You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/attack-surface-reduction-rules-reference.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -131,7 +131,7 @@ The following table lists the supported operating systems for rules that are cur
131
131
|[Block rebooting machine in Safe Mode](#block-rebooting-machine-in-safe-mode)| Y | Y | Y |
132
132
|[Block untrusted and unsigned processes that run from USB](#block-untrusted-and-unsigned-processes-that-run-from-usb)| Y | Y | Y |
133
133
|[Block use of copied or impersonated system tools](#block-use-of-copied-or-impersonated-system-tools)| Y | Y | Y |
134
-
|[Block Webshell creation for Servers](#block-webshell-creation-for-servers)| N | Y <br>Exchange role only| Y <br>Exchange role only |
134
+
|[Block Webshell creation for Servers](#block-webshell-creation-for-servers)| N | Y <br>Exchange role only|Y on Windows Server 2016 <br>Exchange role only <br>N on Windows Server 2012 R2|
135
135
|[Block Win32 API calls from Office macros](#block-win32-api-calls-from-office-macros)| Y | N | N |
136
136
|[Use advanced protection against ransomware](#use-advanced-protection-against-ransomware)| Y <br> version 1803 or later | Y | Y |
Copy file name to clipboardExpand all lines: defender-endpoint/enable-attack-surface-reduction.md
+15-15Lines changed: 15 additions & 15 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -136,13 +136,13 @@ The following procedures for enabling attack surface reduction rules include ins
136
136
### Intune
137
137
138
138
> [!IMPORTANT]
139
-
> If you're using Intune on Windows Server 2012 R2 and Windows Server 2016 with the [modern unified solution](onboard-server.md#functionality-in-the-modern-unified-solution-for-windows-server-2016-and-windows-server-2012-r2), you need to set the following attack surface reduction rules to `Not Configured` because they're not supported on these OS versions. Otherwise, these policies fail to apply:
140
-
> -[Block persistence through Windows Management Instrumentation (WMI) event subscription](/defender-endpoint/attack-surface-reduction-rules-reference#block-persistence-through-wmi-event-subscription)
141
-
> -[Block JavaScript or VBScript from launching downloaded executable content](/defender-endpoint/attack-surface-reduction-rules-reference#block-javascript-or-vbscript-from-launching-downloaded-executable-content)
142
-
> -[Block Win32 API calls from Office macro](/defender-endpoint/attack-surface-reduction-rules-reference#block-win32-api-calls-from-office-macros)
139
+
> If you're using Intune on Windows Server 2012 R2 and Windows Server 2016 with the [modern unified solution](onboard-server.md#functionality-in-the-modern-unified-solution-for-windows-server-2016-and-windows-server-2012-r2), you need to set the following attack surface reduction rules to `Not Configured` because they're not supported on these OS versions. Otherwise, policies containing any of these rules targeted at Windows Server 2012 R2 or Windows Server 2016 will fail to apply:
140
+
-[Block persistence through Windows Management Instrumentation (WMI) event subscription](/defender-endpoint/attack-surface-reduction-rules-reference#block-persistence-through-wmi-event-subscription)
141
+
-[Block JavaScript or VBScript from launching downloaded executable content](/defender-endpoint/attack-surface-reduction-rules-reference#block-javascript-or-vbscript-from-launching-downloaded-executable-content)
142
+
-[Block Win32 API calls from Office macro](/defender-endpoint/attack-surface-reduction-rules-reference#block-win32-api-calls-from-office-macros)
143
+
-[Block Webshell creation for Servers](/defender-endpoint/attack-surface-reduction-rules-reference), this isn't supported on Windows Server 2012 R2, but it is supported on Windows Server 2016. It only applies to the Exchange server role.
143
144
144
145
#### Endpoint security policy (Preferred)
145
-
146
146
1. Select **Endpoint Security** > **Attack surface reduction**. Choose an existing attack surface reduction rule or create a new one. To create a new one, select **Create Policy** and enter information for this profile. For **Profile type**, select **Attack surface reduction rules**. If you've chosen an existing profile, select **Properties** and then select **Settings**.
147
147
148
148
1. In the **Configuration settings** pane, select **Attack Surface Reduction** and then select the desired setting for each attack surface reduction rule.
@@ -159,7 +159,7 @@ The following procedures for enabling attack surface reduction rules include ins
159
159
160
160
1. Select **Device configuration** > **Profiles**. Choose an existing endpoint protection profile or create a new one. To create a new one, select **Create profile** and enter information for this profile. For **Profile type**, select **Endpoint protection**. If you've chosen an existing profile, select **Properties** and then select **Settings**.
161
161
162
-
2. In the **Endpoint protection** pane, select **Windows Defender Exploit Guard**, then select **Attack Surface Reduction**. Select the desired setting for each attack surface reduction rule.
162
+
2. In the **Endpoint protection** pane, select **Windows Defender Exploit Guard**, and then select **Attack Surface Reduction**. Select the desired setting for each attack surface reduction rule.
163
163
164
164
3. Under **Attack Surface Reduction exceptions**, enter individual files and folders. You can also select **Import** to import a CSV file that contains files and folders to exclude from attack surface reduction rules. Each line in the CSV file should be formatted as follows:
165
165
@@ -177,8 +177,8 @@ You can use Microsoft Intune OMA-URI to configure custom attack surface reductio
177
177
178
178
2. In **Create a profile**, in the following two drop-down lists, select the following:
179
179
180
-
- In **Platform**, select **Windows 10 and later**
181
-
- In **Profile type**, select **Templates**
180
+
- In **Platform**, select **Windows 10 and later**.
181
+
- In **Profile type**, select **Templates**.
182
182
- If attack surface reduction rules are already set through Endpoint security, in **Profile type**, select **Settings Catalog**.
183
183
184
184
3. Select **Custom**, and then select **Create**.
@@ -235,7 +235,7 @@ You can use Microsoft Intune OMA-URI to configure custom attack surface reductio
235
235
236
236
3. In **Value**, enter the applicable value or value range.
237
237
238
-
:::image type="content" source="media/mem07-5-applicability-rules.png" alt-text="The applicability rules in the Microsoft Intune admin center portal" lightbox="media/mem07-5-applicability-rules.png":::
238
+
:::image type="content" source="media/mem07-5-applicability-rules.png" alt-text="The applicability rules in the Microsoft Intune admin center portal." lightbox="media/mem07-5-applicability-rules.png":::
239
239
240
240
11. Select **Next**. In step **6 Review + create**, review the settings and information you've selected and entered, and then select **Create**.
241
241
@@ -245,7 +245,7 @@ You can use Microsoft Intune OMA-URI to configure custom attack surface reductio
245
245
246
246
> [!NOTE]
247
247
> Regarding conflict handling, if you assign a device two different attack surface reduction policies, potential policy conflicts can occur, depending on whether rules are assigned different states, whether conflict management is in place, and whether the result is an error.
248
-
> Nonconflicting rules do not result in an error, and such rules are applied correctly. The first rule is applied, and subsequent nonconflicting rules are merged into the policy.
248
+
> Nonconflicting rules don't result in an error, and such rules are applied correctly. The first rule is applied, and subsequent nonconflicting rules are merged into the policy.
249
249
250
250
### MDM
251
251
@@ -290,7 +290,7 @@ Example:
290
290
6. After the policy is created, select **Close**.
291
291
292
292
> [!WARNING]
293
-
> There is a known issue with the applicability of attack surface reduction on Server OS versions which is marked as compliant without any actual enforcement. Currently, there is no defined release date for when this will be fixed.
293
+
> There's a known issue with the applicability of attack surface reduction on Server OS versions which is marked as compliant without any actual enforcement. Currently, there's no defined release date for when this will be fixed.
294
294
295
295
> [!IMPORTANT]
296
296
> If you're using "Disable admin merge" set to `true` on devices, and you're using any of the following tools/methods, adding ASR rules per-rule exclusions or local ASR rule exclusions don't apply.
@@ -316,15 +316,15 @@ Example:
316
316
- 0: Disable (Disable the attack surface reduction rule)
317
317
- 1: Block (Enable the attack surface reduction rule)
318
318
- 2: Audit (Evaluate how the attack surface reduction rule would impact your organization if enabled)
319
-
- 6: Warn (Enable the attack surface reduction rule but allow the end-user to bypass the block)
319
+
- 6: Warn (Enable the attack surface reduction rule but allow the end-user to bypass the block)
320
320
321
321
:::image type="content" source="media/asr-rules-gp.png" alt-text="attack surface reduction rules in Group Policy" lightbox="media/asr-rules-gp.png":::
322
322
323
323
5. To exclude files and folders from attack surface reduction rules, select the **Exclude files and paths from Attack surface reduction rules** setting and set the option to **Enabled**. Select **Show** and enter each file or folder in the **Value name** column. Enter **0** in the **Value** column for each item.
324
324
325
325
> [!WARNING]
326
-
> Do not use quotes as they are not supported for either the **Value name** column or the **Value** column.
327
-
> The rule ID should not have any leading or trailing spaces.
326
+
> Don't use quotes as they aren't supported for either the **Value name** column or the **Value** column.
327
+
> The rule ID shouldn't have any leading or trailing spaces.
328
328
329
329
### PowerShell
330
330
@@ -333,7 +333,7 @@ Example:
333
333
334
334
1. Type **powershell** in the Start menu, right-click **Windows PowerShell** and select **Run as administrator**.
335
335
336
-
2. Type one of the following cmdlets. (For more information, such as rule ID, refer to [Attack surface reduction rules reference](attack-surface-reduction-rules-reference.md).)
336
+
2. Type one of the following cmdlets. For more information, such as rule ID, refer to [Attack surface reduction rules reference](attack-surface-reduction-rules-reference.md).
Copy file name to clipboardExpand all lines: defender-endpoint/enable-network-protection.md
+19-18Lines changed: 19 additions & 18 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -66,26 +66,27 @@ To enable network protection, you can use any of the methods described in this a
66
66
| -------- | -------- |
67
67
| Enable Network Protection|Options:<br>- Enabled (block mode) Block mode is needed to block IP address/URL indicators and Web Content Filtering.<br>- Enabled (audit mode) <br>- Disabled (Default) <br>- Not Configured|
68
68
69
-
- Network Protection on Windows Server 2012 R2 and Windows Server 2016
70
-
69
+
- Network Protection on Windows Server 2012 R2 and Windows Server 2016, use the additional policy listed in the following table:
70
+
71
71
| Description|Setting|
72
72
| -------- | -------- |
73
73
|Allow Network Protection Down Level|Options:<br>- Network protection will be enabled downlevel. <br>- Network Protection will be disabled downlevel. (Default) <br>- Not Configured|
74
74
75
75
- Optional Network Protection settings for Windows and Windows Server:
76
76
77
77
> [!WARNING]
78
-
> For Domain Controllers, Windows DNS servers, Windows File Servers, Microsoft SQL servers, Microsoft Exchange servers, and others, set the `Allow Datagram Processing On WinServer` to `disabled`. These roles often generate high volumes of UDP traffic, which can affect network performance and reliability when datagram processing is enabled. Disabling this setting helps maintain network stability and optimize resource usage in demanding environments.
78
+
> Disable the `Allow Datagram Processing On WinServer` setting. This is important for any roles that generate high volumes of UDP traffic such as Domain Controllers, Windows DNS servers, Windows File Servers, Microsoft SQL servers, Microsoft Exchange servers, and others. Enabling datagram processing in these cases can reduce network performance and reliability. Disabling it helps keep the network stable and ensures better use of system resources in high-demand environments.
79
79
80
-
|Description| Setting|
81
-
| -------- | -------- |
82
-
|Allow Datagram Processing On Win Server|- Datagram processing on Windows Server is enabled. <br>- Datagram processing on Windows Server is disabled (Default, recommended). <br>- Not configured|
83
-
|Disable DNS over TCP parsing|- DNS over TCP parsing is disabled. <br>- DNS over TCP parsing is enabled (Default). <br>- Not configured|
84
-
|Disable HTTP parsing|- HTTP parsing is disabled. <br>- HTTP parsing is enabled (Default). <br>- Not configured|
85
-
|Disable SSH parsing|- SSH parsing is disabled. <br>- SSH parsing is enabled (Default). <br>- Not configured|
86
-
|Disable TLS parsing |- TLS parsing is disabled. <br>- TLS parsing is enabled (Default). <br>- Not configured|
87
-
|[Deprecated]Enable DNS Sinkhole|- DNS Sinkhole is disabled. <br>- DNS Sinkhole is enabled. (Default) <br>- Not configured|
88
80
81
+
|Description| Setting|
82
+
| -------- | -------- |
83
+
|Allow Datagram Processing On Win Server|- Datagram processing on Windows Server is enabled. <br>- Datagram processing on Windows Server is disabled (Default, recommended). <br>- Not configured|
84
+
|Disable DNS over TCP parsing|- DNS over TCP parsing is disabled. <br>- DNS over TCP parsing is enabled (Default). <br>- Not configured|
85
+
|Disable HTTP parsing|- HTTP parsing is disabled. <br>- HTTP parsing is enabled (Default). <br>- Not configured|
86
+
|Disable SSH parsing|- SSH parsing is disabled. <br>- SSH parsing is enabled (Default). <br>- Not configured|
87
+
|Disable TLS parsing |- TLS parsing is disabled. <br>- TLS parsing is enabled (Default). <br>- Not configured|
88
+
|[Deprecated]Enable DNS Sinkhole|- DNS Sinkhole is disabled. <br>- DNS Sinkhole is enabled. (Default) <br>- Not configured|
89
+
89
90
7. When you're done configuring settings, select **Next**.
90
91
91
92
8. On the **Assignments** page, select the groups that will receive this profile. Then select **Next**.
@@ -206,23 +207,23 @@ Use the following procedure to enable network protection on domain-joined comput
206
207
207
208
1. On your Windows device, click **Start**, type `powershell`, right-click **Windows PowerShell**, and then select **Run as administrator**.
208
209
209
-
2. Run the following cmdlet:
210
+
1. Run the following cmdlet:
210
211
211
212
```PowerShell
212
213
Set-MpPreference -EnableNetworkProtection Enabled
213
214
```
214
215
215
216
1. For Windows Server, use the additional commands listed in the following table:
216
217
217
-
| Windows Server version | Commands |
218
-
|---|---|
219
-
|Windows Server 2019 and later |`set-mpPreference -AllowNetworkProtectionOnWinServer $true` <br/>|
220
-
|Windows Server 2016 <br/>Windows Server 2012 R2 with the [unified agent for Microsoft Defender for Endpoint](/defender-endpoint/enable-network-protection)|`set-MpPreference -AllowNetworkProtectionDownLevel $true` <br/> `set-MpPreference -AllowNetworkProtectionOnWinServer $true` <br/>|
218
+
| Windows Server version | Commands |
219
+
|---|---|
220
+
|Windows Server 2019 and later |`set-mpPreference -AllowNetworkProtectionOnWinServer $true` <br/>|
221
+
|Windows Server 2016 <br/>Windows Server 2012 R2 with the [unified agent for Microsoft Defender for Endpoint](/defender-endpoint/enable-network-protection)|`set-MpPreference -AllowNetworkProtectionDownLevel $true` <br/> `set-MpPreference -AllowNetworkProtectionOnWinServer $true` <br/>|
221
222
222
223
> [!IMPORTANT]
223
-
> For Domain Controllers, Windows DNS servers, Windows File Servers, Microsoft SQL servers, Microsoft Exchange servers, and others, set the `AllowDatagramProcessingOnWinServer` parameter to `$false`. These roles often generate high volumes of UDP traffic, which can affect network performance and reliability when datagram processing is enabled. Disabling this setting helps maintain network stability and optimize resource usage in demanding environments.
224
+
> Disable the "AllowDatagramProcessingOnWinServer" setting. This is important for any roles that generate high volumes of UDP traffic such as Domain Controllers, Windows DNS servers, Windows File Servers, Microsoft SQL servers, Microsoft Exchange servers, and others. Enabling datagram processing in these cases can reduce network performance and reliability. Disabling it helps keep the network stable and ensures better use of system resources in high-demand environments.
224
225
225
-
4. (This step is optional.) To set network protection to audit mode, use the following cmdlet:
226
+
1. (This step is optional.) To set network protection to audit mode, use the following cmdlet:
- For DEBIAN the mdatp package requires `libc6 >= 2.23`, `uuid-runtime`, `mde-netfilter`
490
-
- For Mariner the mdatp package requires `attr`, `diffutils`, `libacl`, `libattr`, `libselinux-utils`, `selinux-policy`, `policycoreutils`, `mde-netfilter`
488
+
- The mdatp RPM package requires `glibc >= 2.17`
489
+
- For DEBIAN the mdatp package requires `libc6 >= 2.23`, `uuid-runtime`
490
+
- For Mariner the mdatp package requires `attr`, `diffutils`, `libacl`, `libattr`, `libselinux-utils`, `selinux-policy`, `policycoreutils`
491
491
492
492
> [!NOTE]
493
493
> Beginning with version `101.24082.0004`, Defender for Endpoint on Linux no longer supports the `Auditd` event provider. We're transitioning completely to the more efficient eBPF technology.
494
494
> If eBPF isn't supported on your machines, or if there are specific requirements to remain on Auditd, and your machines are using Defender for Endpoint on Linux version `101.24072.0001` or lower, the following other dependencies on the auditd package exist for mdatp:
495
495
> - The mdatp RPM package requires `audit`, `semanage`.
496
496
> - For DEBIAN, the mdatp package requires `auditd`.
497
497
> - For Mariner, the mdatp package requires `audit`.
498
-
499
-
The `mde-netfilter` package also has the following package dependencies:
500
-
501
-
- For DEBIAN, the `mde-netfilter` package requires `libnetfilter-queue1`, `libglib2.0-0`
502
-
- For RPM, the `mde-netfilter` package requires `libmnl`, `libnfnetlink`, `libnetfilter_queue`, `glib2`
503
-
- For Mariner, the `mde-netfilter` package requires `libnfnetlink`, `libnetfilter_queue`
0 commit comments