mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-22 13:53:39 +00:00
added links to sections
This commit is contained in:
@ -11,14 +11,31 @@ ms.pagetype: security
|
|||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
author: andreabichsel
|
author: andreabichsel
|
||||||
ms.author: v-anbic
|
ms.author: v-anbic
|
||||||
|
ms.date: 04/26/2019
|
||||||
---
|
---
|
||||||
|
|
||||||
# Enable attack surface reduction rules
|
# Enable attack surface reduction rules
|
||||||
|
|
||||||
[Attack surface reduction rules](attack-surface-reduction-exploit-guard.md) help prevent actions and apps that malware often uses to infect computers. You can set attack surface reduction rules for computers running Windows 10 or Windows Server 2019.
|
[Attack surface reduction rules](attack-surface-reduction-exploit-guard.md) help prevent actions and apps that malware often uses to infect computers. You can set attack surface reduction rules for computers running Windows 10 or Windows Server 2019.
|
||||||
|
|
||||||
|
Each ASR rule contains three settings:
|
||||||
|
|
||||||
|
* Not configured: Disable the ASR rule
|
||||||
|
* Block: Enable the ASR rule
|
||||||
|
* Audit: Evaluate how the ASR rule would impact your organization if enabled
|
||||||
|
|
||||||
To use ASR rules, you need either a Windows 10 Enterprise E3 or E5 license. We recommend an E5 license so you can take advantage of the advanced monitoring and reporting capabilities available in Windows Defender Advanced Threat Protection (Windows Defender ATP). These advanced capabilities aren't available with an E3 license, but you can develop your own monitoring and reporting tools to use in conjunction with ASR rules.
|
To use ASR rules, you need either a Windows 10 Enterprise E3 or E5 license. We recommend an E5 license so you can take advantage of the advanced monitoring and reporting capabilities available in Windows Defender Advanced Threat Protection (Windows Defender ATP). These advanced capabilities aren't available with an E3 license, but you can develop your own monitoring and reporting tools to use in conjunction with ASR rules.
|
||||||
|
|
||||||
|
You can enable attack surface reduction rules by using any of the these methods:
|
||||||
|
|
||||||
|
- [Microsoft Intune](#intune)
|
||||||
|
- [Mobile Device Management (MDM)](#mdm)
|
||||||
|
- [System Center Configuration Manager (SCCM)](#sccm)
|
||||||
|
- [Group Policy](#group-policy)
|
||||||
|
- [PowerShell](#powershell)
|
||||||
|
|
||||||
|
Enterprise-level management such as Intune or SCCM is recommended. Enterprise-level management will overwrite any conflicting Group Policy or PowerShell settings on startup.
|
||||||
|
|
||||||
## Exclude files and folders from ASR rules
|
## Exclude files and folders from ASR rules
|
||||||
|
|
||||||
You can exclude files and folders from being evaluated by most attack surface reduction rules. This means that even if an ASR rule determines the file or folder contains malicious behavior, it will not block the file from running. This could potentially allow unsafe files to run and infect your devices.
|
You can exclude files and folders from being evaluated by most attack surface reduction rules. This means that even if an ASR rule determines the file or folder contains malicious behavior, it will not block the file from running. This could potentially allow unsafe files to run and infect your devices.
|
||||||
@ -43,24 +60,7 @@ ASR rules support environment variables and wildcards. For information about usi
|
|||||||
|
|
||||||
The following procedures for enabling ASR rules include instructions for how to exclude files and folders.
|
The following procedures for enabling ASR rules include instructions for how to exclude files and folders.
|
||||||
|
|
||||||
## Enable and audit attack surface reduction rules
|
## Intune
|
||||||
|
|
||||||
It's best to use an enterprise-level management platform like Intune or System Center Configuration Manager (SCCM) to configure ASR rules, but you can also use Group Policy, PowerShell, or third-party mobile device management (MDM) CSPs.
|
|
||||||
|
|
||||||
>[!WARNING]
|
|
||||||
>If you manage your computers and devices with Intune, SCCM, or other enterprise-level management platform, the management software will overwrite any conflicting Group Policy or PowerShell settings on startup.
|
|
||||||
|
|
||||||
For a complete list of ASR rules, see [Reduce attack surfaces with attack surface reduction rules](attack-surface-reduction-exploit-guard.md).
|
|
||||||
|
|
||||||
Each ASR rule contains three settings:
|
|
||||||
|
|
||||||
* Not configured: Disable the ASR rule
|
|
||||||
* Block: Enable the ASR rule
|
|
||||||
* Audit: Evaluate how the ASR rule would impact your organization if enabled
|
|
||||||
|
|
||||||
For further details on how audit mode works and when to use it, see [Audit Windows Defender Exploit Guard](audit-windows-defender-exploit-guard.md).
|
|
||||||
|
|
||||||
### Intune
|
|
||||||
|
|
||||||
1. In Intune, select **Device configuration** > **Profiles**. Choose an existing endpoint protection profile or create a new one. To create a new one, select **Create profile** and enter information for this profile. For **Profile type**, select **Endpoint protection**. If you've chosen an existing profile, select **Properties** and then select **Settings**.
|
1. In Intune, select **Device configuration** > **Profiles**. Choose an existing endpoint protection profile or create a new one. To create a new one, select **Create profile** and enter information for this profile. For **Profile type**, select **Endpoint protection**. If you've chosen an existing profile, select **Properties** and then select **Settings**.
|
||||||
|
|
||||||
@ -72,7 +72,7 @@ For further details on how audit mode works and when to use it, see [Audit Windo
|
|||||||
|
|
||||||
4. Select **OK** on the three configuration panes and then select **Create** if you're creating a new endpoint protection file or **Save** if you're editing an existing one.
|
4. Select **OK** on the three configuration panes and then select **Create** if you're creating a new endpoint protection file or **Save** if you're editing an existing one.
|
||||||
|
|
||||||
### SCCM
|
## SCCM
|
||||||
|
|
||||||
1. In System Center Configuration Manager, click **Assets and Compliance** > **Endpoint Protection** > **Windows Defender Exploit Guard**.
|
1. In System Center Configuration Manager, click **Assets and Compliance** > **Endpoint Protection** > **Windows Defender Exploit Guard**.
|
||||||
1. Click **Home** > **Create Exploit Guard Policy**.
|
1. Click **Home** > **Create Exploit Guard Policy**.
|
||||||
@ -81,7 +81,7 @@ For further details on how audit mode works and when to use it, see [Audit Windo
|
|||||||
1. Review the settings and click **Next** to create the policy.
|
1. Review the settings and click **Next** to create the policy.
|
||||||
1. After the policy is created, click **Close**.
|
1. After the policy is created, click **Close**.
|
||||||
|
|
||||||
### Group Policy
|
## Group Policy
|
||||||
|
|
||||||
>[!WARNING]
|
>[!WARNING]
|
||||||
>If you manage your computers and devices with Intune, SCCM, or other enterprise-level management platform, the management software will overwrite any conflicting Group Policy settings on startup.
|
>If you manage your computers and devices with Intune, SCCM, or other enterprise-level management platform, the management software will overwrite any conflicting Group Policy settings on startup.
|
||||||
@ -102,7 +102,7 @@ For further details on how audit mode works and when to use it, see [Audit Windo
|
|||||||
|
|
||||||
5. To exclude files and folders from ASR rules, select the **Exclude files and paths from Attack surface reduction rules** setting and set the option to **Enabled**. Click **Show** and enter each file or folder in the **Value name** column. Enter **0** in the **Value** column for each item.
|
5. To exclude files and folders from ASR rules, select the **Exclude files and paths from Attack surface reduction rules** setting and set the option to **Enabled**. Click **Show** and enter each file or folder in the **Value name** column. Enter **0** in the **Value** column for each item.
|
||||||
|
|
||||||
### PowerShell
|
## PowerShell
|
||||||
|
|
||||||
>[!WARNING]
|
>[!WARNING]
|
||||||
>If you manage your computers and devices with Intune, SCCM, or other enterprise-level management platform, the management software will overwrite any conflicting PowerShell settings on startup.
|
>If you manage your computers and devices with Intune, SCCM, or other enterprise-level management platform, the management software will overwrite any conflicting PowerShell settings on startup.
|
||||||
@ -153,7 +153,7 @@ For further details on how audit mode works and when to use it, see [Audit Windo
|
|||||||
>[!IMPORTANT]
|
>[!IMPORTANT]
|
||||||
>Use `Add-MpPreference` to append or add apps to the list. Using the `Set-MpPreference` cmdlet will overwrite the existing list.
|
>Use `Add-MpPreference` to append or add apps to the list. Using the `Set-MpPreference` cmdlet will overwrite the existing list.
|
||||||
|
|
||||||
### MDM
|
## MDM
|
||||||
|
|
||||||
Use the [./Vendor/MSFT/Policy/Config/Defender/AttackSurfaceReductionRules](https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-defender#defender-attacksurfacereductionrules) configuration service provider (CSP) to individually enable and set the mode for each rule.
|
Use the [./Vendor/MSFT/Policy/Config/Defender/AttackSurfaceReductionRules](https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-defender#defender-attacksurfacereductionrules) configuration service provider (CSP) to individually enable and set the mode for each rule.
|
||||||
|
|
||||||
|
Reference in New Issue
Block a user