Skip to content

Commit ecb4f6f

Browse files
authored
Merge branch 'main' into Add-preview-brackets-to-release-note
2 parents 2599d20 + e86b882 commit ecb4f6f

File tree

1 file changed

+20
-16
lines changed

1 file changed

+20
-16
lines changed

defender-endpoint/attack-surface-reduction-rules-reference.md

Lines changed: 20 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -5,8 +5,8 @@ ms.service: defender-endpoint
55
ms.subservice: asr
66
ms.localizationpriority: medium
77
audience: ITPro
8-
author: denisebmsft
9-
ms.author: deniseb
8+
author: emmwalshh
9+
ms.author: ewalsh
1010
ms.reviewer: sugamar, yongrhee
1111
manager: deniseb
1212
ms.custom: asr
@@ -15,7 +15,7 @@ ms.collection:
1515
- m365-security
1616
- tier2
1717
- mde-asr
18-
ms.date: 03/05/2025
18+
ms.date: 04/02/2025
1919
search.appverid: met150
2020
---
2121

@@ -179,7 +179,7 @@ Toast notifications are generated for all rules in Block mode. Rules in any othe
179179
For rules with the "Rule State" specified:
180180

181181
- ASR rules with `\ASR Rule, Rule State\` combinations are used to surface alerts (toast notifications) on Microsoft Defender for Endpoint only for devices set at the cloud block level `High`.
182-
- Devices that are not set at the cloud block level `High` don't generate alerts for any `ASR Rule, Rule State` combinations.
182+
- Devices that aren't set at the cloud block level `High` don't generate alerts for any `ASR Rule, Rule State` combinations.
183183
- EDR alerts are generated for ASR rules in the specified states, for devices set at the cloud block level `High+`.
184184
- Toast notifications occur in block mode only and for devices set at the cloud block level `High`.
185185

@@ -326,22 +326,22 @@ This rule helps prevent credential stealing by locking down Local Security Autho
326326

327327
LSASS authenticates users who sign in on a Windows computer. Microsoft Defender Credential Guard in Windows normally prevents attempts to extract credentials from LSASS. Some organizations can't enable Credential Guard on all of their computers because of compatibility issues with custom smartcard drivers or other programs that load into the Local Security Authority (LSA). In these cases, attackers can use tools like Mimikatz to scrape cleartext passwords and NTLM hashes from LSASS.
328328

329-
By default the state of this rule is set to block. In most cases, many processes make calls to LSASS for access rights that are not needed. For example, such as when the initial block from the ASR rule results in a subsequent call for a lesser privilege which subsequently succeeds. For information about the types of rights that are typically requested in process calls to LSASS, see [Process Security and Access Rights](/windows/win32/procthread/process-security-and-access-rights).
329+
By default the state of this rule is set to block. In most cases, many processes make calls to LSASS for access rights that aren't needed. For example, such as when the initial block from the ASR rule results in a subsequent call for a lesser privilege which then succeeds. For information about the types of rights that are typically requested in process calls to LSASS, see [Process Security and Access Rights](/windows/win32/procthread/process-security-and-access-rights).
330330

331-
Enabling this rule doesn't provide additional protection if you have LSA protection enabled since the ASR rule and LSA protection work similarly. However, when LSA protection cannot be enabled, this rule can be configured to provide equivalent protection against malware that target `lsass.exe`.
331+
Enabling this rule doesn't provide additional protection if you have LSA protection enabled since the ASR rule and LSA protection work similarly. However, when LSA protection can't be enabled, this rule can be configured to provide equivalent protection against malware that target `lsass.exe`.
332332

333333
> [!TIP]
334334
>
335335
> 1. ASR audit events don't generate toast notifications. However, since the LSASS ASR rule produces large volume of audit events, almost all of which are safe to ignore when the rule is enabled in block mode, you can choose to skip the audit mode evaluation and proceed to block mode deployment, beginning with a small set of devices and gradually expanding to cover the rest.
336-
> 2. The rule is designed to suppress block reports/toasts for friendly processes. It is also designed to drop reports for duplicate blocks. As such, the rule is well suited to be enabled in block mode, irrespective of whether toast notifications are enabled or disabled.
336+
> 2. The rule is designed to suppress block reports/toasts for friendly processes. It's also designed to drop reports for duplicate blocks. As such, the rule is well suited to be enabled in block mode, irrespective of whether toast notifications are enabled or disabled.
337337
> 3. ASR in warn mode is designed to present users with a block toast notification that includes an "Unblock" button. Due to the "safe to ignore" nature of LSASS ASR blocks and their large volume, WARN mode isn't advisable for this rule (irrespective of whether toast notifications are enabled or disabled).
338338
339339
> [!NOTE]
340340
> In this scenario, the ASR rule is classified as "not applicable" in Defender for Endpoint settings in the Microsoft Defender portal.
341341
>
342342
> The *Block credential stealing from the Windows local security authority subsystem* ASR rule doesn't support WARN mode.
343343
>
344-
> In some apps, the code enumerates all running processes and attempts to open them with exhaustive permissions. This rule denies the app's process open action and logs the details to the security event log. This rule can generate a lot of noise. If you have an app that simply enumerates LSASS, but has no real impact in functionality, there's no need to add it to the exclusion list. By itself, this event log entry doesn't necessarily indicate a malicious threat.
344+
> In some apps, the code enumerates all running processes and attempts to open them with exhaustive permissions. This rule denies the app's process open action and logs the details to the security event log. This rule can generate numerous noise. If you have an app that simply enumerates LSASS, but has no real impact in functionality, there's no need to add it to the exclusion list. By itself, this event log entry doesn't necessarily indicate a malicious threat.
345345
Intune name: `Flag credential stealing from the Windows local security authority subsystem`
346346

347347
Configuration Manager name: `Block credential stealing from the Windows local security authority subsystem`
@@ -370,6 +370,8 @@ This rule blocks email opened within the Microsoft Outlook application, or Outlo
370370
- Executable files (such as .exe, .dll, or .scr)
371371
- Script files (such as a PowerShell .ps1, Visual Basic .vbs, or JavaScript .js file)
372372

373+
- Archive files (such as .zip and others)
374+
373375
Intune name: `Execution of executable content (exe, dll, ps, js, vbs, etc.) dropped from email (webmail/mail client) (no exceptions)`
374376

375377
Microsoft Configuration Manager name: `Block executable content from email client and webmail`
@@ -435,7 +437,7 @@ Advanced hunting action type:
435437
- `AsrObfuscatedScriptAudited`
436438
- `AsrObfuscatedScriptBlocked`
437439

438-
Dependencies: Microsoft Defender Antivirus, AntiMalware Scan Interface (AMSI), Cloud Protection
440+
Dependencies: Microsoft Defender Antivirus, Anti-malware Scan Interface (AMSI), Cloud Protection
439441

440442
### Block JavaScript or VBScript from launching downloaded executable content
441443

@@ -456,7 +458,7 @@ Dependencies: Microsoft Defender Antivirus, AMSI
456458

457459
### Block Office applications from creating executable content
458460

459-
This rule prevents Office apps, including Word, Excel, and PowerPoint, from creating potentially malicious executable content, by blocking malicious code from being written to disk. Malware that abuses Office as a vector might attempt to break out of Office and save malicious components to disk. These malicious components would survive a computer reboot and persist on the system. Therefore, this rule defends against a common persistence technique. This rule also blocks execution of untrusted files that may have been saved by Office macros that are allowed to run in Office files.
461+
This rule prevents Office apps, including Word, Excel, and PowerPoint, from creating potentially malicious executable content, by blocking malicious code from being written to disk. Malware that abuses Office as a vector might attempt to break out of Office and save malicious components to disk. These malicious components would survive a computer reboot and persist on the system. Therefore, this rule defends against a common persistence technique. This rule also blocks execution of untrusted files that might have been saved by Office macros that are allowed to run in Office files.
460462

461463
Intune name: `Office apps/macros creating executable content`
462464

@@ -476,7 +478,7 @@ Dependencies: Microsoft Defender Antivirus, RPC
476478
This rule blocks code injection attempts from Office apps into other processes.
477479

478480
> [!NOTE]
479-
> The Block applications from injecting code into other processes ASR rule doesn't support WARN mode.
481+
> The Block applications from injecting code into other processes ASR rule don't support WARN mode.
480482
481483
> [!IMPORTANT]
482484
> This rule requires restarting Microsoft 365 Apps (Office applications) for the configuration changes to take effect.
@@ -574,7 +576,7 @@ Dependencies: Microsoft Defender Antivirus
574576
This rule prevents the execution of commands to restart machines in Safe Mode. Safe Mode is a diagnostic mode that only loads the essential files and drivers needed for Windows to run. However, in Safe Mode, many security products are either disabled or operate in a limited capacity, which allows attackers to further launch tampering commands, or execute and encrypt all files on the machine. This rule blocks such attacks by preventing processes from restarting machines in Safe Mode.
575577

576578
> [!NOTE]
577-
> This capability is currently in preview. Additional upgrades to improve efficacy are under development.
579+
> This capability is currently in preview. Extra upgrades to improve efficacy are under development.
578580
579581
Intune Name: `[PREVIEW] Block rebooting machine in Safe Mode`
580582

@@ -595,7 +597,7 @@ Dependencies: Microsoft Defender Antivirus
595597
With this rule, admins can prevent unsigned or untrusted executable files from running from USB removable drives, including SD cards. Blocked file types include executable files (such as .exe, .dll, or .scr)
596598

597599
> [!IMPORTANT]
598-
> Files copied from the USB to the disk drive will be blocked by this rule if and when it's about to be executed on the disk drive.
600+
> Files copied from the USB to the disk drive are blocked by this rule if and when it's about to be executed on the disk drive.
599601
600602
Intune name: `Untrusted and unsigned processes that run from USB`
601603

@@ -612,7 +614,7 @@ Dependencies: Microsoft Defender Antivirus
612614

613615
### Block use of copied or impersonated system tools (preview)
614616

615-
This rule blocks the use of executable files that are identified as copies of Windows system tools. These files are either duplicates or impostors of the original system tools. Some malicious programs may try to copy or impersonate Windows system tools to avoid detection or gain privileges. Allowing such executable files can lead to potential attacks. This rule prevents propagation and execution of such duplicates and impostors of the system tools on Windows machines.
617+
This rule blocks the use of executable files that are identified as copies of Windows system tools. These files are either duplicates or impostors of the original system tools. Some malicious programs might try to copy or impersonate Windows system tools to avoid detection or gain privileges. Allowing such executable files can lead to potential attacks. This rule prevents propagation and execution of such duplicates and impostors of the system tools on Windows machines.
616618

617619
> [!NOTE]
618620
> This capability is currently in preview. Additional upgrades to improve efficacy are under development.
@@ -635,7 +637,9 @@ Dependencies: Microsoft Defender Antivirus
635637

636638
### Block Webshell creation for Servers
637639

638-
This rule blocks web shell script creation on Microsoft Server, Exchange Role. A web shell script is a specifically crafted script that allows an attacker to control the compromised server. A web shell may include functionalities such as receiving and executing malicious commands, downloading and executing malicious files, stealing and exfiltrating credentials and sensitive information, and identifying potential targets.
640+
This rule blocks web shell script creation on Microsoft Server, Exchange Role. A web shell script is a crafted script that allows an attacker to control the compromised server.
641+
642+
A web shell might include functionalities such as receiving and executing malicious commands, downloading and executing malicious files, stealing and exfiltrating credentials and sensitive information, and identifying potential targets.
639643

640644
Intune name: `Block Webshell creation for Servers`
641645

@@ -664,7 +668,7 @@ Dependencies: Microsoft Defender Antivirus, AMSI
664668

665669
This rule provides an extra layer of protection against ransomware. It uses both client and cloud heuristics to determine whether a file resembles ransomware. This rule doesn't block files that have one or more of the following characteristics:
666670

667-
- The file has already been found to be unharmful in the Microsoft cloud.
671+
- The file is found to be unharmful in the Microsoft cloud.
668672
- The file is a valid signed file.
669673
- The file is prevalent enough to not be considered as ransomware.
670674

0 commit comments

Comments
 (0)