Skip to content

Commit d01c60d

Browse files
committed
Update enable-attack-surface-reduction.md
1 parent 7eb7423 commit d01c60d

File tree

1 file changed

+41
-31
lines changed

1 file changed

+41
-31
lines changed

defender-endpoint/enable-attack-surface-reduction.md

Lines changed: 41 additions & 31 deletions
Original file line numberDiff line numberDiff line change
@@ -103,12 +103,17 @@ When adding exclusions, keep these points in mind:
103103
1. If a conflicting policy is applied via MDM and GP, the setting applied from GP takes precedence.
104104

105105
1. Attack surface reduction rules for managed devices now support behavior for merger of settings from different policies, to create a superset of policy for each device. Only the settings that aren't in conflict are merged, while those that are in conflict aren't added to the superset of rules. Previously, if two policies included conflicts for a single setting, both policies were flagged as being in conflict, and no settings from either profile would be deployed. Attack surface reduction rule merge behavior is as follows:
106+
106107
- Attack surface reduction rules from the following profiles are evaluated for each device to which the rules apply:
107-
- Devices > Configuration profiles > Endpoint protection profile > **Microsoft Defender Exploit Guard** > [Attack Surface Reduction](/mem/intune/protect/endpoint-protection-windows-10#attack-surface-reduction-rules).
108-
- Endpoint security > **Attack surface reduction policy** > [Attack surface reduction rules](/mem/intune/protect/endpoint-security-asr-policy#devices-managed-by-intune).
109-
- Endpoint security > Security baselines > **Microsoft Defender ATP Baseline** > [Attack Surface Reduction Rules](/mem/intune/protect/security-baseline-settings-defender-atp#attack-surface-reduction-rules).
108+
109+
- **Devices** > **Configuration profiles** > **Endpoint protection profile** > **Microsoft Defender Exploit Guard** > **Attack Surface Reduction**. (See [Attack Surface Reduction](/mem/intune/protect/endpoint-protection-windows-10#attack-surface-reduction-rules).)
110+
- **Endpoint security** > **Attack surface reduction policy** > **Attack surface reduction rules**. (See [Attack surface reduction rules](/mem/intune/protect/endpoint-security-asr-policy#devices-managed-by-intune).)
111+
- **Endpoint security** > **Security baselines** > **Microsoft Defender ATP Baseline** > **Attack Surface Reduction Rules**. (See [Attack Surface Reduction Rules](/mem/intune/protect/security-baseline-settings-defender-atp#attack-surface-reduction-rules).)
112+
110113
- Settings that don't have conflicts are added to a superset of policy for the device.
114+
111115
- When two or more policies have conflicting settings, the conflicting settings aren't added to the combined policy, while settings that don't conflict are added to the superset policy that applies to a device.
116+
112117
- Only the configurations for conflicting settings are held back.
113118

114119
## Configuration methods
@@ -149,13 +154,13 @@ The following procedures for enabling attack surface reduction rules include ins
149154

150155
1. Select **Device configuration** > **Profiles**. Choose an existing endpoint protection profile or create a new one. To create a new one, select **Create profile** and enter information for this profile. For **Profile type**, select **Endpoint protection**. If you've chosen an existing profile, select **Properties** and then select **Settings**.
151156

152-
1. In the **Endpoint protection** pane, select **Windows Defender Exploit Guard**, then select **Attack Surface Reduction**. Select the desired setting for each attack surface reduction rule.
157+
2. In the **Endpoint protection** pane, select **Windows Defender Exploit Guard**, then select **Attack Surface Reduction**. Select the desired setting for each attack surface reduction rule.
153158

154-
1. Under **Attack Surface Reduction exceptions**, enter individual files and folders. You can also select **Import** to import a CSV file that contains files and folders to exclude from attack surface reduction rules. Each line in the CSV file should be formatted as follows:
159+
3. Under **Attack Surface Reduction exceptions**, enter individual files and folders. You can also select **Import** to import a CSV file that contains files and folders to exclude from attack surface reduction rules. Each line in the CSV file should be formatted as follows:
155160

156-
`C:\folder`, `%ProgramFiles%\folder\file`, `C:\path`
161+
`C:\folder`, `%ProgramFiles%\folder\file`, `C:\path`
157162

158-
1. Select **OK** on the three configuration panes. Then select **Create** if you're creating a new endpoint protection file or **Save** if you're editing an existing one.
163+
4. Select **OK** on the three configuration panes. Then select **Create** if you're creating a new endpoint protection file or **Save** if you're editing an existing one.
159164

160165
#### Custom profile in Intune (Alternative 2)
161166

@@ -171,62 +176,67 @@ You can use Microsoft Intune OMA-URI to configure custom attack surface reductio
171176
- In **Profile type**, select **Templates**
172177
- If attack surface reduction rules are already set through Endpoint security, in **Profile type**, select **Settings Catalog**.
173178

174-
Select **Custom**, and then select **Create**.
179+
3. Select **Custom**, and then select **Create**.
175180

176181
:::image type="content" source="media/mem02-profile-attributes.png" alt-text="The rule profile attributes in the Microsoft Intune admin center portal." lightbox="media/mem02-profile-attributes.png":::
177182

178-
3. The Custom template tool opens to step **1 Basics**. In **1 Basics**, in **Name**, type a name for your template, and in **Description** you can type a description (optional).
183+
4. The Custom template tool opens to step **1 Basics**. In **1 Basics**, in **Name**, type a name for your template, and in **Description** you can type a description (optional).
179184

180185
:::image type="content" source="media/mem03-1-basics.png" alt-text="The basic attributes in the Microsoft Intune admin center portal" lightbox="media/mem03-1-basics.png":::
181186

182-
4. Click **Next**. Step **2 Configuration settings** opens. For OMA-URI Settings, click **Add**. Two options now appear: **Add** and **Export**.
187+
5. Click **Next**. Step **2 Configuration settings** opens. For OMA-URI Settings, click **Add**. Two options now appear: **Add** and **Export**.
183188

184-
:::image type="content" source="media/mem04-2-configuration-settings.png" alt-text="The configuration settings in the Microsoft Intune admin center portal." lightbox="media/mem04-2-configuration-settings.png":::
189+
:::image type="content" source="media/mem04-2-configuration-settings.png" alt-text="The configuration settings in the Microsoft Intune admin center portal." lightbox="media/mem04-2-configuration-settings.png":::
185190

186-
1. Click **Add** again. The **Add Row OMA-URI Settings** opens. In **Add Row**, do the following:
191+
6. Click **Add** again. The **Add Row OMA-URI Settings** opens. In **Add Row**, fill in the following information:
187192

188-
- In **Name**, type a name for the rule.
189-
- In **Description**, type a brief description.
190-
- In **OMA-URI**, type or paste the specific OMA-URI link for the rule that you're adding. Refer to the MDM section in this article for the OMA-URI to use for this example rule. For attack surface reduction rule GUIDS, see [Per rule descriptions](attack-surface-reduction-rules-reference.md#per-rule-descriptions) in the article: Attack surface reduction rules.
191-
- In **Data type**, select **String**.
192-
- In **Value**, type or paste the GUID value, the \= sign and the State value with no spaces (_GUID=StateValue_). Where:
193+
1. In **Name**, type a name for the rule.
193194

194-
- 0: Disable (Disable the attack surface reduction rule)
195-
- 1: Block (Enable the attack surface reduction rule)
196-
- 2: Audit (Evaluate how the attack surface reduction rule would impact your organization if enabled)
197-
- 6: Warn (Enable the attack surface reduction rule but allow the end-user to bypass the block)
195+
2. In **Description**, type a brief description.
196+
197+
3. In **OMA-URI**, type or paste the specific OMA-URI link for the rule that you're adding. Refer to the MDM section in this article for the OMA-URI to use for this example rule. For attack surface reduction rule GUIDS, see [Per rule descriptions](attack-surface-reduction-rules-reference.md#per-rule-descriptions).
198+
199+
4. In **Data type**, select **String**.
200+
201+
5. In **Value**, type or paste the GUID value, the `\=` sign and the State value with no spaces (`GUID=StateValue`):
202+
203+
- `0`: Disable (Disable the attack surface reduction rule)
204+
- `1`: Block (Enable the attack surface reduction rule)
205+
- `2`: Audit (Evaluate how the attack surface reduction rule would impact your organization if enabled)
206+
- `6`: Warn (Enable the attack surface reduction rule but allow the end-user to bypass the block)
198207

199208
:::image type="content" source="media/mem05-add-row-oma-uri.png" alt-text="The OMA URI configuration in the Microsoft Intune admin center portal" lightbox="media/mem05-add-row-oma-uri.png":::
200209

201-
1. Select **Save**. **Add Row** closes. In **Custom**, select **Next**. In step **3 Scope tags**, scope tags are optional. Do one of the following:
210+
7. Select **Save**. **Add Row** closes. In **Custom**, select **Next**. In step **3 Scope tags**, scope tags are optional. Do one of the following:
202211

203212
- Select **Select Scope tags**, select the scope tag (optional) and then select **Next**.
204213
- Or select **Next**
205214

206-
1. In step **4 Assignments**, in **Included Groups**, for the groups that you want this rule to apply, select from the following options:
215+
8. In step **4 Assignments**, in **Included Groups**, for the groups that you want this rule to apply, select from the following options:
207216

208217
- **Add groups**
209218
- **Add all users**
210219
- **Add all devices**
211220

212221
:::image type="content" source="media/mem06-4-assignments.png" alt-text="The assignments in the Microsoft Intune admin center portal" lightbox="media/mem06-4-assignments.png":::
213222

214-
1. In **Excluded groups**, select any groups that you want to exclude from this rule, and then select **Next**.
223+
9. In **Excluded groups**, select any groups that you want to exclude from this rule, and then select **Next**.
224+
225+
10. In step **5 Applicability Rules** for the following settings, do the following:
215226

216-
1. In step **5 Applicability Rules** for the following settings, do the following:
227+
1. In **Rule**, select either **Assign profile if**, or **Don't assign profile if**.
217228

218-
- In **Rule**, select either **Assign profile if**, or **Don't assign profile if**
229+
2. In **Property**, select the property to which you want this rule to apply.
219230

220-
- In **Property**, select the property to which you want this rule to apply
221-
- In **Value**, enter the applicable value or value range
231+
3. In **Value**, enter the applicable value or value range.
222232

223233
:::image type="content" source="media/mem07-5-applicability-rules.png" alt-text="The applicability rules in the Microsoft Intune admin center portal" lightbox="media/mem07-5-applicability-rules.png":::
224234

225-
10. Select **Next**. In step **6 Review + create**, review the settings and information you've selected and entered, and then select **Create**.
235+
11. Select **Next**. In step **6 Review + create**, review the settings and information you've selected and entered, and then select **Create**.
226236

227-
:::image type="content" source="media/mem08-6-review-create.png" alt-text="The Review and create option in the Microsoft Intune admin center portal" lightbox="media/mem08-6-review-create.png":::
237+
:::image type="content" source="media/mem08-6-review-create.png" alt-text="The Review and create option in the Microsoft Intune admin center portal" lightbox="media/mem08-6-review-create.png":::
228238

229-
Rules are active and live within minutes.
239+
Rules are active and live within minutes.
230240

231241
> [!NOTE]
232242
> Conflict handling:

0 commit comments

Comments
 (0)