable files that are identified as copies of Windows system tools. These files are either duplicates or impostors of the original system tools.
110
+
-[Block rebooting machine in Safe Mode](attack-surface-reduction-rules-reference.md#block-rebooting-machine-in-safe-mode): This rule prevents the execution of commands to restart machines in Safe Mode.
111
+
-[Block use of copied or impersonated system tools](attack-surface-reduction-rules-reference.md#block-use-of-copied-or-impersonated-system-tools): This rule blocks the use of executable files that are identified as copies of Windows system tools. These files are either duplicates or impostors of the original system tools.
112
112
113
113
**Microsoft Defender for Endpoint on macOS** features are in public preview:
0 commit comments