You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/attack-surface-reduction-rules-reference.md
+28-29Lines changed: 28 additions & 29 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,7 +15,7 @@ ms.collection:
15
15
- m365-security
16
16
- tier2
17
17
- mde-asr
18
-
ms.date: 01/28/2025
18
+
ms.date: 02/04/2025
19
19
search.appverid: met150
20
20
---
21
21
@@ -113,33 +113,32 @@ The following table lists the supported operating systems for rules that are cur
113
113
> Unless otherwise indicated, the minimum Windows 10 build is version 1709 (RS3, build 16299) or later; the minimum Windows Server build is version 1809 or later.
114
114
> Attack surface reduction rules in Windows Server 2012 R2 and Windows Server 2016 are available for devices onboarded using the modern unified solution package. For more information, see [New Windows Server 2012 R2 and 2016 functionality in the modern unified solution](configure-server-endpoints.md#functionality-in-the-modern-unified-solution).
115
115
116
-
| Rule name| Windows 11 <br>and<br> Windows 10 | Windows Server 2022 <br>and<br> Windows Server 2019 | Windows Server | Windows Server 2016 <sup>[[1, 2](#fn1)]</sup> | Windows Server <br> 2012 R2 <sup>[[1, 2](#fn1)]</sup> |
117
-
|:---|:---:|:---:|:---:|:---:|:---:|
118
-
|[Block abuse of exploited vulnerable signed drivers](#block-abuse-of-exploited-vulnerable-signed-drivers)| Y | Y | Y <br> version 1803 (Semi-Annual Enterprise Channel) or later | Y | Y |
119
-
|[Block Adobe Reader from creating child processes](#block-adobe-reader-from-creating-child-processes)| Y <br> version 1809 or later <sup>[[3](#fn1)]</sup> | Y | Y | Y | Y |
120
-
|[Block all Office applications from creating child processes](#block-all-office-applications-from-creating-child-processes)| Y | Y | Y | Y | Y |
121
-
|[Block credential stealing from the Windows local security authority subsystem (lsass.exe)](#block-credential-stealing-from-the-windows-local-security-authority-subsystem)| Y <br> version 1803 or later <sup>[[3](#fn1)]</sup> | Y | Y | Y | Y |
122
-
|[Block executable content from email client and webmail](#block-executable-content-from-email-client-and-webmail)| Y | Y | Y | Y | Y |
123
-
|[Block executable files from running unless they meet a prevalence, age, or trusted list criterion](#block-executable-files-from-running-unless-they-meet-a-prevalence-age-or-trusted-list-criterion)| Y <br> version 1803 or later <sup>[[3](#fn1)]</sup> | Y | Y | Y | Y |
124
-
|[Block execution of potentially obfuscated scripts](#block-execution-of-potentially-obfuscated-scripts)| Y | Y | Y | Y | Y |
125
-
|[Block JavaScript or VBScript from launching downloaded executable content](#block-javascript-or-vbscript-from-launching-downloaded-executable-content)| Y | Y | Y | N |N|
126
-
|[Block Office applications from creating executable content](#block-office-applications-from-creating-executable-content)| Y | Y | Y | Y | Y |
127
-
|[Block Office applications from injecting code into other processes](#block-office-applications-from-injecting-code-into-other-processes)| Y | Y | Y | Y | Y |
128
-
|[Block Office communication application from creating child processes](#block-office-communication-application-from-creating-child-processes)| Y | Y | Y | Y | Y |
129
-
|[Block persistence through Windows Management Instrumentation (WMI) event subscription](#block-persistence-through-wmi-event-subscription)| Y <br> version 1903 (build 18362) or later <sup>[[3](#fn1)]</sup> | Y | Y <br> version 1903 (build 18362) or later | N |N|
130
-
|[Block process creations originating from PSExec and WMI commands](#block-process-creations-originating-from-psexec-and-wmi-commands)| Y <br> version 1803 or later <sup>[[3](#fn1)]</sup> | Y | Y | Y | Y |
131
-
|[Block rebooting machine in Safe Mode (preview)](#block-rebooting-machine-in-safe-mode-preview)| Y | Y | Y | Y | Y |
132
-
|[Block untrusted and unsigned processes that run from USB](#block-untrusted-and-unsigned-processes-that-run-from-usb)| Y | Y | Y | Y | Y |
133
-
|[Block use of copied or impersonated system tools (preview)](#block-use-of-copied-or-impersonated-system-tools-preview)| Y | Y | Y | Y | Y |
134
-
|[Block Webshell creation for Servers](#block-webshell-creation-for-servers)| N | Y <br>Exchange Role Only | Y <br>Exchange Role Only | Y <br>Exchange Role Only | Y <br>Exchange Role Only |
135
-
|[Block Win32 API calls from Office macros](#block-win32-api-calls-from-office-macros)| Y | N | N | N | N |
136
-
|[Use advanced protection against ransomware](#use-advanced-protection-against-ransomware)| Y <br> version 1803 or later <sup>[[3](#fn1)]</sup> | Y | Y | Y | Y |
137
-
138
-
(<aid="fn1">1</a>) Refers to the modern unified solution for Windows Server 2012 and 2016. For more information, see [Onboard Windows Servers to the Defender for Endpoint service](configure-server-endpoints.md).
139
-
140
-
(<aid="fn1">2</a>) For Windows Server 2016 and Windows Server 2012 R2, the minimum required version of Microsoft Endpoint Configuration Manager is version 2111.
141
-
142
-
(<aid="fn1">3</a>) Version and build number apply only to Windows10.
116
+
| Rule name| Windows 10 and 11 | Windows Server version 1803, 2019, and later | Windows Server 2016 and 2012 R2 |
117
+
|---|---|---|---|
118
+
|[Block abuse of exploited vulnerable signed drivers](#block-abuse-of-exploited-vulnerable-signed-drivers)| Y | Y <br> version 1803 (Semi-Annual Enterprise Channel) or later | Y |
119
+
|[Block Adobe Reader from creating child processes](#block-adobe-reader-from-creating-child-processes)| Y <br> version 1809 or later | Y | Y |
120
+
|[Block all Office applications from creating child processes](#block-all-office-applications-from-creating-child-processes)| Y | Y | Y |
121
+
|[Block credential stealing from the Windows local security authority subsystem (lsass.exe)](#block-credential-stealing-from-the-windows-local-security-authority-subsystem)| Y <br> version 1803 or later | Y | Y |
122
+
|[Block executable content from email client and webmail](#block-executable-content-from-email-client-and-webmail)| Y | Y | Y |
123
+
|[Block executable files from running unless they meet a prevalence, age, or trusted list criterion](#block-executable-files-from-running-unless-they-meet-a-prevalence-age-or-trusted-list-criterion)| Y <br> version 1803 or later | Y | Y |
124
+
|[Block execution of potentially obfuscated scripts](#block-execution-of-potentially-obfuscated-scripts)| Y | Y | Y |
125
+
|[Block JavaScript or VBScript from launching downloaded executable content](#block-javascript-or-vbscript-from-launching-downloaded-executable-content)| Y | Y | N |
126
+
|[Block Office applications from creating executable content](#block-office-applications-from-creating-executable-content)| Y | Y | Y |
127
+
|[Block Office applications from injecting code into other processes](#block-office-applications-from-injecting-code-into-other-processes)| Y | Y | Y |
128
+
|[Block Office communication application from creating child processes](#block-office-communication-application-from-creating-child-processes)| Y | Y | Y |
129
+
|[Block persistence through Windows Management Instrumentation (WMI) event subscription](#block-persistence-through-wmi-event-subscription)| Y <br> version 1903 (build 18362) or later | Y <br> version 1903 (build 18362) or later | N |
130
+
|[Block process creations originating from PSExec and WMI commands](#block-process-creations-originating-from-psexec-and-wmi-commands)| Y <br> version 1803 or later | Y | Y |
131
+
|[Block rebooting machine in Safe Mode (preview)](#block-rebooting-machine-in-safe-mode-preview)| Y | Y | Y |
132
+
|[Block untrusted and unsigned processes that run from USB](#block-untrusted-and-unsigned-processes-that-run-from-usb)| Y | Y | Y |
133
+
|[Block use of copied or impersonated system tools (preview)](#block-use-of-copied-or-impersonated-system-tools-preview)| Y | Y | Y |
134
+
|[Block Webshell creation for Servers](#block-webshell-creation-for-servers)| N | Y <br>Exchange role only | Y <br>Exchange role only |
135
+
|[Block Win32 API calls from Office macros](#block-win32-api-calls-from-office-macros)| Y | N | N |
136
+
|[Use advanced protection against ransomware](#use-advanced-protection-against-ransomware)| Y <br> version 1803 or later | Y | Y |
137
+
138
+
> [!NOTE]
139
+
> - For Windows Server 2012 R2 and Windows Server 2016, use the [modern, unified solution](/defender-endpoint/configure-server-endpoints#functionality-in-the-modern-unified-solution). If you're using Configuration Manager, the minimum required version of Microsoft Endpoint Configuration Manager is version 2111.
140
+
> - For Windows client devices, "version 1809 or later" and "version 1903 (build 18362)" apply to Windows 10 only.
141
+
> - Support for Windows Server 2025 is rolling out, beginning in February 2025 and over the next several weeks.
143
142
144
143
## ASR rules supported configuration management systems
145
144
@@ -151,7 +150,7 @@ Links to information about configuration management system versions referenced i
151
150
|[Block Adobe Reader from creating child processes](#block-adobe-reader-from-creating-child-processes)| Y || Y | Y |
152
151
|[Block all Office applications from creating child processes](#block-all-office-applications-from-creating-child-processes)| Y |Y <br><br> CB 1710 | Y | Y |
153
152
|[Block credential stealing from the Windows local security authority subsystem (lsass.exe)](#block-credential-stealing-from-the-windows-local-security-authority-subsystem)| Y | Y <br><br>CB 1802 | Y | Y |
154
-
|[Block executable content from email client and webmail](#block-executable-content-from-email-client-and-webmail)| Y |Y <br><br> CB 1710| Y| Y |
153
+
|[Block executable content from email client and webmail](#block-executable-content-from-email-client-and-webmail)| Y |Y <br><br> CB 1710 | Y |
155
154
|[Block executable files from running unless they meet a prevalence, age, or trusted list criterion](#block-executable-files-from-running-unless-they-meet-a-prevalence-age-or-trusted-list-criterion)| Y | Y <br><br> CB 1802 | Y | Y |
156
155
|[Block execution of potentially obfuscated scripts](#block-execution-of-potentially-obfuscated-scripts)| Y |Y <br><br> CB 1710 | Y | Y |
157
156
|[Block JavaScript or VBScript from launching downloaded executable content](#block-javascript-or-vbscript-from-launching-downloaded-executable-content)| Y |Y <br><br> CB 1710 | Y | Y |
Copy file name to clipboardExpand all lines: defender-endpoint/attack-surface-reduction.md
+3-2Lines changed: 3 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -16,7 +16,7 @@ ms.collection:
16
16
- tier2
17
17
- mde-asr
18
18
search.appverid: met150
19
-
ms.date: 01/10/2025
19
+
ms.date: 02/04/2025
20
20
---
21
21
22
22
# Attack surface reduction rules overview
@@ -135,13 +135,14 @@ You can set attack surface reduction rules for devices that are running any of t
135
135
- Windows 10 Pro, [version 1709](/windows/whats-new/whats-new-windows-10-version-1709) or later
136
136
- Windows 10 Enterprise, [version 1709](/windows/whats-new/whats-new-windows-10-version-1709) or later
137
137
- Windows Server, [version 1803 (Semi-Annual Channel)](/windows-server/get-started/whats-new-in-windows-server-1803) or later
138
+
- Windows Server 2025 (beginning in February 2025 and rolling out over the next several weeks)
138
139
-[Windows Server 2022](/windows-server/get-started/whats-new-in-windows-server-2022)
139
140
-[Windows Server 2019](/windows-server/get-started-19/whats-new-19)
140
141
-[Windows Server 2016](/windows-server/get-started/whats-new-in-windows-server-2016)
141
142
-[Windows Server 2012 R2](/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/hh801901(v=ws.11))
142
143
143
144
> [!NOTE]
144
-
> Windows Server 2016 and Windows Server 2012 R2 must be onboarded using the instructions in [Onboard Windows servers](configure-server-endpoints.md#windows-server-2016-and-windows-server-2012-r2) for this feature to work.
145
+
> Windows Server 2016 and Windows Server 2012 R2 must be onboarded using the instructions in [Onboard Windows servers](/defender-endpoint/configure-server-endpoints#functionality-in-the-modern-unified-solution) for this feature to work.
145
146
146
147
Although attack surface reduction rules don't require a [Windows E5 license](/windows/deployment/deploy-enterprise-licenses), if you have Windows E5, you get advanced management capabilities. The advanced capabilities - available only in Windows E5 - include:
Copy file name to clipboardExpand all lines: defender-endpoint/configure-device-connectivity.md
+2-1Lines changed: 2 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,7 +14,7 @@ ms.collection:
14
14
ms.reviewer: pahuijbr
15
15
search.appverid: MET150
16
16
audience: ITPro
17
-
ms.date: 06/11/2024
17
+
ms.date: 02/04/2025
18
18
---
19
19
20
20
# Onboarding devices using streamlined connectivity for Microsoft Defender for Endpoint
@@ -80,6 +80,7 @@ Devices must meet specific prerequisites to use the streamlined connectivity met
80
80
81
81
- Windows 10 version 1809 or later. Windows 10 versions 1607, 1703, 1709, 1803 are supported on the streamlined onboarding package but require a different URL list, see [streamlined URL sheet](https://aka.ms/MDE-streamlined-urls)
82
82
- Windows 11
83
+
- Windows Server 2025 (beginning in February 2025 and rolling out over the next several weeks)
83
84
- Windows Server 2022
84
85
- Windows Server 2019
85
86
- Windows Server 2012 R2 or Windows Server 2016, fully updated running Defender for Endpoint modern unified solution (installation through MSI).
0 commit comments