You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/enable-attack-surface-reduction.md
+41-31Lines changed: 41 additions & 31 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -103,12 +103,17 @@ When adding exclusions, keep these points in mind:
103
103
1. If a conflicting policy is applied via MDM and GP, the setting applied from GP takes precedence.
104
104
105
105
1. Attack surface reduction rules for managed devices now support behavior for merger of settings from different policies, to create a superset of policy for each device. Only the settings that aren't in conflict are merged, while those that are in conflict aren't added to the superset of rules. Previously, if two policies included conflicts for a single setting, both policies were flagged as being in conflict, and no settings from either profile would be deployed. Attack surface reduction rule merge behavior is as follows:
106
+
106
107
- Attack surface reduction rules from the following profiles are evaluated for each device to which the rules apply:
-**Endpoint security** > **Security baselines** > **Microsoft Defender ATP Baseline** > **Attack Surface Reduction Rules**. (See [Attack Surface Reduction Rules](/mem/intune/protect/security-baseline-settings-defender-atp#attack-surface-reduction-rules).)
112
+
110
113
- Settings that don't have conflicts are added to a superset of policy for the device.
114
+
111
115
- When two or more policies have conflicting settings, the conflicting settings aren't added to the combined policy, while settings that don't conflict are added to the superset policy that applies to a device.
116
+
112
117
- Only the configurations for conflicting settings are held back.
113
118
114
119
## Configuration methods
@@ -149,13 +154,13 @@ The following procedures for enabling attack surface reduction rules include ins
149
154
150
155
1. Select **Device configuration** > **Profiles**. Choose an existing endpoint protection profile or create a new one. To create a new one, select **Create profile** and enter information for this profile. For **Profile type**, select **Endpoint protection**. If you've chosen an existing profile, select **Properties** and then select **Settings**.
151
156
152
-
1. In the **Endpoint protection** pane, select **Windows Defender Exploit Guard**, then select **Attack Surface Reduction**. Select the desired setting for each attack surface reduction rule.
157
+
2. In the **Endpoint protection** pane, select **Windows Defender Exploit Guard**, then select **Attack Surface Reduction**. Select the desired setting for each attack surface reduction rule.
153
158
154
-
1. Under **Attack Surface Reduction exceptions**, enter individual files and folders. You can also select **Import** to import a CSV file that contains files and folders to exclude from attack surface reduction rules. Each line in the CSV file should be formatted as follows:
159
+
3. Under **Attack Surface Reduction exceptions**, enter individual files and folders. You can also select **Import** to import a CSV file that contains files and folders to exclude from attack surface reduction rules. Each line in the CSV file should be formatted as follows:
1. Select **OK** on the three configuration panes. Then select **Create** if you're creating a new endpoint protection file or **Save** if you're editing an existing one.
163
+
4. Select **OK** on the three configuration panes. Then select **Create** if you're creating a new endpoint protection file or **Save** if you're editing an existing one.
159
164
160
165
#### Custom profile in Intune (Alternative 2)
161
166
@@ -171,62 +176,67 @@ You can use Microsoft Intune OMA-URI to configure custom attack surface reductio
171
176
- In **Profile type**, select **Templates**
172
177
- If attack surface reduction rules are already set through Endpoint security, in **Profile type**, select **Settings Catalog**.
173
178
174
-
Select **Custom**, and then select **Create**.
179
+
3. Select **Custom**, and then select **Create**.
175
180
176
181
:::image type="content" source="media/mem02-profile-attributes.png" alt-text="The rule profile attributes in the Microsoft Intune admin center portal." lightbox="media/mem02-profile-attributes.png":::
177
182
178
-
3. The Custom template tool opens to step **1 Basics**. In **1 Basics**, in **Name**, type a name for your template, and in **Description** you can type a description (optional).
183
+
4. The Custom template tool opens to step **1 Basics**. In **1 Basics**, in **Name**, type a name for your template, and in **Description** you can type a description (optional).
179
184
180
185
:::image type="content" source="media/mem03-1-basics.png" alt-text="The basic attributes in the Microsoft Intune admin center portal" lightbox="media/mem03-1-basics.png":::
181
186
182
-
4. Click **Next**. Step **2 Configuration settings** opens. For OMA-URI Settings, click **Add**. Two options now appear: **Add** and **Export**.
187
+
5. Click **Next**. Step **2 Configuration settings** opens. For OMA-URI Settings, click **Add**. Two options now appear: **Add** and **Export**.
183
188
184
-
:::image type="content" source="media/mem04-2-configuration-settings.png" alt-text="The configuration settings in the Microsoft Intune admin center portal." lightbox="media/mem04-2-configuration-settings.png":::
189
+
:::image type="content" source="media/mem04-2-configuration-settings.png" alt-text="The configuration settings in the Microsoft Intune admin center portal." lightbox="media/mem04-2-configuration-settings.png":::
185
190
186
-
1. Click **Add** again. The **Add Row OMA-URI Settings** opens. In **Add Row**, do the following:
191
+
6. Click **Add** again. The **Add Row OMA-URI Settings** opens. In **Add Row**, fill in the following information:
187
192
188
-
- In **Name**, type a name for the rule.
189
-
- In **Description**, type a brief description.
190
-
- In **OMA-URI**, type or paste the specific OMA-URI link for the rule that you're adding. Refer to the MDM section in this article for the OMA-URI to use for this example rule. For attack surface reduction rule GUIDS, see [Per rule descriptions](attack-surface-reduction-rules-reference.md#per-rule-descriptions) in the article: Attack surface reduction rules.
191
-
- In **Data type**, select **String**.
192
-
- In **Value**, type or paste the GUID value, the \= sign and the State value with no spaces (_GUID=StateValue_). Where:
193
+
1. In **Name**, type a name for the rule.
193
194
194
-
- 0: Disable (Disable the attack surface reduction rule)
195
-
- 1: Block (Enable the attack surface reduction rule)
196
-
- 2: Audit (Evaluate how the attack surface reduction rule would impact your organization if enabled)
197
-
- 6: Warn (Enable the attack surface reduction rule but allow the end-user to bypass the block)
195
+
2. In **Description**, type a brief description.
196
+
197
+
3. In **OMA-URI**, type or paste the specific OMA-URI link for the rule that you're adding. Refer to the MDM section in this article for the OMA-URI to use for this example rule. For attack surface reduction rule GUIDS, see [Per rule descriptions](attack-surface-reduction-rules-reference.md#per-rule-descriptions).
198
+
199
+
4. In **Data type**, select **String**.
200
+
201
+
5. In **Value**, type or paste the GUID value, the `\=` sign and the State value with no spaces (`GUID=StateValue`):
202
+
203
+
-`0`: Disable (Disable the attack surface reduction rule)
204
+
-`1`: Block (Enable the attack surface reduction rule)
205
+
-`2`: Audit (Evaluate how the attack surface reduction rule would impact your organization if enabled)
206
+
-`6`: Warn (Enable the attack surface reduction rule but allow the end-user to bypass the block)
198
207
199
208
:::image type="content" source="media/mem05-add-row-oma-uri.png" alt-text="The OMA URI configuration in the Microsoft Intune admin center portal" lightbox="media/mem05-add-row-oma-uri.png":::
200
209
201
-
1. Select **Save**. **Add Row** closes. In **Custom**, select **Next**. In step **3 Scope tags**, scope tags are optional. Do one of the following:
210
+
7. Select **Save**. **Add Row** closes. In **Custom**, select **Next**. In step **3 Scope tags**, scope tags are optional. Do one of the following:
202
211
203
212
- Select **Select Scope tags**, select the scope tag (optional) and then select **Next**.
204
213
- Or select **Next**
205
214
206
-
1. In step **4 Assignments**, in **Included Groups**, for the groups that you want this rule to apply, select from the following options:
215
+
8. In step **4 Assignments**, in **Included Groups**, for the groups that you want this rule to apply, select from the following options:
207
216
208
217
-**Add groups**
209
218
-**Add all users**
210
219
-**Add all devices**
211
220
212
221
:::image type="content" source="media/mem06-4-assignments.png" alt-text="The assignments in the Microsoft Intune admin center portal" lightbox="media/mem06-4-assignments.png":::
213
222
214
-
1. In **Excluded groups**, select any groups that you want to exclude from this rule, and then select **Next**.
223
+
9. In **Excluded groups**, select any groups that you want to exclude from this rule, and then select **Next**.
224
+
225
+
10. In step **5 Applicability Rules** for the following settings, do the following:
215
226
216
-
1. In step **5 Applicability Rules** for the following settings, do the following:
227
+
1. In **Rule**, select either **Assign profile if**, or **Don't assign profile if**.
217
228
218
-
- In **Rule**, select either **Assign profile if**, or **Don't assign profile if**
229
+
2. In **Property**, select the property to which you want this rule to apply.
219
230
220
-
- In **Property**, select the property to which you want this rule to apply
221
-
- In **Value**, enter the applicable value or value range
231
+
3. In **Value**, enter the applicable value or value range.
222
232
223
233
:::image type="content" source="media/mem07-5-applicability-rules.png" alt-text="The applicability rules in the Microsoft Intune admin center portal" lightbox="media/mem07-5-applicability-rules.png":::
224
234
225
-
10. Select **Next**. In step **6 Review + create**, review the settings and information you've selected and entered, and then select **Create**.
235
+
11. Select **Next**. In step **6 Review + create**, review the settings and information you've selected and entered, and then select **Create**.
226
236
227
-
:::image type="content" source="media/mem08-6-review-create.png" alt-text="The Review and create option in the Microsoft Intune admin center portal" lightbox="media/mem08-6-review-create.png":::
237
+
:::image type="content" source="media/mem08-6-review-create.png" alt-text="The Review and create option in the Microsoft Intune admin center portal" lightbox="media/mem08-6-review-create.png":::
0 commit comments