Skip to content

Commit ab8f59a

Browse files
committed
Learn Editor: Update attack-surface-reduction-rules-reference.md
1 parent f1f45b3 commit ab8f59a

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

defender-endpoint/attack-surface-reduction-rules-reference.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -320,7 +320,8 @@ Dependencies: Microsoft Defender Antivirus
320320
### Block credential stealing from the Windows local security authority subsystem
321321

322322
> [!NOTE]
323-
> If you have [LSA protection](/windows-server/security/credentials-protection-and-management/configuring-additional-lsa-protection) enabled, this attack surface reduction rule is not required. For a more secure posture, we also recommend enabling [Credential Guard](/windows/security/identity-protection/credential-guard) with the LSA protection.
323+
> If you have [LSA protection](/windows-server/security/credentials-protection-and-management/configuring-additional-lsa-protection) enabled, this attack surface reduction rule is not required. For a more secure posture, we also recommend enabling [Credential Guard](/windows/security/identity-protection/credential-guard) with the LSA protection.
324+
> If the LSA protection is enabled, the ASR rule is classified as "not applicable" in Defender for Endpoint management settings in the [Microsoft Defender XDR portal](https://security.microsoft.com).
324325
325326
This rule helps prevent credential stealing by locking down Local Security Authority Subsystem Service (LSASS).
326327

@@ -339,7 +340,6 @@ Enabling this rule doesn't provide additional protection if you have LSA protect
339340
> In this scenario, the ASR rule is classified as "not applicable" in Defender for Endpoint settings in the Microsoft Defender portal.
340341
> The *Block credential stealing from the Windows local security authority subsystem* ASR rule doesn't support WARN mode.
341342
> In some apps, the code enumerates all running processes and attempts to open them with exhaustive permissions. This rule denies the app's process open action and logs the details to the security event log. This rule can generate a lot of noise. If you have an app that simply enumerates LSASS, but has no real impact in functionality, there is no need to add it to the exclusion list. By itself, this event log entry doesn't necessarily indicate a malicious threat.
342-
343343
Intune name: `Flag credential stealing from the Windows local security authority subsystem`
344344

345345
Configuration Manager name: `Block credential stealing from the Windows local security authority subsystem`

0 commit comments

Comments
 (0)