mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-14 14:27:22 +00:00
Merged PR 14291: Major updates to ASR rules topics
Major updates to ASR rules topics
This commit is contained in:
commit
6e98f99499
@ -136,7 +136,6 @@
|
|||||||
#### [Controlled folder access](../windows-defender-exploit-guard/enable-controlled-folders-exploit-guard.md)
|
#### [Controlled folder access](../windows-defender-exploit-guard/enable-controlled-folders-exploit-guard.md)
|
||||||
##### [Customize controlled folder access](../windows-defender-exploit-guard/customize-controlled-folders-exploit-guard.md)
|
##### [Customize controlled folder access](../windows-defender-exploit-guard/customize-controlled-folders-exploit-guard.md)
|
||||||
#### [Attack surface reduction controls](../windows-defender-exploit-guard/enable-attack-surface-reduction.md)
|
#### [Attack surface reduction controls](../windows-defender-exploit-guard/enable-attack-surface-reduction.md)
|
||||||
##### [Customize attack surface reduction](../windows-defender-exploit-guard/customize-attack-surface-reduction.md)
|
|
||||||
#### [Network firewall](../windows-firewall/windows-firewall-with-advanced-security-deployment-guide.md)
|
#### [Network firewall](../windows-firewall/windows-firewall-with-advanced-security-deployment-guide.md)
|
||||||
|
|
||||||
|
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Use attack surface reduction rules to prevent malware infection
|
title: Use attack surface reduction rules to prevent malware infection
|
||||||
description: ASR rules can help prevent exploits from using apps and scripts to infect machines with malware
|
description: Attack surface reduction rules can help prevent exploits from using apps and scripts to infect machines with malware
|
||||||
keywords: Attack surface reduction, hips, host intrusion prevention system, protection rules, anti-exploit, antiexploit, exploit, infection prevention
|
keywords: Attack surface reduction, hips, host intrusion prevention system, protection rules, anti-exploit, antiexploit, exploit, infection prevention
|
||||||
search.product: eADQiWindows 10XVcnh
|
search.product: eADQiWindows 10XVcnh
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
@ -11,7 +11,6 @@ ms.pagetype: security
|
|||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
author: andreabichsel
|
author: andreabichsel
|
||||||
ms.author: v-anbic
|
ms.author: v-anbic
|
||||||
ms.date: 11/29/2018
|
|
||||||
---
|
---
|
||||||
|
|
||||||
# Reduce attack surfaces with attack surface reduction rules
|
# Reduce attack surfaces with attack surface reduction rules
|
||||||
@ -20,26 +19,25 @@ ms.date: 11/29/2018
|
|||||||
|
|
||||||
- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf)
|
- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf)
|
||||||
|
|
||||||
Attack surface reduction rules help prevent actions and apps that are typically used by exploit-seeking malware to infect machines. This feature is part of Windows Defender Advanced Threat Protection and provides:
|
Attack surface reduction rules help prevent behaviors malware often uses to infect computers with malicious code. You can set attack surface reduction rules for computers running Windows 10, version 1803 or later, or Windows Server 2019.
|
||||||
|
|
||||||
|
To use attack surface reduction rules, you need a Windows 10 Enterprise E3 license or higher. A Windows E5 license gives you the advanced management capabilities to power them. These include monitoring, analytics, and workflows available in [Windows Defender Advanced Threat Protection](../windows-defender-atp/windows-defender-advanced-threat-protection.md), as well as reporting and configuration capabilities in the M365 Security Center. These advanced capabilities aren't available with an E3 license, but you can use attack surface reduction rule events in Event Viewer to help facilitate deployment.
|
||||||
|
|
||||||
|
Attack surface reduction rules target behaviors that malware and malicious apps typically use to infect computers, including:
|
||||||
|
|
||||||
- Rules you can set to enable or disable specific behaviors that are typically used by malware and malicious apps to infect machines, such as:
|
|
||||||
- Executable files and scripts used in Office apps or web mail that attempt to download or run files
|
- Executable files and scripts used in Office apps or web mail that attempt to download or run files
|
||||||
- Scripts that are obfuscated or otherwise suspicious
|
- Obfuscated or otherwise suspicious scripts
|
||||||
- Behaviors that apps undertake that are not usually initiated during normal day-to-day work
|
- Behaviors that apps don't usually initiate during normal day-to-day work
|
||||||
- Centralized monitoring and reporting with deep optics that help you connect the dots across events, computers and devices, and networks
|
|
||||||
- Analytics to enable ease of deployment, by using [audit mode](audit-windows-defender-exploit-guard.md) to show how attack surface reduction rules would impact your organization if they were enabled
|
|
||||||
|
|
||||||
When an attack surface reduction rule is triggered, a notification displays from the Action Center on the user's computer. You can [customize the notification](customize-attack-surface-reduction.md#customize-the-notification) with your company details and contact information.
|
You can use [audit mode](audit-windows-defender-exploit-guard.md) to evaluate how attack surface reduction rules would impact your organization if they were enabled. It's best to run all rules in audit mode first so you can understand their impact on your line-of-business applications. Many line-of-business applications are written with limited security concerns, and they may perform tasks similar to malware. By monitoring audit data and [adding exclusions](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-exploit-guard/enable-attack-surface-reduction#exclude-files-and-folders-from-asr-rules) for necessary applications, you can deploy attack surface reduction rules without impacting productivity.
|
||||||
|
|
||||||
Attack surface reduction is supported on Windows 10, version 1709 and later and Windows Server 2019.
|
Triggered rules display a notification on the device. You can [customize the notification](customize-attack-surface-reduction.md#customize-the-notification) with your company details and contact information. The notification also displays in the Windows Defender ATP Security Center and on the M365 console.
|
||||||
|
|
||||||
## Requirements
|
For information about configuring attack surface reduction rules, see [Enable attack surface reduction rules](enable-attack-surface-reduction.md).
|
||||||
|
|
||||||
Attack surface reduction rules are a feature of Windows Defender ATP and require Windows 10 Enterprise E5 and [Windows Defender AV real-time protection](../windows-defender-antivirus/configure-real-time-protection-windows-defender-antivirus.md).
|
|
||||||
|
|
||||||
## Attack surface reduction rules
|
## Attack surface reduction rules
|
||||||
|
|
||||||
The following sections describe what each rule does. Each rule is identified by a rule GUID, as in the following table.
|
The following sections describe each of the 15 attack surface reduction rules. This table shows their corresponding GUIDs, which you use if you're configuring the rules with Group Policy:
|
||||||
|
|
||||||
Rule name | GUID
|
Rule name | GUID
|
||||||
-|-
|
-|-
|
||||||
@ -50,7 +48,7 @@ Block Office applications from injecting code into other processes | 75668C1F-73
|
|||||||
Block JavaScript or VBScript from launching downloaded executable content | D3E037E1-3EB8-44C8-A917-57927947596D
|
Block JavaScript or VBScript from launching downloaded executable content | D3E037E1-3EB8-44C8-A917-57927947596D
|
||||||
Block execution of potentially obfuscated scripts | 5BEB7EFE-FD9A-4556-801D-275E5FFC04CC
|
Block execution of potentially obfuscated scripts | 5BEB7EFE-FD9A-4556-801D-275E5FFC04CC
|
||||||
Block Win32 API calls from Office macro | 92E97FA1-2EDF-4476-BDD6-9DD0B4DDDC7B
|
Block Win32 API calls from Office macro | 92E97FA1-2EDF-4476-BDD6-9DD0B4DDDC7B
|
||||||
Block executable files from running unless they meet a prevalence, age, or trusted list criteria | 01443614-cd74-433a-b99e-2ecdc07bfc25
|
Block executable files from running unless they meet a prevalence, age, or trusted list criterion | 01443614-cd74-433a-b99e-2ecdc07bfc25
|
||||||
Use advanced protection against ransomware | c1db55ab-c21a-4637-bb3f-a12568109d35
|
Use advanced protection against ransomware | c1db55ab-c21a-4637-bb3f-a12568109d35
|
||||||
Block credential stealing from the Windows local security authority subsystem (lsass.exe) | 9e6c4e1f-7d60-472f-ba1a-a39ef669e4b2
|
Block credential stealing from the Windows local security authority subsystem (lsass.exe) | 9e6c4e1f-7d60-472f-ba1a-a39ef669e4b2
|
||||||
Block process creations originating from PSExec and WMI commands | d1e49aac-8f56-4280-b9ba-993a6d77406c
|
Block process creations originating from PSExec and WMI commands | d1e49aac-8f56-4280-b9ba-993a6d77406c
|
||||||
@ -58,147 +56,186 @@ Block untrusted and unsigned processes that run from USB | b2b3f03d-6a65-4f7b-a9
|
|||||||
Block Office communication application from creating child processes | 26190899-1602-49e8-8b27-eb1d0a1ce869
|
Block Office communication application from creating child processes | 26190899-1602-49e8-8b27-eb1d0a1ce869
|
||||||
Block Adobe Reader from creating child processes | 7674ba52-37eb-4a4f-a9a1-f0f9a1619a2c
|
Block Adobe Reader from creating child processes | 7674ba52-37eb-4a4f-a9a1-f0f9a1619a2c
|
||||||
|
|
||||||
### Rule: Block executable content from email client and webmail
|
Each rule description indicates which apps or file types the rule applies to. In general, the rules for Office apps apply to only Word, Excel, PowerPoint, and OneNote, or they apply to Outlook. Except where specified, attack surface reduction rules don't apply to any other Office apps.
|
||||||
|
|
||||||
This rule blocks the following file types from being run or launched from an email seen in either Microsoft Outlook or webmail (such as Gmail.com or Outlook.com):
|
### Block executable content from email client and webmail
|
||||||
|
|
||||||
|
This rule blocks the following file types from launching from email in Microsoft Outlook or Outlook.com and other popular webmail providers:
|
||||||
|
|
||||||
- Executable files (such as .exe, .dll, or .scr)
|
- Executable files (such as .exe, .dll, or .scr)
|
||||||
- Script files (such as a PowerShell .ps, VisualBasic .vbs, or JavaScript .js file)
|
- Script files (such as a PowerShell .ps, VisualBasic .vbs, or JavaScript .js file)
|
||||||
- Script archive files
|
|
||||||
|
|
||||||
### Rule: Block all Office applications from creating child processes
|
Intune name: Execution of executable content (exe, dll, ps, js, vbs, etc.) dropped from email (webmail/mail client) (no exceptions)
|
||||||
|
|
||||||
Office apps will not be allowed to create child processes. This includes Word, Excel, PowerPoint, OneNote, and Access.
|
SCCM name: Block executable content from email client and webmail
|
||||||
|
|
||||||
>[!NOTE]
|
GUID: BE9BA2D9-53EA-4CDC-84E5-9B1EEEE46550
|
||||||
>This does not include Outlook. For Outlook, please see [Block Office communication applications from creating child processes](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard#rule-block-office-communication-applications-from-creating-child-processes).
|
|
||||||
|
|
||||||
This is a typical malware behavior, especially for macro-based attacks that attempt to use Office apps to launch or download malicious executables.
|
### Block all Office applications from creating child processes
|
||||||
|
|
||||||
### Rule: Block Office applications from creating executable content
|
This rule blocks Office apps from creating child processes. This includes Word, Excel, PowerPoint, OneNote, and Access.
|
||||||
|
|
||||||
This rule targets typical behaviors used by suspicious and malicious add-ons and scripts (extensions) that create or launch executable files. This is a typical malware technique.
|
This is a typical malware behavior, especially malware that abuses Office as a vector, using VBA macros and exploit code to download and attempt to run additional payload. Some legitimate line-of-business applications might also use behaviors like this, including spawning a command prompt or using PowerShell to configure registry settings.
|
||||||
|
|
||||||
Extensions will be blocked from being used by Office apps. Typically these extensions use the Windows Scripting Host (.wsh files) to run scripts that automate certain tasks or provide user-created add-on features.
|
Intune name: Office apps launching child processes
|
||||||
|
|
||||||
### Rule: Block Office applications from injecting code into other processes
|
SCCM name: Block Office application from creating child processes
|
||||||
|
|
||||||
Office apps, including Word, Excel, PowerPoint, and OneNote, will not be able to inject code into other processes.
|
GUID: D4F940AB-401B-4EFC-AADC-AD5F3C50688A
|
||||||
|
|
||||||
This is typically used by malware to run malicious code in an attempt to hide the activity from antivirus scanning engines.
|
### Block Office applications from creating executable content
|
||||||
|
|
||||||
### Rule: Block JavaScript or VBScript From launching downloaded executable content
|
This rule prevents Office apps, including Word, Excel, and PowerPoint, from creating executable content.
|
||||||
|
|
||||||
JavaScript and VBScript scripts can be used by malware to launch other malicious apps.
|
This rule targets a typical behavior where malware uses Office as a vector to break out of Office and save malicious components to disk, where they persist and survive a computer reboot. This rule prevents malicious code from being written to disk.
|
||||||
|
|
||||||
This rule prevents these scripts from being allowed to launch apps, thus preventing malicious use of the scripts to spread malware and infect machines.
|
Intune name: Office apps/macros creating executable content
|
||||||
|
|
||||||
### Rule: Block execution of potentially obfuscated scripts
|
SCCM name: Block Office applications from creating executable content
|
||||||
|
|
||||||
Malware and other threats can attempt to obfuscate or hide their malicious code in some script files.
|
GUID: 3B576869-A4EC-4529-8536-B80A7769E899
|
||||||
|
|
||||||
This rule prevents scripts that appear to be obfuscated from running.
|
### Block Office applications from injecting code into other processes
|
||||||
|
|
||||||
### Rule: Block Win32 API calls from Office macro
|
Attackers might attempt to use Office apps to migrate malicious code into other processes through code injection, so the code can masquerade as a clean process. This rule blocks code injection attempts from Office apps into other processes. There are no known legitimate business purposes for using code injection.
|
||||||
|
|
||||||
Malware can use macro code in Office files to import and load Win32 DLLs, which can then be used to make API calls to allow further infection throughout the system.
|
This rule applies to Word, Excel, and PowerPoint.
|
||||||
|
|
||||||
This rule attempts to block Office files that contain macro code that is capable of importing Win32 DLLs. This includes Word, Excel, PowerPoint, and OneNote.
|
Intune name: Office apps injecting code into other processes (no exceptions)
|
||||||
|
|
||||||
### Rule: Block executable files from running unless they meet a prevalence, age, or trusted list criteria
|
SCCM name: Block Office applications from injecting code into other processes
|
||||||
|
|
||||||
This rule blocks the following file types from being run or launched unless they meet prevalence or age criteria set by admins, or they are in a trusted list or exclusion list:
|
GUID: 75668C1F-73B5-4CF0-BB93-3ECF5CB7CC84
|
||||||
|
|
||||||
|
### Block JavaScript or VBScript from launching downloaded executable content
|
||||||
|
|
||||||
|
Malware often uses JavaScript and VBScript scripts to launch other malicious apps.
|
||||||
|
|
||||||
|
Malware written in JavaScript or VBS often acts as a downloader to fetch and launch additional native payload from the Internet. This rule prevents scripts from launching downloaded content, helping to prevent malicious use of the scripts to spread malware and infect machines. This isn't a common line-of-business use, but line-of-business applications sometimes use scripts to download and launch installers. You can exclude scripts so they're allowed to run.
|
||||||
|
|
||||||
|
>[!IMPORTANT]
|
||||||
|
>File and folder exclusions don't apply to this attack surface reduction rule.
|
||||||
|
|
||||||
|
Intune name: js/vbs executing payload downloaded from Internet (no exceptions)
|
||||||
|
|
||||||
|
SCCM name: Block JavaScript or VBScript from launching downloaded executable content
|
||||||
|
|
||||||
|
GUID: D3E037E1-3EB8-44C8-A917-57927947596D
|
||||||
|
|
||||||
|
### Block execution of potentially obfuscated scripts
|
||||||
|
|
||||||
|
Script obfuscation is a common technique that both malware authors and legitimate applications use to hide intellectual property or decrease script loading times. This rule detects suspicious properties within an obfuscated script.
|
||||||
|
|
||||||
|
Intune name: Obfuscated js/vbs/ps/macro code
|
||||||
|
|
||||||
|
SCCM name: Block execution of potentially obfuscated scripts.
|
||||||
|
|
||||||
|
GUID: 5BEB7EFE-FD9A-4556-801D-275E5FFC04CC
|
||||||
|
|
||||||
|
### Block Win32 API calls from Office macros
|
||||||
|
|
||||||
|
Office VBA provides the ability to use Win32 API calls, which malicious code can abuse. Most organizations don't use this functionality, but might still rely on using other macro capabilities. This rule allows you to prevent using Win32 APIs in VBA macros, which reduces the attack surface.
|
||||||
|
|
||||||
|
Intune name: Win32 imports from Office macro code
|
||||||
|
|
||||||
|
SCCM name: Block Win32 API calls from Office macros
|
||||||
|
|
||||||
|
GUID: 92E97FA1-2EDF-4476-BDD6-9DD0B4DDDC7B
|
||||||
|
|
||||||
|
### Block executable files from running unless they meet a prevalence, age, or trusted list criterion
|
||||||
|
|
||||||
|
This rule blocks the following file types from launching unless they either meet prevalence or age criteria, or they're in a trusted list or exclusion list:
|
||||||
|
|
||||||
- Executable files (such as .exe, .dll, or .scr)
|
- Executable files (such as .exe, .dll, or .scr)
|
||||||
|
|
||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
>You must [enable cloud-delivered protection](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-antivirus/enable-cloud-protection-windows-defender-antivirus) to use this rule.
|
>You must [enable cloud-delivered protection](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-antivirus/enable-cloud-protection-windows-defender-antivirus) to use this rule.
|
||||||
|
|
||||||
### Rule: Use advanced protection against ransomware
|
Intune name: Executables that don't meet a prevalence, age, or trusted list criteria
|
||||||
|
|
||||||
This rule provides an extra layer of protection against ransomware. Executable files that enter the system will be scanned to determine whether they are trustworthy. If the files exhibit characteristics that closely resemble ransomware, they are blocked from being run or launched, provided they are not already in the trusted list or exception list.
|
SCCM name: Block executable files from running unless they meet a prevalence, age, or trusted list criteria
|
||||||
|
|
||||||
|
GUID: 01443614-cd74-433a-b99e-2ecdc07bfc25
|
||||||
|
|
||||||
|
### Use advanced protection against ransomware
|
||||||
|
|
||||||
|
This rule provides an extra layer of protection against ransomware. It scans executable files entering the system to determine whether they're trustworthy. If the files closely resemble ransomware, this rule blocks them from running, unless they're in a trusted list or exclusion list.
|
||||||
|
|
||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
>You must [enable cloud-delivered protection](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-antivirus/enable-cloud-protection-windows-defender-antivirus) to use this rule.
|
>You must [enable cloud-delivered protection](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-antivirus/enable-cloud-protection-windows-defender-antivirus) to use this rule.
|
||||||
|
|
||||||
### Rule: Block credential stealing from the Windows local security authority subsystem (lsass.exe)
|
Intune name: Advanced ransomware protection
|
||||||
|
|
||||||
|
SCCM name: Use advanced protection against ransomware
|
||||||
|
|
||||||
|
GUID: c1db55ab-c21a-4637-bb3f-a12568109d35
|
||||||
|
|
||||||
|
### Block credential stealing from the Windows local security authority subsystem (lsass.exe)
|
||||||
|
|
||||||
Local Security Authority Subsystem Service (LSASS) authenticates users who log in to a Windows computer. Windows Defender Credential Guard in Windows 10 normally prevents attempts to extract credentials from LSASS. However, some organizations can't enable Credential Guard on all of their computers because of compatibility issues with custom smartcard drivers or other programs that load into the Local Security Authority (LSA). In these cases, attackers can use tools like Mimikatz to scrape cleartext passwords and NTLM hashes from LSASS. This rule helps mitigate that risk by locking down LSASS.
|
Local Security Authority Subsystem Service (LSASS) authenticates users who log in to a Windows computer. Windows Defender Credential Guard in Windows 10 normally prevents attempts to extract credentials from LSASS. However, some organizations can't enable Credential Guard on all of their computers because of compatibility issues with custom smartcard drivers or other programs that load into the Local Security Authority (LSA). In these cases, attackers can use tools like Mimikatz to scrape cleartext passwords and NTLM hashes from LSASS. This rule helps mitigate that risk by locking down LSASS.
|
||||||
|
|
||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
>Some apps are coded to enumerate all running processes and to attempt opening them with exhaustive permissions. This results in the app accessing LSASS even when it's not necessary. ASR will deny the app's process open action and log the details to the security event log. Entry in the event log for access denial by itself is not an indication of the presence of a malicious threat.
|
>In some apps, the code enumerates all running processes and attempts to open them with exhaustive permissions. This rule denies the app's process open action and logs the details to the security event log. This rule can generate a lot of noise. If you have an app that overly enumerates LSASS, you need to add it to the exclusion list. By itself, this event log entry doesn't necessarily indicate a malicious threat.
|
||||||
|
|
||||||
### Rule: Block process creations originating from PSExec and WMI commands
|
Intune name: Flag credential stealing from the Windows local security authority subsystem
|
||||||
|
|
||||||
|
SCCM name: Block credential stealing from the Windows local security authority subsystem
|
||||||
|
|
||||||
|
GUID: 9e6c4e1f-7d60-472f-ba1a-a39ef669e4b2
|
||||||
|
|
||||||
|
### Block process creations originating from PSExec and WMI commands
|
||||||
|
|
||||||
This rule blocks processes through PsExec and WMI commands from running, to prevent remote code execution that can spread malware attacks.
|
This rule blocks processes through PsExec and WMI commands from running, to prevent remote code execution that can spread malware attacks.
|
||||||
|
|
||||||
>[!WARNING]
|
>[!IMPORTANT]
|
||||||
>[Only use this rule if you are managing your devices with [Intune](https://docs.microsoft.com/intune) or another MDM solution. This rule is incompatible with management through [System Center Configuration Manager](https://docs.microsoft.com/sccm) because this rule blocks WMI commands that the Configuration Manager client uses to function correctly.]
|
>File and folder exclusions do not apply to this attack surface reduction rule.
|
||||||
|
|
||||||
### Rule: Block untrusted and unsigned processes that run from USB
|
>[!WARNING]
|
||||||
|
>Only use this rule if you're managing your devices with [Intune](https://docs.microsoft.com/intune) or another MDM solution. This rule is incompatible with management through [System Center Configuration Manager](https://docs.microsoft.com/sccm) because this rule blocks WMI commands the SCCM client uses to function correctly.
|
||||||
|
|
||||||
|
Intune name: Process creation from PSExec and WMI commands
|
||||||
|
|
||||||
|
SCCM name: Not applicable
|
||||||
|
|
||||||
|
GUID: d1e49aac-8f56-4280-b9ba-993a6d77406c
|
||||||
|
|
||||||
|
### Block untrusted and unsigned processes that run from USB
|
||||||
|
|
||||||
With this rule, admins can prevent unsigned or untrusted executable files from running from USB removable drives, including SD cards. Blocked file types include:
|
With this rule, admins can prevent unsigned or untrusted executable files from running from USB removable drives, including SD cards. Blocked file types include:
|
||||||
|
|
||||||
- Executable files (such as .exe, .dll, or .scr)
|
- Executable files (such as .exe, .dll, or .scr)
|
||||||
- Script files (such as a PowerShell .ps, VisualBasic .vbs, or JavaScript .js file)
|
- Script files (such as a PowerShell .ps, VisualBasic .vbs, or JavaScript .js file)
|
||||||
|
|
||||||
### Rule: Block Office communication application from creating child processes
|
Intune name: Untrusted and unsigned processes that run from USB
|
||||||
|
|
||||||
Outlook will not be allowed to create child processes.
|
SCCM name: Block untrusted and unsigned processes that run from USB
|
||||||
|
|
||||||
This is a typical malware behavior, especially for macro-based attacks that attempt to use Office apps to launch or download malicious executables.
|
GUID: b2b3f03d-6a65-4f7b-a9c7-1c7ef74a9ba4
|
||||||
|
|
||||||
|
### Block Office communication application from creating child processes
|
||||||
|
|
||||||
|
This rule prevents Outlook from creating child processes. It protects against social engineering attacks and prevents exploit code from abusing a vulnerability in Outlook. To achieve this, the rule prevents the launch of additional payload while still allowing legitimate Outlook functions. It also protects against [Outlook rules and forms exploits](https://blogs.technet.microsoft.com/office365security/defending-against-rules-and-forms-injection/) that attackers can use when a user's credentials are compromised.
|
||||||
|
|
||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
>This rule applies to Outlook only.
|
>This rule applies to Outlook and Outlook.com only.
|
||||||
|
|
||||||
### Rule: Block Adobe Reader from creating child processes
|
Intune name: Not yet available
|
||||||
|
|
||||||
This rule blocks Adobe Reader from creating child processes.
|
SCCM name: Not yet available
|
||||||
|
|
||||||
## Review attack surface reduction rule events in the Windows Defender ATP Security Center
|
GUID: 26190899-1602-49e8-8b27-eb1d0a1ce869
|
||||||
|
|
||||||
Windows Defender ATP provides detailed reporting into events and blocks as part of its [alert investigation scenarios](../windows-defender-atp/investigate-alerts-windows-defender-advanced-threat-protection.md).
|
### Block Adobe Reader from creating child processes
|
||||||
|
|
||||||
You can query Windows Defender ATP data by using [Advanced hunting](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-atp/advanced-hunting-windows-defender-advanced-threat-protection). If you're using [audit mode](audit-windows-defender-exploit-guard.md), you can use Advanced hunting to see how attack surface reduction rules would affect your environment if they were enabled.
|
Through social engineering or exploits, malware can download and launch additional payloads and break out of Adobe Reader. This rule prevents attacks like this by blocking Adobe Reader from creating additional processes.
|
||||||
|
|
||||||
## Review attack surface reduction rule events in Windows Event Viewer
|
Intune name: Not applicable
|
||||||
|
|
||||||
You can review the Windows event log to see events that are created when an attack surface reduction rule is triggered (or audited):
|
SCCM name: Not applicable
|
||||||
|
|
||||||
1. Download the [Exploit Guard Evaluation Package](https://aka.ms/mp7z2w) and extract the file *asr-events.xml* to an easily accessible location on the machine.
|
GUID: 7674ba52-37eb-4a4f-a9a1-f0f9a1619a2c
|
||||||
|
|
||||||
2. Type **Event viewer** in the Start menu to open the Windows Event Viewer.
|
## Related topics
|
||||||
|
|
||||||
3. On the left panel, under **Actions**, click **Import custom view...**
|
|
||||||
|
|
||||||
4. Navigate to the Exploit Guard Evaluation Package, and select the file *asr-events.xml*. Alternatively, [copy the XML directly](event-views-exploit-guard.md).
|
|
||||||
|
|
||||||
5. Click **OK**.
|
|
||||||
|
|
||||||
6. This will create a custom view that filters to only show the following events related to attack surface reduction rules:
|
|
||||||
|
|
||||||
Event ID | Description
|
|
||||||
-|-
|
|
||||||
5007 | Event when settings are changed
|
|
||||||
1122 | Event when rule fires in Audit-mode
|
|
||||||
1121 | Event when rule fires in Block-mode
|
|
||||||
|
|
||||||
### Event fields
|
|
||||||
|
|
||||||
- **ID**: matches with the Rule-ID that triggered the block/audit.
|
|
||||||
- **Detection time**: Time of detection
|
|
||||||
- **Process Name**: The process that performed the "operation" that was blocked/audited
|
|
||||||
- **Description**: Additional details about the event or audit, including Security intelligence, engine, and product version of Windows Defender Antivirus
|
|
||||||
|
|
||||||
## Attack surface reduction rules in Windows 10 Enterprise E3
|
|
||||||
|
|
||||||
A subset of attack surface reduction rules are also available on Windows 10 Enterprise E3 without the benefit of centralized monitoring, reporting, and analytics. For more information, see [Use attack surface reduction rules in Windows 10 Enterprise E3](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-rules-in-windows-10-enterprise-e3).
|
|
||||||
|
|
||||||
## In this section
|
|
||||||
|
|
||||||
Topic | Description
|
|
||||||
---|---
|
|
||||||
[Evaluate attack surface reduction rules](evaluate-attack-surface-reduction.md) | Use a tool to see a number of scenarios that demonstrate how attack surface reduction rules work, and what events would typically be created.
|
|
||||||
[Enable attack surface reduction rules](enable-attack-surface-reduction.md) | Use Group Policy, PowerShell, or MDM CSPs to enable and manage attack surface reduction rules in your network.
|
|
||||||
[Customize attack surface reduction rules](customize-attack-surface-reduction.md) | Exclude specified files and folders from being evaluated by attack surface reduction rules and customize the notification that appears on a user's machine when a rule blocks an app or file.
|
|
||||||
|
|
||||||
|
- [Enable attack surface reduction rules](enable-attack-surface-reduction.md)
|
||||||
|
- [Evaluate attack surface reduction rules](evaluate-attack-surface-reduction.md)
|
@ -11,47 +11,72 @@ ms.pagetype: security
|
|||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
author: andreabichsel
|
author: andreabichsel
|
||||||
ms.author: v-anbic
|
ms.author: v-anbic
|
||||||
ms.date: 10/17/2018
|
|
||||||
---
|
---
|
||||||
|
|
||||||
# Enable attack surface reduction rules
|
# Enable attack surface reduction rules
|
||||||
|
|
||||||
**Applies to:**
|
Attack surface reduction rules help prevent actions and apps that malware often uses to infect computers. You can set attack surface reduction rules for computers running Windows 10 or Windows Server 2019.
|
||||||
|
|
||||||
- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf)
|
To use ASR rules, you need either a Windows 10 Enterprise E3 or E5 license. We recommend an E5 license so you can take advantage of the advanced monitoring and reporting capabilities available in Windows Defender Advanced Threat Protection (Windows Defender ATP). These advanced capabilities aren't available with an E3 license, but you can develop your own monitoring and reporting tools to use in conjuction with ASR rules.
|
||||||
|
|
||||||
Attack surface reduction rules help prevent actions and apps that are typically used by exploit-seeking malware to infect machines. Attack surface reduction rules are supported on Windows Server 2019 as well as Windows 10 clients.
|
## Exclude files and folders from ASR rules
|
||||||
|
|
||||||
|
You can exclude files and folders from being evaluated by most attack surface reduction rules. This means that even if an ASR rule determines the file or folder contains malicious behavior, it will not block the file from running. This could potentially allow unsafe files to run and infect your devices.
|
||||||
|
|
||||||
|
>[!WARNING]
|
||||||
|
>Excluding files or folders can severely reduce the protection provided by ASR rules. Excluded files will be allowed to run, and no report or event will be recorded.
|
||||||
|
>
|
||||||
|
>If ASR rules are detecting files that you believe shouldn't be detected, you should [use audit mode first to test the rule](enable-attack-surface-reduction.md#enable-and-audit-attack-surface-reduction-rules).
|
||||||
|
|
||||||
|
>[!IMPORTANT]
|
||||||
|
>File and folder exclusions do not apply to the following ASR rules:
|
||||||
|
>
|
||||||
|
>- Block process creations originating from PSExec and WMI commands
|
||||||
|
>- Block JavaScript or VBScript from launching downloaded executable content
|
||||||
|
|
||||||
|
You can specify individual files or folders (using folder paths or fully qualified resource names) but you can't specify which rules the exclusions apply to.
|
||||||
|
|
||||||
|
ASR rules support environment variables and wildcards. For information about using wildcards, see [Use wildcards in the file name and folder path or extension exclusion lists](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus#use-wildcards-in-the-file-name-and-folder-path-or-extension-exclusion-lists).
|
||||||
|
|
||||||
|
The following procedures for enabling ASR rules include instructions for how to exclude files and folders.
|
||||||
|
|
||||||
## Enable and audit attack surface reduction rules
|
## Enable and audit attack surface reduction rules
|
||||||
|
|
||||||
You can use Group Policy, PowerShell, or MDM CSPs to configure the state or mode for each rule. This can be useful if you only want to enable some rules, or you want to enable rules individually in audit mode.
|
It's best to use an enterprise-level management platform like Intune or System Center Configuration Manager (SCCM) to configure ASR rules, but you can also use Group Policy, PowerShell, or third-party mobile device management (MDM) CSPs.
|
||||||
|
|
||||||
For further details on how audit mode works, and when you might want to use it, see the [audit Windows Defender Exploit Guard topic](audit-windows-defender-exploit-guard.md).
|
>[!WARNING]
|
||||||
|
>If you manage your computers and devices with Intune, SCCM, or other enterprise-level management platform, the management software will overwrite any conflicting Group Policy or PowerShell settings on startup.
|
||||||
|
|
||||||
Attack surface reduction rules are identified by their unique rule ID.
|
For a complete list of ASR rules, see [Reduce attack surfaces with attack surface reduction rules](attack-surface-reduction-exploit-guard.md).
|
||||||
|
|
||||||
You can manually add the rules by using the GUIDs in the following table:
|
Each ASR rule contains three settings:
|
||||||
|
|
||||||
Rule description | GUID
|
* Not configured: Disable the ASR rule
|
||||||
-|-
|
* Block: Enable the ASR rule
|
||||||
Block executable content from email client and webmail | be9ba2d9-53ea-4cdc-84e5-9B1eeee46550
|
* Audit: Evaluate how the ASR rule would impact your organization if enabled
|
||||||
Block all Office applications from creating child processes | d4f940ab-401b-4efc-aadc-ad5f3c50688a
|
|
||||||
Block Office applications from creating executable content | 3b576869-a4eC-4529-8536-b80a7769e899
|
|
||||||
Block Office applications from injecting code into other processes | 75668c1f-73b5-4Cf0-bb93-3ecf5cb7cc84
|
|
||||||
Block JavaScript or VBScript from launching downloaded executable content | d3e037e1-3eb8-44c8-a917-57927947596d
|
|
||||||
Block execution of potentially obfuscated scripts | 5beb7efe-fd9A-4556-801d-275e5ffc04cc
|
|
||||||
Block Win32 API calls from Office macro | 92e97fa1-2edf-4476-bdd6-9dd0B4dddc7b
|
|
||||||
Block executable files from running unless they meet a prevalence, age, or trusted list criteria | 01443614-cd74-433a-b99e-2ecdc07bfc25
|
|
||||||
Use advanced protection against ransomware | c1db55ab-c21a-4637-bb3f-a12568109d35
|
|
||||||
Block credential stealing from the Windows local security authority subsystem (lsass.exe) | 9e6c4e1f-7d60-472f-ba1a-a39ef669e4b2
|
|
||||||
Block process creations originating from PSExec and WMI commands | d1e49aac-8f56-4280-b9ba-993a6d77406c
|
|
||||||
Block untrusted and unsigned processes that run from USB | b2b3f03d-6a65-4f7b-a9c7-1c7ef74a9ba4
|
|
||||||
Block Office communication applications from creating child processes | 26190899-1602-49e8-8b27-eb1d0a1ce869
|
|
||||||
Block Adobe Reader from creating child processes | 7674ba52-37eb-4a4f-a9a1-f0f9a1619a2c
|
|
||||||
|
|
||||||
See the [Attack surface reduction](attack-surface-reduction-exploit-guard.md) topic for details on each rule.
|
For further details on how audit mode works and when to use it, see [Audit Windows Defender Exploit Guard](audit-windows-defender-exploit-guard.md).
|
||||||
|
|
||||||
### Use Group Policy to enable or audit attack surface reduction rules
|
### Enable ASR rules in Intune
|
||||||
|
|
||||||
|
1. In Intune, select *Device configuration* > *Profiles*. Choose an existing endpoint protection profile or create a new one. To create a new one, select *Create profile* and enter information for this profile. For *Profile type*, select *Endpoint protection*. If you've chosen an existing profile, select *Properties* and then select *Settings*.
|
||||||
|
|
||||||
|
2. In the *Endpoint protection* pane, select *Windows Defender Exploit Guard*, then select *Attack Surface Reduction*. Select the desired setting for each ASR rule.
|
||||||
|
|
||||||
|
3. Under *Attack Surface Reduction exceptions*, you can enter individual files and folders, or you can select *Import* to import a CSV file that contains files and folders to exclude from ASR rules. Each line in the CSV file should be in the following format:
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
4. Select *OK* on the three configuration panes and then select *Create* if you're creating a new endpoint protection file or *Save* if you're editing an existing one.
|
||||||
|
|
||||||
|
### Enable ASR rules in SCCM
|
||||||
|
|
||||||
|
For information about enabling ASR rules and setting exclusions in SCCM, see [Create and deploy an Exploit Guard policy](https://docs.microsoft.com/en-us/sccm/protect/deploy-use/create-deploy-exploit-guard-policy).
|
||||||
|
|
||||||
|
### Enable ASR rules with Group Policy
|
||||||
|
|
||||||
|
>[!WARNING]
|
||||||
|
>If you manage your computers and devices with Intune, SCCM, or other enterprise-level management platform, the management software will overwrite any conflicting Group Policy settings on startup.
|
||||||
|
|
||||||
1. On your Group Policy management computer, open the [Group Policy Management Console](https://technet.microsoft.com/library/cc731212.aspx), right-click the Group Policy Object you want to configure and click **Edit**.
|
1. On your Group Policy management computer, open the [Group Policy Management Console](https://technet.microsoft.com/library/cc731212.aspx), right-click the Group Policy Object you want to configure and click **Edit**.
|
||||||
|
|
||||||
@ -59,32 +84,43 @@ See the [Attack surface reduction](attack-surface-reduction-exploit-guard.md) to
|
|||||||
|
|
||||||
3. Expand the tree to **Windows components** > **Windows Defender Antivirus** > **Windows Defender Exploit Guard** > **Attack surface reduction**.
|
3. Expand the tree to **Windows components** > **Windows Defender Antivirus** > **Windows Defender Exploit Guard** > **Attack surface reduction**.
|
||||||
|
|
||||||
4. Double-click the **Configure Attack surface reduction rules** setting and set the option to **Enabled**. You can then set the individual state for each rule in the options section:
|
4. Select **Configure Attack surface reduction rules** and select **Enabled**. You can then set the individual state for each rule in the options section:
|
||||||
- Click **Show...** and enter the rule ID in the **Value name** column and your desired state in the **Value** column as follows:
|
- Click **Show...** and enter the rule ID in the **Value name** column and your desired state in the **Value** column as follows:
|
||||||
- Block mode = 1
|
- Disable = 0
|
||||||
- Disabled = 0
|
- Block (enable ASR rule) = 1
|
||||||
- Audit mode = 2
|
- Audit = 2
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
### Use PowerShell to enable or audit attack surface reduction rules
|
5. To exclude files and folders from ASR rules, select the **Exclude files and paths from Attack surface reduction rules** setting and set the option to **Enabled**. Click **Show** and enter each file or folder in the **Value name** column. Enter **0** in the **Value** column for each item.
|
||||||
|
|
||||||
|
### Enable ASR rules with PowerShell
|
||||||
|
|
||||||
|
>[!WARNING]
|
||||||
|
>If you manage your computers and devices with Intune, SCCM, or other enterprise-level management platform, the management software will overwrite any conflicting PowerShell settings on startup.
|
||||||
|
|
||||||
|
1. Type **powershell** in the Start menu, right click **Windows PowerShell** and click **Run as administrator**.
|
||||||
|
|
||||||
1. Type **powershell** in the Start menu, right click **Windows PowerShell** and click **Run as administrator**
|
|
||||||
2. Enter the following cmdlet:
|
2. Enter the following cmdlet:
|
||||||
|
|
||||||
```PowerShell
|
```PowerShell
|
||||||
Set-MpPreference -AttackSurfaceReductionRules_Ids <rule ID> -AttackSurfaceReductionRules_Actions Enabled
|
Set-MpPreference -AttackSurfaceReductionRules_Ids <rule ID> -AttackSurfaceReductionRules_Actions Enabled
|
||||||
```
|
```
|
||||||
|
|
||||||
You can enable the feature in audit mode using the following cmdlet:
|
To enable ASR rules in audit mode, use the following cmdlet:
|
||||||
|
|
||||||
```PowerShell
|
```PowerShell
|
||||||
Add-MpPreference -AttackSurfaceReductionRules_Ids <rule ID> -AttackSurfaceReductionRules_Actions AuditMode
|
Add-MpPreference -AttackSurfaceReductionRules_Ids <rule ID> -AttackSurfaceReductionRules_Actions AuditMode
|
||||||
```
|
```
|
||||||
Use `Disabled` insead of `AuditMode` or `Enabled` to turn the feature off.
|
|
||||||
|
|
||||||
>[!IMPORTANT>
|
To turn off ASR rules, use the following cmdlet:
|
||||||
>You must specify the state individually for each rule, but you can combine rules and states in a comma seperated list.
|
|
||||||
|
```PowerShell
|
||||||
|
Add-MpPreference -AttackSurfaceReductionRules_Ids <rule ID> -AttackSurfaceReductionRules_Actions Disabled
|
||||||
|
```
|
||||||
|
|
||||||
|
>[!IMPORTANT]
|
||||||
|
>You must specify the state individually for each rule, but you can combine rules and states in a comma-separated list.
|
||||||
>
|
>
|
||||||
>In the following example, the first two rules will be enabled, the third rule will be disabled, and the fourth rule will be enabled in audit mode:
|
>In the following example, the first two rules will be enabled, the third rule will be disabled, and the fourth rule will be enabled in audit mode:
|
||||||
>
|
>
|
||||||
@ -92,20 +128,51 @@ Use `Disabled` insead of `AuditMode` or `Enabled` to turn the feature off.
|
|||||||
>Set-MpPreference -AttackSurfaceReductionRules_Ids <rule ID 1>,<rule ID 2>,<rule ID 3>,<rule ID 4> -AttackSurfaceReductionRules_Actions Enabled, Enabled, Disabled, AuditMode
|
>Set-MpPreference -AttackSurfaceReductionRules_Ids <rule ID 1>,<rule ID 2>,<rule ID 3>,<rule ID 4> -AttackSurfaceReductionRules_Actions Enabled, Enabled, Disabled, AuditMode
|
||||||
>```
|
>```
|
||||||
|
|
||||||
|
|
||||||
You can also the `Add-MpPreference` PowerShell verb to add new rules to the existing list.
|
You can also the `Add-MpPreference` PowerShell verb to add new rules to the existing list.
|
||||||
|
|
||||||
>[!WARNING]
|
>[!WARNING]
|
||||||
>`Set-MpPreference` will always overwrite the existing set of rules. If you want to add to the existing set, you should use `Add-MpPreference` instead.
|
>`Set-MpPreference` will always overwrite the existing set of rules. If you want to add to the existing set, you should use `Add-MpPreference` instead.
|
||||||
>You can obtain a list of rules and their current state by using `Get-MpPreference`
|
>You can obtain a list of rules and their current state by using `Get-MpPreference`
|
||||||
|
|
||||||
|
3. To exclude files and folders from ASR rules, use the following cmdlet:
|
||||||
|
|
||||||
### Use MDM CSPs to enable attack surface reduction rules
|
```PowerShell
|
||||||
|
Add-MpPreference -AttackSurfaceReductionOnlyExclusions "<fully qualified path or resource>"
|
||||||
|
```
|
||||||
|
|
||||||
Use the [./Vendor/MSFT/Policy/Config/Defender/AttackSurfaceReductionRules](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-defender#defender-attacksurfacereductionrules) configuration service provider (CSP) to individually enable and set the mode for each rule.
|
Continue to use `Add-MpPreference -AttackSurfaceReductionOnlyExclusions` to add more files and folders to the list.
|
||||||
|
|
||||||
|
>[!IMPORTANT]
|
||||||
|
>Use `Add-MpPreference` to append or add apps to the list. Using the `Set-MpPreference` cmdlet will overwrite the existing list.
|
||||||
|
|
||||||
|
### Enable ASR rules with MDM CSPs
|
||||||
|
|
||||||
|
Use the [./Vendor/MSFT/Policy/Config/Defender/AttackSurfaceReductionRules](https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-defender#defender-attacksurfacereductionrules) configuration service provider (CSP) to individually enable and set the mode for each rule.
|
||||||
|
|
||||||
|
The following is a sample for reference, using [GUID values for ASR rules](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard#attack-surface-reduction-rules).
|
||||||
|
|
||||||
|
OMA-URI path: ./Vendor/MSFT/Policy/Config/Defender/AttackSurfaceReductionRules
|
||||||
|
|
||||||
|
Value: {75668C1F-73B5-4CF0-BB93-3ECF5CB7CC84}=2|{3B576869-A4EC-4529-8536-B80A7769E899}=1|{D4F940AB-401B-4EfC-AADC-AD5F3C50688A}=2|{D3E037E1-3EB8-44C8-A917-57927947596D}=1|{5BEB7EFE-FD9A-4556-801D-275E5FFC04CC}=0|{BE9BA2D9-53EA-4CDC-84E5-9B1EEEE46550}=1
|
||||||
|
|
||||||
|
The values to enable, disable, or enable in audit mode are:
|
||||||
|
|
||||||
|
- Disable = 0
|
||||||
|
- Block (enable ASR rule) = 1
|
||||||
|
- Audit = 2
|
||||||
|
|
||||||
|
Use the [./Vendor/MSFT/Policy/Config/Defender/AttackSurfaceReductionOnlyExclusions](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-defender#defender-attacksurfacereductiononlyexclusions) configuration service provider (CSP) to add exclusions.
|
||||||
|
|
||||||
|
Example:
|
||||||
|
|
||||||
|
OMA-URI path: ./Vendor/MSFT/Policy/Config/Defender/AttackSurfaceReductionOnlyExclusions
|
||||||
|
|
||||||
|
Value: c:\path|e:\path|c:\Whitelisted.exe
|
||||||
|
|
||||||
|
>[!NOTE]
|
||||||
|
>Be sure to enter OMA-URI values without spaces.
|
||||||
|
|
||||||
## Related topics
|
## Related topics
|
||||||
|
|
||||||
- [Reduce attack surfaces with attack surface reduction rules](attack-surface-reduction-exploit-guard.md)
|
- [Reduce attack surfaces with attack surface reduction rules](attack-surface-reduction-exploit-guard.md)
|
||||||
- [Customize attack surface reduction](customize-attack-surface-reduction.md)
|
|
||||||
- [Evaluate attack surface reduction](evaluate-attack-surface-reduction.md)
|
- [Evaluate attack surface reduction](evaluate-attack-surface-reduction.md)
|
||||||
|
@ -11,7 +11,6 @@ ms.pagetype: security
|
|||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
author: andreabichsel
|
author: andreabichsel
|
||||||
ms.author: v-anbic
|
ms.author: v-anbic
|
||||||
ms.date: 09/18/2018
|
|
||||||
---
|
---
|
||||||
|
|
||||||
# Troubleshoot attack surface reduction rules
|
# Troubleshoot attack surface reduction rules
|
||||||
@ -40,7 +39,7 @@ Attack surface reduction rules will only work on devices with the following cond
|
|||||||
> - Endpoints are running Windows 10 Enterprise E5, version 1709 (also known as the Fall Creators Update).
|
> - Endpoints are running Windows 10 Enterprise E5, version 1709 (also known as the Fall Creators Update).
|
||||||
> - Endpoints are using Windows Defender Antivirus as the sole antivirus protection app. [Using any other antivirus app will cause Windows Defender AV to disable itself](../windows-defender-antivirus/windows-defender-antivirus-compatibility.md).
|
> - Endpoints are using Windows Defender Antivirus as the sole antivirus protection app. [Using any other antivirus app will cause Windows Defender AV to disable itself](../windows-defender-antivirus/windows-defender-antivirus-compatibility.md).
|
||||||
> - [Real-time protection](../windows-defender-antivirus/configure-real-time-protection-windows-defender-antivirus.md) is enabled.
|
> - [Real-time protection](../windows-defender-antivirus/configure-real-time-protection-windows-defender-antivirus.md) is enabled.
|
||||||
> - Audit mode is not enabled. Use Group Policy to set the rule to **Disabled** (value: **0**) as described in the [Enable ASR topic](enable-attack-surface-reduction.md#use-group-policy-to-enable-or-audit-attack-surface-reduction-rules).
|
> - Audit mode is not enabled. Use Group Policy to set the rule to **Disabled** (value: **0**) as described in [Enable attack surface reduction rules](enable-attack-surface-reduction.md).
|
||||||
|
|
||||||
If these pre-requisites have all been met, proceed to the next step to test the rule in audit mode.
|
If these pre-requisites have all been met, proceed to the next step to test the rule in audit mode.
|
||||||
|
|
||||||
@ -61,7 +60,7 @@ Follow the instructions in [Use the demo tool to see how attack surface reductio
|
|||||||
|
|
||||||
Audit mode allows the rule to report as if it actually blocked the file or process, but will still allow the file to run.
|
Audit mode allows the rule to report as if it actually blocked the file or process, but will still allow the file to run.
|
||||||
|
|
||||||
1. Enable audit mode for the specific rule you want to test. Use Group Policy to set the rule to **Audit mode** (value: **2**) as described in [Enable attack surface reduction rules](enable-attack-surface-reduction.md#use-group-policy-to-enable-or-audit-attack-surface-reduction-rules).
|
1. Enable audit mode for the specific rule you want to test. Use Group Policy to set the rule to **Audit mode** (value: **2**) as described in [Enable attack surface reduction rules](enable-attack-surface-reduction.md).
|
||||||
2. Perform the activity that is causing an issue (for example, open or execute the file or process that should be blocked but is being allowed).
|
2. Perform the activity that is causing an issue (for example, open or execute the file or process that should be blocked but is being allowed).
|
||||||
3. [Review the attack surface reductio rule event logs](attack-surface-reduction-exploit-guard.md) to see if the rule would have blocked the file or process if the rule had been set to **Enabled**.
|
3. [Review the attack surface reductio rule event logs](attack-surface-reduction-exploit-guard.md) to see if the rule would have blocked the file or process if the rule had been set to **Enabled**.
|
||||||
|
|
||||||
|
Loading…
x
Reference in New Issue
Block a user