Skip to content

Commit 9b2e119

Browse files
committed
Learn Editor: Update attack-surface-reduction-rules-reference.md
1 parent 14ccbf5 commit 9b2e119

File tree

1 file changed

+18
-22
lines changed

1 file changed

+18
-22
lines changed

defender-endpoint/attack-surface-reduction-rules-reference.md

Lines changed: 18 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -70,9 +70,9 @@ For the easiest method to enable the standard protection rules, see [Simplified
7070
| Block Office communication application from creating child processes | | Yes |
7171
| Block persistence through WMI event subscription | Yes | |
7272
| Block process creations originating from PSExec and WMI commands | | Yes |
73-
| Block rebooting machine in Safe Mode (preview) | | Yes |
73+
| Block rebooting machine in Safe Mode| | Yes |
7474
| Block untrusted and unsigned processes that run from USB | | Yes |
75-
| Block use of copied or impersonated system tools (preview) | | Yes |
75+
| Block use of copied or impersonated system tools| | Yes |
7676
| Block Webshell creation for Servers | | Yes |
7777
| Block Win32 API calls from Office macros | | Yes |
7878
| Use advanced protection against ransomware | | Yes |
@@ -128,9 +128,9 @@ The following table lists the supported operating systems for rules that are cur
128128
| [Block Office communication application from creating child processes](#block-office-communication-application-from-creating-child-processes) | Y | Y | Y |
129129
| [Block persistence through Windows Management Instrumentation (WMI) event subscription](#block-persistence-through-wmi-event-subscription) | Y <br> version 1903 (build 18362) or later | Y <br> version 1903 (build 18362) or later | N |
130130
| [Block process creations originating from PSExec and WMI commands](#block-process-creations-originating-from-psexec-and-wmi-commands) | Y <br> version 1803 or later | Y | Y |
131-
| [Block rebooting machine in Safe Mode (preview)](#block-rebooting-machine-in-safe-mode-preview) | Y | Y | Y |
131+
| [Block rebooting machine in Safe Mode](#block-rebooting-machine-in-safe-mode-preview)| Y | Y | Y |
132132
| [Block untrusted and unsigned processes that run from USB](#block-untrusted-and-unsigned-processes-that-run-from-usb) | Y | Y | Y |
133-
| [Block use of copied or impersonated system tools (preview)](#block-use-of-copied-or-impersonated-system-tools-preview) | Y | Y | Y |
133+
| [Block use of copied or impersonated system tools](#block-use-of-copied-or-impersonated-system-tools-preview)| Y | Y | Y |
134134
| [Block Webshell creation for Servers](#block-webshell-creation-for-servers) | N | Y <br>Exchange role only | Y <br>Exchange role only |
135135
| [Block Win32 API calls from Office macros](#block-win32-api-calls-from-office-macros) | Y | N | N |
136136
| [Use advanced protection against ransomware](#use-advanced-protection-against-ransomware) | Y <br> version 1803 or later | Y | Y |
@@ -149,7 +149,7 @@ Links to information about configuration management system versions referenced i
149149
|[Block Adobe Reader from creating child processes](#block-adobe-reader-from-creating-child-processes) | Y | | Y | Y |
150150
|[Block all Office applications from creating child processes](#block-all-office-applications-from-creating-child-processes) | Y |Y <br><br> CB 1710 | Y | Y |
151151
|[Block credential stealing from the Windows local security authority subsystem (lsass.exe)](#block-credential-stealing-from-the-windows-local-security-authority-subsystem) | Y | Y <br><br>CB 1802 | Y | Y |
152-
|[Block executable content from email client and webmail](#block-executable-content-from-email-client-and-webmail) | Y | Y <br><br> CB 1710 | Y |
152+
|[Block executable content from email client and webmail](#block-executable-content-from-email-client-and-webmail) | Y | Y <br><br> CB 1710 | Y ||
153153
|[Block executable files from running unless they meet a prevalence, age, or trusted list criterion](#block-executable-files-from-running-unless-they-meet-a-prevalence-age-or-trusted-list-criterion) | Y | Y <br><br> CB 1802 | Y | Y |
154154
|[Block execution of potentially obfuscated scripts](#block-execution-of-potentially-obfuscated-scripts) | Y |Y <br><br> CB 1710 | Y | Y |
155155
|[Block JavaScript or VBScript from launching downloaded executable content](#block-javascript-or-vbscript-from-launching-downloaded-executable-content) | Y |Y <br><br> CB 1710 | Y | Y |
@@ -158,9 +158,9 @@ Links to information about configuration management system versions referenced i
158158
|[Block Office communication application from creating child processes](#block-office-communication-application-from-creating-child-processes) | Y |Y <br><br> CB 1710 | Y | Y |
159159
|[Block persistence through WMI event subscription](#block-persistence-through-wmi-event-subscription) |Y | |Y | Y |
160160
|[Block process creations originating from PSExec and WMI commands](#block-process-creations-originating-from-psexec-and-wmi-commands) | Y | |Y | Y |
161-
|[Block rebooting machine in Safe Mode (preview)](#block-rebooting-machine-in-safe-mode-preview) | Y | | Y | Y |
161+
|[Block rebooting machine in Safe Mode](#block-rebooting-machine-in-safe-mode-preview)| Y | | Y | Y |
162162
|[Block untrusted and unsigned processes that run from USB](#block-untrusted-and-unsigned-processes-that-run-from-usb) | Y |Y <br><br> CB 1802 | Y | Y |
163-
|[Block use of copied or impersonated system tools (preview)](#block-use-of-copied-or-impersonated-system-tools-preview) | Y | | Y | Y |
163+
|[Block use of copied or impersonated system tools](#block-use-of-copied-or-impersonated-system-tools-preview)| Y | | Y | Y |
164164
|[Block Webshell creation for Servers](#block-webshell-creation-for-servers) | Y | | Y | Y |
165165
|[Block Win32 API calls from Office macros](#block-win32-api-calls-from-office-macros) | Y |Y <br><br> CB 1710 | Y | Y |
166166
|[Use advanced protection against ransomware](#use-advanced-protection-against-ransomware) | Y |Y <br><br> CB 1802 | Y | Y |
@@ -196,11 +196,11 @@ For rules with the "Rule State" specified:
196196
|[Block Office applications from creating executable content](#block-office-applications-from-creating-executable-content) | | N | Y |
197197
|[Block Office applications from injecting code into other processes](#block-office-applications-from-injecting-code-into-other-processes) | | N | Y |
198198
|[Block Office communication application from creating child processes](#block-office-communication-application-from-creating-child-processes) | | N | Y |
199-
|[Block persistence through WMI event subscription](#block-persistence-through-wmi-event-subscription) | Audit or Block | Y (in block mode) <br/> N (in audit mode) | Y (in block mode) |
199+
|[Block persistence through WMI event subscription](#block-persistence-through-wmi-event-subscription) | Audit or Block | Y (in block mode) <br/> N (in audit mode) | Y (in block mode) |
200200
|[Block process creations originating from PSExec and WMI commands](#block-process-creations-originating-from-psexec-and-wmi-commands) | | N | Y |
201-
|[Block rebooting machine in Safe Mode (preview)](#block-rebooting-machine-in-safe-mode-preview) | | N | N |
201+
|[Block rebooting machine in Safe Mode](#block-rebooting-machine-in-safe-mode-preview)| | N | N |
202202
|[Block untrusted and unsigned processes that run from USB](#block-untrusted-and-unsigned-processes-that-run-from-usb) | Audit or Block | Y (in block mode) <br/> N (in audit mode) | Y (in block mode) |
203-
|[Block use of copied or impersonated system tools (preview)](#block-use-of-copied-or-impersonated-system-tools-preview) | | N | N |
203+
|[Block use of copied or impersonated system tools](#block-use-of-copied-or-impersonated-system-tools-preview)| | N | N |
204204
|[Block Webshell creation for Servers](#block-webshell-creation-for-servers) | | N | N |
205205
|[Block Win32 API calls from Office macros](#block-win32-api-calls-from-office-macros) | | N | Y |
206206
|[Use advanced protection against ransomware](#use-advanced-protection-against-ransomware) | Audit or Block | Y (in block mode) <br/> N (in audit mode) | Y (in block mode) |
@@ -222,9 +222,9 @@ For rules with the "Rule State" specified:
222222
| Block Office communication application from creating child processes | 26190899-1602-49e8-8b27-eb1d0a1ce869 |
223223
| Block persistence through WMI event subscription <br>* File and folder exclusions not supported. | e6db77e5-3df2-4cf1-b95a-636979351e5b |
224224
| Block process creations originating from PSExec and WMI commands | d1e49aac-8f56-4280-b9ba-993a6d77406c |
225-
| Block rebooting machine in Safe Mode (preview) | 33ddedf1-c6e0-47cb-833e-de6133960387 |
225+
| Block rebooting machine in Safe Mode| 33ddedf1-c6e0-47cb-833e-de6133960387 |
226226
| Block untrusted and unsigned processes that run from USB | b2b3f03d-6a65-4f7b-a9c7-1c7ef74a9ba4 |
227-
| Block use of copied or impersonated system tools (preview) | c0033c00-d16d-4114-a5a0-dc9b3a7d2ceb |
227+
| Block use of copied or impersonated system tools| c0033c00-d16d-4114-a5a0-dc9b3a7d2ceb |
228228
| Block Webshell creation for Servers | a8f5898e-1dc8-49a9-9878-85004b8a61e6 |
229229
| Block Win32 API calls from Office macros | 92e97fa1-2edf-4476-bdd6-9dd0b4dddc7b |
230230
| Use advanced protection against ransomware | c1db55ab-c21a-4637-bb3f-a12568109d35 |
@@ -571,14 +571,11 @@ Advanced hunting action type:
571571

572572
Dependencies: Microsoft Defender Antivirus
573573

574-
### Block rebooting machine in Safe Mode (preview)
574+
### Block rebooting machine in Safe Mode
575575

576576
This rule prevents the execution of commands to restart machines in Safe Mode. Safe Mode is a diagnostic mode that only loads the essential files and drivers needed for Windows to run. However, in Safe Mode, many security products are either disabled or operate in a limited capacity, which allows attackers to further launch tampering commands, or execute and encrypt all files on the machine. This rule blocks such attacks by preventing processes from restarting machines in Safe Mode.
577577

578-
> [!NOTE]
579-
> This capability is currently in preview. Extra upgrades to improve efficacy are under development.
580-
581-
Intune Name: `[PREVIEW] Block rebooting machine in Safe Mode`
578+
Intune Name: ` Block rebooting machine in Safe Mode`
582579

583580
Configuration Manager name: Not yet available
584581

@@ -612,14 +609,11 @@ Advanced hunting action type:
612609

613610
Dependencies: Microsoft Defender Antivirus
614611

615-
### Block use of copied or impersonated system tools (preview)
612+
### Block use of copied or impersonated system tools
616613

617614
This rule blocks the use of executable files that are identified as copies of Windows system tools. These files are either duplicates or impostors of the original system tools. Some malicious programs might try to copy or impersonate Windows system tools to avoid detection or gain privileges. Allowing such executable files can lead to potential attacks. This rule prevents propagation and execution of such duplicates and impostors of the system tools on Windows machines.
618615

619-
> [!NOTE]
620-
> This capability is currently in preview. Additional upgrades to improve efficacy are under development.
621-
622-
Intune Name: `[PREVIEW] Block use of copied or impersonated system tools`
616+
Intune Name: `Block use of copied or impersonated system tools`
623617

624618
Configuration Manager name: Not yet available
625619

@@ -701,4 +695,6 @@ Dependencies: Microsoft Defender Antivirus, Cloud Protection
701695
- [Attack surface reduction rules reference](attack-surface-reduction-rules-reference.md)
702696
- [Exclusions for Microsoft Defender for Endpoint and Microsoft Defender Antivirus](defender-endpoint-antivirus-exclusions.md)
703697

698+
- [Troubleshoot attack surface reduction rules](/defender-endpoint/troubleshoot-asr)
699+
704700
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]

0 commit comments

Comments
 (0)