You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/defender-endpoint-demonstration-attack-surface-reduction-rules.md
+25-18Lines changed: 25 additions & 18 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,6 +5,7 @@ search.appverid: met150
5
5
ms.service: defender-endpoint
6
6
ms.author: deniseb
7
7
author: denisebmsft
8
+
ms.reviewer: yongrhee
8
9
ms.localizationpriority: medium
9
10
manager: deniseb
10
11
audience: ITPro
@@ -14,7 +15,7 @@ ms.collection:
14
15
- demo
15
16
ms.topic: article
16
17
ms.subservice: asr
17
-
ms.date: 03/04/2025
18
+
ms.date: 03/10/2025
18
19
---
19
20
20
21
# Attack surface reduction rules demonstrations
@@ -35,9 +36,9 @@ Attack surface reduction rules target specific behaviors that are typically used
35
36
## Scenario requirements and setup
36
37
37
38
- Windows client devices must be running Windows 11, Windows 10 1709 build 16273, or later
38
-
- Windows server devices must be running Windows Server 2025, Windows Server 2022, Windows Server 2019, Windows Server 2016, or Windows Server 2012 R2 (with the unified MDE client).
39
+
- Windows server devices must be running Windows Server 2025, Windows Server 2022, Windows Server 2019, Windows Server 2016, or Windows Server 2012 R2 (with the [modern, unified solution](/defender-endpoint/configure-server-endpoints#functionality-in-the-modern-unified-solution)).
39
40
- Microsoft Defender Antivirus
40
-
- Microsoft 365 Apps (Office; required for Office rules and sample)
41
+
- Microsoft 365 Apps (formerly referred to as Office apps; required for Office rules and sample)
Note - some test files have multiple exploits embedded and triggers multiple rules
84
87
85
-
| Rule name | Rule GUID |
88
+
| Rule name | Rule GUID |
86
89
|:---|:---|
87
90
| Block executable content from email client and webmail | BE9BA2D9-53EA-4CDC-84E5-9B1EEEE46550 |
88
91
|[Block Office applications from creating child processes](https://demo.wd.microsoft.com/Content/TestFile_OfficeChildProcess_D4F940AB-401B-4EFC-AADC-AD5F3C50688A.docm)| D4F940AB-401B-4EFC-AADC-AD5F3C50688A |
89
-
|[Block Office applications from creating executable content](https://demo.wd.microsoft.com/Content/TestFile_Block_Office_applications_from_creating_executable_content_3B576869-A4EC-4529-8536-B80A7769E899.docm)| 3B576869-A4EC-4529-8536-B80A7769E899 |
90
-
| Block Office applications from injecting into other processes | 75668C1F-73B5-4CF0-BB93-3ECF5CB7CC84 |
91
-
|[Impede JavaScript and VBScript to launch executables](https://demo.wd.microsoft.com/Content/TestFile_Impede_JavaScript_and_VBScript_to_launch_executables_D3E037E1-3EB8-44C8-A917-57927947596D.js)| D3E037E1-3EB8-44C8-A917-57927947596D |
92
-
| Block execution of potentially obfuscated scripts | 5BEB7EFE-FD9A-4556-801D-275E5FFC04CC |
93
-
|[Block Win32 imports from Macro code in Office](https://demo.wd.microsoft.com/Content/Block_Win32_imports_from_Macro_code_in_Office_92E97FA1-2EDF-4476-BDD6-9DD0B4DDDC7B.docm)| 92E97FA1-2EDF-4476-BDD6-9DD0B4DDDC7B |
94
-
|[{Block Process Creations originating from PSExec & WMI commands](https://demo.wd.microsoft.com/Content/TestFile_PsexecAndWMICreateProcess_D1E49AAC-8F56-4280-B9BA-993A6D77406C.vbs)| D1E49AAC-8F56-4280-B9BA-993A6D77406C |
95
-
|[Block Execution of untrusted or unsigned executables inside removable USB media](https://demo.wd.microsoft.com/Content/UNSIGNED_ransomware_test_exe.exe)| B2B3F03D-6A65-4F7B-A9C7-1C7EF74A9BA4 |
| Block abuse of exploited vulnerable signed drivers | 56a863a9-875e-4185-98a7-b882c64b5ce5 |
100
-
| Block credential stealing from the Windows local security authority subsystem (lsass.exe) | 9e6c4e1f-7d60-472f-ba1a-a39ef669e4b2 |
101
-
| Block persistence through WMI event subscription | e6db77e5-3df2-4cf1-b95a-636979351e5b |
102
-
| Block Webshell creation for Servers | a8f5898e-1dc8-49a9-9878-85004b8a61e6 |
92
+
|[Block Office applications from creating executable content](https://demo.wd.microsoft.com/Content/TestFile_Block_Office_applications_from_creating_executable_content_3B576869-A4EC-4529-8536-B80A7769E899.docm)| 3B576869-A4EC-4529-8536-B80A7769E899 |
93
+
| Block Office applications from injecting into other processes | 75668C1F-73B5-4CF0-BB93-3ECF5CB7CC84 |
94
+
|[Impede JavaScript and VBScript to launch executables](https://demo.wd.microsoft.com/Content/TestFile_Impede_JavaScript_and_VBScript_to_launch_executables_D3E037E1-3EB8-44C8-A917-57927947596D.js)| D3E037E1-3EB8-44C8-A917-57927947596D |
95
+
| Block execution of potentially obfuscated scripts | 5BEB7EFE-FD9A-4556-801D-275E5FFC04CC |
96
+
|[Block Win32 imports from Macro code in Office](https://demo.wd.microsoft.com/Content/Block_Win32_imports_from_Macro_code_in_Office_92E97FA1-2EDF-4476-BDD6-9DD0B4DDDC7B.docm)| 92E97FA1-2EDF-4476-BDD6-9DD0B4DDDC7B |
97
+
|[{Block Process Creations originating from PSExec & WMI commands](https://demo.wd.microsoft.com/Content/TestFile_PsexecAndWMICreateProcess_D1E49AAC-8F56-4280-B9BA-993A6D77406C.vbs)| D1E49AAC-8F56-4280-B9BA-993A6D77406C |
98
+
|[Block Execution of untrusted or unsigned executables inside removable USB media](https://demo.wd.microsoft.com/Content/UNSIGNED_ransomware_test_exe.exe)| B2B3F03D-6A65-4F7B-A9C7-1C7EF74A9BA4 |
0 commit comments