(147) Microsoft Intune - Configure Available Attack Surface Reduction Rules with Exceptions
- Mr B SOE way
- Oct 12, 2024
- 2 min read
As our company generally deploys CIS Benchmark controls to customers as a baseline or Essential 8 (ACSC), as part of CIS baselines we also deploy Attack Surface Reduction Rules.
What is Attack Surface Reduction Rules?
Attack surfaces are all the places where your organization is vulnerable to cyber threats and attacks. An attacker could compromise your organization’s devices or networks. To minimize the risk that an attacker could compromise your device, you must implement security measures e.g., Attack Surface Reduction rules, Network protection, application control, etc. See Microsoft documentation for all the security measures.
There are five ways of deploying Attack Surface Reduction Rules:
1) Attack Surface Reduction Rules via Endpoint protection
Endpoint protection configuration profile can be used to control the security of Windows devices. The category Microsoft Defender Exploit Guard contains an Attack Surface Reduction group and contains nearly all currently available ASR rules.
2) Attack Surface Reduction Rules via custom configuration profile A custom configuration profile can be used to configure settings that are available in Configuration Service Provider (CSP). CSP also includes all ASR rules. ASR rules and exclusions need to be set via custom OMA-URI’s.
3) Attack Surface Reduction Rules via MDM Security Baseline
Security baselines are Microsoft-recommended configuration settings. These settings are based on feedback from Microsoft security engineering teams, product groups, partners, and customers. A security baseline includes a group of Microsoft Defender settings. The Security Baseline contains nearly all currently available ASR rules.
4) Attack Surface Reduction Rules via Endpoint Security Attack Surface Reduction rules
The Attack Surface Reduction rules profile can be used to configure the Attack Surface Reduction rules and contains nearly all currently available ASR rules.
5) Attack Surface Reduction Rules via PowerShell script
PowerShell is a cross-platform task automation solution made up of a command-line shell, a scripting language, and a configuration management framework. We can use a PowerShell script to set all the available ASR rules.
How to create OMA-URI Profile for ASR Rules?
Today we will create a rule using OMA-URI which is the 2nd option listed above. Navigate to https://intune.microsoft.com/ > Devices > Configuration > Create > New Policy > Platform: Windows 10 and later > Profile type: Templates > Custom
Under Basics, enter Name of Profile: ASR Rules
Under Configuration Settings > select Add
Name: ASR Rules
Description: All ASR Rules Enabled
OMA-URI: ./Vendor/MSFT/Policy/Config/Defender/AttackSurfaceReductionRules
Data Type: String
Value:
75668c1f-73b5-4cf0-bb93-3ecf5cb7cc84=1|3b576869-a4ec-4529-8536-b80a7769e899=1|d4f940ab-401b-4efc-aadc-ad5f3c50688a=1|92e97fa1-2edf-4476-bdd6-9dd0b4dddc7b=1|5beb7efe-fd9a-4556-801d-275e5ffc04cc=1|d3e037e1-3eb8-44c8-a917-57927947596d=1|9e6c4e1f-7d60-472f-ba1a-a39ef669e4b2=1|d1e49aac-8f56-4280-b9ba-993a6d77406c=1|b2b3f03d-6a65-4f7b-a9c7-1c7ef74a9ba4=1|01443614-cd74-433a-b99e-2ecdc07bfc25=1|be9ba2d9-53ea-4cdc-84e5-9b1eeee46550=1|c1db55ab-c21a-4637-bb3f-a12568109d35=1|7674ba52-37eb-4a4f-a9a1-f0f9a1619a2c=1|26190899-1602-49e8-8b27-eb1d0a1ce869=1|e6db77e5-3df2-4cf1-b95a-636979351e5b=1|56a863a9-875e-4185-98a7-b882c64b5ce5=1
Under Review + Create, review the settings then select Create.
How to create OMA-URI Profile for ASR Exclusion?
Navigate to https://intune.microsoft.com/ > Devices > Configuration > Create > New Policy > Platform: Windows 10 and later > Profile type: Templates > Custom
Under Basics, enter Name of Profile: ASR Rules Exclusion
Under Configuration Settings > select Add
Name: ASR Rules Exclusion
Description: Exclusions
OMA-URI: ./Vendor/MSFT/Policy/Config/Defender/AttackSurfaceReductionOnlyExclusions
Data Type: String
Value:
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe | C:\Program Files (x86)\Zoiper5\Uninstall.exe
Under Review + create, review the settings and select Create.
To test your ASR rules, navigate to Event Viewer then DeviceManagement-Enteprise-Diagnostics-Provide -> Admin
Comments