You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
| Block untrusted and unsigned processes that run from USB || Yes |
75
-
| Block use of copied or impersonated system tools (preview) || Yes |
75
+
| Block use of copied or impersonated system tools|| Yes |
76
76
| Block Webshell creation for Servers || Yes |
77
77
| Block Win32 API calls from Office macros || Yes |
78
78
| Use advanced protection against ransomware || Yes |
@@ -128,9 +128,9 @@ The following table lists the supported operating systems for rules that are cur
128
128
|[Block Office communication application from creating child processes](#block-office-communication-application-from-creating-child-processes)| Y | Y | Y |
129
129
|[Block persistence through Windows Management Instrumentation (WMI) event subscription](#block-persistence-through-wmi-event-subscription)| Y <br> version 1903 (build 18362) or later | Y <br> version 1903 (build 18362) or later | N |
130
130
|[Block process creations originating from PSExec and WMI commands](#block-process-creations-originating-from-psexec-and-wmi-commands)| Y <br> version 1803 or later | Y | Y |
131
-
|[Block rebooting machine in Safe Mode (preview)](#block-rebooting-machine-in-safe-mode-preview)| Y | Y | Y |
131
+
|[Block rebooting machine in Safe Mode](#block-rebooting-machine-in-safe-mode-preview)| Y | Y | Y |
132
132
|[Block untrusted and unsigned processes that run from USB](#block-untrusted-and-unsigned-processes-that-run-from-usb)| Y | Y | Y |
133
-
|[Block use of copied or impersonated system tools (preview)](#block-use-of-copied-or-impersonated-system-tools-preview)| Y | Y | Y |
133
+
|[Block use of copied or impersonated system tools](#block-use-of-copied-or-impersonated-system-tools-preview)| Y | Y | Y |
134
134
|[Block Webshell creation for Servers](#block-webshell-creation-for-servers)| N | Y <br>Exchange role only | Y <br>Exchange role only |
135
135
|[Block Win32 API calls from Office macros](#block-win32-api-calls-from-office-macros)| Y | N | N |
136
136
|[Use advanced protection against ransomware](#use-advanced-protection-against-ransomware)| Y <br> version 1803 or later | Y | Y |
@@ -149,7 +149,7 @@ Links to information about configuration management system versions referenced i
149
149
|[Block Adobe Reader from creating child processes](#block-adobe-reader-from-creating-child-processes)| Y || Y | Y |
150
150
|[Block all Office applications from creating child processes](#block-all-office-applications-from-creating-child-processes)| Y |Y <br><br> CB 1710 | Y | Y |
151
151
|[Block credential stealing from the Windows local security authority subsystem (lsass.exe)](#block-credential-stealing-from-the-windows-local-security-authority-subsystem)| Y | Y <br><br>CB 1802 | Y | Y |
152
-
|[Block executable content from email client and webmail](#block-executable-content-from-email-client-and-webmail)| Y | Y <br><br> CB 1710 | Y |
152
+
|[Block executable content from email client and webmail](#block-executable-content-from-email-client-and-webmail)| Y | Y <br><br> CB 1710 | Y ||
153
153
|[Block executable files from running unless they meet a prevalence, age, or trusted list criterion](#block-executable-files-from-running-unless-they-meet-a-prevalence-age-or-trusted-list-criterion)| Y | Y <br><br> CB 1802 | Y | Y |
154
154
|[Block execution of potentially obfuscated scripts](#block-execution-of-potentially-obfuscated-scripts)| Y |Y <br><br> CB 1710 | Y | Y |
155
155
|[Block JavaScript or VBScript from launching downloaded executable content](#block-javascript-or-vbscript-from-launching-downloaded-executable-content)| Y |Y <br><br> CB 1710 | Y | Y |
@@ -158,9 +158,9 @@ Links to information about configuration management system versions referenced i
158
158
|[Block Office communication application from creating child processes](#block-office-communication-application-from-creating-child-processes)| Y |Y <br><br> CB 1710 | Y | Y |
159
159
|[Block persistence through WMI event subscription](#block-persistence-through-wmi-event-subscription)|Y ||Y | Y |
160
160
|[Block process creations originating from PSExec and WMI commands](#block-process-creations-originating-from-psexec-and-wmi-commands)| Y ||Y | Y |
161
-
|[Block rebooting machine in Safe Mode (preview)](#block-rebooting-machine-in-safe-mode-preview)| Y || Y | Y |
161
+
|[Block rebooting machine in Safe Mode](#block-rebooting-machine-in-safe-mode-preview)| Y || Y | Y |
162
162
|[Block untrusted and unsigned processes that run from USB](#block-untrusted-and-unsigned-processes-that-run-from-usb)| Y |Y <br><br> CB 1802 | Y | Y |
163
-
|[Block use of copied or impersonated system tools (preview)](#block-use-of-copied-or-impersonated-system-tools-preview)| Y || Y | Y |
163
+
|[Block use of copied or impersonated system tools](#block-use-of-copied-or-impersonated-system-tools-preview)| Y || Y | Y |
164
164
|[Block Webshell creation for Servers](#block-webshell-creation-for-servers)| Y || Y | Y |
165
165
|[Block Win32 API calls from Office macros](#block-win32-api-calls-from-office-macros)| Y |Y <br><br> CB 1710 | Y | Y |
166
166
|[Use advanced protection against ransomware](#use-advanced-protection-against-ransomware)| Y |Y <br><br> CB 1802 | Y | Y |
@@ -196,11 +196,11 @@ For rules with the "Rule State" specified:
196
196
|[Block Office applications from creating executable content](#block-office-applications-from-creating-executable-content)|| N | Y |
197
197
|[Block Office applications from injecting code into other processes](#block-office-applications-from-injecting-code-into-other-processes)|| N | Y |
198
198
|[Block Office communication application from creating child processes](#block-office-communication-application-from-creating-child-processes)|| N | Y |
199
-
|[Block persistence through WMI event subscription](#block-persistence-through-wmi-event-subscription)| Audit or Block | Y (in block mode) <br/> N (in audit mode) | Y (in block mode) |
199
+
|[Block persistence through WMI event subscription](#block-persistence-through-wmi-event-subscription)| Audit or Block | Y (in block mode) <br/> N (in audit mode) | Y (in block mode) |
200
200
|[Block process creations originating from PSExec and WMI commands](#block-process-creations-originating-from-psexec-and-wmi-commands)|| N | Y |
201
-
|[Block rebooting machine in Safe Mode (preview)](#block-rebooting-machine-in-safe-mode-preview)|| N | N |
201
+
|[Block rebooting machine in Safe Mode](#block-rebooting-machine-in-safe-mode-preview)|| N | N |
202
202
|[Block untrusted and unsigned processes that run from USB](#block-untrusted-and-unsigned-processes-that-run-from-usb)| Audit or Block | Y (in block mode) <br/> N (in audit mode) | Y (in block mode) |
203
-
|[Block use of copied or impersonated system tools (preview)](#block-use-of-copied-or-impersonated-system-tools-preview)|| N | N |
203
+
|[Block use of copied or impersonated system tools](#block-use-of-copied-or-impersonated-system-tools-preview)|| N | N |
204
204
|[Block Webshell creation for Servers](#block-webshell-creation-for-servers)|| N | N |
205
205
|[Block Win32 API calls from Office macros](#block-win32-api-calls-from-office-macros)|| N | Y |
206
206
|[Use advanced protection against ransomware](#use-advanced-protection-against-ransomware)| Audit or Block | Y (in block mode) <br/> N (in audit mode) | Y (in block mode) |
@@ -222,9 +222,9 @@ For rules with the "Rule State" specified:
222
222
| Block Office communication application from creating child processes | 26190899-1602-49e8-8b27-eb1d0a1ce869 |
223
223
| Block persistence through WMI event subscription <br>* File and folder exclusions not supported. | e6db77e5-3df2-4cf1-b95a-636979351e5b |
224
224
| Block process creations originating from PSExec and WMI commands | d1e49aac-8f56-4280-b9ba-993a6d77406c |
### Block rebooting machine in Safe Mode (preview)
574
+
### Block rebooting machine in Safe Mode
575
575
576
576
This rule prevents the execution of commands to restart machines in Safe Mode. Safe Mode is a diagnostic mode that only loads the essential files and drivers needed for Windows to run. However, in Safe Mode, many security products are either disabled or operate in a limited capacity, which allows attackers to further launch tampering commands, or execute and encrypt all files on the machine. This rule blocks such attacks by preventing processes from restarting machines in Safe Mode.
577
577
578
-
> [!NOTE]
579
-
> This capability is currently in preview. Extra upgrades to improve efficacy are under development.
580
-
581
-
Intune Name: `[PREVIEW] Block rebooting machine in Safe Mode`
578
+
Intune Name: ` Block rebooting machine in Safe Mode`
### Block use of copied or impersonated system tools (preview)
612
+
### Block use of copied or impersonated system tools
616
613
617
614
This rule blocks the use of executable files that are identified as copies of Windows system tools. These files are either duplicates or impostors of the original system tools. Some malicious programs might try to copy or impersonate Windows system tools to avoid detection or gain privileges. Allowing such executable files can lead to potential attacks. This rule prevents propagation and execution of such duplicates and impostors of the system tools on Windows machines.
618
615
619
-
> [!NOTE]
620
-
> This capability is currently in preview. Additional upgrades to improve efficacy are under development.
621
-
622
-
Intune Name: `[PREVIEW] Block use of copied or impersonated system tools`
616
+
Intune Name: `Block use of copied or impersonated system tools`
623
617
624
618
Configuration Manager name: Not yet available
625
619
@@ -701,4 +695,6 @@ Dependencies: Microsoft Defender Antivirus, Cloud Protection
0 commit comments