You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/troubleshoot-asr-rules.md
+9-57Lines changed: 9 additions & 57 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ ms.localizationpriority: medium
6
6
audience: ITPro
7
7
author: denisebmsft
8
8
ms.author: deniseb
9
-
ms.reviewer:
9
+
ms.reviewer:yongrhee
10
10
manager: deniseb
11
11
ms.custom:
12
12
- mde-asr
@@ -17,7 +17,7 @@ ms.collection:
17
17
- m365-security
18
18
- tier3
19
19
search.appverid: met150
20
-
ms.date: 07/18/2023
20
+
ms.date: 03/10/2025
21
21
---
22
22
23
23
# Report and troubleshoot Defender for Endpoint attack surface reduction rules
@@ -68,63 +68,15 @@ The following screenshot shows the Timeline view of these events on a given endp
68
68
69
69
## How to troubleshoot attack surface reduction rules?
70
70
71
-
The first and most immediate way is to check locally, on a Windows device, which attack surface reduction rules are enabled (and their configuration) is by using the PowerShell cmdlets.
:::image type="content" source="media/getmpreferencescriptnew.png" alt-text="The get mppreference script" lightbox="media/getmpreferencescriptnew.png":::
82
-
83
-
There are multiple attack surface reduction rules active, with different configured actions.
84
-
85
-
To expand the above information on attack surface reduction rules, you can use the properties **AttackSurfaceReductionRules_Ids** and/or **AttackSurfaceReductionRules_Actions**.
:::image type="content" source="media/getmpref-example2new.png" alt-text="The get mppreference example2" lightbox="media/getmpref-example2new.png":::
104
-
105
-
### Querying blocking and auditing events
106
-
107
-
attack surface reduction rule events can be viewed within the Windows Defender log.
108
-
109
-
To access it, open Windows Event Viewer, and browse to **Applications and Services Logs**\>**Microsoft**\>**Windows**\>**Windows Defender**\>**Operational**.
You can also view rule events through the Microsoft Defender Antivirus dedicated command-line tool, called `*mpcmdrun.exe*`, that can be used to manage and configure, and automate tasks if needed.
116
-
117
-
You can find this utility in *%ProgramFiles%\Windows Defender\MpCmdRun.exe*. You must run it from an elevated command prompt (that is, run as Admin).
118
-
119
-
To generate the support information, type *MpCmdRun.exe -getfiles*. After a while, several logs will be packaged into an archive (MpSupportFiles.cab) and made available in *C:\ProgramData\Microsoft\Windows Defender\Support*.
0 commit comments