Skip to content

Commit 947bd68

Browse files
authored
Merge pull request #5189 from ericlaw1979/docs-editor/attack-surface-reduction-rules-1759355452
Update attack-surface-reduction-rules-reference.md
2 parents c090dc2 + 461f7a5 commit 947bd68

File tree

1 file changed

+10
-10
lines changed

1 file changed

+10
-10
lines changed

defender-endpoint/attack-surface-reduction-rules-reference.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.localizationpriority: medium
77
audience: ITPro
88
author: paulinbar
99
ms.author: painbar
10-
ms.reviewer: sugamar, yongrhee
10+
ms.reviewer: sugamar, ericlaw
1111
manager: bagol
1212
ms.custom: asr
1313
ms.topic: reference
@@ -462,7 +462,7 @@ Dependencies: Microsoft Defender Antivirus, AMSI
462462

463463
### Block Office applications from creating executable content
464464

465-
This rule prevents Office apps, including Word, Excel, and PowerPoint, from creating potentially malicious executable content, by blocking malicious code from being written to disk. Malware that abuses Office as a vector might attempt to break out of Office and save malicious components to disk. These malicious components would survive a computer reboot and persist on the system. Therefore, this rule defends against a common persistence technique. This rule also blocks execution of untrusted files that might have been saved by Office macros that are allowed to run in Office files.
465+
This rule prevents Office apps, including Word, Excel, and PowerPoint, from being used as a vector to persist malicious code on disk. Malware that abuses Office as a vector might attempt to save malicious components to disk that would survive a computer reboot and persist on the system. This rule defends against this persistence technique by blocking access (open/execute) to the code written to disk. This rule also blocks execution of untrusted files that might have been saved by Office macros that are allowed to run in Office files.
466466

467467
Intune name: `Office apps/macros creating executable content`
468468

@@ -579,10 +579,7 @@ Dependencies: Microsoft Defender Antivirus
579579

580580
### Block rebooting machine in Safe Mode
581581

582-
> [!NOTE]
583-
> This feature isn't supported in Threat and Vulnerability Management, so the Attack Surface Reduction rule report will show as "Not applicable" for Windows and Windows Servers.
584-
585-
This rule prevents the execution of commands to restart machines in Safe Mode. Safe Mode is a diagnostic mode that only loads the essential files and drivers needed for Windows to run. However, in Safe Mode, many security products are either disabled or operate in a limited capacity, which allows attackers to further launch tampering commands, or execute and encrypt all files on the machine. This rule blocks such attacks by preventing processes from restarting machines in Safe Mode.
582+
This rule prevents the execution of certain commands to restart machines in Safe Mode. In Windows' Safe Mode, many security products are either disabled or operate in a limited capacity, which allows attackers to further launch tampering commands, or execute and encrypt all files on the machine. This rule blocks such abuse of Safe Mode by preventing commonly abused commands like `bcdedit` and `bootcfg` from restarting machines in Safe Mode. Safe Mode is still accessible manually from the Windows Recovery Environment.
586583

587584
Intune Name: ` Block rebooting machine in Safe Mode`
588585

@@ -598,6 +595,9 @@ Advanced hunting action type:
598595

599596
Dependencies: Microsoft Defender Antivirus
600597

598+
> [!NOTE]
599+
> This rule is not yet recognized by Threat and Vulnerability Management, so the Attack Surface Reduction rule report will show it as "Not applicable".
600+
601601
### Block untrusted and unsigned processes that run from USB
602602

603603
With this rule, admins can prevent unsigned or untrusted executable files from running from USB removable drives, including SD cards. Blocked file types include executable files (such as .exe, .dll, or .scr)
@@ -620,9 +620,6 @@ Dependencies: Microsoft Defender Antivirus
620620

621621
### Block use of copied or impersonated system tools
622622

623-
> [!NOTE]
624-
> This feature isn't supported in Threat and Vulnerability Management, so the Attack Surface Reduction rule report will show as "Not applicable" for Windows and Windows Servers.
625-
626623
This rule blocks the use of executable files that are identified as copies of Windows system tools. These files are either duplicates or impostors of the original system tools. Some malicious programs might try to copy or impersonate Windows system tools to avoid detection or gain privileges. Allowing such executable files can lead to potential attacks. This rule prevents propagation and execution of such duplicates and impostors of the system tools on Windows machines.
627624

628625
Intune Name: `Block use of copied or impersonated system tools`
@@ -641,6 +638,9 @@ Advanced hunting action type:
641638

642639
Dependencies: Microsoft Defender Antivirus
643640

641+
> [!NOTE]
642+
> This rule is not yet recognized by Threat and Vulnerability Management, so the Attack Surface Reduction rule report will show it as "Not applicable".
643+
644644
### Block Webshell creation for Servers
645645

646646
This rule blocks web shell script creation on Microsoft Server, Exchange Role. A web shell script is a crafted script that allows an attacker to control the compromised server.
@@ -654,7 +654,7 @@ GUID: `a8f5898e-1dc8-49a9-9878-85004b8a61e6`
654654
Dependencies: Microsoft Defender Antivirus
655655

656656
> [!NOTE]
657-
> When managing ASR rules using Microsoft Defender for Endpoint security settings management, the setting for **Block Webshell creation for Servers** must be configured as `Not Configured` in Group Policy or other local settings. If this rule is set to any other value (such as `Enabled` or `Disabled`), it could cause conflicts and prevent the policy from applying correctly through security settings management. This feature isn't supported in Threat and Vulnerability Management, so the Attack Surface Reduction rule report will show as "Not applicable" for Exchange servers.
657+
> When managing ASR rules using Microsoft Defender for Endpoint security settings management, the setting for **Block Webshell creation for Servers** must be configured as `Not Configured` in Group Policy or other local settings. If this rule is set to any other value (such as `Enabled` or `Disabled`), it could cause conflicts and prevent the policy from applying correctly through security settings management. This rule is not yet recognized by Threat and Vulnerability Management, so the Attack Surface Reduction rule report will show it as "Not applicable".
658658
659659
### Block Win32 API calls from Office macros
660660

0 commit comments

Comments
 (0)