You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/enable-attack-surface-reduction.md
+33-21Lines changed: 33 additions & 21 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,7 +15,7 @@ ms.collection:
15
15
- mde-asr
16
16
ms.custom: admindeeplinkDEFENDER
17
17
search.appverid: met150
18
-
ms.date: 03/05/2025
18
+
ms.date: 04/30/2025
19
19
---
20
20
21
21
# Enable attack surface reduction rules
@@ -98,23 +98,27 @@ When adding exclusions, keep these points in mind:
98
98
99
99
* Exclusions can be added based on certificate and file hashes, by allowing specified Defender for Endpoint file and certificate indicators. See [Overview of indicators](indicators-overview.md).
100
100
101
-
## Policy Conflict
101
+
## Policy conflicts
102
102
103
-
1.If a conflicting policy is applied via MDM and GP, the setting applied from GP takes precedence.
103
+
If a conflicting policy is applied via MDM and GP, the setting applied from Group Policy takes precedence.
104
104
105
-
1.Attack surface reduction rules for managed devices now support behavior for merger of settings from different policies, to create a superset of policy for each device. Only the settings that aren't in conflict are merged, while those that are in conflict aren't added to the superset of rules. Previously, if two policies included conflicts for a single setting, both policies were flagged as being in conflict, and no settings from either profile would be deployed. Attack surface reduction rule merge behavior is as follows:
105
+
Attack surface reduction rules for managed devices now support behavior for merging settings from different policies to create a policy superset for each device. Only the settings that aren't in conflict are merged, whereas policy conficts aren't added to the superset of rules. Previously, if two policies included conflicts for a single setting, both policies were flagged as being in conflict, and no settings from either profile were deployed.
106
106
107
-
-Attack surface reduction rules from the following profiles are evaluated for each device to which the rules apply:
107
+
Attack surface reduction rule merge behavior works as follows:
-When two or more policies have conflicting settings, the conflicting settings aren't added to the combined policy, while settings that don't conflict are added to the superset policy that applies to a device.
- Only the configurations for conflicting settings are held back.
115
+
-**Endpoint security** > **Security baselines** > **Microsoft Defender ATP Baseline** > **Attack Surface Reduction Rules**. (See [Attack Surface Reduction Rules](/mem/intune/protect/security-baseline-settings-defender-atp#attack-surface-reduction-rules).)
116
+
117
+
- Settings that don't have conflicts are added to a superset of policy for the device.
118
+
119
+
- When two or more policies have conflicting settings, the conflicting settings aren't added to the combined policy, while settings that don't conflict are added to the superset policy that applies to a device.
120
+
121
+
- Only the configurations for conflicting settings are held back.
118
122
119
123
## Configuration methods
120
124
@@ -132,18 +136,19 @@ The following procedures for enabling attack surface reduction rules include ins
132
136
### Intune
133
137
134
138
> [!IMPORTANT]
135
-
> If using Intune on Windows Server 2012 R2 and Windows Server 2016 unified version, you need to set these to `Not Configured`, because they're not supported on these OS versions. Otherwise, the following policies fail to apply:
136
-
> - Block persistence through Windows Management Instrumentation (WMI) event subscription
137
-
> - Block JavaScript or VBScript from launching downloaded executable content
138
-
> - Use advanced protection against ransomware
139
+
> If you're using Intune on Windows Server 2012 R2 and Windows Server 2016 with the [modern unified solution](onboard-server.md#functionality-in-the-modern-unified-solution-for-windows-server-2016-and-windows-server-2012-r2), you need to set the following attack surface reduction rules to `Not Configured` because they're not supported on these OS versions. Otherwise, these policies fail to apply:
140
+
> -[Block persistence through Windows Management Instrumentation (WMI) event subscription](/defender-endpoint/attack-surface-reduction-rules-reference#block-persistence-through-wmi-event-subscription)
141
+
> -[Block JavaScript or VBScript from launching downloaded executable content](/defender-endpoint/attack-surface-reduction-rules-reference#block-javascript-or-vbscript-from-launching-downloaded-executable-content)
139
142
140
143
#### Endpoint security policy (Preferred)
141
144
142
145
1. Select **Endpoint Security** > **Attack surface reduction**. Choose an existing attack surface reduction rule or create a new one. To create a new one, select **Create Policy** and enter information for this profile. For **Profile type**, select **Attack surface reduction rules**. If you've chosen an existing profile, select **Properties** and then select **Settings**.
143
146
144
147
1. In the **Configuration settings** pane, select **Attack Surface Reduction** and then select the desired setting for each attack surface reduction rule.
145
148
146
-
1. Under **List of additional folders that need to be protected**, **List of apps that have access to protected folders**, and **Exclude files and paths from attack surface reduction rules**, enter individual files and folders. You can also select **Import** to import a CSV file that contains files and folders to exclude from attack surface reduction rules. Each line in the CSV file should be formatted as follows:
149
+
1. Under **List of additional folders that need to be protected**, **List of apps that have access to protected folders**, and **Exclude files and paths from attack surface reduction rules**, enter individual files and folders.
150
+
151
+
You can also select **Import** to import a CSV file that contains files and folders to exclude from attack surface reduction rules. Each line in the CSV file should be formatted as follows:
@@ -238,9 +243,8 @@ You can use Microsoft Intune OMA-URI to configure custom attack surface reductio
238
243
Rules are active and live within minutes.
239
244
240
245
> [!NOTE]
241
-
> Conflict handling:
242
-
>
243
-
> If you assign a device two different attack surface reduction policies, potential policy conflicts can occur, depending on whether rules are assigned different states, whether conflict management is in place, and whether the result is an error. Nonconflicting rules do not result in an error, and such rules are applied correctly. The first rule is applied, and subsequent nonconflicting rules are merged into the policy.
246
+
> Regarding conflict handling, if you assign a device two different attack surface reduction policies, potential policy conflicts can occur, depending on whether rules are assigned different states, whether conflict management is in place, and whether the result is an error.
247
+
> Nonconflicting rules do not result in an error, and such rules are applied correctly. The first rule is applied, and subsequent nonconflicting rules are merged into the policy.
244
248
245
249
### MDM
246
250
@@ -287,10 +291,18 @@ Example:
287
291
> [!WARNING]
288
292
> There is a known issue with the applicability of attack surface reduction on Server OS versions which is marked as compliant without any actual enforcement. Currently, there is no defined release date for when this will be fixed.
289
293
294
+
> [!IMPORTANT]
295
+
> If you're using "Disable admin merge" set to `true` on devices, and you're using any of the following tools/methods, adding ASR rules per-rule exclusions or local ASR rule exclusions don't apply.
296
+
> - Defender for Endpoint Security Settings Management (Disable Local Admin Merge)
297
+
> - Intune (Disable Local Admin Merge)
298
+
> - The Defender CSP (**[DisableLocalAdminMerge](/windows/client-management/mdm/defender-csp)**)
299
+
> - Group Policy (Configure local administrator merge behavior for lists)
300
+
> To modify this behavior, you need to change "Disable admin merge" to `false`.
301
+
290
302
### Group policy
291
303
292
304
> [!WARNING]
293
-
> If you manage your computers and devices with Intune, Configuration Manager, or other enterprise-level management platform, the management software will overwrite any conflicting group policy settings on startup.
305
+
> If you manage your computers and devices with Intune, Configuration Manager, or other enterprise-level management platform, the management software overwrites any conflicting group policy settings on startup.
294
306
295
307
1. On your Group Policy management computer, open the [Group Policy Management Console](https://technet.microsoft.com/library/cc731212.aspx), right-click the Group Policy Object you want to configure and select **Edit**.
296
308
@@ -349,7 +361,7 @@ Example:
349
361
> [!IMPORTANT]
350
362
> Use `Add-MpPreference` to append or add apps to the list. Using the `Set-MpPreference` cmdlet will overwrite the existing list.
0 commit comments