Skip to content

Commit 97e8279

Browse files
authored
Merge pull request #3921 from LeonardoMele-MSFT/docs-editor/attack-surface-reduction-rules-1748434311
Update attack-surface-reduction-rules-deployment-test.md
2 parents b8aa34a + 751f069 commit 97e8279

File tree

1 file changed

+47
-42
lines changed

1 file changed

+47
-42
lines changed

defender-endpoint/attack-surface-reduction-rules-deployment-test.md

Lines changed: 47 additions & 42 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ ms.collection:
1717
- highpri
1818
- tier1
1919
- mde-asr
20-
ms.date: 03/26/2025
20+
ms.date: 06/05/2025
2121
search.appverid: met150
2222
---
2323

@@ -28,18 +28,18 @@ search.appverid: met150
2828
- [Microsoft Defender for Endpoint Plan 1](microsoft-defender-endpoint.md)
2929
- [Microsoft Defender for Endpoint Plan 2](microsoft-defender-endpoint.md)
3030

31-
Testing Microsoft Defender for Endpoint attack surface reduction rules helps you determine if rules impede line-of-business operations prior to enabling any rule. By starting with a small, controlled group, you can limit potential work disruptions as you expand your deployment across your organization.
31+
Testing Microsoft Defender for Endpoint attack surface reduction rules helps you determine if rules impede line-of-business operations before you enable rules. By starting with a small, controlled group, you can limit potential work disruptions as you expand your deployment across your organization.
3232

33-
In this section of the attack surface reduction rules deployment guide, you'll learn how to:
33+
In this section of the attack surface reduction rules deployment guide, you learn how to:
3434

35-
- configure rules using Microsoft Intune
36-
- use Microsoft Defender for Endpoint attack surface reduction rules reports
37-
- configure attack surface reduction rules exclusions
38-
- enable attack surface reduction rules using PowerShell
39-
- use Event Viewer for attack surface reduction rules events
35+
- Configure rules using Microsoft Intune
36+
- Use Microsoft Defender for Endpoint attack surface reduction rules reports
37+
- Configure attack surface reduction rules exclusions
38+
- Enable attack surface reduction rules using PowerShell
39+
- Use Event Viewer for attack surface reduction rules events
4040

4141
> [!NOTE]
42-
> Before you begin testing attack surface reduction rules, it's recommended that you first disable all rules that you have previously set to either **audit** or **enable** (if applicable). See [Attack surface reduction rules reports](attack-surface-reduction-rules-report.md) for information about using the attack surface reduction rules report disabling attack surface reduction rules.
42+
> Before you begin testing attack surface reduction rules, it's recommended that you first disable all rules that were previously set to either **audit** or **enable** (if applicable). See [Attack surface reduction rules reports](attack-surface-reduction-rules-report.md) for information about using the attack surface reduction rules report disabling attack surface reduction rules.
4343
4444
Begin your attack surface reduction rules deployment with ring 1.
4545

@@ -56,38 +56,44 @@ Begin the testing phase by turning on the attack surface reduction rules with th
5656
You can use Microsoft Intune Endpoint Security to configure custom attack surface reduction rules.
5757

5858
1. Open the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431).
59+
5960
2. Go to **Endpoint Security** > **Attack surface reduction**.
61+
6062
3. Select **Create Policy**.
63+
6164
4. In **Platform**, select **Windows 10, Windows 11, and Windows Server**, and in **Profile**, select **Attack surface reduction rules**.
6265

63-
> [!div class="mx-imgBorder"]
64-
> :::image type="content" source="media/asr-mem-create-profile.png" alt-text="The profile creation page for ASR rules" lightbox="media/asr-mem-create-profile.png":::
66+
> [!div class="mx-imgBorder"]
67+
> :::image type="content" source="media/asr-mem-create-profile.png" alt-text="The profile creation page for ASR rules" lightbox="media/asr-mem-create-profile.png":::
6568
6669
5. Select **Create**.
70+
6771
6. In the **Basics** tab of the **Create profile** pane, in **Name** add a name for your policy. In **Description** add a description for your attack surface reduction rules policy.
72+
6873
7. In the **Configuration settings** tab, under **Attack Surface Reduction Rules**, set all rules to **Audit mode**.
6974

70-
> [!div class="mx-imgBorder"]
71-
> :::image type="content" source="media/asr-mem-configuration-settings.png" alt-text="The configuration of attack surface reduction rules to Audit mode" lightbox="media/asr-mem-configuration-settings.png":::
75+
> [!div class="mx-imgBorder"]
76+
> :::image type="content" source="media/asr-mem-configuration-settings.png" alt-text="The configuration of attack surface reduction rules to Audit mode" lightbox="media/asr-mem-configuration-settings.png":::
77+
78+
> [!NOTE]
79+
> There are variations in some attack surface reduction rules mode listings; _Blocked_ and _Enabled_ provide the same functionality.
7280
73-
> [!NOTE]
74-
> There are variations in some attack surface reduction rules mode listings; _Blocked_ and _Enabled_ provide the same functionality.
81+
8. [Optional] In the **Scope tags** pane, you can add tag information to specific devices. You can also use role-based access control and scope tags to make sure that the right admins have the right access and visibility to the correct Intune objects. Learn more: [Use role-based access control (RBAC) and scope tags for distributed IT in Intune](/mem/intune/fundamentals/scope-tags).
7582

76-
8. [Optional] In the **Scope tags** pane, you can add tag information to specific devices. You can also use role-based access control and scope tags to make sure that the right admins have the right access and visibility to the right Intune objects. Learn more: [Use role-based access control (RBAC) and scope tags for distributed IT in Intune](/mem/intune/fundamentals/scope-tags).
77-
9. In the **Assignments** pane, you can deploy or "assign" the profile to your user or device groups. Learn more: [Assign device profiles in Microsoft Intune](/mem/intune/configuration/device-profile-assign#exclude-groups-from-a-profile-assignment)
83+
9. In the **Assignments** pane, you can deploy or assign the profile to your user or device groups. For more information, see [Assign device profiles in Microsoft Intune](/mem/intune/configuration/device-profile-assign#exclude-groups-from-a-profile-assignment).
7884

79-
> [!NOTE]
80-
> Device group creation is supported in Defender for Endpoint Plan 1 and Plan 2.
85+
> [!NOTE]
86+
> Device group creation is supported in Defender for Endpoint Plan 1 and Plan 2.
8187
8288
10. Review your settings in the **Review + create** pane. Select **Create** to apply the rules.
8389

84-
> [!div class="mx-imgBorder"]
85-
> :::image type="content" source="media/asr-mem-review-create.png" alt-text="The Create profile page" lightbox="media/asr-mem-review-create.png":::
90+
> [!div class="mx-imgBorder"]
91+
> :::image type="content" source="media/asr-mem-review-create.png" alt-text="The Create profile page" lightbox="media/asr-mem-review-create.png":::
8692
8793
Your new attack surface reduction policy for attack surface reduction rules is listed in **Endpoint security | Attack surface reduction**.
8894

8995
> [!div class="mx-imgBorder"]
90-
> :::image type="content" source="media/asr-mem-my-asr-rules.png" alt-text=" The Attack surface reduction page" lightbox="media/asr-mem-my-asr-rules.png":::
96+
> :::image type="content" source="media/asr-mem-my-asr-rules.png" alt-text=" The Attack surface reduction page" lightbox="media/asr-mem-my-asr-rules.png":::
9197
9298
<a name='step-2-understand-the-asr-rules-reporting-page-in-the-microsoft-365-defender-portal'></a>
9399

@@ -141,11 +147,11 @@ The **GroupBy** returns results set to the following groups:
141147
> :::image type="content" source="media/asr-defender365-filter.png" alt-text="The Attack surface reduction rules detections filter on rules" lightbox="media/asr-defender365-filter.png":::
142148
143149
> [!NOTE]
144-
> If you have a Microsoft 365 Security E5 or A5, Windows E5 or A5 license, the following link opens the Microsoft Defender 365 Reports > [Attack surface reductions](https://security.microsoft.com/asr?viewid=detections) > Detections tab.
150+
> If you have a license for Microsoft 365 Security E5 or A5, or Windows E5 or A5, the following link opens the Microsoft Defender portal with detections visible: [Attack surface reduction detections](https://security.microsoft.com/asr?viewid=detections).
145151
146152
### Configuration tab
147153

148-
Listson a per-computer basisthe aggregate state of attack surface reduction rules: Off, Audit, Block.
154+
Lists, on a per-computer basis, the aggregate state of attack surface reduction rules: Off, Audit, Block.
149155

150156
>:::image type="content" source="media/attack-surface-reduction-rules-report-main-configuration-tab.png" alt-text="Screenshot that shows the attack surface reduction rules report main configuration tab." lightbox="media/attack-surface-reduction-rules-report-main-configuration-tab.png":::
151157
@@ -182,38 +188,39 @@ This tab provides a method to select detected entities (for example, false posit
182188
> :::image type="content" source="media/asr-defender365-06d.png" alt-text="The pane for exclusion of the detected file" lightbox="media/asr-defender365-06d.png":::
183189
184190
> [!NOTE]
185-
> If you have a Microsoft Defender 365 E5 (or Windows E5?) License, this link will open the Microsoft Defender 365 Reports > Attack surface reductions > [Exclusions](https://security.microsoft.com/asr?viewid=exclusions) tab.
191+
> If you have an appropriate license and permissions, this link opens the Microsoft Defender portal with [Exclusions visible](https://security.microsoft.com/asr?viewid=exclusions).
186192
187193
For more information about using the attack surface reduction rules report, see [Attack surface reduction rules reports](attack-surface-reduction-rules-report.md).
188194

189195
## Configure attack surface reduction per-rule exclusions
190196

191197
Attack surface reduction rules now provide the capability to configure rule-specific exclusions, known as "Per Rule Exclusions."
192198

193-
To configure specific rule exclusions, you have the choices of using the MDE Security Settings Management, Intune, and Group Policy.
199+
To configure specific rule exclusions, you have the choices of using the Defender for Endpoint Security Settings Management, Intune, and Group Policy.
194200

195-
#### Via Intune:
201+
> [!NOTE]
202+
> When configuring Attack Surface Reduction per-rule exclusions, keep in mind that specifying only the file or application name (for example, `test1.exe`) isn't sufficient. You must provide the full file or application path (for example, `C:\test1.exe`) to ensure the exclusion is applied correctly.
203+
204+
#### Via Intune
196205

197206
1. Open the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), and navigate to **Home** > **Endpoint security** > **Attack surface reduction**.
198207

199208
2. If it isn't already configured, set the rule for which you want to configure exclusions to **Audit** or **Block**.
200209

201-
3. In **ASR Only Per Rule Exclusion**, click the toggle to change from **Not configured** to **Configured.**
210+
3. In **ASR Only Per Rule Exclusion**, select the toggle to change from **Not configured** to **Configured.**
202211

203212
4. Enter the names of the files or application that you want to exclude.
204213

205-
5. At the bottom of the **Create profile** wizard, select **Next** and follow the wizard instructions.
214+
5. At the bottom of the **Create profile** wizard, select **Next**, and then follow the wizard instructions.
206215

207216
>:::image type="content" source="media/attack-surface-reduction-rules-report-per-rule-exclusion.png" alt-text="Screenshot that shows the configuration settings for adding ASR per-rule exclusions." lightbox="media/attack-surface-reduction-rules-report-per-rule-exclusion.png":::
208217
209218
> [!TIP]
210219
> Use the checkboxes next to your list of exclusion entries to select items to **Delete**, **Sort**, **Import**, or **Export**.
211220
212-
### Via Group Policy
213-
221+
#### Via Group Policy
214222

215-
216-
Use Group Policy to set the per-user ASR rule exclusions
223+
Use Group Policy to set the per-user ASR rule exclusions.
217224

218225
1. On your Group Policy management computer, open the [Group Policy Management Console](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc731212(v=ws.11)).
219226

@@ -227,22 +234,20 @@ Use Group Policy to set the per-user ASR rule exclusions
227234

228235
1. Double-click **Apply a list of exclusions to specific attack surface reduction (ASR) rules**, and set the option to **Enabled**.
229236

230-
1. Then click on **Show...**
231-
232-
1. Under "**Value Name**", enter "GUID for the ASR Rule" without the double quotes
237+
1. Then select **Show...**.
233238

234-
1. Under "**Value**", enter the <drive_letter:\Path\ProcessName>. In order to add multiple processes, it's separated by a greater than sign (>)
239+
1. Under **Value Name**, enter GUID for the ASR Rule.
235240

236-
e.g., "C:\Notepad.exe>c:\regedit.exe>C:\SomeFolder\test.exe" without the double quotes
241+
1. Under **Value**, enter the <drive_letter:\Path\ProcessName>. In order to add multiple processes, it's separated by a greater than sign (>). For example, `C:\Notepad.exe>c:\regedit.exe>C:\SomeFolder\test.exe`.
237242

238243
1. select **OK**. This setting allows the processes that are being blocked by the particular ASR Rule to continue running.
239244

240245
> [!NOTE]
241-
> "If policies aren't applying, review [Troubleshoot Microsoft Defender Antivirus settings](/defender-endpoint/troubleshoot-settings)
246+
> If policies aren't applying, review [Troubleshoot Microsoft Defender Antivirus settings](/defender-endpoint/troubleshoot-settings).
242247
243248
### Use PowerShell as an alternative method to enable attack surface reduction rules
244249

245-
Use PowerShell, as an alternative to Intune, to enable attack surface reduction rules in audit mode. This allows you to view a record of apps that would have been blocked if the feature was fully enabled. You can also see how often the rules fire during normal use.
250+
Use PowerShell, as an alternative to Intune, to enable attack surface reduction rules in audit mode. This configuration allows you to view a record of apps that would have been blocked if the feature was fully enabled. You can also see how often the rules fire during normal use.
246251

247252
To enable an attack surface reduction rule in audit mode, use the following PowerShell cmdlet:
248253

@@ -259,15 +264,15 @@ To enable all the added attack surface reduction rules in audit mode, use the fo
259264
```
260265

261266
> [!TIP]
262-
> If you want to fully audit how attack surface reduction rules work in your organization, you'll need to use a management tool to deploy this setting to devices in your network.
267+
> If you want to fully audit how attack surface reduction rules work in your organization, you need to use a management tool to deploy this setting to devices in your network.
263268
264269
You can also use Group Policy, Intune, or mobile device management (MDM) configuration service providers (CSPs) to configure and deploy the setting. Learn more in the main [Attack surface reduction rules](attack-surface-reduction.md) article.
265270

266271
<a name='use-windows-event-viewer-review-as-an-alternative-to-the-attack-surface-reduction-rules-reporting-page-in-the-microsoft-365-defender-portal'></a>
267272

268273
## Use Windows Event Viewer Review as an alternative to the attack surface reduction rules reporting page in the Microsoft Defender portal
269274

270-
To review apps that would have been blocked, open Event Viewer and filter for Event ID 1121 in the Microsoft-Windows-Windows Defender/Operational log. The following table lists all network protection events.
275+
To review apps that would be blocked, open Event Viewer and filter for Event ID 1121 in the Microsoft-Windows-Windows Defender/Operational log. The following table lists all network protection events.
271276

272277
Event ID | Description
273278
-|-

0 commit comments

Comments
 (0)