Skip to content

Commit e4eadb7

Browse files
Merge branch 'main' into docs-editor/schedule-antivirus-scans-1745951460
2 parents 5547ff2 + 1019289 commit e4eadb7

File tree

1 file changed

+6
-4
lines changed

1 file changed

+6
-4
lines changed

defender-endpoint/attack-surface-reduction-rules-reference.md

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
- m365-security
1616
- tier2
1717
- mde-asr
18-
ms.date: 04/04/2025
18+
ms.date: 04/30/2025
1919
search.appverid: met150
2020
---
2121

@@ -253,8 +253,8 @@ For rules with the "Rule State" specified:
253253

254254
> [!NOTE]
255255
> To protect your environment from vulnerable drivers, you should first implement these:
256-
> For Windows 10 or later, Windows Server 2016 or later using [Microsoft App Control for Business](/windows/security/application-security/application-control/app-control-for-business/design/microsoft-recommended-driver-block-rules), you should block all drivers by default and only allow drivers that you deem necessary and are not known to be vulnerable.
257-
> For Windows 8.1 or older, Windows Server 2012 R2 or older, using [Microsoft AppLocker](/windows/security/application-security/application-control/app-control-for-business/applocker/understanding-applocker-allow-and-deny-actions-on-rules), you should block all drivers by default and only allow drivers that you deem necessary and are not known to be vulnerable.
256+
> For Windows 10 or later, Windows Server 2016 or later using [Microsoft App Control for Business](/windows/security/application-security/application-control/app-control-for-business/design/microsoft-recommended-driver-block-rules), you should block all drivers by default and only allow drivers that you deem necessary and aren't known to be vulnerable.
257+
> For Windows 8.1 or older, Windows Server 2012 R2 or older, using [Microsoft AppLocker](/windows/security/application-security/application-control/app-control-for-business/applocker/understanding-applocker-allow-and-deny-actions-on-rules), you should block all drivers by default and only allow drivers that you deem necessary and aren't known to be vulnerable.
258258
> For Windows 11 or later, and Windows Server core 1809 or later, or Windows Server 2019 or later, you should also enable [Microsoft Windows vulnerable driver blocklist](/windows/security/application-security/application-control/app-control-for-business/design/microsoft-recommended-driver-block-rules),
259259
> Then as another layer of defense, you should enable this attack surface reduction rule.
260260
@@ -544,7 +544,9 @@ This rule prevents malware from abusing WMI to attain persistence on a device.
544544
Fileless threats employ various tactics to stay hidden, to avoid being seen in the file system, and to gain periodic execution control. Some threats can abuse the WMI repository and event model to stay hidden.
545545

546546
> [!NOTE]
547-
> If `CcmExec.exe` (SCCM Agent) is detected on the device, the ASR rule is classified as "not applicable" in Defender for Endpoint settings in the Microsoft Defender portal.
547+
> If you're utilizing Configuration Manager (CM, previously known as MEMCM or SCCM) with CcmExec.exe` (SCCM Agent), we recommend running it in audit mode for at least 60 days.
548+
> Once you're prepared to switch to block mode, ensure you deploy the appropriate ASR rules, considering any necessary rule exclusions.
549+
548550

549551
Intune name: `Persistence through WMI event subscription`
550552

0 commit comments

Comments
 (0)