Skip to content

Commit e4b907f

Browse files
committed
Merge branch 'main' into pr/2313
2 parents 4ed5837 + 75e0b40 commit e4b907f

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

defender-endpoint/attack-surface-reduction-rules-reference.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
- m365-security
1616
- tier2
1717
- mde-asr
18-
ms.date: 12/02/2024
18+
ms.date: 01/07/2025
1919
search.appverid: met150
2020
---
2121

@@ -51,7 +51,7 @@ Attack surface reduction rules are categorized as one of two types:
5151

5252
- **Standard protection rules**: Are the minimum set of rules which Microsoft recommends you always enable, while you're evaluating the effect and configuration needs of the other ASR rules. These rules typically have minimal-to-no noticeable impact on the end user.
5353

54-
- **Other rules**: Rules that require some measure of following the documented deployment steps [Plan > Test (audit) > Enable (block/warn modes)], as documented in the [Attack surface reduction rules deployment guide](attack-surface-reduction-rules-deployment.md)
54+
- **Other rules**: Rules that require some measure of following the documented deployment steps [Plan > Test (audit) > Enable (block/warn modes)], as documented in the [Attack surface reduction rules deployment guide](attack-surface-reduction-rules-deployment.md).
5555

5656
For the easiest method to enable the standard protection rules, see: [Simplified standard protection option](attack-surface-reduction-rules-report.md#simplified-standard-protection-option).
5757

@@ -180,7 +180,7 @@ Toast notifications are generated for all rules in Block mode. Rules in any othe
180180

181181
For rules with the "Rule State" specified:
182182

183-
- ASR rules with `\ASR Rule, Rule State\` combinations are used to surface alerts (toast notifications) on Microsoft Defender for Endpoint only for devices at cloud block level "High".
183+
- ASR rules with `\ASR Rule, Rule State\` combinations are used to surface alerts (toast notifications) on Microsoft Defender for Endpoint only for devices at cloud block level "High"
184184
- Devices that not at the high cloud block level don't generate alerts for any `ASR Rule, Rule State` combinations
185185
- EDR alerts are generated for ASR rules in the specified states, for devices at cloud block level "High+"
186186
- Toast notifications occur in block mode only and for devices at cloud block level "High"
@@ -320,7 +320,7 @@ Dependencies: Microsoft Defender Antivirus
320320
### Block credential stealing from the Windows local security authority subsystem
321321

322322
> [!NOTE]
323-
> If you have [LSA protection](/windows-server/security/credentials-protection-and-management/configuring-additional-lsa-protection) enabled and [Credential Guard](/windows/security/identity-protection/credential-guard) enabled, this attack surface reduction rule is not required.
323+
> If you have [LSA protection](/windows-server/security/credentials-protection-and-management/configuring-additional-lsa-protection) enabled, this attack surface reduction rule is not required. For a more secure posture, we also recommend enabling [Credential Guard](/windows/security/identity-protection/credential-guard) with the LSA protection.
324324
325325
This rule helps prevent credential stealing by locking down Local Security Authority Subsystem Service (LSASS).
326326

@@ -634,7 +634,7 @@ Dependencies: Microsoft Defender Antivirus
634634

635635
### Block Webshell creation for Servers
636636

637-
This rule blocks web shell script creation on Microsoft Server, Exchange Role. A web shell script is a specifically crafted script that allows an attacker to control the compromised server. A web shell may include functionalities such as receiving and executing malicious commands, downloading and executing malicious files, stealing and exfiltrating credentials and sensitive information, identifying potential targets etc.
637+
This rule blocks web shell script creation on Microsoft Server, Exchange Role. A web shell script is a specifically crafted script that allows an attacker to control the compromised server. A web shell may include functionalities such as receiving and executing malicious commands, downloading and executing malicious files, stealing and exfiltrating credentials and sensitive information, and identifying potential targets.
638638

639639
Intune name: `Block Webshell creation for Servers`
640640

0 commit comments

Comments
 (0)