Skip to content

Commit df38777

Browse files
Merge pull request #3082 from MicrosoftDocs/main
Publish main to live, 03/10/24, 3:30 PM PT
2 parents 77c1d0d + bdb1577 commit df38777

File tree

2 files changed

+11
-58
lines changed

2 files changed

+11
-58
lines changed

.github/workflows/AutoLabelMsftContributor.yml

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,4 +31,5 @@ jobs:
3131
PayloadJson: ${{ needs.download-payload.outputs.WorkflowPayload }}
3232
secrets:
3333
AccessToken: ${{ secrets.GITHUB_TOKEN }}
34-
TeamReadAccessToken: ${{ secrets.ORG_READTEAMS_TOKEN }}
34+
ClientId: ${{ secrets.M365_APP_CLIENT_ID }}
35+
PrivateKey: ${{ secrets.M365_APP_PRIVATE_KEY }}

defender-endpoint/troubleshoot-asr-rules.md

Lines changed: 9 additions & 57 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.localizationpriority: medium
66
audience: ITPro
77
author: denisebmsft
88
ms.author: deniseb
9-
ms.reviewer:
9+
ms.reviewer: yongrhee
1010
manager: deniseb
1111
ms.custom:
1212
- mde-asr
@@ -17,7 +17,7 @@ ms.collection:
1717
- m365-security
1818
- tier3
1919
search.appverid: met150
20-
ms.date: 07/18/2023
20+
ms.date: 03/10/2025
2121
---
2222

2323
# Report and troubleshoot Defender for Endpoint attack surface reduction rules
@@ -68,63 +68,15 @@ The following screenshot shows the Timeline view of these events on a given endp
6868

6969
## How to troubleshoot attack surface reduction rules?
7070

71-
The first and most immediate way is to check locally, on a Windows device, which attack surface reduction rules are enabled (and their configuration) is by using the PowerShell cmdlets.
71+
Review [Troubleshoot attack surface reduction rules](/defender-endpoint/troubleshoot-asr)
7272

73-
Here are a few other sources of information that Windows offers, to troubleshoot attack surface reduction rules' impact and operation.
73+
## Related articles
7474

75-
### Querying which rules are active
75+
- [Attack surface reduction rules](attack-surface-reduction.md)
76+
- [Enable attack surface reduction rules](enable-attack-surface-reduction.md)
77+
- [Evaluate attack surface reduction rules](attack-surface-reduction-rules-deployment-test.md)
7678

77-
One of the easiest ways to determine if attack surface reduction rules are already enabled is through a PowerShell cmdlet, Get-MpPreference.
79+
- [Troubleshoot attack surface reduction rules](/defender-endpoint/troubleshoot-asr)
7880

79-
Here's an example:
80-
81-
:::image type="content" source="media/getmpreferencescriptnew.png" alt-text="The get mppreference script" lightbox="media/getmpreferencescriptnew.png":::
82-
83-
There are multiple attack surface reduction rules active, with different configured actions.
84-
85-
To expand the above information on attack surface reduction rules, you can use the properties **AttackSurfaceReductionRules_Ids** and/or **AttackSurfaceReductionRules_Actions**.
86-
87-
Example:
88-
89-
```powershell
90-
Get-MPPreference | Select-Object -ExpandProperty AttackSurfaceReductionRules_Ids
91-
```
92-
93-
:::image type="content" source="media/getmpref-examplenew.png" alt-text="The get mpreference example" lightbox="media/getmpref-examplenew.png":::
94-
95-
The above shows all the IDs for attack surface reduction rules that have a setting different from 0 (Not Configured).
96-
97-
The next step is then to list the actual actions (Block or Audit) that each rule is configured with.
98-
99-
```powershell
100-
Get-MPPreference | Select-Object -ExpandProperty AttackSurfaceReductionRules_Actions
101-
```
102-
103-
:::image type="content" source="media/getmpref-example2new.png" alt-text="The get mppreference example2" lightbox="media/getmpref-example2new.png":::
104-
105-
### Querying blocking and auditing events
106-
107-
attack surface reduction rule events can be viewed within the Windows Defender log.
108-
109-
To access it, open Windows Event Viewer, and browse to **Applications and Services Logs** \> **Microsoft** \> **Windows** \> **Windows Defender** \> **Operational**.
110-
111-
:::image type="content" source="media/eventviewerscrnew.png" alt-text="The Event Viewer page" lightbox="media/eventviewerscrnew.png":::
112-
113-
## Microsoft Defender Antimalware Protection Logs
114-
115-
You can also view rule events through the Microsoft Defender Antivirus dedicated command-line tool, called `*mpcmdrun.exe*`, that can be used to manage and configure, and automate tasks if needed.
116-
117-
You can find this utility in *%ProgramFiles%\Windows Defender\MpCmdRun.exe*. You must run it from an elevated command prompt (that is, run as Admin).
118-
119-
To generate the support information, type *MpCmdRun.exe -getfiles*. After a while, several logs will be packaged into an archive (MpSupportFiles.cab) and made available in *C:\ProgramData\Microsoft\Windows Defender\Support*.
120-
121-
:::image type="content" source="media/malware-prot-logsnew.png" alt-text="The malware protection logs" lightbox="media/malware-prot-logsnew.png":::
122-
123-
Extract that archive and you'll have many files available for troubleshooting purposes.
124-
125-
The most relevant files are as follows:
126-
127-
- **MPOperationalEvents.txt**: This file contains same level of information found in Event Viewer for Windows Defender's Operational log.
128-
- **MPRegistry.txt**: In this file you can analyze all the current Windows Defender configurations, from the moment the support logs were captured.
129-
- **MPLog.txt**: This log contains more verbose information about all the actions/operations of the Windows Defender.
13081
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]
82+

0 commit comments

Comments
 (0)