Attack Surface Reduction Rules – Manage, maintain, and protect devices

Attack Surface Reduction rules can help prevent actions and apps often used by exploit-seeking malware from infecting your organization’s devices. Each rule is identified by a unique identity known as a GUID. Table 3-17 lists and describes the available Attack Surface Reduction rules and their respective GUIDs.

TABLE 3-17 Attack Surface Reduction rules

Rule and descriptionGUID
Block executable content from email client and webmail.be9ba2d9-53ea-4cdc-84e5-9B1eeee46550
Block all Office applications from creating child processes.d4f940ab-401b-4efc-aadc-ad5f3c50688a
Block Office applications from creating executable content.3b576869-a4eC-4529-8536-b80a7769e899
Block Office applications from injecting code into other processes.75668c1f-73b5-4Cf0-bb93-3ecf5cb7cc84
Block JavaScript or VBScript from launching downloaded executable content.d3e037e1-3eb8-44c8-a917-57927947596d
Block execution of potentially obfuscated scripts.5beb7efe-fd9A-4556-801d-275e5ffc04cc
Block Win32 API calls from Office macro.92e97fa1-2edf-4476-bdd6-9dd0B4dddc7b
Block executable files from running unless they meet a prevalence, age, or trusted list criteria.01443614-cd74-433a-b99e-2ecdc07bfc25
Use advanced protection against ransomware.c1db55ab-c21a-4637-bb3f-a12568109d35
Block credential stealing from the Windows local security authority subsystem (lsass.exe).9e6c4e1f-7d60-472f-ba1a-a39ef669e4b2
Block process creations originating from PSExec and WMI commands.d1e49aac-8f56-4280-b9ba-993a6d77406c
Block untrusted and unsigned processes that run from USB.b2b3f03d-6a65-4f7b-a9c7-1c7ef74a9ba4
Block Office communication applications from creating child processes.26190899-1602-49e8-8b27-eb1d0a1ce869
Block Adobe Reader from creating child processes.7674ba52-37eb-4a4f-a9a1-f0f9a1619a2c

Need More Review? Enable Attack Surface Reduction Rules

To review further details about configuring Attack Surface Reduction rules, refer to the Microsoft website at https://learn.microsoft.com/en-us/microsoft-365/security/defender-endpoint/enable-attack-surface-reduction?view=o365-worldwide.

Network Protection

Network Protection helps prevent your users from using apps to access Internet-based domains that might present a risk of malware, scams, or other malicious content. You can use GPOs, Microsoft Intune, or Windows PowerShell to enable network protection.

Need More Review? Enable Network Protection

To review further details about enabling and configuring Network Protection, refer to the Microsoft website at https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/network-protection.

Controlled Folder Access

You can use Controlled Folder Access to help prevent the spread of malicious software. Specifically, controlled folder access helps protect valuable data stored in specific folders. You can use Windows PowerShell, GPOs, or MDM to configure controlled folder access.

Need More Review? Enable Controlled Folder Access

To review further details about configuring folder access, refer to the Microsoft website at https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/controlled-folders.

Leave a Reply

Your email address will not be published. Required fields are marked *