Skip to content

Commit b4bda09

Browse files
Merge pull request #3626 from YongRhee-MSFT/docs-editor/enable-attack-surface-reductio-1746030541
Update enable-attack-surface-reduction.md
2 parents 79053c1 + db2eee3 commit b4bda09

File tree

1 file changed

+33
-21
lines changed

1 file changed

+33
-21
lines changed

defender-endpoint/enable-attack-surface-reduction.md

Lines changed: 33 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
- mde-asr
1616
ms.custom: admindeeplinkDEFENDER
1717
search.appverid: met150
18-
ms.date: 03/05/2025
18+
ms.date: 04/30/2025
1919
---
2020

2121
# Enable attack surface reduction rules
@@ -98,23 +98,27 @@ When adding exclusions, keep these points in mind:
9898

9999
* Exclusions can be added based on certificate and file hashes, by allowing specified Defender for Endpoint file and certificate indicators. See [Overview of indicators](indicators-overview.md).
100100

101-
## Policy Conflict
101+
## Policy conflicts
102102

103-
1. If a conflicting policy is applied via MDM and GP, the setting applied from GP takes precedence.
103+
If a conflicting policy is applied via MDM and GP, the setting applied from Group Policy takes precedence.
104104

105-
1. Attack surface reduction rules for managed devices now support behavior for merger of settings from different policies, to create a superset of policy for each device. Only the settings that aren't in conflict are merged, while those that are in conflict aren't added to the superset of rules. Previously, if two policies included conflicts for a single setting, both policies were flagged as being in conflict, and no settings from either profile would be deployed. Attack surface reduction rule merge behavior is as follows:
105+
Attack surface reduction rules for managed devices now support behavior for merging settings from different policies to create a policy superset for each device. Only the settings that aren't in conflict are merged, whereas policy conficts aren't added to the superset of rules. Previously, if two policies included conflicts for a single setting, both policies were flagged as being in conflict, and no settings from either profile were deployed.
106106

107-
- Attack surface reduction rules from the following profiles are evaluated for each device to which the rules apply:
107+
Attack surface reduction rule merge behavior works as follows:
108108

109-
- **Devices** > **Configuration profiles** > **Endpoint protection profile** > **Microsoft Defender Exploit Guard** > **Attack Surface Reduction**. (See [Attack Surface Reduction](/mem/intune/protect/endpoint-protection-windows-10#attack-surface-reduction-rules).)
110-
- **Endpoint security** > **Attack surface reduction policy** > **Attack surface reduction rules**. (See [Attack surface reduction rules](/mem/intune/protect/endpoint-security-asr-policy#devices-managed-by-intune).)
111-
- **Endpoint security** > **Security baselines** > **Microsoft Defender ATP Baseline** > **Attack Surface Reduction Rules**. (See [Attack Surface Reduction Rules](/mem/intune/protect/security-baseline-settings-defender-atp#attack-surface-reduction-rules).)
109+
- Attack surface reduction rules from the following profiles are evaluated for each device to which the rules apply:
112110

113-
- Settings that don't have conflicts are added to a superset of policy for the device.
111+
- **Devices** > **Configuration profiles** > **Endpoint protection profile** > **Microsoft Defender Exploit Guard** > **Attack Surface Reduction**. (See [Attack Surface Reduction](/mem/intune/protect/endpoint-protection-windows-10#attack-surface-reduction-rules).)
114112

115-
- When two or more policies have conflicting settings, the conflicting settings aren't added to the combined policy, while settings that don't conflict are added to the superset policy that applies to a device.
113+
- **Endpoint security** > **Attack surface reduction policy** > **Attack surface reduction rules**. (See [Attack surface reduction rules](/mem/intune/protect/endpoint-security-asr-policy#devices-managed-by-intune).)
116114

117-
- Only the configurations for conflicting settings are held back.
115+
- **Endpoint security** > **Security baselines** > **Microsoft Defender ATP Baseline** > **Attack Surface Reduction Rules**. (See [Attack Surface Reduction Rules](/mem/intune/protect/security-baseline-settings-defender-atp#attack-surface-reduction-rules).)
116+
117+
- Settings that don't have conflicts are added to a superset of policy for the device.
118+
119+
- When two or more policies have conflicting settings, the conflicting settings aren't added to the combined policy, while settings that don't conflict are added to the superset policy that applies to a device.
120+
121+
- Only the configurations for conflicting settings are held back.
118122

119123
## Configuration methods
120124

@@ -132,18 +136,19 @@ The following procedures for enabling attack surface reduction rules include ins
132136
### Intune
133137

134138
> [!IMPORTANT]
135-
> If using Intune on Windows Server 2012 R2 and Windows Server 2016 unified version, you need to set these to `Not Configured`, because they're not supported on these OS versions. Otherwise, the following policies fail to apply:
136-
> - Block persistence through Windows Management Instrumentation (WMI) event subscription
137-
> - Block JavaScript or VBScript from launching downloaded executable content
138-
> - Use advanced protection against ransomware
139+
> If you're using Intune on Windows Server 2012 R2 and Windows Server 2016 with the [modern unified solution](onboard-server.md#functionality-in-the-modern-unified-solution-for-windows-server-2016-and-windows-server-2012-r2), you need to set the following attack surface reduction rules to `Not Configured` because they're not supported on these OS versions. Otherwise, these policies fail to apply:
140+
> - [Block persistence through Windows Management Instrumentation (WMI) event subscription](/defender-endpoint/attack-surface-reduction-rules-reference#block-persistence-through-wmi-event-subscription)
141+
> - [Block JavaScript or VBScript from launching downloaded executable content](/defender-endpoint/attack-surface-reduction-rules-reference#block-javascript-or-vbscript-from-launching-downloaded-executable-content)
139142
140143
#### Endpoint security policy (Preferred)
141144

142145
1. Select **Endpoint Security** > **Attack surface reduction**. Choose an existing attack surface reduction rule or create a new one. To create a new one, select **Create Policy** and enter information for this profile. For **Profile type**, select **Attack surface reduction rules**. If you've chosen an existing profile, select **Properties** and then select **Settings**.
143146

144147
1. In the **Configuration settings** pane, select **Attack Surface Reduction** and then select the desired setting for each attack surface reduction rule.
145148

146-
1. Under **List of additional folders that need to be protected**, **List of apps that have access to protected folders**, and **Exclude files and paths from attack surface reduction rules**, enter individual files and folders. You can also select **Import** to import a CSV file that contains files and folders to exclude from attack surface reduction rules. Each line in the CSV file should be formatted as follows:
149+
1. Under **List of additional folders that need to be protected**, **List of apps that have access to protected folders**, and **Exclude files and paths from attack surface reduction rules**, enter individual files and folders.
150+
151+
You can also select **Import** to import a CSV file that contains files and folders to exclude from attack surface reduction rules. Each line in the CSV file should be formatted as follows:
147152

148153
`C:\folder`, `%ProgramFiles%\folder\file`, `C:\path`
149154

@@ -238,9 +243,8 @@ You can use Microsoft Intune OMA-URI to configure custom attack surface reductio
238243
Rules are active and live within minutes.
239244

240245
> [!NOTE]
241-
> Conflict handling:
242-
>
243-
> If you assign a device two different attack surface reduction policies, potential policy conflicts can occur, depending on whether rules are assigned different states, whether conflict management is in place, and whether the result is an error. Nonconflicting rules do not result in an error, and such rules are applied correctly. The first rule is applied, and subsequent nonconflicting rules are merged into the policy.
246+
> Regarding conflict handling, if you assign a device two different attack surface reduction policies, potential policy conflicts can occur, depending on whether rules are assigned different states, whether conflict management is in place, and whether the result is an error.
247+
> Nonconflicting rules do not result in an error, and such rules are applied correctly. The first rule is applied, and subsequent nonconflicting rules are merged into the policy.
244248
245249
### MDM
246250

@@ -287,10 +291,18 @@ Example:
287291
> [!WARNING]
288292
> There is a known issue with the applicability of attack surface reduction on Server OS versions which is marked as compliant without any actual enforcement. Currently, there is no defined release date for when this will be fixed.
289293
294+
> [!IMPORTANT]
295+
> If you're using "Disable admin merge" set to `true` on devices, and you're using any of the following tools/methods, adding ASR rules per-rule exclusions or local ASR rule exclusions don't apply.
296+
> - Defender for Endpoint Security Settings Management (Disable Local Admin Merge)
297+
> - Intune (Disable Local Admin Merge)
298+
> - The Defender CSP (**[DisableLocalAdminMerge](/windows/client-management/mdm/defender-csp)**)
299+
> - Group Policy (Configure local administrator merge behavior for lists)
300+
> To modify this behavior, you need to change "Disable admin merge" to `false`.
301+
290302
### Group policy
291303

292304
> [!WARNING]
293-
> If you manage your computers and devices with Intune, Configuration Manager, or other enterprise-level management platform, the management software will overwrite any conflicting group policy settings on startup.
305+
> If you manage your computers and devices with Intune, Configuration Manager, or other enterprise-level management platform, the management software overwrites any conflicting group policy settings on startup.
294306
295307
1. On your Group Policy management computer, open the [Group Policy Management Console](https://technet.microsoft.com/library/cc731212.aspx), right-click the Group Policy Object you want to configure and select **Edit**.
296308

@@ -349,7 +361,7 @@ Example:
349361
> [!IMPORTANT]
350362
> Use `Add-MpPreference` to append or add apps to the list. Using the `Set-MpPreference` cmdlet will overwrite the existing list.
351363
352-
## Related articles
364+
## Related content
353365

354366
- [Attack surface reduction rules reference](attack-surface-reduction-rules-reference.md)
355367
- [Evaluate attack surface reduction](attack-surface-reduction-rules-deployment-test.md)

0 commit comments

Comments
 (0)