You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/attack-surface-reduction-rules-deployment-test.md
+47-42Lines changed: 47 additions & 42 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -17,7 +17,7 @@ ms.collection:
17
17
- highpri
18
18
- tier1
19
19
- mde-asr
20
-
ms.date: 03/26/2025
20
+
ms.date: 06/05/2025
21
21
search.appverid: met150
22
22
---
23
23
@@ -28,18 +28,18 @@ search.appverid: met150
28
28
-[Microsoft Defender for Endpoint Plan 1](microsoft-defender-endpoint.md)
29
29
-[Microsoft Defender for Endpoint Plan 2](microsoft-defender-endpoint.md)
30
30
31
-
Testing Microsoft Defender for Endpoint attack surface reduction rules helps you determine if rules impede line-of-business operations prior to enabling any rule. By starting with a small, controlled group, you can limit potential work disruptions as you expand your deployment across your organization.
31
+
Testing Microsoft Defender for Endpoint attack surface reduction rules helps you determine if rules impede line-of-business operations before you enable rules. By starting with a small, controlled group, you can limit potential work disruptions as you expand your deployment across your organization.
32
32
33
-
In this section of the attack surface reduction rules deployment guide, you'll learn how to:
33
+
In this section of the attack surface reduction rules deployment guide, you learn how to:
34
34
35
-
-configure rules using Microsoft Intune
36
-
-use Microsoft Defender for Endpoint attack surface reduction rules reports
-Enable attack surface reduction rules using PowerShell
39
+
-Use Event Viewer for attack surface reduction rules events
40
40
41
41
> [!NOTE]
42
-
> Before you begin testing attack surface reduction rules, it's recommended that you first disable all rules that you have previously set to either **audit** or **enable** (if applicable). See [Attack surface reduction rules reports](attack-surface-reduction-rules-report.md) for information about using the attack surface reduction rules report disabling attack surface reduction rules.
42
+
> Before you begin testing attack surface reduction rules, it's recommended that you first disable all rules that were previously set to either **audit** or **enable** (if applicable). See [Attack surface reduction rules reports](attack-surface-reduction-rules-report.md) for information about using the attack surface reduction rules report disabling attack surface reduction rules.
43
43
44
44
Begin your attack surface reduction rules deployment with ring 1.
45
45
@@ -56,38 +56,44 @@ Begin the testing phase by turning on the attack surface reduction rules with th
56
56
You can use Microsoft Intune Endpoint Security to configure custom attack surface reduction rules.
57
57
58
58
1. Open the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431).
59
+
59
60
2. Go to **Endpoint Security** > **Attack surface reduction**.
61
+
60
62
3. Select **Create Policy**.
63
+
61
64
4. In **Platform**, select **Windows 10, Windows 11, and Windows Server**, and in **Profile**, select **Attack surface reduction rules**.
62
65
63
-
> [!div class="mx-imgBorder"]
64
-
> :::image type="content" source="media/asr-mem-create-profile.png" alt-text="The profile creation page for ASR rules" lightbox="media/asr-mem-create-profile.png":::
66
+
> [!div class="mx-imgBorder"]
67
+
> :::image type="content" source="media/asr-mem-create-profile.png" alt-text="The profile creation page for ASR rules" lightbox="media/asr-mem-create-profile.png":::
65
68
66
69
5. Select **Create**.
70
+
67
71
6. In the **Basics** tab of the **Create profile** pane, in **Name** add a name for your policy. In **Description** add a description for your attack surface reduction rules policy.
72
+
68
73
7. In the **Configuration settings** tab, under **Attack Surface Reduction Rules**, set all rules to **Audit mode**.
69
74
70
-
> [!div class="mx-imgBorder"]
71
-
> :::image type="content" source="media/asr-mem-configuration-settings.png" alt-text="The configuration of attack surface reduction rules to Audit mode" lightbox="media/asr-mem-configuration-settings.png":::
75
+
> [!div class="mx-imgBorder"]
76
+
> :::image type="content" source="media/asr-mem-configuration-settings.png" alt-text="The configuration of attack surface reduction rules to Audit mode" lightbox="media/asr-mem-configuration-settings.png":::
77
+
78
+
> [!NOTE]
79
+
> There are variations in some attack surface reduction rules mode listings; _Blocked_ and _Enabled_ provide the same functionality.
72
80
73
-
> [!NOTE]
74
-
> There are variations in some attack surface reduction rules mode listings; _Blocked_ and _Enabled_ provide the same functionality.
81
+
8.[Optional] In the **Scope tags** pane, you can add tag information to specific devices. You can also use role-based access control and scope tags to make sure that the right admins have the right access and visibility to the correct Intune objects. Learn more: [Use role-based access control (RBAC) and scope tags for distributed IT in Intune](/mem/intune/fundamentals/scope-tags).
75
82
76
-
8.[Optional] In the **Scope tags** pane, you can add tag information to specific devices. You can also use role-based access control and scope tags to make sure that the right admins have the right access and visibility to the right Intune objects. Learn more: [Use role-based access control (RBAC) and scope tags for distributed IT in Intune](/mem/intune/fundamentals/scope-tags).
77
-
9. In the **Assignments** pane, you can deploy or "assign" the profile to your user or device groups. Learn more: [Assign device profiles in Microsoft Intune](/mem/intune/configuration/device-profile-assign#exclude-groups-from-a-profile-assignment)
83
+
9. In the **Assignments** pane, you can deploy or assign the profile to your user or device groups. For more information, see [Assign device profiles in Microsoft Intune](/mem/intune/configuration/device-profile-assign#exclude-groups-from-a-profile-assignment).
78
84
79
-
> [!NOTE]
80
-
> Device group creation is supported in Defender for Endpoint Plan 1 and Plan 2.
85
+
> [!NOTE]
86
+
> Device group creation is supported in Defender for Endpoint Plan 1 and Plan 2.
81
87
82
88
10. Review your settings in the **Review + create** pane. Select **Create** to apply the rules.
> If you have a Microsoft 365 Security E5 or A5, Windows E5 or A5 license, the following link opens the Microsoft Defender 365 Reports >[Attack surface reductions](https://security.microsoft.com/asr?viewid=detections) > Detections tab.
150
+
> If you have a license for Microsoft 365 Security E5 or A5, or Windows E5 or A5, the following link opens the Microsoft Defender portal with detections visible:[Attack surface reduction detections](https://security.microsoft.com/asr?viewid=detections).
145
151
146
152
### Configuration tab
147
153
148
-
Lists—on a per-computer basis—the aggregate state of attack surface reduction rules: Off, Audit, Block.
154
+
Lists, on a per-computer basis, the aggregate state of attack surface reduction rules: Off, Audit, Block.
149
155
150
156
>:::image type="content" source="media/attack-surface-reduction-rules-report-main-configuration-tab.png" alt-text="Screenshot that shows the attack surface reduction rules report main configuration tab." lightbox="media/attack-surface-reduction-rules-report-main-configuration-tab.png":::
151
157
@@ -182,38 +188,39 @@ This tab provides a method to select detected entities (for example, false posit
182
188
> :::image type="content" source="media/asr-defender365-06d.png" alt-text="The pane for exclusion of the detected file" lightbox="media/asr-defender365-06d.png":::
183
189
184
190
> [!NOTE]
185
-
> If you have a Microsoft Defender 365 E5 (or Windows E5?) License, this link will open the Microsoft Defender 365 Reports > Attack surface reductions > [Exclusions](https://security.microsoft.com/asr?viewid=exclusions) tab.
191
+
> If you have an appropriate license and permissions, this link opens the Microsoft Defender portal with [Exclusions visible](https://security.microsoft.com/asr?viewid=exclusions).
186
192
187
193
For more information about using the attack surface reduction rules report, see [Attack surface reduction rules reports](attack-surface-reduction-rules-report.md).
Attack surface reduction rules now provide the capability to configure rule-specific exclusions, known as "Per Rule Exclusions."
192
198
193
-
To configure specific rule exclusions, you have the choices of using the MDE Security Settings Management, Intune, and Group Policy.
199
+
To configure specific rule exclusions, you have the choices of using the Defender for Endpoint Security Settings Management, Intune, and Group Policy.
194
200
195
-
#### Via Intune:
201
+
> [!NOTE]
202
+
> When configuring Attack Surface Reduction per-rule exclusions, keep in mind that specifying only the file or application name (for example, `test1.exe`) isn't sufficient. You must provide the full file or application path (for example, `C:\test1.exe`) to ensure the exclusion is applied correctly.
203
+
204
+
#### Via Intune
196
205
197
206
1. Open the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), and navigate to **Home** > **Endpoint security** > **Attack surface reduction**.
198
207
199
208
2. If it isn't already configured, set the rule for which you want to configure exclusions to **Audit** or **Block**.
200
209
201
-
3. In **ASR Only Per Rule Exclusion**, click the toggle to change from **Not configured** to **Configured.**
210
+
3. In **ASR Only Per Rule Exclusion**, select the toggle to change from **Not configured** to **Configured.**
202
211
203
212
4. Enter the names of the files or application that you want to exclude.
204
213
205
-
5. At the bottom of the **Create profile** wizard, select **Next** and follow the wizard instructions.
214
+
5. At the bottom of the **Create profile** wizard, select **Next**, and then follow the wizard instructions.
206
215
207
216
>:::image type="content" source="media/attack-surface-reduction-rules-report-per-rule-exclusion.png" alt-text="Screenshot that shows the configuration settings for adding ASR per-rule exclusions." lightbox="media/attack-surface-reduction-rules-report-per-rule-exclusion.png":::
208
217
209
218
> [!TIP]
210
219
> Use the checkboxes next to your list of exclusion entries to select items to **Delete**, **Sort**, **Import**, or **Export**.
211
220
212
-
### Via Group Policy
213
-
221
+
#### Via Group Policy
214
222
215
-
216
-
Use Group Policy to set the per-user ASR rule exclusions
223
+
Use Group Policy to set the per-user ASR rule exclusions.
217
224
218
225
1. On your Group Policy management computer, open the [Group Policy Management Console](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc731212(v=ws.11)).
219
226
@@ -227,22 +234,20 @@ Use Group Policy to set the per-user ASR rule exclusions
227
234
228
235
1. Double-click **Apply a list of exclusions to specific attack surface reduction (ASR) rules**, and set the option to **Enabled**.
229
236
230
-
1. Then click on **Show...**
231
-
232
-
1. Under "**Value Name**", enter "GUID for the ASR Rule" without the double quotes
237
+
1. Then select **Show...**.
233
238
234
-
1. Under "**Value**", enter the <drive_letter:\Path\ProcessName>. In order to add multiple processes, it's separated by a greater than sign (>)
239
+
1. Under **Value Name**, enter GUID for the ASR Rule.
235
240
236
-
e.g., "C:\Notepad.exe>c:\regedit.exe>C:\SomeFolder\test.exe" without the double quotes
241
+
1. Under **Value**, enter the <drive_letter:\Path\ProcessName>. In order to add multiple processes, it's separated by a greater than sign (>). For example, `C:\Notepad.exe>c:\regedit.exe>C:\SomeFolder\test.exe`.
237
242
238
243
1. select **OK**. This setting allows the processes that are being blocked by the particular ASR Rule to continue running.
> If policies aren't applying, review [Troubleshoot Microsoft Defender Antivirus settings](/defender-endpoint/troubleshoot-settings).
242
247
243
248
### Use PowerShell as an alternative method to enable attack surface reduction rules
244
249
245
-
Use PowerShell, as an alternative to Intune, to enable attack surface reduction rules in audit mode. This allows you to view a record of apps that would have been blocked if the feature was fully enabled. You can also see how often the rules fire during normal use.
250
+
Use PowerShell, as an alternative to Intune, to enable attack surface reduction rules in audit mode. This configuration allows you to view a record of apps that would have been blocked if the feature was fully enabled. You can also see how often the rules fire during normal use.
246
251
247
252
To enable an attack surface reduction rule in audit mode, use the following PowerShell cmdlet:
248
253
@@ -259,15 +264,15 @@ To enable all the added attack surface reduction rules in audit mode, use the fo
259
264
```
260
265
261
266
> [!TIP]
262
-
> If you want to fully audit how attack surface reduction rules work in your organization, you'll need to use a management tool to deploy this setting to devices in your network.
267
+
> If you want to fully audit how attack surface reduction rules work in your organization, you need to use a management tool to deploy this setting to devices in your network.
263
268
264
269
You can also use Group Policy, Intune, or mobile device management (MDM) configuration service providers (CSPs) to configure and deploy the setting. Learn more in the main [Attack surface reduction rules](attack-surface-reduction.md) article.
## Use Windows Event Viewer Review as an alternative to the attack surface reduction rules reporting page in the Microsoft Defender portal
269
274
270
-
To review apps that would have been blocked, open Event Viewer and filter for Event ID 1121 in the Microsoft-Windows-Windows Defender/Operational log. The following table lists all network protection events.
275
+
To review apps that would be blocked, open Event Viewer and filter for Event ID 1121 in the Microsoft-Windows-Windows Defender/Operational log. The following table lists all network protection events.
0 commit comments