This article provides information about attack reduction rules: Supported operating system versions Supported configuration management systems Per-rule-descriptions Rule descriptions GUIDs Configuration management system rule names Public preview: Supported operating systems Important Some information relates to prereleased product which may be substantially modified before it’s commercially released. Microsoft makes no warranties, express or implied, with respect […]
Articles Tagged: Microsoft
Attack surface reduction rules deployment phase 4: operationalize (Microsoft)
After you’ve fully deployed ASR rules, it’s vital that you have processes in place to monitor and respond to ASR-related activities. Manage false positives False positives/negatives can occur with any threat protection solution. False positives are cases in which an entity (such as a file or process) is detected and identified as malicious, although the […]
Attack surface reduction rules deployment phase 3: implement (Microsoft)
The implementation phase moves the ring from testing into functional state. Step 1: Transition ASR Rules from Audit to Block After all exclusions are determined while in audit mode, start setting some ASR rules to “block” mode, starting with the rule that has the fewest triggered events. See” Enable attack surface reduction rules. Review the reporting […]
Attack surface reduction rules deployment phase 2: test (Microsoft)
Begin your ASR rules deployment with ring 1. Step 1: Test ASR rules using Audit Begin the testing phase by turning on the ASR rules with the rules set to Audit, starting with your champion users or devices in ring 1. Typically, the recommendation is that you enable all the rules (in Audit) so that […]
Attack surface reduction rules deployment phase 1: plan (Microsoft)
Starting to test ASR rules involves starting with the right business unit. You’ll want to start with a small group of people in a specific business unit. You can identify some ASR champions within a particular business unit who can provide real-world impact to the ASR rules and help you tune your implementation. Start with […]
Attack surface reduction rules deployment guide (Microsoft)
Before you begin Attack surfaces are all the places where your organization is vulnerable to cyberthreats and attacks. Your organization’s attack surfaces includes all the places where an attacker could compromise your organization’s devices or networks. Reducing your attack surface means protecting your organization’s devices and network, which leaves attackers with fewer ways to attack. […]
Use attack surface reduction rules to prevent malware infection (Microsoft)
Why attack surface reduction rules are important Your organization’s attack surface includes all the places where an attacker could compromise your organization’s devices or networks. Reducing your attack surface means protecting your organization’s devices and network, which leaves attackers with fewer ways to perform attacks. Configuring attack surface reduction rules in Microsoft Defender for Endpoint […]
Understand and use attack surface reduction capabilities (Microsoft)
Tip Want to experience Microsoft Defender for Endpoint? Sign up for a free trial. Attack surfaces are all the places where your organization is vulnerable to cyberthreats and attacks. Defender for Endpoint includes several capabilities to help reduce your attack surfaces. Watch the following video to learn more about attack surface reduction. Configure attack surface reduction […]
Host firewall reporting in Microsoft Defender for Endpoint
If you are an admin, you can now host firewall reporting to the Microsoft 365 Defender portal. This feature enables you to view Windows 10, Windows 11, Windows Server 2019, and Windows Server 2022 firewall reporting from a centralized location. What do you need to know before you begin? You must be running Windows 10 or […]
Device discovery frequently asked questions
Important Some information relates to prereleased product which may be substantially modified before it’s commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. Find answers to frequently asked questions (FAQs) about device discovery. What is Basic discovery mode? This mode allows every Microsoft Defender for Endpoint onboarded device […]