Skip to content

Commit f520053

Browse files
authored
Merge branch 'main' into docs-editor/enable-network-protection-1748262254
2 parents ff12fd9 + 60b0794 commit f520053

File tree

1 file changed

+15
-15
lines changed

1 file changed

+15
-15
lines changed

defender-endpoint/enable-attack-surface-reduction.md

Lines changed: 15 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -136,13 +136,13 @@ The following procedures for enabling attack surface reduction rules include ins
136136
### Intune
137137

138138
> [!IMPORTANT]
139-
> If you're using Intune on Windows Server 2012 R2 and Windows Server 2016 with the [modern unified solution](onboard-server.md#functionality-in-the-modern-unified-solution-for-windows-server-2016-and-windows-server-2012-r2), you need to set the following attack surface reduction rules to `Not Configured` because they're not supported on these OS versions. Otherwise, these policies fail to apply:
140-
> - [Block persistence through Windows Management Instrumentation (WMI) event subscription](/defender-endpoint/attack-surface-reduction-rules-reference#block-persistence-through-wmi-event-subscription)
141-
> - [Block JavaScript or VBScript from launching downloaded executable content](/defender-endpoint/attack-surface-reduction-rules-reference#block-javascript-or-vbscript-from-launching-downloaded-executable-content)
142-
> - [Block Win32 API calls from Office macro](/defender-endpoint/attack-surface-reduction-rules-reference#block-win32-api-calls-from-office-macros)
139+
> If you're using Intune on Windows Server 2012 R2 and Windows Server 2016 with the [modern unified solution](onboard-server.md#functionality-in-the-modern-unified-solution-for-windows-server-2016-and-windows-server-2012-r2), you need to set the following attack surface reduction rules to `Not Configured` because they're not supported on these OS versions. Otherwise, policies containing any of these rules targeted at Windows Server 2012 R2 or Windows Server 2016 will fail to apply:
140+
- [Block persistence through Windows Management Instrumentation (WMI) event subscription](/defender-endpoint/attack-surface-reduction-rules-reference#block-persistence-through-wmi-event-subscription)
141+
- [Block JavaScript or VBScript from launching downloaded executable content](/defender-endpoint/attack-surface-reduction-rules-reference#block-javascript-or-vbscript-from-launching-downloaded-executable-content)
142+
- [Block Win32 API calls from Office macro](/defender-endpoint/attack-surface-reduction-rules-reference#block-win32-api-calls-from-office-macros)
143+
- [Block Webshell creation for Servers](/defender-endpoint/attack-surface-reduction-rules-reference), this isn't supported on Windows Server 2012 R2, but it is supported on Windows Server 2016. It only applies to the Exchange server role.
143144

144145
#### Endpoint security policy (Preferred)
145-
146146
1. Select **Endpoint Security** > **Attack surface reduction**. Choose an existing attack surface reduction rule or create a new one. To create a new one, select **Create Policy** and enter information for this profile. For **Profile type**, select **Attack surface reduction rules**. If you've chosen an existing profile, select **Properties** and then select **Settings**.
147147

148148
1. In the **Configuration settings** pane, select **Attack Surface Reduction** and then select the desired setting for each attack surface reduction rule.
@@ -159,7 +159,7 @@ The following procedures for enabling attack surface reduction rules include ins
159159

160160
1. Select **Device configuration** > **Profiles**. Choose an existing endpoint protection profile or create a new one. To create a new one, select **Create profile** and enter information for this profile. For **Profile type**, select **Endpoint protection**. If you've chosen an existing profile, select **Properties** and then select **Settings**.
161161

162-
2. In the **Endpoint protection** pane, select **Windows Defender Exploit Guard**, then select **Attack Surface Reduction**. Select the desired setting for each attack surface reduction rule.
162+
2. In the **Endpoint protection** pane, select **Windows Defender Exploit Guard**, and then select **Attack Surface Reduction**. Select the desired setting for each attack surface reduction rule.
163163

164164
3. Under **Attack Surface Reduction exceptions**, enter individual files and folders. You can also select **Import** to import a CSV file that contains files and folders to exclude from attack surface reduction rules. Each line in the CSV file should be formatted as follows:
165165

@@ -177,8 +177,8 @@ You can use Microsoft Intune OMA-URI to configure custom attack surface reductio
177177

178178
2. In **Create a profile**, in the following two drop-down lists, select the following:
179179

180-
- In **Platform**, select **Windows 10 and later**
181-
- In **Profile type**, select **Templates**
180+
- In **Platform**, select **Windows 10 and later**.
181+
- In **Profile type**, select **Templates**.
182182
- If attack surface reduction rules are already set through Endpoint security, in **Profile type**, select **Settings Catalog**.
183183

184184
3. Select **Custom**, and then select **Create**.
@@ -235,7 +235,7 @@ You can use Microsoft Intune OMA-URI to configure custom attack surface reductio
235235

236236
3. In **Value**, enter the applicable value or value range.
237237

238-
:::image type="content" source="media/mem07-5-applicability-rules.png" alt-text="The applicability rules in the Microsoft Intune admin center portal" lightbox="media/mem07-5-applicability-rules.png":::
238+
:::image type="content" source="media/mem07-5-applicability-rules.png" alt-text="The applicability rules in the Microsoft Intune admin center portal." lightbox="media/mem07-5-applicability-rules.png":::
239239

240240
11. Select **Next**. In step **6 Review + create**, review the settings and information you've selected and entered, and then select **Create**.
241241

@@ -245,7 +245,7 @@ You can use Microsoft Intune OMA-URI to configure custom attack surface reductio
245245

246246
> [!NOTE]
247247
> Regarding conflict handling, if you assign a device two different attack surface reduction policies, potential policy conflicts can occur, depending on whether rules are assigned different states, whether conflict management is in place, and whether the result is an error.
248-
> Nonconflicting rules do not result in an error, and such rules are applied correctly. The first rule is applied, and subsequent nonconflicting rules are merged into the policy.
248+
> Nonconflicting rules don't result in an error, and such rules are applied correctly. The first rule is applied, and subsequent nonconflicting rules are merged into the policy.
249249
250250
### MDM
251251

@@ -290,7 +290,7 @@ Example:
290290
6. After the policy is created, select **Close**.
291291

292292
> [!WARNING]
293-
> There is a known issue with the applicability of attack surface reduction on Server OS versions which is marked as compliant without any actual enforcement. Currently, there is no defined release date for when this will be fixed.
293+
> There's a known issue with the applicability of attack surface reduction on Server OS versions which is marked as compliant without any actual enforcement. Currently, there's no defined release date for when this will be fixed.
294294
295295
> [!IMPORTANT]
296296
> If you're using "Disable admin merge" set to `true` on devices, and you're using any of the following tools/methods, adding ASR rules per-rule exclusions or local ASR rule exclusions don't apply.
@@ -316,15 +316,15 @@ Example:
316316
- 0: Disable (Disable the attack surface reduction rule)
317317
- 1: Block (Enable the attack surface reduction rule)
318318
- 2: Audit (Evaluate how the attack surface reduction rule would impact your organization if enabled)
319-
- 6: Warn (Enable the attack surface reduction rule but allow the end-user to bypass the block)
319+
- 6: Warn (Enable the attack surface reduction rule but allow the end-user to bypass the block)
320320

321321
:::image type="content" source="media/asr-rules-gp.png" alt-text="attack surface reduction rules in Group Policy" lightbox="media/asr-rules-gp.png":::
322322

323323
5. To exclude files and folders from attack surface reduction rules, select the **Exclude files and paths from Attack surface reduction rules** setting and set the option to **Enabled**. Select **Show** and enter each file or folder in the **Value name** column. Enter **0** in the **Value** column for each item.
324324

325325
> [!WARNING]
326-
> Do not use quotes as they are not supported for either the **Value name** column or the **Value** column.
327-
> The rule ID should not have any leading or trailing spaces.
326+
> Don't use quotes as they aren't supported for either the **Value name** column or the **Value** column.
327+
> The rule ID shouldn't have any leading or trailing spaces.
328328
329329
### PowerShell
330330

@@ -333,7 +333,7 @@ Example:
333333
334334
1. Type **powershell** in the Start menu, right-click **Windows PowerShell** and select **Run as administrator**.
335335

336-
2. Type one of the following cmdlets. (For more information, such as rule ID, refer to [Attack surface reduction rules reference](attack-surface-reduction-rules-reference.md).)
336+
2. Type one of the following cmdlets. For more information, such as rule ID, refer to [Attack surface reduction rules reference](attack-surface-reduction-rules-reference.md).
337337

338338
| Task | PowerShell cmdlet|
339339
|---|---|

0 commit comments

Comments
 (0)