Skip to content

Commit 6d3aad7

Browse files
authored
Merge branch 'main' into docs-editor/detect-block-potentially-unwan-1748882391
2 parents b363e96 + fdd46dd commit 6d3aad7

File tree

1 file changed

+4
-1
lines changed

1 file changed

+4
-1
lines changed

defender-endpoint/attack-surface-reduction-rules-reference.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
- m365-security
1616
- tier2
1717
- mde-asr
18-
ms.date: 04/30/2025
18+
ms.date: 06/10/2025
1919
search.appverid: met150
2020
---
2121

@@ -651,6 +651,9 @@ GUID: `a8f5898e-1dc8-49a9-9878-85004b8a61e6`
651651

652652
Dependencies: Microsoft Defender Antivirus
653653

654+
> [!NOTE]
655+
> When managing ASR rules using Microsoft Defender for Endpoint security settings management, the setting for **Block Webshell creation for Servers** must be configured as `Not Configured` in Group Policy or other local settings. If this rule is set to any other value (such as `Enabled` or `Disabled`), it could cause conflicts and prevent the policy from applying correctly through security settings management.
656+
654657
### Block Win32 API calls from Office macros
655658

656659
This rule prevents VBA macros from calling Win32 APIs. Office VBA enables Win32 API calls. Malware can abuse this capability, such as [calling Win32 APIs to launch malicious shellcode](https://www.microsoft.com/security/blog/2018/09/12/office-vba-amsi-parting-the-veil-on-malicious-macros/) without writing anything directly to disk. Most organizations don't rely on the ability to call Win32 APIs in their day-to-day functioning, even if they use macros in other ways.

0 commit comments

Comments
 (0)