Skip to content

Commit 7f813ac

Browse files
committed
Update enable-attack-surface-reduction.md
1 parent 524d823 commit 7f813ac

File tree

1 file changed

+18
-14
lines changed

1 file changed

+18
-14
lines changed

defender-endpoint/enable-attack-surface-reduction.md

Lines changed: 18 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -98,23 +98,27 @@ When adding exclusions, keep these points in mind:
9898

9999
* Exclusions can be added based on certificate and file hashes, by allowing specified Defender for Endpoint file and certificate indicators. See [Overview of indicators](indicators-overview.md).
100100

101-
## Policy Conflict
101+
## Policy conflicts
102102

103-
1. If a conflicting policy is applied via MDM and GP, the setting applied from GP takes precedence.
103+
If a conflicting policy is applied via MDM and GP, the setting applied from Group Policy takes precedence.
104104

105-
1. Attack surface reduction rules for managed devices now support behavior for merger of settings from different policies, to create a superset of policy for each device. Only the settings that aren't in conflict are merged, while those that are in conflict aren't added to the superset of rules. Previously, if two policies included conflicts for a single setting, both policies were flagged as being in conflict, and no settings from either profile would be deployed. Attack surface reduction rule merge behavior is as follows:
105+
Attack surface reduction rules for managed devices now support behavior for merging settings from different policies to create a policy superset for each device. Only the settings that aren't in conflict are merged, whereas policy conficts aren't added to the superset of rules. Previously, if two policies included conflicts for a single setting, both policies were flagged as being in conflict, and no settings from either profile were deployed.
106106

107-
- Attack surface reduction rules from the following profiles are evaluated for each device to which the rules apply:
107+
Attack surface reduction rule merge behavior works as follows:
108108

109-
- **Devices** > **Configuration profiles** > **Endpoint protection profile** > **Microsoft Defender Exploit Guard** > **Attack Surface Reduction**. (See [Attack Surface Reduction](/mem/intune/protect/endpoint-protection-windows-10#attack-surface-reduction-rules).)
110-
- **Endpoint security** > **Attack surface reduction policy** > **Attack surface reduction rules**. (See [Attack surface reduction rules](/mem/intune/protect/endpoint-security-asr-policy#devices-managed-by-intune).)
111-
- **Endpoint security** > **Security baselines** > **Microsoft Defender ATP Baseline** > **Attack Surface Reduction Rules**. (See [Attack Surface Reduction Rules](/mem/intune/protect/security-baseline-settings-defender-atp#attack-surface-reduction-rules).)
109+
- Attack surface reduction rules from the following profiles are evaluated for each device to which the rules apply:
112110

113-
- Settings that don't have conflicts are added to a superset of policy for the device.
111+
- **Devices** > **Configuration profiles** > **Endpoint protection profile** > **Microsoft Defender Exploit Guard** > **Attack Surface Reduction**. (See [Attack Surface Reduction](/mem/intune/protect/endpoint-protection-windows-10#attack-surface-reduction-rules).)
114112

115-
- When two or more policies have conflicting settings, the conflicting settings aren't added to the combined policy, while settings that don't conflict are added to the superset policy that applies to a device.
113+
- **Endpoint security** > **Attack surface reduction policy** > **Attack surface reduction rules**. (See [Attack surface reduction rules](/mem/intune/protect/endpoint-security-asr-policy#devices-managed-by-intune).)
116114

117-
- Only the configurations for conflicting settings are held back.
115+
- **Endpoint security** > **Security baselines** > **Microsoft Defender ATP Baseline** > **Attack Surface Reduction Rules**. (See [Attack Surface Reduction Rules](/mem/intune/protect/security-baseline-settings-defender-atp#attack-surface-reduction-rules).)
116+
117+
- Settings that don't have conflicts are added to a superset of policy for the device.
118+
119+
- When two or more policies have conflicting settings, the conflicting settings aren't added to the combined policy, while settings that don't conflict are added to the superset policy that applies to a device.
120+
121+
- Only the configurations for conflicting settings are held back.
118122

119123
## Configuration methods
120124

@@ -132,10 +136,10 @@ The following procedures for enabling attack surface reduction rules include ins
132136
### Intune
133137

134138
> [!IMPORTANT]
135-
> If using Intune on Windows Server 2012 R2 and Windows Server 2016 unified version, you need to set these to `Not Configured`, because they're not supported on these OS versions. Otherwise, the following policies fail to apply:
136-
> - Block persistence through Windows Management Instrumentation (WMI) event subscription
137-
> - Block JavaScript or VBScript from launching downloaded executable content
138-
> - Use advanced protection against ransomware
139+
> If you're using Intune on Windows Server 2012 R2 and Windows Server 2016 with the [modern unified solution](onboard-server.md#functionality-in-the-modern-unified-solution-for-windows-server-2016-and-windows-server-2012-r2), you need to set the following attack surface reduction rules to `Not Configured` because they're not supported on these OS versions. Otherwise, these policies fail to apply:
140+
> - [Block persistence through Windows Management Instrumentation (WMI) event subscription](/defender-endpoint/attack-surface-reduction-rules-reference#block-persistence-through-wmi-event-subscription)
141+
> - [Block JavaScript or VBScript from launching downloaded executable content](/defender-endpoint/attack-surface-reduction-rules-reference#block-javascript-or-vbscript-from-launching-downloaded-executable-content)
142+
> - [Use advanced protection against ransomware](/defender-endpoint/attack-surface-reduction-rules-reference#use-advanced-protection-against-ransomware)
139143
140144
#### Endpoint security policy (Preferred)
141145

0 commit comments

Comments
 (0)