mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-15 14:57:23 +00:00
Update troubleshoot-asr.md
This commit is contained in:
parent
7687a90c94
commit
7dd43d693d
@ -10,11 +10,12 @@ ms.sitesec: library
|
|||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
audience: ITPro
|
audience: ITPro
|
||||||
author: dansimp
|
author: denisebmsft
|
||||||
ms.author: dansimp
|
ms.author: deniseb
|
||||||
ms.date: 03/27/2019
|
ms.date: 03/27/2019
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
|
ms.custom: asr
|
||||||
---
|
---
|
||||||
|
|
||||||
# Troubleshoot attack surface reduction rules
|
# Troubleshoot attack surface reduction rules
|
||||||
@ -23,48 +24,56 @@ manager: dansimp
|
|||||||
|
|
||||||
* [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559)
|
* [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559)
|
||||||
|
|
||||||
When you use [attack surface reduction rules](attack-surface-reduction.md) you may encounter issues, such as:
|
When you use [attack surface reduction rules](attack-surface-reduction.md) you may run into issues, such as:
|
||||||
|
|
||||||
* A rule blocks a file, process, or performs some other action that it should not (false positive)
|
- A rule blocks a file, process, or performs some other action that it should not (false positive)
|
||||||
* A rule does not work as described, or does not block a file or process that it should (false negative)
|
|
||||||
|
- A rule does not work as described, or does not block a file or process that it should (false negative)
|
||||||
|
|
||||||
There are four steps to troubleshooting these problems:
|
There are four steps to troubleshooting these problems:
|
||||||
|
|
||||||
1. Confirm prerequisites
|
1. [Confirm prerequisites](#confirm-prerequisites)
|
||||||
2. Use audit mode to test the rule
|
|
||||||
3. Add exclusions for the specified rule (for false positives)
|
2. [Use audit mode to test the rule](#use-audit-mode-to-test-the-rule)
|
||||||
4. Submit support logs
|
|
||||||
|
3. [Add exclusions for the specified rule](#add-exclusions-for-a-false-positive) (for false positives)
|
||||||
|
|
||||||
|
4. [Submit support logs](#collect-diagnostic-data-for-file-submissions)
|
||||||
|
|
||||||
## Confirm prerequisites
|
## Confirm prerequisites
|
||||||
|
|
||||||
Attack surface reduction rules will only work on devices with the following conditions:
|
Attack surface reduction rules will only work on devices with the following conditions:
|
||||||
|
|
||||||
> [!div class="checklist"]
|
- Endpoints are running Windows 10 Enterprise, version 1709 (also known as the Fall Creators Update).
|
||||||
> * Endpoints are running Windows 10 Enterprise, version 1709 (also known as the Fall Creators Update).
|
|
||||||
> * Endpoints are using Windows Defender Antivirus as the sole antivirus protection app. [Using any other antivirus app will cause Windows Defender AV to disable itself](../windows-defender-antivirus/windows-defender-antivirus-compatibility.md).
|
- Endpoints are using Windows Defender Antivirus as the sole antivirus protection app. [Using any other antivirus app will cause Windows Defender AV to disable itself](../windows-defender-antivirus/windows-defender-antivirus-compatibility.md).
|
||||||
> * [Real-time protection](../windows-defender-antivirus/configure-real-time-protection-windows-defender-antivirus.md) is enabled.
|
|
||||||
> * Audit mode is not enabled. Use Group Policy to set the rule to **Disabled** (value: **0**) as described in [Enable attack surface reduction rules](enable-attack-surface-reduction.md).
|
- [Real-time protection](../windows-defender-antivirus/configure-real-time-protection-windows-defender-antivirus.md) is enabled.
|
||||||
|
|
||||||
|
- Audit mode is not enabled. Use Group Policy to set the rule to **Disabled** (value: **0**) as described in [Enable attack surface reduction rules](enable-attack-surface-reduction.md).
|
||||||
|
|
||||||
If these prerequisites have all been met, proceed to the next step to test the rule in audit mode.
|
If these prerequisites have all been met, proceed to the next step to test the rule in audit mode.
|
||||||
|
|
||||||
## Use audit mode to test the rule
|
## Use audit mode to test the rule
|
||||||
|
|
||||||
You can visit the Windows Defender Testground website at [demo.wd.microsoft.com](https://demo.wd.microsoft.com?ocid=cx-wddocs-testground) to confirm attack surface reduction rules are generally working for pre-configured scenarios and processes on a device, or you can use audit mode, which enables rules for reporting only.
|
You can visit the Windows Defender Test ground website at [demo.wd.microsoft.com](https://demo.wd.microsoft.com?ocid=cx-wddocs-testground) to confirm attack surface reduction rules are generally working for pre-configured scenarios and processes on a device, or you can use audit mode, which enables rules for reporting only.
|
||||||
|
|
||||||
Follow these instructions in [Use the demo tool to see how attack surface reduction rules work](evaluate-attack-surface-reduction.md) to test the specific rule you are encountering problems with.
|
Follow these instructions in [Use the demo tool to see how attack surface reduction rules work](evaluate-attack-surface-reduction.md) to test the specific rule you are encountering problems with.
|
||||||
|
|
||||||
1. Enable audit mode for the specific rule you want to test. Use Group Policy to set the rule to **Audit mode** (value: **2**) as described in [Enable attack surface reduction rules](enable-attack-surface-reduction.md). Audit mode allows the rule to report the file or process, but will still allow it to run.
|
1. Enable audit mode for the specific rule you want to test. Use Group Policy to set the rule to **Audit mode** (value: **2**) as described in [Enable attack surface reduction rules](enable-attack-surface-reduction.md). Audit mode allows the rule to report the file or process, but will still allow it to run.
|
||||||
|
|
||||||
2. Perform the activity that is causing an issue (for example, open or execute the file or process that should be blocked but is being allowed).
|
2. Perform the activity that is causing an issue (for example, open or execute the file or process that should be blocked but is being allowed).
|
||||||
|
|
||||||
3. [Review the attack surface reductio rule event logs](attack-surface-reduction.md) to see if the rule would have blocked the file or process if the rule had been set to **Enabled**.
|
3. [Review the attack surface reductio rule event logs](attack-surface-reduction.md) to see if the rule would have blocked the file or process if the rule had been set to **Enabled**.
|
||||||
|
|
||||||
>
|
If a rule is not blocking a file or process that you are expecting it should block, first check if audit mode is enabled.
|
||||||
>If a rule is not blocking a file or process that you are expecting it should block, first check if audit mode is enabled.
|
|
||||||
>
|
Audit mode may have been enabled for testing another feature, or by an automated PowerShell script, and may not have been disabled after the tests were completed.
|
||||||
>Audit mode may have been enabled for testing another feature, or by an automated PowerShell script, and may not have been disabled after the tests were completed.
|
|
||||||
|
|
||||||
If you've tested the rule with the demo tool and with audit mode, and attack surface reduction rules are working on pre-configured scenarios, but the rule is not working as expected, proceed to either of the following sections based on your situation:
|
If you've tested the rule with the demo tool and with audit mode, and attack surface reduction rules are working on pre-configured scenarios, but the rule is not working as expected, proceed to either of the following sections based on your situation:
|
||||||
|
|
||||||
1. If the attack surface reduction rule is blocking something that it should not block (also known as a false positive), you can [first add an attack surface reduction rule exclusion](#add-exclusions-for-a-false-positive).
|
1. If the attack surface reduction rule is blocking something that it should not block (also known as a false positive), you can [first add an attack surface reduction rule exclusion](#add-exclusions-for-a-false-positive).
|
||||||
|
|
||||||
2. If the attack surface reduction rule is not blocking something that it should block (also known as a false negative), you can proceed immediately to the last step, [collecting diagnostic data and submitting the issue to us](#collect-diagnostic-data-for-file-submissions).
|
2. If the attack surface reduction rule is not blocking something that it should block (also known as a false negative), you can proceed immediately to the last step, [collecting diagnostic data and submitting the issue to us](#collect-diagnostic-data-for-file-submissions).
|
||||||
|
|
||||||
## Add exclusions for a false positive
|
## Add exclusions for a false positive
|
||||||
@ -79,7 +88,7 @@ To add an exclusion, see [Customize Attack surface reduction](customize-attack-s
|
|||||||
|
|
||||||
## Report a false positive or false negative
|
## Report a false positive or false negative
|
||||||
|
|
||||||
Use the [Windows Defender Security Intelligence web-based submission form](https://www.microsoft.com/wdsi/filesubmission) to report a false negative or false positive for network protection. With an E5 subscription, you can also [provide a link to any associated alert](../microsoft-defender-atp/alerts-queue.md).
|
Use the [Windows Defender Security Intelligence web-based submission form](https://www.microsoft.com/wdsi/filesubmission) to report a false negative or false positive for network protection. With a Windows E5 subscription, you can also [provide a link to any associated alert](../microsoft-defender-atp/alerts-queue.md).
|
||||||
|
|
||||||
## Collect diagnostic data for file submissions
|
## Collect diagnostic data for file submissions
|
||||||
|
|
||||||
@ -97,10 +106,12 @@ When you report a problem with attack surface reduction rules, you are asked to
|
|||||||
mpcmdrun -getfiles
|
mpcmdrun -getfiles
|
||||||
```
|
```
|
||||||
|
|
||||||
3. By default, they are saved to C:\ProgramData\Microsoft\Windows Defender\Support\MpSupportFiles.cab. Attach the file to the submission form.
|
3. By default, they are saved to `C:\ProgramData\Microsoft\Windows Defender\Support\MpSupportFiles.cab`. Attach the file to the submission form.
|
||||||
|
|
||||||
## Related topics
|
## Related articles
|
||||||
|
|
||||||
* [Attack surface reduction rules](attack-surface-reduction.md)
|
- [Attack surface reduction rules](attack-surface-reduction.md)
|
||||||
* [Enable attack surface reduction rules](enable-attack-surface-reduction.md)
|
|
||||||
* [Evaluate attack surface reduction rules](evaluate-attack-surface-reduction.md)
|
- [Enable attack surface reduction rules](enable-attack-surface-reduction.md)
|
||||||
|
|
||||||
|
- [Evaluate attack surface reduction rules](evaluate-attack-surface-reduction.md)
|
||||||
|
Loading…
x
Reference in New Issue
Block a user