mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-14 22:37:22 +00:00
Merge pull request #2512 from MicrosoftDocs/4086435
Attack Surface Reduction content updates
This commit is contained in:
commit
917fc7baaa
@ -30,9 +30,9 @@ Your attack surface is the total number of places where an attacker could compro
|
|||||||
|
|
||||||
Attack surface reduction rules target software behaviors that are often abused by attackers, such as:
|
Attack surface reduction rules target software behaviors that are often abused by attackers, such as:
|
||||||
|
|
||||||
* Launching executable files and scripts that attempt to download or run files
|
- Launching executable files and scripts that attempt to download or run files
|
||||||
* Running obfuscated or otherwise suspicious scripts
|
- Running obfuscated or otherwise suspicious scripts
|
||||||
* Performing behaviors that apps don't usually initiate during normal day-to-day work
|
- Performing behaviors that apps don't usually initiate during normal day-to-day work
|
||||||
|
|
||||||
These behaviors are sometimes seen in legitimate applications; however, they are considered risky because they are commonly abused by malware. Attack surface reduction rules can constrain these kinds of risky behaviors and help keep your organization safe.
|
These behaviors are sometimes seen in legitimate applications; however, they are considered risky because they are commonly abused by malware. Attack surface reduction rules can constrain these kinds of risky behaviors and help keep your organization safe.
|
||||||
|
|
||||||
@ -44,9 +44,13 @@ For more information about configuring attack surface reduction rules, see [Enab
|
|||||||
|
|
||||||
## Attack surface reduction features across Windows versions
|
## Attack surface reduction features across Windows versions
|
||||||
|
|
||||||
You can set attack surface reduction rules for computers running Windows 10 versions 1709 and 1803 or later, Windows Server version 1803 (Semi-Annual Channel) or later, and Windows Server 2019.
|
You can set attack surface reduction rules for computers running the following versions of Windows:
|
||||||
|
- [Windows 10, version 1709](https://docs.microsoft.com/windows/whats-new/whats-new-windows-10-version-1709)
|
||||||
|
- [Windows 10, version 1803](https://docs.microsoft.com/windows/whats-new/whats-new-windows-10-version-1803) or later
|
||||||
|
- [Windows Server, version 1803](https://docs.microsoft.com/windows-server/get-started/whats-new-in-windows-server-1803) (Semi-Annual Channel) or later
|
||||||
|
- [Windows Server 2019](https://docs.microsoft.com/windows-server/get-started-19/whats-new-19)
|
||||||
|
|
||||||
To use the entire feature-set of attack surface reduction rules, you need a Windows 10 Enterprise license. With a Windows E5 license, you get advanced management capabilities including monitoring, analytics, and workflows available in [Microsoft Defender Advanced Threat Protection](microsoft-defender-advanced-threat-protection.md), as well as reporting and configuration capabilities in the Microsoft 365 security center. These advanced capabilities aren't available with an E3 license, but you can still use Event Viewer to review attack surface reduction rule events.
|
To use the entire feature-set of attack surface reduction rules, you need a [Windows 10 Enterprise license](https://www.microsoft.com/licensing/product-licensing/windows10). With a [Windows E5 license](https://docs.microsoft.com/windows/deployment/deploy-enterprise-licenses), you get advanced management capabilities including monitoring, analytics, and workflows available in [Microsoft Defender Advanced Threat Protection](microsoft-defender-advanced-threat-protection.md), as well as reporting and configuration capabilities in the [Microsoft 365 security center](https://docs.microsoft.com/microsoft-365/security/mtp/overview-security-center). These advanced capabilities aren't available with an E3 license, but you can still use Event Viewer to review attack surface reduction rule events.
|
||||||
|
|
||||||
## Review attack surface reduction events in the Microsoft Defender Security Center
|
## Review attack surface reduction events in the Microsoft Defender Security Center
|
||||||
|
|
||||||
@ -77,11 +81,11 @@ You can review the Windows event log to view events generated by attack surface
|
|||||||
|
|
||||||
This will create a custom view that filters events to only show the following, all of which are related to controlled folder access:
|
This will create a custom view that filters events to only show the following, all of which are related to controlled folder access:
|
||||||
|
|
||||||
Event ID | Description
|
|Event ID | Description |
|
||||||
-|-
|
|---|---|
|
||||||
5007 | Event when settings are changed
|
|5007 | Event when settings are changed |
|
||||||
1121 | Event when rule fires in Block-mode
|
|1121 | Event when rule fires in Block-mode |
|
||||||
1122 | Event when rule fires in Audit-mode
|
|1122 | Event when rule fires in Audit-mode |
|
||||||
|
|
||||||
The "engine version" listed for attack surface reduction events in the event log, is generated by Microsoft Defender ATP, not by the operating system. Microsoft Defender ATP is integrated with Windows 10, so this feature works on all devices with Windows 10 installed.
|
The "engine version" listed for attack surface reduction events in the event log, is generated by Microsoft Defender ATP, not by the operating system. Microsoft Defender ATP is integrated with Windows 10, so this feature works on all devices with Windows 10 installed.
|
||||||
|
|
||||||
@ -89,38 +93,42 @@ The "engine version" listed for attack surface reduction events in the event log
|
|||||||
|
|
||||||
The following sections describe each of the 15 attack surface reduction rules. This table shows their corresponding GUIDs, which you use if you're configuring the rules with Group Policy or PowerShell. If you use Microsoft Endpoint Configuration Manager or Microsoft Intune, you do not need the GUIDs:
|
The following sections describe each of the 15 attack surface reduction rules. This table shows their corresponding GUIDs, which you use if you're configuring the rules with Group Policy or PowerShell. If you use Microsoft Endpoint Configuration Manager or Microsoft Intune, you do not need the GUIDs:
|
||||||
|
|
||||||
Rule name | GUID | File & folder exclusions
|
| Rule name | GUID | File & folder exclusions | Minimum OS supported |
|
||||||
-|-|-
|
|-----|----|---|---|
|
||||||
[Block executable content from email client and webmail](#block-executable-content-from-email-client-and-webmail) | BE9BA2D9-53EA-4CDC-84E5-9B1EEEE46550 | Supported
|
|[Block executable content from email client and webmail](#block-executable-content-from-email-client-and-webmail) | `BE9BA2D9-53EA-4CDC-84E5-9B1EEEE46550` | Supported | [Windows 10, version 1709](https://docs.microsoft.com/windows/whats-new/whats-new-windows-10-version-1709) (RS3, build 16299) or greater |
|
||||||
[Block all Office applications from creating child processes](#block-all-office-applications-from-creating-child-processes) | D4F940AB-401B-4EFC-AADC-AD5F3C50688A | Supported
|
|[Block all Office applications from creating child processes](#block-all-office-applications-from-creating-child-processes) | `D4F940AB-401B-4EFC-AADC-AD5F3C50688A` | Supported | [Windows 10, version 1709](https://docs.microsoft.com/windows/whats-new/whats-new-windows-10-version-1709) (RS3, build 16299) or greater |
|
||||||
[Block Office applications from creating executable content](#block-office-applications-from-creating-executable-content) | 3B576869-A4EC-4529-8536-B80A7769E899 | Supported
|
|[Block Office applications from creating executable content](#block-office-applications-from-creating-executable-content) | `3B576869-A4EC-4529-8536-B80A7769E899` | Supported | [Windows 10, version 1709](https://docs.microsoft.com/windows/whats-new/whats-new-windows-10-version-1709) (RS3, build 16299) or greater |
|
||||||
[Block Office applications from injecting code into other processes](#block-office-applications-from-injecting-code-into-other-processes) | 75668C1F-73B5-4CF0-BB93-3ECF5CB7CC84 | Supported
|
|[Block Office applications from injecting code into other processes](#block-office-applications-from-injecting-code-into-other-processes) | `75668C1F-73B5-4CF0-BB93-3ECF5CB7CC84` | Supported | [Windows 10, version 1709](https://docs.microsoft.com/windows/whats-new/whats-new-windows-10-version-1709) (RS3, build 16299) or greater |
|
||||||
[Block JavaScript or VBScript from launching downloaded executable content](#block-javascript-or-vbscript-from-launching-downloaded-executable-content) | D3E037E1-3EB8-44C8-A917-57927947596D | Not supported
|
|[Block JavaScript or VBScript from launching downloaded executable content](#block-javascript-or-vbscript-from-launching-downloaded-executable-content) | `D3E037E1-3EB8-44C8-A917-57927947596D` | Not supported | [Windows 10, version 1903](https://docs.microsoft.com/windows/whats-new/whats-new-windows-10-version-1903) (build 18362) or greater |
|
||||||
[Block execution of potentially obfuscated scripts](#block-execution-of-potentially-obfuscated-scripts) | 5BEB7EFE-FD9A-4556-801D-275E5FFC04CC | Supported
|
|[Block execution of potentially obfuscated scripts](#block-execution-of-potentially-obfuscated-scripts) | `5BEB7EFE-FD9A-4556-801D-275E5FFC04CC` | Supported | [Windows 10, version 1709](https://docs.microsoft.com/windows/whats-new/whats-new-windows-10-version-1709) (RS3, build 16299) or greater |
|
||||||
[Block Win32 API calls from Office macros](#block-win32-api-calls-from-office-macros) | 92E97FA1-2EDF-4476-BDD6-9DD0B4DDDC7B | Supported
|
|[Block Win32 API calls from Office macros](#block-win32-api-calls-from-office-macros) | `92E97FA1-2EDF-4476-BDD6-9DD0B4DDDC7B` | Supported | [Windows 10, version 1709](https://docs.microsoft.com/windows/whats-new/whats-new-windows-10-version-1709) (RS3, build 16299) or greater |
|
||||||
[Block executable files from running unless they meet a prevalence, age, or trusted list criterion](#block-executable-files-from-running-unless-they-meet-a-prevalence-age-or-trusted-list-criterion) | 01443614-cd74-433a-b99e-2ecdc07bfc25 | Supported
|
|[Block executable files from running unless they meet a prevalence, age, or trusted list criterion](#block-executable-files-from-running-unless-they-meet-a-prevalence-age-or-trusted-list-criterion) | `01443614-cd74-433a-b99e-2ecdc07bfc25` | Supported | [Windows 10, version 1709](https://docs.microsoft.com/windows/whats-new/whats-new-windows-10-version-1709) (RS3, build 16299) or greater |
|
||||||
[Use advanced protection against ransomware](#use-advanced-protection-against-ransomware) | c1db55ab-c21a-4637-bb3f-a12568109d35 | Supported
|
|[Use advanced protection against ransomware](#use-advanced-protection-against-ransomware) | `c1db55ab-c21a-4637-bb3f-a12568109d35` | Supported | [Windows 10, version 1709](https://docs.microsoft.com/windows/whats-new/whats-new-windows-10-version-1709) (RS3, build 16299) or greater |
|
||||||
[Block credential stealing from the Windows local security authority subsystem (lsass.exe)](#block-credential-stealing-from-the-windows-local-security-authority-subsystem) | 9e6c4e1f-7d60-472f-ba1a-a39ef669e4b2 | Supported
|
|[Block credential stealing from the Windows local security authority subsystem (lsass.exe)](#block-credential-stealing-from-the-windows-local-security-authority-subsystem) | `9e6c4e1f-7d60-472f-ba1a-a39ef669e4b2` | Supported | [Windows 10, version 1709](https://docs.microsoft.com/windows/whats-new/whats-new-windows-10-version-1709) (RS3, build 16299) or greater |
|
||||||
[Block process creations originating from PSExec and WMI commands](#block-process-creations-originating-from-psexec-and-wmi-commands) | d1e49aac-8f56-4280-b9ba-993a6d77406c | Supported
|
|[Block process creations originating from PSExec and WMI commands](#block-process-creations-originating-from-psexec-and-wmi-commands) | `d1e49aac-8f56-4280-b9ba-993a6d77406c` | Supported | [Windows 10, version 1709](https://docs.microsoft.com/windows/whats-new/whats-new-windows-10-version-1709) (RS3, build 16299) or greater |
|
||||||
[Block untrusted and unsigned processes that run from USB](#block-untrusted-and-unsigned-processes-that-run-from-usb) | b2b3f03d-6a65-4f7b-a9c7-1c7ef74a9ba4 | Supported
|
|[Block untrusted and unsigned processes that run from USB](#block-untrusted-and-unsigned-processes-that-run-from-usb) | `b2b3f03d-6a65-4f7b-a9c7-1c7ef74a9ba4` | Supported | [Windows 10, version 1709](https://docs.microsoft.com/windows/whats-new/whats-new-windows-10-version-1709) (RS3, build 16299) or greater |
|
||||||
[Block Office communication application from creating child processes](#block-office-communication-application-from-creating-child-processes) | 26190899-1602-49e8-8b27-eb1d0a1ce869 | Supported
|
|[Block Office communication application from creating child processes](#block-office-communication-application-from-creating-child-processes) | `26190899-1602-49e8-8b27-eb1d0a1ce869` | Supported | [Windows 10, version 1709](https://docs.microsoft.com/windows/whats-new/whats-new-windows-10-version-1709) (RS3, build 16299) or greater |
|
||||||
[Block Adobe Reader from creating child processes](#block-adobe-reader-from-creating-child-processes) | 7674ba52-37eb-4a4f-a9a1-f0f9a1619a2c | Supported
|
|[Block Adobe Reader from creating child processes](#block-adobe-reader-from-creating-child-processes) | `7674ba52-37eb-4a4f-a9a1-f0f9a1619a2c` | Supported | [Windows 10, version 1709](https://docs.microsoft.com/windows/whats-new/whats-new-windows-10-version-1709) (RS3, build 16299) or greater |
|
||||||
[Block persistence through WMI event subscription](#block-persistence-through-wmi-event-subscription) | e6db77e5-3df2-4cf1-b95a-636979351e5b | Not supported
|
|[Block persistence through WMI event subscription](#block-persistence-through-wmi-event-subscription) | `e6db77e5-3df2-4cf1-b95a-636979351e5b` | Not supported | [Windows 10, version 1903](https://docs.microsoft.com/windows/whats-new/whats-new-windows-10-version-1903) (build 18362) or greater |
|
||||||
|
|
||||||
### Block executable content from email client and webmail
|
### Block executable content from email client and webmail
|
||||||
|
|
||||||
This rule blocks the following file types from launching from email opened within the Microsoft Outlook application, or Outlook.com and other popular webmail providers:
|
This rule blocks the following file types from launching from email opened within the Microsoft Outlook application, or Outlook.com and other popular webmail providers:
|
||||||
|
|
||||||
* Executable files (such as .exe, .dll, or .scr)
|
- Executable files (such as .exe, .dll, or .scr)
|
||||||
* Script files (such as a PowerShell .ps, VisualBasic .vbs, or JavaScript .js file)
|
- Script files (such as a PowerShell .ps, VisualBasic .vbs, or JavaScript .js file)
|
||||||
|
|
||||||
This rule was introduced in: Windows 10 1709, Windows Server 1809, Windows Server 2019, Microsoft Endpoint Configuration Manager CB 1710
|
This rule was introduced in:
|
||||||
|
- [Windows 10, version 1709](https://docs.microsoft.com/windows/whats-new/whats-new-windows-10-version-1709)
|
||||||
|
- [Windows Server, version 1809](https://docs.microsoft.com/windows-server/get-started/whats-new-in-windows-server-1809)
|
||||||
|
- [Windows Server 2019](https://docs.microsoft.com/windows-server/get-started-19/whats-new-19)
|
||||||
|
- [Microsoft Endpoint Configuration Manager CB 1710](https://docs.microsoft.com/configmgr/core/servers/manage/updates)
|
||||||
|
|
||||||
Intune name: Execution of executable content (exe, dll, ps, js, vbs, etc.) dropped from email (webmail/mail client) (no exceptions)
|
Intune name: Execution of executable content (exe, dll, ps, js, vbs, etc.) dropped from email (webmail/mail client) (no exceptions)
|
||||||
|
|
||||||
Microsoft Endpoint Configuration Manager name: Block executable content from email client and webmail
|
Microsoft Endpoint Configuration Manager name: Block executable content from email client and webmail
|
||||||
|
|
||||||
GUID: BE9BA2D9-53EA-4CDC-84E5-9B1EEEE46550
|
GUID: `BE9BA2D9-53EA-4CDC-84E5-9B1EEEE46550`
|
||||||
|
|
||||||
### Block all Office applications from creating child processes
|
### Block all Office applications from creating child processes
|
||||||
|
|
||||||
@ -128,27 +136,35 @@ This rule blocks Office apps from creating child processes. This includes Word,
|
|||||||
|
|
||||||
Creating malicious child processes is a common malware strategy. Malware that abuse Office as a vector often run VBA macros and exploit code to download and attempt to run additional payloads. However, some legitimate line-of-business applications might also generate child processes for benign purposes, such as spawning a command prompt or using PowerShell to configure registry settings.
|
Creating malicious child processes is a common malware strategy. Malware that abuse Office as a vector often run VBA macros and exploit code to download and attempt to run additional payloads. However, some legitimate line-of-business applications might also generate child processes for benign purposes, such as spawning a command prompt or using PowerShell to configure registry settings.
|
||||||
|
|
||||||
This rule was introduced in: Windows 10 1709, Windows Server 1809, Windows Server 2019, Configuration Manager CB 1710
|
This rule was introduced in:
|
||||||
|
- [Windows 10, version 1709](https://docs.microsoft.com/windows/whats-new/whats-new-windows-10-version-1709)
|
||||||
|
- [Windows Server, version 1809](https://docs.microsoft.com/windows-server/get-started/whats-new-in-windows-server-1809)
|
||||||
|
- [Windows Server 2019](https://docs.microsoft.com/windows-server/get-started-19/whats-new-19)
|
||||||
|
- [Configuration Manager CB 1710](https://docs.microsoft.com/configmgr/core/servers/manage/updates)
|
||||||
|
|
||||||
Intune name: Office apps launching child processes
|
Intune name: Office apps launching child processes
|
||||||
|
|
||||||
Configuration Manager name: Block Office application from creating child processes
|
Configuration Manager name: Block Office application from creating child processes
|
||||||
|
|
||||||
GUID: D4F940AB-401B-4EFC-AADC-AD5F3C50688A
|
GUID: `D4F940AB-401B-4EFC-AADC-AD5F3C50688A`
|
||||||
|
|
||||||
### Block Office applications from creating executable content
|
### Block Office applications from creating executable content
|
||||||
|
|
||||||
This rule prevents Office apps, including Word, Excel, and PowerPoint, from creating potentially malicious executable content, by blocking malicious code from being written to disk.
|
This rule prevents Office apps, including Word, Excel, and PowerPoint, from creating potentially malicious executable content, by blocking malicious code from being written to disk.
|
||||||
|
|
||||||
Malware that abuse Office as a vector may attempt to break out of Office and save malicious components to disk. These malicious components would survive a computer reboot and persist on the system. Therefore, this rule defends against a common persistence technique.
|
Malware that abuses Office as a vector may attempt to break out of Office and save malicious components to disk. These malicious components would survive a computer reboot and persist on the system. Therefore, this rule defends against a common persistence technique.
|
||||||
|
|
||||||
This rule was introduced in: Windows 10 1709, Windows Server 1809, Windows Server 2019, SCCM CB 1710
|
This rule was introduced in:
|
||||||
|
- [Windows 10, version 1709](https://docs.microsoft.com/windows/whats-new/whats-new-windows-10-version-1709)
|
||||||
|
- [Windows Server, version 1809](https://docs.microsoft.com/windows-server/get-started/whats-new-in-windows-server-1809)
|
||||||
|
- [Windows Server 2019](https://docs.microsoft.com/windows-server/get-started-19/whats-new-19)
|
||||||
|
- [System Center Configuration Manager](https://docs.microsoft.com/configmgr/core/servers/manage/updates) (SCCM) CB 1710 (SCCM is now Microsoft Endpoint Configuration Manager)
|
||||||
|
|
||||||
Intune name: Office apps/macros creating executable content
|
Intune name: Office apps/macros creating executable content
|
||||||
|
|
||||||
SCCM name: Block Office applications from creating executable content
|
SCCM name: Block Office applications from creating executable content
|
||||||
|
|
||||||
GUID: 3B576869-A4EC-4529-8536-B80A7769E899
|
GUID: `3B576869-A4EC-4529-8536-B80A7769E899`
|
||||||
|
|
||||||
### Block Office applications from injecting code into other processes
|
### Block Office applications from injecting code into other processes
|
||||||
|
|
||||||
@ -160,13 +176,17 @@ There are no known legitimate business purposes for using code injection.
|
|||||||
|
|
||||||
This rule applies to Word, Excel, and PowerPoint.
|
This rule applies to Word, Excel, and PowerPoint.
|
||||||
|
|
||||||
This rule was introduced in: Windows 10 1709, Windows Server 1809, Windows Server 2019, Configuration Manager CB 1710
|
This rule was introduced in:
|
||||||
|
- [Windows 10, version 1709](https://docs.microsoft.com/windows/whats-new/whats-new-windows-10-version-1709)
|
||||||
|
- [Windows Server, version 1809](https://docs.microsoft.com/windows-server/get-started/whats-new-in-windows-server-1809)
|
||||||
|
- [Windows Server 2019](https://docs.microsoft.com/windows-server/get-started-19/whats-new-19)
|
||||||
|
- [Configuration Manager CB 1710](https://docs.microsoft.com/configmgr/core/servers/manage/updates)
|
||||||
|
|
||||||
Intune name: Office apps injecting code into other processes (no exceptions)
|
Intune name: Office apps injecting code into other processes (no exceptions)
|
||||||
|
|
||||||
Configuration Manager name: Block Office applications from injecting code into other processes
|
Configuration Manager name: Block Office applications from injecting code into other processes
|
||||||
|
|
||||||
GUID: 75668C1F-73B5-4CF0-BB93-3ECF5CB7CC84
|
GUID: `75668C1F-73B5-4CF0-BB93-3ECF5CB7CC84`
|
||||||
|
|
||||||
### Block JavaScript or VBScript from launching downloaded executable content
|
### Block JavaScript or VBScript from launching downloaded executable content
|
||||||
|
|
||||||
@ -177,13 +197,17 @@ Although not common, line-of-business applications sometimes use scripts to down
|
|||||||
> [!IMPORTANT]
|
> [!IMPORTANT]
|
||||||
> File and folder exclusions don't apply to this attack surface reduction rule.
|
> File and folder exclusions don't apply to this attack surface reduction rule.
|
||||||
|
|
||||||
This rule was introduced in: Windows 10 1709, Windows Server 1809, Windows Server 2019, Configuration Manager CB 1710
|
This rule was introduced in:
|
||||||
|
- [Windows 10, version 1709](https://docs.microsoft.com/windows/whats-new/whats-new-windows-10-version-1709)
|
||||||
|
- [Windows Server, version 1809](https://docs.microsoft.com/windows-server/get-started/whats-new-in-windows-server-1809)
|
||||||
|
- [Windows Server 2019](https://docs.microsoft.com/windows-server/get-started-19/whats-new-19)
|
||||||
|
- [Configuration Manager CB 1710](https://docs.microsoft.com/configmgr/core/servers/manage/updates)
|
||||||
|
|
||||||
Intune name: js/vbs executing payload downloaded from Internet (no exceptions)
|
Intune name: js/vbs executing payload downloaded from Internet (no exceptions)
|
||||||
|
|
||||||
Configuration Manager name: Block JavaScript or VBScript from launching downloaded executable content
|
Configuration Manager name: Block JavaScript or VBScript from launching downloaded executable content
|
||||||
|
|
||||||
GUID: D3E037E1-3EB8-44C8-A917-57927947596D
|
GUID: `D3E037E1-3EB8-44C8-A917-57927947596D`
|
||||||
|
|
||||||
### Block execution of potentially obfuscated scripts
|
### Block execution of potentially obfuscated scripts
|
||||||
|
|
||||||
@ -191,13 +215,17 @@ This rule detects suspicious properties within an obfuscated script.
|
|||||||
|
|
||||||
Script obfuscation is a common technique that both malware authors and legitimate applications use to hide intellectual property or decrease script loading times. Malware authors also use obfuscation to make malicious code harder to read, which prevents close scrutiny by humans and security software.
|
Script obfuscation is a common technique that both malware authors and legitimate applications use to hide intellectual property or decrease script loading times. Malware authors also use obfuscation to make malicious code harder to read, which prevents close scrutiny by humans and security software.
|
||||||
|
|
||||||
This rule was introduced in: Windows 10 1709, Windows Server 1809, Windows Server 2019, Configuration Manager CB 1710
|
This rule was introduced in:
|
||||||
|
- [Windows 10, version 1709](https://docs.microsoft.com/windows/whats-new/whats-new-windows-10-version-1709)
|
||||||
|
- [Windows Server, version 1809](https://docs.microsoft.com/windows-server/get-started/whats-new-in-windows-server-1809)
|
||||||
|
- [Windows Server 2019](https://docs.microsoft.com/windows-server/get-started-19/whats-new-19)
|
||||||
|
- [Configuration Manager CB 1710](https://docs.microsoft.com/configmgr/core/servers/manage/updates)
|
||||||
|
|
||||||
Intune name: Obfuscated js/vbs/ps/macro code
|
Intune name: Obfuscated js/vbs/ps/macro code
|
||||||
|
|
||||||
Configuration Manager name: Block execution of potentially obfuscated scripts.
|
Configuration Manager name: Block execution of potentially obfuscated scripts.
|
||||||
|
|
||||||
GUID: 5BEB7EFE-FD9A-4556-801D-275E5FFC04CC
|
GUID: `5BEB7EFE-FD9A-4556-801D-275E5FFC04CC`
|
||||||
|
|
||||||
### Block Win32 API calls from Office macros
|
### Block Win32 API calls from Office macros
|
||||||
|
|
||||||
@ -205,37 +233,42 @@ This rule prevents VBA macros from calling Win32 APIs.
|
|||||||
|
|
||||||
Office VBA provides the ability to make Win32 API calls. Malware can abuse this capability, such as [calling Win32 APIs to launch malicious shellcode](https://www.microsoft.com/security/blog/2018/09/12/office-vba-amsi-parting-the-veil-on-malicious-macros/) without writing anything directly to disk. Most organizations don't rely on the ability to call Win32 APIs in their day-to-day functioning, even if they use macros in other ways.
|
Office VBA provides the ability to make Win32 API calls. Malware can abuse this capability, such as [calling Win32 APIs to launch malicious shellcode](https://www.microsoft.com/security/blog/2018/09/12/office-vba-amsi-parting-the-veil-on-malicious-macros/) without writing anything directly to disk. Most organizations don't rely on the ability to call Win32 APIs in their day-to-day functioning, even if they use macros in other ways.
|
||||||
|
|
||||||
This rule was introduced in: Windows 10 1709, Windows Server 1809, Windows Server 2019, Configuration Manager CB 1710
|
This rule was introduced in:
|
||||||
|
- [Windows 10, version 1709](https://docs.microsoft.com/windows/whats-new/whats-new-windows-10-version-1709)
|
||||||
|
- [Windows Server, version 1809](https://docs.microsoft.com/windows-server/get-started/whats-new-in-windows-server-1809)
|
||||||
|
- [Windows Server 2019](https://docs.microsoft.com/windows-server/get-started-19/whats-new-19)
|
||||||
|
- [Configuration Manager CB 1710](https://docs.microsoft.com/configmgr/core/servers/manage/updates)
|
||||||
|
|
||||||
Intune name: Win32 imports from Office macro code
|
Intune name: Win32 imports from Office macro code
|
||||||
|
|
||||||
Configuration Manager name: Block Win32 API calls from Office macros
|
Configuration Manager name: Block Win32 API calls from Office macros
|
||||||
|
|
||||||
GUID: 92E97FA1-2EDF-4476-BDD6-9DD0B4DDDC7B
|
GUID: `92E97FA1-2EDF-4476-BDD6-9DD0B4DDDC7B`
|
||||||
|
|
||||||
### Block executable files from running unless they meet a prevalence, age, or trusted list criterion
|
### Block executable files from running unless they meet a prevalence, age, or trusted list criterion
|
||||||
|
|
||||||
This rule blocks the following file types from launching unless they meet prevalence or age criteria, or they're in a trusted list or an exclusion list:
|
This rule blocks the following file types from launching unless they meet prevalence or age criteria, or they're in a trusted list or an exclusion list:
|
||||||
|
|
||||||
* Executable files (such as .exe, .dll, or .scr)
|
- Executable files (such as .exe, .dll, or .scr)
|
||||||
|
|
||||||
Launching untrusted or unknown executable files can be risky, as it may not not be initially clear if the files are malicious.
|
Launching untrusted or unknown executable files can be risky, as it may not be initially clear if the files are malicious.
|
||||||
|
|
||||||
> [!NOTE]
|
|
||||||
> You must [enable cloud-delivered protection](../windows-defender-antivirus/enable-cloud-protection-windows-defender-antivirus.md) to use this rule.
|
|
||||||
|
|
||||||
> [!IMPORTANT]
|
> [!IMPORTANT]
|
||||||
> The rule **Block executable files from running unless they meet a prevalence, age, or trusted list criterion** with GUID 01443614-cd74-433a-b99e-2ecdc07bfc25 is owned by Microsoft and is not specified by admins. It uses cloud-delivered protection to update its trusted list regularly.
|
> You must [enable cloud-delivered protection](../windows-defender-antivirus/enable-cloud-protection-windows-defender-antivirus.md) to use this rule. <br/><br/> The rule **Block executable files from running unless they meet a prevalence, age, or trusted list criterion** with GUID 01443614-cd74-433a-b99e-2ecdc07bfc25 is owned by Microsoft and is not specified by admins. It uses cloud-delivered protection to update its trusted list regularly.
|
||||||
>
|
>
|
||||||
>You can specify individual files or folders (using folder paths or fully qualified resource names) but you can't specify which rules or exclusions apply to.
|
>You can specify individual files or folders (using folder paths or fully qualified resource names) but you can't specify which rules or exclusions apply to.
|
||||||
|
|
||||||
This rule was introduced in: Windows 10 1803, Windows Server 1809, Windows Server 2019, Configuration Manager CB 1802
|
This rule was introduced in:
|
||||||
|
- [Windows 10, version 1803](https://docs.microsoft.com/windows/whats-new/whats-new-windows-10-version-1803)
|
||||||
|
- [Windows Server, version 1809](https://docs.microsoft.com/windows-server/get-started/whats-new-in-windows-server-1809)
|
||||||
|
- [Windows Server 2019](https://docs.microsoft.com/windows-server/get-started-19/whats-new-19)
|
||||||
|
- [Configuration Manager CB 1802](https://docs.microsoft.com/configmgr/core/servers/manage/updates)
|
||||||
|
|
||||||
Intune name: Executables that don't meet a prevalence, age, or trusted list criteria.
|
Intune name: Executables that don't meet a prevalence, age, or trusted list criteria.
|
||||||
|
|
||||||
Configuration Manager name: Block executable files from running unless they meet a prevalence, age, or trusted list criteria
|
Configuration Manager name: Block executable files from running unless they meet a prevalence, age, or trusted list criteria
|
||||||
|
|
||||||
GUID: 01443614-cd74-433a-b99e-2ecdc07bfc25
|
GUID: `01443614-cd74-433a-b99e-2ecdc07bfc25`
|
||||||
|
|
||||||
### Use advanced protection against ransomware
|
### Use advanced protection against ransomware
|
||||||
|
|
||||||
@ -244,13 +277,17 @@ This rule provides an extra layer of protection against ransomware. It scans exe
|
|||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> You must [enable cloud-delivered protection](../windows-defender-antivirus/enable-cloud-protection-windows-defender-antivirus.md) to use this rule.
|
> You must [enable cloud-delivered protection](../windows-defender-antivirus/enable-cloud-protection-windows-defender-antivirus.md) to use this rule.
|
||||||
|
|
||||||
This rule was introduced in: Windows 10 1803, Windows Server 1809, Windows Server 2019, Configuration Manager CB 1802
|
This rule was introduced in:
|
||||||
|
- [Windows 10, version 1803](https://docs.microsoft.com/windows/whats-new/whats-new-windows-10-version-1803)
|
||||||
|
- [Windows Server, version 1809](https://docs.microsoft.com/windows-server/get-started/whats-new-in-windows-server-1809)
|
||||||
|
- [Windows Server 2019](https://docs.microsoft.com/windows-server/get-started-19/whats-new-19)
|
||||||
|
- [Configuration Manager CB 1802](https://docs.microsoft.com/configmgr/core/servers/manage/updates)
|
||||||
|
|
||||||
Intune name: Advanced ransomware protection
|
Intune name: Advanced ransomware protection
|
||||||
|
|
||||||
Configuration Manager name: Use advanced protection against ransomware
|
Configuration Manager name: Use advanced protection against ransomware
|
||||||
|
|
||||||
GUID: c1db55ab-c21a-4637-bb3f-a12568109d35
|
GUID: `c1db55ab-c21a-4637-bb3f-a12568109d35`
|
||||||
|
|
||||||
### Block credential stealing from the Windows local security authority subsystem
|
### Block credential stealing from the Windows local security authority subsystem
|
||||||
|
|
||||||
@ -261,13 +298,17 @@ LSASS authenticates users who log in to a Windows computer. Microsoft Defender C
|
|||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> In some apps, the code enumerates all running processes and attempts to open them with exhaustive permissions. This rule denies the app's process open action and logs the details to the security event log. This rule can generate a lot of noise. If you have an app that overly enumerates LSASS, you need to add it to the exclusion list. By itself, this event log entry doesn't necessarily indicate a malicious threat.
|
> In some apps, the code enumerates all running processes and attempts to open them with exhaustive permissions. This rule denies the app's process open action and logs the details to the security event log. This rule can generate a lot of noise. If you have an app that overly enumerates LSASS, you need to add it to the exclusion list. By itself, this event log entry doesn't necessarily indicate a malicious threat.
|
||||||
|
|
||||||
This rule was introduced in: Windows 10 1803, Windows Server 1809, Windows Server 2019, Configuration Manager CB 1802
|
This rule was introduced in:
|
||||||
|
- [Windows 10, version 1803](https://docs.microsoft.com/windows/whats-new/whats-new-windows-10-version-1803)
|
||||||
|
- [Windows Server, version 1809](https://docs.microsoft.com/windows-server/get-started/whats-new-in-windows-server-1809)
|
||||||
|
- [Windows Server 2019](https://docs.microsoft.com/windows-server/get-started-19/whats-new-19)
|
||||||
|
- [Configuration Manager CB 1802](https://docs.microsoft.com/configmgr/core/servers/manage/updates)
|
||||||
|
|
||||||
Intune name: Flag credential stealing from the Windows local security authority subsystem
|
Intune name: Flag credential stealing from the Windows local security authority subsystem
|
||||||
|
|
||||||
Configuration Manager name: Block credential stealing from the Windows local security authority subsystem
|
Configuration Manager name: Block credential stealing from the Windows local security authority subsystem
|
||||||
|
|
||||||
GUID: 9e6c4e1f-7d60-472f-ba1a-a39ef669e4b2
|
GUID: `9e6c4e1f-7d60-472f-ba1a-a39ef669e4b2`
|
||||||
|
|
||||||
### Block process creations originating from PSExec and WMI commands
|
### Block process creations originating from PSExec and WMI commands
|
||||||
|
|
||||||
@ -276,13 +317,16 @@ This rule blocks processes created through [PsExec](https://docs.microsoft.com/s
|
|||||||
> [!WARNING]
|
> [!WARNING]
|
||||||
> Only use this rule if you're managing your devices with [Intune](https://docs.microsoft.com/intune) or another MDM solution. This rule is incompatible with management through [Microsoft Endpoint Configuration Manager](https://docs.microsoft.com/configmgr) because this rule blocks WMI commands the Configuration Manager client uses to function correctly.
|
> Only use this rule if you're managing your devices with [Intune](https://docs.microsoft.com/intune) or another MDM solution. This rule is incompatible with management through [Microsoft Endpoint Configuration Manager](https://docs.microsoft.com/configmgr) because this rule blocks WMI commands the Configuration Manager client uses to function correctly.
|
||||||
|
|
||||||
This rule was introduced in: Windows 10 1803, Windows Server 1809, Windows Server 2019
|
This rule was introduced in:
|
||||||
|
- [Windows 10, version 1803](https://docs.microsoft.com/windows/whats-new/whats-new-windows-10-version-1803)
|
||||||
|
- [Windows Server, version 1809](https://docs.microsoft.com/windows-server/get-started/whats-new-in-windows-server-1809)
|
||||||
|
- [Windows Server 2019](https://docs.microsoft.com/windows-server/get-started-19/whats-new-19)
|
||||||
|
|
||||||
Intune name: Process creation from PSExec and WMI commands
|
Intune name: Process creation from PSExec and WMI commands
|
||||||
|
|
||||||
Configuration Manager name: Not applicable
|
Configuration Manager name: Not applicable
|
||||||
|
|
||||||
GUID: d1e49aac-8f56-4280-b9ba-993a6d77406c
|
GUID: `d1e49aac-8f56-4280-b9ba-993a6d77406c`
|
||||||
|
|
||||||
### Block untrusted and unsigned processes that run from USB
|
### Block untrusted and unsigned processes that run from USB
|
||||||
|
|
||||||
@ -291,13 +335,17 @@ With this rule, admins can prevent unsigned or untrusted executable files from r
|
|||||||
* Executable files (such as .exe, .dll, or .scr)
|
* Executable files (such as .exe, .dll, or .scr)
|
||||||
* Script files (such as a PowerShell .ps, VisualBasic .vbs, or JavaScript .js file)
|
* Script files (such as a PowerShell .ps, VisualBasic .vbs, or JavaScript .js file)
|
||||||
|
|
||||||
This rule was introduced in: Windows 10 1803, Windows Server 1809, Windows Server 2019, Configuration Manager CB 1802
|
This rule was introduced in:
|
||||||
|
- [Windows 10, version 1803](https://docs.microsoft.com/windows/whats-new/whats-new-windows-10-version-1803)
|
||||||
|
- [Windows Server, version 1809](https://docs.microsoft.com/windows-server/get-started/whats-new-in-windows-server-1809)
|
||||||
|
- [Windows Server 2019](https://docs.microsoft.com/windows-server/get-started-19/whats-new-19)
|
||||||
|
- [Configuration Manager CB 1802](https://docs.microsoft.com/configmgr/core/servers/manage/updates)
|
||||||
|
|
||||||
Intune name: Untrusted and unsigned processes that run from USB
|
Intune name: Untrusted and unsigned processes that run from USB
|
||||||
|
|
||||||
Configuration Manager name: Block untrusted and unsigned processes that run from USB
|
Configuration Manager name: Block untrusted and unsigned processes that run from USB
|
||||||
|
|
||||||
GUID: b2b3f03d-6a65-4f7b-a9c7-1c7ef74a9ba4
|
GUID: `b2b3f03d-6a65-4f7b-a9c7-1c7ef74a9ba4`
|
||||||
|
|
||||||
### Block Office communication application from creating child processes
|
### Block Office communication application from creating child processes
|
||||||
|
|
||||||
@ -308,13 +356,16 @@ This protects against social engineering attacks and prevents exploit code from
|
|||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> This rule applies to Outlook and Outlook.com only.
|
> This rule applies to Outlook and Outlook.com only.
|
||||||
|
|
||||||
This rule was introduced in: Windows 10 1809, Windows Server 1809, Windows Server 2019
|
This rule was introduced in:
|
||||||
|
- [Windows 10, version 1809](https://docs.microsoft.com/windows/whats-new/whats-new-windows-10-version-1809)
|
||||||
|
- [Windows Server, version 1809](https://docs.microsoft.com/windows-server/get-started/whats-new-in-windows-server-1809)
|
||||||
|
- [Windows Server 2019](https://docs.microsoft.com/windows-server/get-started-19/whats-new-19)
|
||||||
|
|
||||||
Intune name: Process creation from Office communication products (beta)
|
Intune name: Process creation from Office communication products (beta)
|
||||||
|
|
||||||
Configuration Manager name: Not yet available
|
Configuration Manager name: Not yet available
|
||||||
|
|
||||||
GUID: 26190899-1602-49e8-8b27-eb1d0a1ce869
|
GUID: `26190899-1602-49e8-8b27-eb1d0a1ce869`
|
||||||
|
|
||||||
### Block Adobe Reader from creating child processes
|
### Block Adobe Reader from creating child processes
|
||||||
|
|
||||||
@ -322,13 +373,16 @@ This rule prevents attacks by blocking Adobe Reader from creating additional pro
|
|||||||
|
|
||||||
Through social engineering or exploits, malware can download and launch additional payloads and break out of Adobe Reader. By blocking child processes from being generated by Adobe Reader, malware attempting to use it as a vector are prevented from spreading.
|
Through social engineering or exploits, malware can download and launch additional payloads and break out of Adobe Reader. By blocking child processes from being generated by Adobe Reader, malware attempting to use it as a vector are prevented from spreading.
|
||||||
|
|
||||||
This rule was introduced in: Windows 10 1809, Windows Server 1809, Windows Server 2019
|
This rule was introduced in:
|
||||||
|
- [Windows 10, version 1809](https://docs.microsoft.com/windows/whats-new/whats-new-windows-10-version-1809)
|
||||||
|
- [Windows Server, version 1809](https://docs.microsoft.com/windows-server/get-started/whats-new-in-windows-server-1809)
|
||||||
|
- [Windows Server 2019](https://docs.microsoft.com/windows-server/get-started-19/whats-new-19)
|
||||||
|
|
||||||
Intune name: Process creation from Adobe Reader (beta)
|
Intune name: Process creation from Adobe Reader (beta)
|
||||||
|
|
||||||
Configuration Manager name: Not yet available
|
Configuration Manager name: Not yet available
|
||||||
|
|
||||||
GUID: 7674ba52-37eb-4a4f-a9a1-f0f9a1619a2c
|
GUID: `7674ba52-37eb-4a4f-a9a1-f0f9a1619a2c`
|
||||||
|
|
||||||
### Block persistence through WMI event subscription
|
### Block persistence through WMI event subscription
|
||||||
|
|
||||||
@ -336,17 +390,22 @@ This rule prevents malware from abusing WMI to attain persistence on a device.
|
|||||||
|
|
||||||
Fileless threats employ various tactics to stay hidden, to avoid being seen in the file system, and to gain periodic execution control. Some threats can abuse the WMI repository and event model to stay hidden.
|
Fileless threats employ various tactics to stay hidden, to avoid being seen in the file system, and to gain periodic execution control. Some threats can abuse the WMI repository and event model to stay hidden.
|
||||||
|
|
||||||
This rule was introduced in: Windows 10 1903, Windows Server 1903
|
This rule was introduced in:
|
||||||
|
- [Windows 10, version 1903](https://docs.microsoft.com/windows/whats-new/whats-new-windows-10-version-1903)
|
||||||
|
- [Windows Server 1903](https://docs.microsoft.com/windows-server/get-started-19/whats-new-in-windows-server-1903-1909)
|
||||||
|
|
||||||
Intune name: Block persistence through WMI event subscription
|
Intune name: Block persistence through WMI event subscription
|
||||||
|
|
||||||
Configuration Manager name: Not yet available
|
Configuration Manager name: Not yet available
|
||||||
|
|
||||||
GUID: e6db77e5-3df2-4cf1-b95a-636979351e5b
|
GUID: `e6db77e5-3df2-4cf1-b95a-636979351e5b`
|
||||||
|
|
||||||
## Related topics
|
## Related topics
|
||||||
|
|
||||||
* [Attack surface reduction FAQ](attack-surface-reduction.md)
|
- [Attack surface reduction FAQ](attack-surface-reduction.md)
|
||||||
* [Enable attack surface reduction rules](enable-attack-surface-reduction.md)
|
|
||||||
* [Evaluate attack surface reduction rules](evaluate-attack-surface-reduction.md)
|
- [Enable attack surface reduction rules](enable-attack-surface-reduction.md)
|
||||||
* [Compatibility of Microsoft Defender with other antivirus/antimalware](../windows-defender-antivirus/windows-defender-antivirus-compatibility.md)
|
|
||||||
|
- [Evaluate attack surface reduction rules](evaluate-attack-surface-reduction.md)
|
||||||
|
|
||||||
|
- [Compatibility of Microsoft Defender with other antivirus/antimalware](../windows-defender-antivirus/windows-defender-antivirus-compatibility.md)
|
||||||
|
Loading…
x
Reference in New Issue
Block a user