Microsoft Defender for Endpoint Attack Surface Reduction

What is ASR?

One of the capabilities of Microsoft Defender for Endpoint that is often overlooked because of its fancy name and fear of breaking things is Attack Surface Reduction also known as ASR.

The name of the feature is a little bit too big for what it achieves so far but is certainly a particularly useful feature. What it does is, it targets software behaviors that are often abused by attackers, such as:

  • Launching executable files and scripts that attempt to download or run files.
  • Running obfuscated or otherwise suspicious scripts
  • Performing behaviors that apps do not usually initiate during normal day-to-day work.

Such behaviors are sometimes seen in legitimate applications; however, they are considered risky because they are commonly abused by malware. Attack surface reduction rules can constrain these kinds of risky behaviors and help keep your organization safe.

By preventing these usual suspects, an organization saves a lot of effort that can be spent in responding to security incidents in which one or more of these activities are used.

You can find the ASR rule (activity types) in the table below.

Category Rule name GUID File & folder exclusions
E-mail and Webmail Block executable content from email client and webmail BE9BA2D9-53EA-4CDC-84E5-9B1EEEE46550 Supported
Microsoft Office Block all Office applications from creating child processes D4F940AB-401B-4EFC-AADC-AD5F3C50688A Supported
Microsoft Office Block Office applications from creating executable content 3B576869-A4EC-4529-8536-B80A7769E899 Supported
Microsoft Office Block Office communication application from creating child processes 26190899-1602-49e8-8b27-eb1d0a1ce869 Supported
Microsoft Office Block Win32 API calls from Office macros 92E97FA1-2EDF-4476-BDD6-9DD0B4DDDC7B Supported
Microsoft Office Block Office applications from injecting code into other processes 75668C1F-73B5-4CF0-BB93-3ECF5CB7CC84 Supported
Executables and Scripts Block JavaScript or VBScript from launching downloaded executable content D3E037E1-3EB8-44C8-A917-57927947596D Not supported
Executables and Scripts Block execution of potentially obfuscated scripts 5BEB7EFE-FD9A-4556-801D-275E5FFC04CC Supported
Executables and Scripts Block executable files from running unless they meet a prevalence, age, or trusted list criterion 01443614-cd74-433a-b99e-2ecdc07bfc25 Supported
Executables and Scripts Use advanced protection against ransomware c1db55ab-c21a-4637-bb3f-a12568109d35 Supported
Block abuse of exploited vulnerable signed drivers 56a863a9-875e-4185-98a7-b882c64b5ce5
Windows Credentials Block persistence through WMI event subscription e6db77e5-3df2-4cf1-b95a-636979351e5b Not supported
Windows Credentials Block credential stealing from the Windows local security authority subsystem (lsass.exe) 9e6c4e1f-7d60-472f-ba1a-a39ef669e4b2 Supported
Windows Management Interface (WMI) Block process creations originating from PSExec and WMI commands d1e49aac-8f56-4280-b9ba-993a6d77406c Supported
Windows Management Interface (WMI) Block persistence through WMI event subscription e6db77e5-3df2-4cf1-b95a-636979351e5b Not supported
Windows Management Interface (WMI) Note: This setting is not yet available in MEM/MEMCM.
Device Control Block untrusted and unsigned processes that run from USB b2b3f03d-6a65-4f7b-a9c7-1c7ef74a9ba4 Supported
3rd Party Apps Block Adobe Reader from creating child processes 7674ba52-37eb-4a4f-a9a1-f0f9a1619a2c Supported

 

Although some of these behaviors might be legitimate for some applications to work, they are considered risky as they are primarily used by attackers to carry on their attacks. Before enabling ASR rules in block-mode, you must run the rules in audit mode to capture more data and understand their impact on your business applications.

ASR rules are not about trusting or not trusting certain apps in your endpoints. They are about recognizing potentially malicious behaviors and minimizing the probability of an attacker using these behaviors to carry on an attack thus minimizing the overall risk level.

Requirement and Prerequisites

You can configure attack surface reduction rules for devices running any of the following editions and versions of Windows:

  • Windows 10 Pro/Enterprise/Education, version 1709 or later.
  • Windows Server, version 1803 (Semi-Annual Channel) or later.
  • Windows Server 2019.

 

With Windows 10 Pro, you get the ASR rule capabilities. However, Windows 10 Enterprise E3 license gives you the entire feature-set of ASR rules, and you can use Event viewer to review attack surface reduction rule events.

 

While using event viewer might work for you, having the Windows E5 license with Microsoft Defender for Endpoint adds management and reporting layer for the ASR rules, such as monitoring, analytics, and workflow as part of Microsoft Defender for Endpoint.

In fact, Microsoft Defender for Endpoint takes ASR rules to the next level by onboarding those ASR rule events within the Microsoft 365 Defender portal.

Regardless of the license of choice, Microsoft Defender Antivirus must be active mode because ASR uses Microsoft Defender Antivirus to block the attempts.

This should be taken into consideration especially when you are using a third-party antivirus solution. In this case, the built-in Microsoft Defender Antivirus automatically goes into passive mode.

Finally, some ASR rules require the Microsoft Defender Antivirus cloud-delivered protection to be enabled.

Rule Exclusions

There are certainly going to be cases where a benign process will be identified as malicious, and you will have to define some exclusions to avoid the alert fatigue. This means that the ASR rule will ignore the execution of certain processes. For these cases, keep in mind the following:

  • If you add an exclusion, it will affect every ASR rule. The reason for this is for performance and reliability (you cannot specify what ASR rule to exclude)
  • Not all rules support exclusions.
  • Excluded files/folders and processes will be allowed to run, and no report or event will be recorded.
  • ASR rules exclusions are managed separately from Microsoft Defender Antivirus exclusions.
  • ASR rules exclusions support wildcards, paths, and environmental variables. This is, however, only supported if you use Microsoft Intune. If you manage ASR rules through SCCM, you cannot use wildcards.
  • Wildcards cannot be used to define a drive letter.
  • ASR rules exclusions are not user context aware (ASR rules run under NT AUTHORITY\SYSTEM account), so it is not possible to add user profile folder to exclusions using environmental variables such as %USERPROFILE%.

Configuring ASR Rules

There are four states for any ASR rule:

  • Not configured: which means disabled.
  • Block: Block and log the identified suspicious activity attempts.
  • Audit: Detect and log the activity but not block.
  • Warn: Enforce the rules but provide the users with a possibility to override the block action for 24 hours. This allows you to test rules, without necessarily blocking your end-users.

The warn mode is available for all rules except:

  • Block JavaScript or VBScript from launching downloaded executable content.
  • Block persistence through WMI event subscription.
  • Use advanced protection against ransomware.

You do not have to enable all ASR rules at once. Many business applications were written with limited security concerns, and they might perform tasks that resemble malware or malicious activity.

A recommended approach is to enable ASR rules in audit mode first to better understand the impact of enabling each of these rules. By monitoring audit data and adding exclusions for necessary applications, you can deploy ASR rules without impacting productivity.

It is worth mentioning that dealing with Office macros is difficult for security professionals. They represent an effortless way for attackers to launch their attacks. Unfortunately, many customers still depend on Office macros to run their businesses. Special attention might be required for enforcing the related rule in block mode.

The warn mode is available for all rules except:

  • Block JavaScript or VBScript from launching downloaded executable content.
  • Block persistence through WMI event subscription.
  • Use advanced protection against.

You can configure ASR rules using one of the following methods:

  • Microsoft Intune
  • 3rd-party Mobile Device Management (MDM)
  • Microsoft Endpoint Configuration Manager
  • Group Policy
  • PowerShell

We are ready to help you deploy MDE’s ASR capabilities for your organization using your tool of choice. Please contact us to learn more about it.