mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-12 13:27:23 +00:00
Merge pull request #171 from MicrosoftDocs/asr-rules-19H1
added caveat about excluded apps
This commit is contained in:
commit
c658ff628a
@ -11,7 +11,7 @@ ms.pagetype: security
|
|||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
author: andreabichsel
|
author: andreabichsel
|
||||||
ms.author: v-anbic
|
ms.author: v-anbic
|
||||||
ms.date: 05/08/2019
|
ms.date: 05/13/2019
|
||||||
---
|
---
|
||||||
|
|
||||||
# Customize attack surface reduction rules
|
# Customize attack surface reduction rules
|
||||||
@ -31,20 +31,18 @@ You can use Group Policy, PowerShell, and MDM CSPs to configure these settings.
|
|||||||
|
|
||||||
## Exclude files and folders
|
## Exclude files and folders
|
||||||
|
|
||||||
You can exclude files and folders from being evaluated by all attack surface reduction rules. This means that even if the file or folder contains malicious behavior as determined by an attack surface reduction rule, the file will not be blocked from running.
|
You can exclude files and folders from being evaluated by attack surface reduction rules. This means that even if an attack surface reduction rule detects that the file contains malicious behavior, the file will not be blocked from running.
|
||||||
|
|
||||||
This could potentially allow unsafe files to run and infect your devices.
|
|
||||||
|
|
||||||
>[!WARNING]
|
>[!WARNING]
|
||||||
>Excluding files or folders can severely reduce the protection provided by attack surface reduction rules. Files that would have been blocked by a rule will be allowed to run, and there will be no report or event recorded.
|
>This could potentially allow unsafe files to run and infect your devices. Excluding files or folders can severely reduce the protection provided by attack surface reduction rules. Files that would have been blocked by a rule will be allowed to run, and there will be no report or event recorded.
|
||||||
>
|
|
||||||
>If you are encountering problems with rules detecting files that you believe should not be detected, you should [use audit mode first to test the rule](evaluate-attack-surface-reduction.md).
|
|
||||||
|
|
||||||
You can specify individual files or folders (using folder paths or fully qualified resource names) but you cannot specify if the exclusions should only be applied to individual rules: the exclusions will apply to all rules that are enabled (or placed in audit mode) and that allow exclusions.
|
An exclusion applies to all rules that allow exclusions. You can specify an individual file, folder path, or the fully qualified domain name for a resource, but you cannot limit an exclusion to certain rules.
|
||||||
|
|
||||||
|
An exclusion is applied only when when the excluded application or service starts. For example, if you add an exclusion for an update service that is already running, the update service will continue to trigger events until the service is stopped and restarted.
|
||||||
|
|
||||||
Attack surface reduction supports environment variables and wildcards. For information about using wildcards, see [Use wildcards in the file name and folder path or extension exclusion lists](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus#use-wildcards-in-the-file-name-and-folder-path-or-extension-exclusion-lists).
|
Attack surface reduction supports environment variables and wildcards. For information about using wildcards, see [Use wildcards in the file name and folder path or extension exclusion lists](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus#use-wildcards-in-the-file-name-and-folder-path-or-extension-exclusion-lists).
|
||||||
|
If you are encountering problems with rules detecting files that you believe should not be detected, you should [use audit mode first to test the rule](evaluate-attack-surface-reduction.md).
|
||||||
|
|
||||||
Exclusions apply to all attack surface reduction rules.
|
|
||||||
|
|
||||||
Rule description | GUID
|
Rule description | GUID
|
||||||
-|:-:|-
|
-|:-:|-
|
||||||
@ -76,9 +74,9 @@ See the [attack surface reduction](attack-surface-reduction-exploit-guard.md) to
|
|||||||
|
|
||||||
4. Double-click the **Exclude files and paths from Attack surface reduction Rules** setting and set the option to **Enabled**. Click **Show** and enter each file or folder in the **Value name** column. Enter **0** in the **Value** column for each item.
|
4. Double-click the **Exclude files and paths from Attack surface reduction Rules** setting and set the option to **Enabled**. Click **Show** and enter each file or folder in the **Value name** column. Enter **0** in the **Value** column for each item.
|
||||||
|
|
||||||
### Use PowerShell to exclude files and folderss
|
### Use PowerShell to exclude files and folders
|
||||||
|
|
||||||
1. Type **powershell** in the Start menu, right click **Windows PowerShell** and click **Run as administrator**
|
1. Type **powershell** in the Start menu, right-click **Windows PowerShell** and click **Run as administrator**
|
||||||
2. Enter the following cmdlet:
|
2. Enter the following cmdlet:
|
||||||
|
|
||||||
```PowerShell
|
```PowerShell
|
||||||
|
@ -11,7 +11,7 @@ ms.pagetype: security
|
|||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
author: andreabichsel
|
author: andreabichsel
|
||||||
ms.author: v-anbic
|
ms.author: v-anbic
|
||||||
ms.date: 05/07/2019
|
ms.date: 05/13/2019
|
||||||
---
|
---
|
||||||
|
|
||||||
# Customize controlled folder access
|
# Customize controlled folder access
|
||||||
@ -89,13 +89,14 @@ Use the [./Vendor/MSFT/Policy/Config/Defender/GuardedFoldersList](https://docs.m
|
|||||||
You can specify if certain apps should always be considered safe and given write access to files in protected folders. Allowing apps can be useful if you're finding a particular app that you know and trust is being blocked by the controlled folder access feature.
|
You can specify if certain apps should always be considered safe and given write access to files in protected folders. Allowing apps can be useful if you're finding a particular app that you know and trust is being blocked by the controlled folder access feature.
|
||||||
|
|
||||||
>[!IMPORTANT]
|
>[!IMPORTANT]
|
||||||
>By default, Windows adds apps that it considers friendly to the allowed list - apps added automatically by Windows are not recorded in the list shown in the Windows Security app or by using the associated PowerShell cmdlets.
|
>By default, Windows adds apps that it considers friendly to the allowed list—apps added automatically by Windows are not recorded in the list shown in the Windows Security app or by using the associated PowerShell cmdlets.
|
||||||
>You shouldn't need to add most apps. Only add apps if they are being blocked and you can verify their trustworthiness.
|
>You shouldn't need to add most apps. Only add apps if they are being blocked and you can verify their trustworthiness.
|
||||||
|
|
||||||
You can use the Windows Security app or Group Policy to add and remove apps that should be allowed to access protected folders.
|
|
||||||
|
|
||||||
When you add an app, you have to specify the app's location. Only the app in that location will be permitted access to the protected folders - if the app (with the same name) is located in a different location, then it will not be added to the allow list and may be blocked by controlled folder access.
|
When you add an app, you have to specify the app's location. Only the app in that location will be permitted access to the protected folders - if the app (with the same name) is located in a different location, then it will not be added to the allow list and may be blocked by controlled folder access.
|
||||||
|
|
||||||
|
An allowed application or service only has write access to a controlled folder after it starts. For example, if you allow an update service that is already running, the update service will continue to trigger events until the service is stopped and restarted.
|
||||||
|
|
||||||
|
|
||||||
### Use the Windows Defender Security app to allow specific apps
|
### Use the Windows Defender Security app to allow specific apps
|
||||||
|
|
||||||
1. Open the Windows Security by clicking the shield icon in the task bar or searching the start menu for **Defender**.
|
1. Open the Windows Security by clicking the shield icon in the task bar or searching the start menu for **Defender**.
|
||||||
@ -106,7 +107,7 @@ When you add an app, you have to specify the app's location. Only the app in tha
|
|||||||
|
|
||||||
4. Click **Add an allowed app** and follow the prompts to add apps.
|
4. Click **Add an allowed app** and follow the prompts to add apps.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
### Use Group Policy to allow specific apps
|
### Use Group Policy to allow specific apps
|
||||||
|
|
||||||
@ -120,7 +121,7 @@ When you add an app, you have to specify the app's location. Only the app in tha
|
|||||||
|
|
||||||
### Use PowerShell to allow specific apps
|
### Use PowerShell to allow specific apps
|
||||||
|
|
||||||
1. Type **powershell** in the Start menu, right click **Windows PowerShell** and click **Run as administrator**
|
1. Type **powershell** in the Start menu, right-click **Windows PowerShell** and click **Run as administrator**
|
||||||
2. Enter the following cmdlet:
|
2. Enter the following cmdlet:
|
||||||
|
|
||||||
```PowerShell
|
```PowerShell
|
||||||
|
@ -11,7 +11,7 @@ ms.pagetype: security
|
|||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
author: andreabichsel
|
author: andreabichsel
|
||||||
ms.author: v-anbic
|
ms.author: v-anbic
|
||||||
ms.date: 05/09/2019
|
ms.date: 05/13/2019
|
||||||
---
|
---
|
||||||
|
|
||||||
# Enable attack surface reduction rules
|
# Enable attack surface reduction rules
|
||||||
@ -51,7 +51,7 @@ You can exclude files and folders from being evaluated by most attack surface re
|
|||||||
>- Block process creations originating from PSExec and WMI commands
|
>- Block process creations originating from PSExec and WMI commands
|
||||||
>- Block JavaScript or VBScript from launching downloaded executable content
|
>- Block JavaScript or VBScript from launching downloaded executable content
|
||||||
|
|
||||||
You can specify individual files or folders (using folder paths or fully qualified resource names) but you can't specify which rules the exclusions apply to.
|
You can specify individual files or folders (using folder paths or fully qualified resource names) but you can't specify which rules the exclusions apply to. An exclusion is applied only when when the excluded application or service starts. For example, if you add an exclusion for an update service that is already running, the update service will continue to trigger events until the service is stopped and restarted.
|
||||||
|
|
||||||
ASR rules support environment variables and wildcards. For information about using wildcards, see [Use wildcards in the file name and folder path or extension exclusion lists](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus#use-wildcards-in-the-file-name-and-folder-path-or-extension-exclusion-lists).
|
ASR rules support environment variables and wildcards. For information about using wildcards, see [Use wildcards in the file name and folder path or extension exclusion lists](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus#use-wildcards-in-the-file-name-and-folder-path-or-extension-exclusion-lists).
|
||||||
|
|
||||||
|
@ -11,7 +11,7 @@ ms.pagetype: security
|
|||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
author: andreabichsel
|
author: andreabichsel
|
||||||
ms.author: v-anbic
|
ms.author: v-anbic
|
||||||
ms.date: 05/09/2019
|
ms.date: 05/13/2019
|
||||||
---
|
---
|
||||||
|
|
||||||
# Enable controlled folder access
|
# Enable controlled folder access
|
||||||
@ -63,7 +63,7 @@ For more information about disabling local list merging, see [Prevent or allow u
|
|||||||

|

|
||||||
|
|
||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
>Wilcard is supported for applications, but not for folders. Subfolders are not protected.
|
>Wilcard is supported for applications, but not for folders. Subfolders are not protected. Allowed apps will continue to trigger events until they are restarted.
|
||||||
|
|
||||||
1. Click **OK** to save each open blade and click **Create**.
|
1. Click **OK** to save each open blade and click **Create**.
|
||||||
1. Click the profile **Assignments**, assign to **All Users & All Devices**, and click **Save**.
|
1. Click the profile **Assignments**, assign to **All Users & All Devices**, and click **Save**.
|
||||||
@ -79,7 +79,7 @@ Use the [./Vendor/MSFT/Policy/Config/ControlledFolderAccessProtectedFolders](htt
|
|||||||
1. Enter a name and a description, click **Controlled folder access**, and click **Next**.
|
1. Enter a name and a description, click **Controlled folder access**, and click **Next**.
|
||||||
1. Choose whether block or audit changes, allow other apps, or add other folders, and click **Next**.
|
1. Choose whether block or audit changes, allow other apps, or add other folders, and click **Next**.
|
||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
>Wilcard is supported for applications, but not for folders. Subfolders are not protected.
|
>Wilcard is supported for applications, but not for folders. Subfolders are not protected. Allowed apps will continue to trigger events until they are restarted.
|
||||||
1. Review the settings and click **Next** to create the policy.
|
1. Review the settings and click **Next** to create the policy.
|
||||||
1. After the policy is created, click **Close**.
|
1. After the policy is created, click **Close**.
|
||||||
|
|
||||||
|
@ -11,7 +11,7 @@ ms.pagetype: security
|
|||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
author: andreabichsel
|
author: andreabichsel
|
||||||
ms.author: v-anbic
|
ms.author: v-anbic
|
||||||
ms.date: 05/10/2019
|
ms.date: 05/13/2019
|
||||||
---
|
---
|
||||||
|
|
||||||
# Enable network protection
|
# Enable network protection
|
||||||
@ -22,6 +22,7 @@ ms.date: 05/10/2019
|
|||||||
|
|
||||||
[Network protection](network-protection-exploit-guard.md) helps to prevent employees from using any application to access dangerous domains that may host phishing scams, exploits, and other malicious content on the Internet.
|
[Network protection](network-protection-exploit-guard.md) helps to prevent employees from using any application to access dangerous domains that may host phishing scams, exploits, and other malicious content on the Internet.
|
||||||
You can [audit network protection](evaluate-network-protection.md) in a test environment to see which apps would be blocked before you enable it.
|
You can [audit network protection](evaluate-network-protection.md) in a test environment to see which apps would be blocked before you enable it.
|
||||||
|
|
||||||
You can enable network protection by using any of these methods:
|
You can enable network protection by using any of these methods:
|
||||||
|
|
||||||
- [Microsoft Intune](#intune)
|
- [Microsoft Intune](#intune)
|
||||||
|
Loading…
x
Reference in New Issue
Block a user