Skip to content

Commit ee50809

Browse files
committed
Update attack-surface-reduction-rules-report.md
1 parent 9e8a63d commit ee50809

File tree

1 file changed

+16
-16
lines changed

1 file changed

+16
-16
lines changed

defender-endpoint/attack-surface-reduction-rules-report.md

Lines changed: 16 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -5,8 +5,8 @@ ms.service: defender-endpoint
55
ms.subservice: asr
66
ms.localizationpriority: medium
77
audience: ITPro
8-
author: denisebmsft
9-
ms.author: deniseb
8+
author: emmwalshh
9+
ms.author: ewalsh
1010
ms.reviewer: sugamar,
1111
manager: deniseb
1212
ms.custom: asr
@@ -15,7 +15,7 @@ ms.collection:
1515
- m365-security
1616
- tier2
1717
- mde-asr
18-
ms.date: 02/17/2025
18+
ms.date: 02/19/2025
1919
search.appverid: met150
2020
---
2121

@@ -33,13 +33,13 @@ search.appverid: met150
3333

3434
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
3535

36-
The attack surface reduction rules report provides information about the attack surface reduction rules that are applied to devices in your organization. This report also provides information about:
36+
The Attack Surface Reduction Rules report provides detailed insights into the rules enforced on devices within your organization. Moreover, this report offers information about:
3737

3838
- detected threats
3939
- blocked threats
4040
- devices that aren't configured to use the standard protection rules to block threats
4141

42-
In addition, this report provides an easy-to-use interface that enables you to:
42+
In addition, the report provides an easy-to-use interface that enables you to:
4343

4444
- View threat detections
4545
- View the configuration of the ASR rules
@@ -76,7 +76,7 @@ To assign these permissions:
7676

7777
4. In **Edit role**, on the **General** tab, in **Role name**, type a name for the role.
7878

79-
5. In **Description** type a brief summary of the role.
79+
5. In **Description**, type a brief summary of the role.
8080

8181
6. In **Permissions**, select **View Data**, and under **View Data** select **Security operations**.
8282

@@ -112,9 +112,9 @@ Selecting the **ASR rules detections** link at the top of the card also opens th
112112

113113
### ASR rules configuration summary card
114114

115-
The top section focuses on three recommended rules, which protect against common attack techniques. This card shows current-state information about the computers in your organization that have the following [Three \(ASR\) standard protection rules](#simplified-standard-protection-option) set in **Block mode**, **Audit mode**, or **off** (not configured).The **Protect devices** button will show full configuration details for only the three rules; customers can quickly take action to enable these rules.
115+
The top section focuses on three recommended rules, which protect against common attack techniques. This card shows current-state information about the computers in your organization that have the following [Three \(ASR\) standard protection rules](#simplified-standard-protection-option) set in **Block mode**, **Audit mode**, or **off** (not configured). The **Protect devices** button shows full configuration details for only the three rules; customers can quickly take action to enable these rules.
116116

117-
The bottom section surfaces six rules based on the number of unprotected devices per rule. The "View configuration" button surfaces all configuration details for all ASR rules. The "Add exclusion" button shows the add exclusion page with all detected file/process names listed for Security Operation Center (SOC) to evaluate. The **Add exclusion** page is linked to Microsoft Intune.
117+
The bottom section surfaces six rules based on the number of unprotected devices per rule. The "View configuration" button surfaces all configuration details for all ASR rules. The "Add exclusion" button shows the **add exclusion** page with all detected file/process names listed for Security Operation Center (SOC) to evaluate. The **Add exclusion** page is linked to Microsoft Intune.
118118

119119
The card also includes two action buttons:
120120

@@ -173,7 +173,7 @@ Filtering provides a way for you to specify what results are returned:
173173
> When filtering by rule, the number of individual _detected_ items listed in the lower half of the report is currently limited to 200 rules. You can use **Export** to save the full list of detections to Excel.
174174
175175
> [!TIP]
176-
> As the filter currently functions in this release, every time you want to "group by", you must first scroll down to last detection in the list to load the complete data set. After you have loaded the complete data set, you can then launch the "sort by" filtering. If you don't scroll down to last detection listed on every use or when changing filtering options (for example, the ASR rules applied to the current filter run), then results will be incorrect for any result that has more than one viewable page of listed detections.
176+
> As the filter currently functions in this release, every time you want to "group by," you must first scroll down to last detection in the list to load the complete data set. After you have loaded the complete data set, you can then launch the "sort by" filtering. If you don't scroll down to last detection listed on every use or when changing filtering options (for example, the ASR rules applied to the current filter run), then results are incorrect for any result that has more than one viewable page of listed detections.
177177
178178
>:::image type="content" source="media/attack-surface-reduction-rules-report-main-tabs-search-configuration-tab.png" alt-text="Screenshot that shows the ASR rules report search feature on the configuration tab." lightbox="media/attack-surface-reduction-rules-report-main-tabs-search-configuration-tab.png":::
179179
@@ -182,8 +182,8 @@ Filtering provides a way for you to specify what results are returned:
182182
183183
### Attack surface reduction rules main detections tab
184184

185-
- **Audit Detections**: Shows how many threat detections were captured by rules set in _Audit_ mode.
186-
- **Blocked Detections**: Shows how many threat detections were blocked by rules set in _Block_ mode.
185+
- **Audit Detections**: Shows how many threat detections are captured by rules set in _Audit_ mode.
186+
- **Blocked Detections**: Shows how many threat detections are blocked by rules set in _Block_ mode.
187187
- **Large, consolidated graph**: Shows blocked and audited detections.
188188

189189
:::image type="content" source="media/attack-surface-reduction-rules-report-main-detections-tab.png" alt-text="Shows the ASR rules report main detections tab, with _Audit detections_ and _Blocked detections_ outlined." lightbox="media/attack-surface-reduction-rules-report-main-detections-tab.png":::
@@ -212,7 +212,7 @@ The "Detection" main page has a list of all detections (files/processes) in the
212212

213213
>:::image type="content" source="media/attack-surface-reduction-rules-report-main-detections-flyout.png" alt-text="Shows the ASR rules report main detections tab flyout" lightbox="media/attack-surface-reduction-rules-report-main-detections-flyout.png":::
214214
215-
The **Possible exclusion and impact** section provides impact of the selected file or process. You can:
215+
The **Possible exclusion and impact** section provides the effect of the selected file or process. You can:
216216

217217
- Select **Go hunt** which opens the Advanced Hunting query page
218218
- **Open file page** opens Microsoft Defender for Endpoint detection
@@ -272,19 +272,19 @@ The **Add exclusions** tab presents a ranked list of detections by file name and
272272
>:::image type="content" source="media/attack-surface-reduction-rules-report-exclusion-tab.png" alt-text="Shows the ASR rules report add exclusions tab" lightbox="media/attack-surface-reduction-rules-report-exclusion-tab.png":::
273273
274274
> [!IMPORTANT]
275-
> Excluding files or folders can severely reduce the protection provided by ASR rules. Excluded files are allowed to run, and no report or event will be recorded.
275+
> Excluding files or folders can severely reduce the protection provided by ASR rules. Excluded files are allowed to run, and no report or event is recorded.
276276
> If ASR rules are detecting files that you believe shouldn't be detected, you should [use audit mode first to test the rule](attack-surface-reduction-rules-deployment-test.md#step-1-test-attack-surface-reduction-rules-using-audit).
277277
278278
When you select a file, a **Summary & expected impact** fly out opens, presenting the following types of information:
279279

280280
- **Files selected** The number of files you've selected for exclusion
281-
- **(_number of_) detections** States the expected reduction in detections after adding the selected exclusion(s). The reduction in detections is represented graphically for **Actual detections** and **Detections after exclusions**
281+
- **(_number of_) detections** States the expected reduction in detections after adding the selected exclusions. The reduction in detections is represented graphically for **Actual detections** and **Detections after exclusions**
282282
- **(_number of_) affected devices** States the expected reduction in devices that report detections for the selected exclusions.
283283

284284
The Add exclusion page has two buttons for actions that can be used on any detected files (after selection). You can:
285285

286-
- **Add exclusion** which will open Microsoft Intune ASR policy page. For more information, see: [Intune](enable-attack-surface-reduction.md) in "Enable ASR rules alternate configuration methods."
287-
- **Get exclusion paths** which will download file paths in a csv format
286+
- **Add exclusion** which opens Microsoft Intune ASR policy page. For more information, see: [Intune](enable-attack-surface-reduction.md) in "Enable ASR rules alternate configuration methods."
287+
- **Get exclusion paths** which downloads file paths in a csv format
288288

289289
:::image type="content" source="media/attack-surface-reduction-rules-report-main-add-exclusions-flyout.png" alt-text="Shows the ASR rules report add exclusions tab flyout impact summary" lightbox="media/attack-surface-reduction-rules-report-main-add-exclusions-flyout.png":::
290290

0 commit comments

Comments
 (0)