Skip to content

Commit 6597778

Browse files
authored
Merge pull request #3366 from YongRhee-MSFT/docs-editor/attack-surface-reduction-rules-1743691671
Update attack-surface-reduction-rules-reference.md
2 parents daf5c87 + a486a3c commit 6597778

File tree

2 files changed

+27
-31
lines changed

2 files changed

+27
-31
lines changed

defender-endpoint/attack-surface-reduction-rules-reference.md

Lines changed: 21 additions & 25 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
- m365-security
1616
- tier2
1717
- mde-asr
18-
ms.date: 04/02/2025
18+
ms.date: 04/04/2025
1919
search.appverid: met150
2020
---
2121

@@ -70,9 +70,9 @@ For the easiest method to enable the standard protection rules, see [Simplified
7070
| Block Office communication application from creating child processes | | Yes |
7171
| Block persistence through WMI event subscription | Yes | |
7272
| Block process creations originating from PSExec and WMI commands | | Yes |
73-
| Block rebooting machine in Safe Mode (preview) | | Yes |
73+
| Block rebooting machine in Safe Mode| | Yes |
7474
| Block untrusted and unsigned processes that run from USB | | Yes |
75-
| Block use of copied or impersonated system tools (preview) | | Yes |
75+
| Block use of copied or impersonated system tools| | Yes |
7676
| Block Webshell creation for Servers | | Yes |
7777
| Block Win32 API calls from Office macros | | Yes |
7878
| Use advanced protection against ransomware | | Yes |
@@ -128,9 +128,9 @@ The following table lists the supported operating systems for rules that are cur
128128
| [Block Office communication application from creating child processes](#block-office-communication-application-from-creating-child-processes) | Y | Y | Y |
129129
| [Block persistence through Windows Management Instrumentation (WMI) event subscription](#block-persistence-through-wmi-event-subscription) | Y <br> version 1903 (build 18362) or later | Y <br> version 1903 (build 18362) or later | N |
130130
| [Block process creations originating from PSExec and WMI commands](#block-process-creations-originating-from-psexec-and-wmi-commands) | Y <br> version 1803 or later | Y | Y |
131-
| [Block rebooting machine in Safe Mode (preview)](#block-rebooting-machine-in-safe-mode-preview) | Y | Y | Y |
131+
| [Block rebooting machine in Safe Mode](#block-rebooting-machine-in-safe-mode)| Y | Y | Y |
132132
| [Block untrusted and unsigned processes that run from USB](#block-untrusted-and-unsigned-processes-that-run-from-usb) | Y | Y | Y |
133-
| [Block use of copied or impersonated system tools (preview)](#block-use-of-copied-or-impersonated-system-tools-preview) | Y | Y | Y |
133+
| [Block use of copied or impersonated system tools](#block-use-of-copied-or-impersonated-system-tools)| Y | Y | Y |
134134
| [Block Webshell creation for Servers](#block-webshell-creation-for-servers) | N | Y <br>Exchange role only | Y <br>Exchange role only |
135135
| [Block Win32 API calls from Office macros](#block-win32-api-calls-from-office-macros) | Y | N | N |
136136
| [Use advanced protection against ransomware](#use-advanced-protection-against-ransomware) | Y <br> version 1803 or later | Y | Y |
@@ -149,7 +149,7 @@ Links to information about configuration management system versions referenced i
149149
|[Block Adobe Reader from creating child processes](#block-adobe-reader-from-creating-child-processes) | Y | | Y | Y |
150150
|[Block all Office applications from creating child processes](#block-all-office-applications-from-creating-child-processes) | Y |Y <br><br> CB 1710 | Y | Y |
151151
|[Block credential stealing from the Windows local security authority subsystem (lsass.exe)](#block-credential-stealing-from-the-windows-local-security-authority-subsystem) | Y | Y <br><br>CB 1802 | Y | Y |
152-
|[Block executable content from email client and webmail](#block-executable-content-from-email-client-and-webmail) | Y | Y <br><br> CB 1710 | Y |
152+
|[Block executable content from email client and webmail](#block-executable-content-from-email-client-and-webmail) | Y | Y <br><br> CB 1710 | Y ||
153153
|[Block executable files from running unless they meet a prevalence, age, or trusted list criterion](#block-executable-files-from-running-unless-they-meet-a-prevalence-age-or-trusted-list-criterion) | Y | Y <br><br> CB 1802 | Y | Y |
154154
|[Block execution of potentially obfuscated scripts](#block-execution-of-potentially-obfuscated-scripts) | Y |Y <br><br> CB 1710 | Y | Y |
155155
|[Block JavaScript or VBScript from launching downloaded executable content](#block-javascript-or-vbscript-from-launching-downloaded-executable-content) | Y |Y <br><br> CB 1710 | Y | Y |
@@ -158,9 +158,9 @@ Links to information about configuration management system versions referenced i
158158
|[Block Office communication application from creating child processes](#block-office-communication-application-from-creating-child-processes) | Y |Y <br><br> CB 1710 | Y | Y |
159159
|[Block persistence through WMI event subscription](#block-persistence-through-wmi-event-subscription) |Y | |Y | Y |
160160
|[Block process creations originating from PSExec and WMI commands](#block-process-creations-originating-from-psexec-and-wmi-commands) | Y | |Y | Y |
161-
|[Block rebooting machine in Safe Mode (preview)](#block-rebooting-machine-in-safe-mode-preview) | Y | | Y | Y |
161+
|[Block rebooting machine in Safe Mode](#block-rebooting-machine-in-safe-mode)| Y | | Y | Y |
162162
|[Block untrusted and unsigned processes that run from USB](#block-untrusted-and-unsigned-processes-that-run-from-usb) | Y |Y <br><br> CB 1802 | Y | Y |
163-
|[Block use of copied or impersonated system tools (preview)](#block-use-of-copied-or-impersonated-system-tools-preview) | Y | | Y | Y |
163+
|[Block use of copied or impersonated system tools](#block-use-of-copied-or-impersonated-system-tools)| Y | | Y | Y |
164164
|[Block Webshell creation for Servers](#block-webshell-creation-for-servers) | Y | | Y | Y |
165165
|[Block Win32 API calls from Office macros](#block-win32-api-calls-from-office-macros) | Y |Y <br><br> CB 1710 | Y | Y |
166166
|[Use advanced protection against ransomware](#use-advanced-protection-against-ransomware) | Y |Y <br><br> CB 1802 | Y | Y |
@@ -196,11 +196,11 @@ For rules with the "Rule State" specified:
196196
|[Block Office applications from creating executable content](#block-office-applications-from-creating-executable-content) | | N | Y |
197197
|[Block Office applications from injecting code into other processes](#block-office-applications-from-injecting-code-into-other-processes) | | N | Y |
198198
|[Block Office communication application from creating child processes](#block-office-communication-application-from-creating-child-processes) | | N | Y |
199-
|[Block persistence through WMI event subscription](#block-persistence-through-wmi-event-subscription) | Audit or Block | Y (in block mode) <br/> N (in audit mode) | Y (in block mode) |
199+
|[Block persistence through WMI event subscription](#block-persistence-through-wmi-event-subscription) | Audit or Block | Y (in block mode) <br/> N (in audit mode) | Y (in block mode) |
200200
|[Block process creations originating from PSExec and WMI commands](#block-process-creations-originating-from-psexec-and-wmi-commands) | | N | Y |
201-
|[Block rebooting machine in Safe Mode (preview)](#block-rebooting-machine-in-safe-mode-preview) | | N | N |
201+
|[Block rebooting machine in Safe Mode](#block-rebooting-machine-in-safe-mode)| | N | N |
202202
|[Block untrusted and unsigned processes that run from USB](#block-untrusted-and-unsigned-processes-that-run-from-usb) | Audit or Block | Y (in block mode) <br/> N (in audit mode) | Y (in block mode) |
203-
|[Block use of copied or impersonated system tools (preview)](#block-use-of-copied-or-impersonated-system-tools-preview) | | N | N |
203+
|[Block use of copied or impersonated system tools](#block-use-of-copied-or-impersonated-system-tools)| | N | N |
204204
|[Block Webshell creation for Servers](#block-webshell-creation-for-servers) | | N | N |
205205
|[Block Win32 API calls from Office macros](#block-win32-api-calls-from-office-macros) | | N | Y |
206206
|[Use advanced protection against ransomware](#use-advanced-protection-against-ransomware) | Audit or Block | Y (in block mode) <br/> N (in audit mode) | Y (in block mode) |
@@ -222,9 +222,9 @@ For rules with the "Rule State" specified:
222222
| Block Office communication application from creating child processes | 26190899-1602-49e8-8b27-eb1d0a1ce869 |
223223
| Block persistence through WMI event subscription <br>* File and folder exclusions not supported. | e6db77e5-3df2-4cf1-b95a-636979351e5b |
224224
| Block process creations originating from PSExec and WMI commands | d1e49aac-8f56-4280-b9ba-993a6d77406c |
225-
| Block rebooting machine in Safe Mode (preview) | 33ddedf1-c6e0-47cb-833e-de6133960387 |
225+
| Block rebooting machine in Safe Mode| 33ddedf1-c6e0-47cb-833e-de6133960387 |
226226
| Block untrusted and unsigned processes that run from USB | b2b3f03d-6a65-4f7b-a9c7-1c7ef74a9ba4 |
227-
| Block use of copied or impersonated system tools (preview) | c0033c00-d16d-4114-a5a0-dc9b3a7d2ceb |
227+
| Block use of copied or impersonated system tools| c0033c00-d16d-4114-a5a0-dc9b3a7d2ceb |
228228
| Block Webshell creation for Servers | a8f5898e-1dc8-49a9-9878-85004b8a61e6 |
229229
| Block Win32 API calls from Office macros | 92e97fa1-2edf-4476-bdd6-9dd0b4dddc7b |
230230
| Use advanced protection against ransomware | c1db55ab-c21a-4637-bb3f-a12568109d35 |
@@ -334,7 +334,7 @@ Enabling this rule doesn't provide additional protection if you have LSA protect
334334
> 1. ASR audit events don't generate toast notifications. However, since the LSASS ASR rule produces large volume of audit events, almost all of which are safe to ignore when the rule is enabled in block mode, you can choose to skip the audit mode evaluation and proceed to block mode deployment, beginning with a small set of devices and gradually expanding to cover the rest.
335335
> 2. The rule is designed to suppress block reports/toasts for friendly processes. It's also designed to drop reports for duplicate blocks. As such, the rule is well suited to be enabled in block mode, irrespective of whether toast notifications are enabled or disabled.
336336
> 3. ASR in warn mode is designed to present users with a block toast notification that includes an "Unblock" button. Due to the "safe to ignore" nature of LSASS ASR blocks and their large volume, WARN mode isn't advisable for this rule (irrespective of whether toast notifications are enabled or disabled).
337-
> 4. This rule is designed to block the processes from accessing LSASS.EXE process memory. It does not block them from running. If you see processes like svchost.exe being blocked, it is only blocking from accessing LSASS process memory. Thus, svchost.exe and other processes can be safely ignored. The 1 exception is in the known issues below.
337+
> 4. This rule is designed to block the processes from accessing LSASS.EXE process memory. It doesn't block them from running. If you see processes like svchost.exe being blocked, it's only blocking from accessing LSASS process memory. Thus, svchost.exe and other processes can be safely ignored. The one exception is in the known issues below.
338338
339339
> [!NOTE]
340340
> In this scenario, the ASR rule is classified as "not applicable" in Defender for Endpoint settings in the Microsoft Defender portal.
@@ -368,7 +368,7 @@ For technical support, contact the software vendor.
368368
This rule blocks email opened within the Microsoft Outlook application, or Outlook.com and other popular webmail providers from propagating the following file types:
369369

370370
- Executable files (such as .exe, .dll, or .scr)
371-
- Script files (such as a PowerShell .ps1, Visual Basic .vbs, or JavaScript .js file)
371+
- Script files (such as a PowerShell.ps1, Visual Basic .vbs, or JavaScript .js file)
372372

373373
- Archive files (such as .zip and others)
374374

@@ -571,14 +571,11 @@ Advanced hunting action type:
571571

572572
Dependencies: Microsoft Defender Antivirus
573573

574-
### Block rebooting machine in Safe Mode (preview)
574+
### Block rebooting machine in Safe Mode
575575

576576
This rule prevents the execution of commands to restart machines in Safe Mode. Safe Mode is a diagnostic mode that only loads the essential files and drivers needed for Windows to run. However, in Safe Mode, many security products are either disabled or operate in a limited capacity, which allows attackers to further launch tampering commands, or execute and encrypt all files on the machine. This rule blocks such attacks by preventing processes from restarting machines in Safe Mode.
577577

578-
> [!NOTE]
579-
> This capability is currently in preview. Extra upgrades to improve efficacy are under development.
580-
581-
Intune Name: `[PREVIEW] Block rebooting machine in Safe Mode`
578+
Intune Name: ` Block rebooting machine in Safe Mode`
582579

583580
Configuration Manager name: Not yet available
584581

@@ -612,14 +609,11 @@ Advanced hunting action type:
612609

613610
Dependencies: Microsoft Defender Antivirus
614611

615-
### Block use of copied or impersonated system tools (preview)
612+
### Block use of copied or impersonated system tools
616613

617614
This rule blocks the use of executable files that are identified as copies of Windows system tools. These files are either duplicates or impostors of the original system tools. Some malicious programs might try to copy or impersonate Windows system tools to avoid detection or gain privileges. Allowing such executable files can lead to potential attacks. This rule prevents propagation and execution of such duplicates and impostors of the system tools on Windows machines.
618615

619-
> [!NOTE]
620-
> This capability is currently in preview. Additional upgrades to improve efficacy are under development.
621-
622-
Intune Name: `[PREVIEW] Block use of copied or impersonated system tools`
616+
Intune Name: `Block use of copied or impersonated system tools`
623617

624618
Configuration Manager name: Not yet available
625619

@@ -701,4 +695,6 @@ Dependencies: Microsoft Defender Antivirus, Cloud Protection
701695
- [Attack surface reduction rules reference](attack-surface-reduction-rules-reference.md)
702696
- [Exclusions for Microsoft Defender for Endpoint and Microsoft Defender Antivirus](defender-endpoint-antivirus-exclusions.md)
703697

698+
- [Troubleshoot attack surface reduction rules](/defender-endpoint/troubleshoot-asr)
699+
704700
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]

defender-endpoint/whats-new-in-microsoft-defender-endpoint.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -3,11 +3,11 @@ title: What's new in Microsoft Defender for Endpoint
33
description: See what features are generally available (GA) in the latest release of Microsoft Defender for Endpoint, and security features in Windows 10 and Windows Server.
44
search.appverid: met150
55
ms.service: defender-endpoint
6-
ms.author: deniseb
7-
author: denisebmsft
6+
ms.author: ewalsh
7+
author: emmwalshh
88
ms.reviewer: noamhadash, pahuijbr, yongrhee
99
ms.localizationpriority: medium
10-
ms.date: 02/12/2025
10+
ms.date: 04/04/2025
1111
manager: deniseb
1212
audience: ITPro
1313
ms.collection:
@@ -65,7 +65,7 @@ For more information on what's new with other Microsoft Defender security produc
6565

6666
## August 2024
6767

68-
- **Network Protection feature is enabled by default** in Microsoft Defender for Endpoint on Android. As a result, users will be able to see a network protection card in the Defender for Endpoint app, along with App Protection and Web Protection. Users are also required to provide location permission to complete the setup process. Admins can change the default value for network protection if they decide not to use it via the Intune App Configuration policies. This feature was already enabled by default earlier on Microsoft Defender for Endpoint on iOS. For more information, see [network protection](/defender-endpoint/android-configure#network-protection).
68+
- **Network Protection feature is enabled by default** in Microsoft Defender for Endpoint on Android. As a result, users are able to see a network protection card in the Defender for Endpoint app, along with App Protection and Web Protection. Users are also required to provide location permission to complete the setup process. Admins can change the default value for network protection if they decide not to use it via the Intune App Configuration policies. This feature was already enabled by default earlier on Microsoft Defender for Endpoint on iOS. For more information, see [network protection](/defender-endpoint/android-configure#network-protection).
6969

7070
## July 2024
7171

@@ -107,8 +107,8 @@ For more information on what's new with other Microsoft Defender security produc
107107

108108
Two new ASR rules are now in public preview:
109109

110-
- [Block rebooting machine in Safe Mode (preview)](attack-surface-reduction-rules-reference.md#block-rebooting-machine-in-safe-mode-preview): This rule prevents the execution of commands to restart machines in Safe Mode.
111-
- [Block use of copied or impersonated system tools (preview)](attack-surface-reduction-rules-reference.md#block-use-of-copied-or-impersonated-system-tools-preview): This rule blocks the use of executable files that are identified as copies of Windows system tools. These files are either duplicates or impostors of the original system tools.
110+
- [Block rebooting machine in Safe Mode](attack-surface-reduction-rules-reference.md#block-rebooting-machine-in-safe-mode): This rule prevents the execution of commands to restart machines in Safe Mode.
111+
- [Block use of copied or impersonated system tools](attack-surface-reduction-rules-reference.md#block-use-of-copied-or-impersonated-system-tools): This rule blocks the use of executable files that are identified as copies of Windows system tools. These files are either duplicates or impostors of the original system tools.
112112

113113
**Microsoft Defender for Endpoint on macOS** features are in public preview:
114114

0 commit comments

Comments
 (0)