You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The attack surface reduction rules report provides information about the attack surface reduction rules that are applied to devices in your organization. This report also provides information about:
36
+
The Attack Surface Reduction Rules report provides detailed insights into the rules enforced on devices within your organization. Moreover, this report offers information about:
37
37
38
38
- detected threats
39
39
- blocked threats
40
40
- devices that aren't configured to use the standard protection rules to block threats
41
41
42
-
In addition, this report provides an easy-to-use interface that enables you to:
42
+
In addition, the report provides an easy-to-use interface that enables you to:
43
43
44
44
- View threat detections
45
45
- View the configuration of the ASR rules
@@ -76,7 +76,7 @@ To assign these permissions:
76
76
77
77
4. In **Edit role**, on the **General** tab, in **Role name**, type a name for the role.
78
78
79
-
5. In **Description** type a brief summary of the role.
79
+
5. In **Description**, type a brief summary of the role.
80
80
81
81
6. In **Permissions**, select **View Data**, and under **View Data** select **Security operations**.
82
82
@@ -112,9 +112,9 @@ Selecting the **ASR rules detections** link at the top of the card also opens th
112
112
113
113
### ASR rules configuration summary card
114
114
115
-
The top section focuses on three recommended rules, which protect against common attack techniques. This card shows current-state information about the computers in your organization that have the following [Three \(ASR\) standard protection rules](#simplified-standard-protection-option) set in **Block mode**, **Audit mode**, or **off** (not configured).The **Protect devices** button will show full configuration details for only the three rules; customers can quickly take action to enable these rules.
115
+
The top section focuses on three recommended rules, which protect against common attack techniques. This card shows current-state information about the computers in your organization that have the following [Three \(ASR\) standard protection rules](#simplified-standard-protection-option) set in **Block mode**, **Audit mode**, or **off** (not configured).The **Protect devices** button shows full configuration details for only the three rules; customers can quickly take action to enable these rules.
116
116
117
-
The bottom section surfaces six rules based on the number of unprotected devices per rule. The "View configuration" button surfaces all configuration details for all ASR rules. The "Add exclusion" button shows the add exclusion page with all detected file/process names listed for Security Operation Center (SOC) to evaluate. The **Add exclusion** page is linked to Microsoft Intune.
117
+
The bottom section surfaces six rules based on the number of unprotected devices per rule. The "View configuration" button surfaces all configuration details for all ASR rules. The "Add exclusion" button shows the **add exclusion** page with all detected file/process names listed for Security Operation Center (SOC) to evaluate. The **Add exclusion** page is linked to Microsoft Intune.
118
118
119
119
The card also includes two action buttons:
120
120
@@ -173,7 +173,7 @@ Filtering provides a way for you to specify what results are returned:
173
173
> When filtering by rule, the number of individual _detected_ items listed in the lower half of the report is currently limited to 200 rules. You can use **Export** to save the full list of detections to Excel.
174
174
175
175
> [!TIP]
176
-
> As the filter currently functions in this release, every time you want to "group by", you must first scroll down to last detection in the list to load the complete data set. After you have loaded the complete data set, you can then launch the "sort by" filtering. If you don't scroll down to last detection listed on every use or when changing filtering options (for example, the ASR rules applied to the current filter run), then results will be incorrect for any result that has more than one viewable page of listed detections.
176
+
> As the filter currently functions in this release, every time you want to "group by," you must first scroll down to last detection in the list to load the complete data set. After you have loaded the complete data set, you can then launch the "sort by" filtering. If you don't scroll down to last detection listed on every use or when changing filtering options (for example, the ASR rules applied to the current filter run), then results are incorrect for any result that has more than one viewable page of listed detections.
177
177
178
178
>:::image type="content" source="media/attack-surface-reduction-rules-report-main-tabs-search-configuration-tab.png" alt-text="Screenshot that shows the ASR rules report search feature on the configuration tab." lightbox="media/attack-surface-reduction-rules-report-main-tabs-search-configuration-tab.png":::
179
179
@@ -182,8 +182,8 @@ Filtering provides a way for you to specify what results are returned:
182
182
183
183
### Attack surface reduction rules main detections tab
184
184
185
-
-**Audit Detections**: Shows how many threat detections were captured by rules set in _Audit_ mode.
186
-
-**Blocked Detections**: Shows how many threat detections were blocked by rules set in _Block_ mode.
185
+
-**Audit Detections**: Shows how many threat detections are captured by rules set in _Audit_ mode.
186
+
-**Blocked Detections**: Shows how many threat detections are blocked by rules set in _Block_ mode.
187
187
-**Large, consolidated graph**: Shows blocked and audited detections.
188
188
189
189
:::image type="content" source="media/attack-surface-reduction-rules-report-main-detections-tab.png" alt-text="Shows the ASR rules report main detections tab, with _Audit detections_ and _Blocked detections_ outlined." lightbox="media/attack-surface-reduction-rules-report-main-detections-tab.png":::
@@ -212,7 +212,7 @@ The "Detection" main page has a list of all detections (files/processes) in the
212
212
213
213
>:::image type="content" source="media/attack-surface-reduction-rules-report-main-detections-flyout.png" alt-text="Shows the ASR rules report main detections tab flyout" lightbox="media/attack-surface-reduction-rules-report-main-detections-flyout.png":::
214
214
215
-
The **Possible exclusion and impact** section provides impact of the selected file or process. You can:
215
+
The **Possible exclusion and impact** section provides the effect of the selected file or process. You can:
216
216
217
217
- Select **Go hunt** which opens the Advanced Hunting query page
218
218
-**Open file page** opens Microsoft Defender for Endpoint detection
@@ -272,19 +272,19 @@ The **Add exclusions** tab presents a ranked list of detections by file name and
272
272
>:::image type="content" source="media/attack-surface-reduction-rules-report-exclusion-tab.png" alt-text="Shows the ASR rules report add exclusions tab" lightbox="media/attack-surface-reduction-rules-report-exclusion-tab.png":::
273
273
274
274
> [!IMPORTANT]
275
-
> Excluding files or folders can severely reduce the protection provided by ASR rules. Excluded files are allowed to run, and no report or event will be recorded.
275
+
> Excluding files or folders can severely reduce the protection provided by ASR rules. Excluded files are allowed to run, and no report or event is recorded.
276
276
> If ASR rules are detecting files that you believe shouldn't be detected, you should [use audit mode first to test the rule](attack-surface-reduction-rules-deployment-test.md#step-1-test-attack-surface-reduction-rules-using-audit).
277
277
278
278
When you select a file, a **Summary & expected impact** fly out opens, presenting the following types of information:
279
279
280
280
-**Files selected** The number of files you've selected for exclusion
281
-
-**(_number of_) detections** States the expected reduction in detections after adding the selected exclusion(s). The reduction in detections is represented graphically for **Actual detections** and **Detections after exclusions**
281
+
-**(_number of_) detections** States the expected reduction in detections after adding the selected exclusions. The reduction in detections is represented graphically for **Actual detections** and **Detections after exclusions**
282
282
-**(_number of_) affected devices** States the expected reduction in devices that report detections for the selected exclusions.
283
283
284
284
The Add exclusion page has two buttons for actions that can be used on any detected files (after selection). You can:
285
285
286
-
-**Add exclusion** which will open Microsoft Intune ASR policy page. For more information, see: [Intune](enable-attack-surface-reduction.md) in "Enable ASR rules alternate configuration methods."
287
-
-**Get exclusion paths** which will download file paths in a csv format
286
+
-**Add exclusion** which opens Microsoft Intune ASR policy page. For more information, see: [Intune](enable-attack-surface-reduction.md) in "Enable ASR rules alternate configuration methods."
287
+
-**Get exclusion paths** which downloads file paths in a csv format
288
288
289
289
:::image type="content" source="media/attack-surface-reduction-rules-report-main-add-exclusions-flyout.png" alt-text="Shows the ASR rules report add exclusions tab flyout impact summary" lightbox="media/attack-surface-reduction-rules-report-main-add-exclusions-flyout.png":::
0 commit comments