You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/attack-surface-reduction-rules-reference.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,7 +15,7 @@ ms.collection:
15
15
- m365-security
16
16
- tier2
17
17
- mde-asr
18
-
ms.date: 12/02/2024
18
+
ms.date: 01/07/2025
19
19
search.appverid: met150
20
20
---
21
21
@@ -51,7 +51,7 @@ Attack surface reduction rules are categorized as one of two types:
51
51
52
52
-**Standard protection rules**: Are the minimum set of rules which Microsoft recommends you always enable, while you're evaluating the effect and configuration needs of the other ASR rules. These rules typically have minimal-to-no noticeable impact on the end user.
53
53
54
-
-**Other rules**: Rules that require some measure of following the documented deployment steps [Plan > Test (audit) > Enable (block/warn modes)], as documented in the [Attack surface reduction rules deployment guide](attack-surface-reduction-rules-deployment.md)
54
+
-**Other rules**: Rules that require some measure of following the documented deployment steps [Plan > Test (audit) > Enable (block/warn modes)], as documented in the [Attack surface reduction rules deployment guide](attack-surface-reduction-rules-deployment.md).
55
55
56
56
For the easiest method to enable the standard protection rules, see: [Simplified standard protection option](attack-surface-reduction-rules-report.md#simplified-standard-protection-option).
57
57
@@ -180,7 +180,7 @@ Toast notifications are generated for all rules in Block mode. Rules in any othe
180
180
181
181
For rules with the "Rule State" specified:
182
182
183
-
- ASR rules with `\ASR Rule, Rule State\` combinations are used to surface alerts (toast notifications) on Microsoft Defender for Endpoint only for devices at cloud block level "High".
183
+
- ASR rules with `\ASR Rule, Rule State\` combinations are used to surface alerts (toast notifications) on Microsoft Defender for Endpoint only for devices at cloud block level "High"
184
184
- Devices that not at the high cloud block level don't generate alerts for any `ASR Rule, Rule State` combinations
185
185
- EDR alerts are generated for ASR rules in the specified states, for devices at cloud block level "High+"
186
186
- Toast notifications occur in block mode only and for devices at cloud block level "High"
@@ -320,7 +320,7 @@ Dependencies: Microsoft Defender Antivirus
320
320
### Block credential stealing from the Windows local security authority subsystem
321
321
322
322
> [!NOTE]
323
-
> If you have [LSA protection](/windows-server/security/credentials-protection-and-management/configuring-additional-lsa-protection) enabled and [Credential Guard](/windows/security/identity-protection/credential-guard)enabled, this attack surface reduction rule is not required.
323
+
> If you have [LSA protection](/windows-server/security/credentials-protection-and-management/configuring-additional-lsa-protection) enabled, this attack surface reduction rule is not required. For a more secure posture, we also recommend enabling [Credential Guard](/windows/security/identity-protection/credential-guard)with the LSA protection.
324
324
325
325
This rule helps prevent credential stealing by locking down Local Security Authority Subsystem Service (LSASS).
326
326
@@ -634,7 +634,7 @@ Dependencies: Microsoft Defender Antivirus
634
634
635
635
### Block Webshell creation for Servers
636
636
637
-
This rule blocks web shell script creation on Microsoft Server, Exchange Role. A web shell script is a specifically crafted script that allows an attacker to control the compromised server. A web shell may include functionalities such as receiving and executing malicious commands, downloading and executing malicious files, stealing and exfiltrating credentials and sensitive information, identifying potential targets etc.
637
+
This rule blocks web shell script creation on Microsoft Server, Exchange Role. A web shell script is a specifically crafted script that allows an attacker to control the compromised server. A web shell may include functionalities such as receiving and executing malicious commands, downloading and executing malicious files, stealing and exfiltrating credentials and sensitive information, and identifying potential targets.
638
638
639
639
Intune name: `Block Webshell creation for Servers`
0 commit comments