แก้ไข

แชร์ผ่าน


Attack surface reduction rules report

Applies to:

Platforms:

  • Windows

The Attack Surface Reduction Rules report provides detailed insights into the rules enforced on devices within your organization. Moreover, this report offers information about:

  • detected threats
  • blocked threats
  • devices that aren't configured to use the standard protection rules to block threats

In addition, the report provides an easy-to-use interface that enables you to:

  • View threat detections
  • View the configuration of the ASR rules
  • Configure (add) exclusions
  • Drill down to gather detailed information

For more information about individual attack surface reduction rules, see Attack surface reduction rules reference.

Prerequisites

Important

To access the attack surface reduction rules report, read permissions are required for the Microsoft Defender portal. For Windows Server 2012 R2 and Windows Server 2016 to appear in the attack surface reduction rules report, these devices must be onboarded using the modern unified solution package. For more information, see New functionality in the modern unified solution for Windows Server 2012 R2 and 2016.

Report access permissions

To access the attack surface reduction rules report in the Microsoft Defender portal, the following permissions are required:

Permission name Permission type
View Data Security operations

Important

Microsoft recommends that you use roles with the fewest permissions. This helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role.

To assign these permissions:

  1. Sign in to the Microsoft Defender portal.

  2. In the navigation pane, select Settings > Endpoints > Roles (under Permissions).

  3. Select the role you'd like to edit, and then select Edit.

  4. In Edit role, on the General tab, in Role name, type a name for the role.

  5. In Description, type a brief summary of the role.

  6. In Permissions, select View Data, and under View Data select Security operations.

To navigate to the summary cards for the attack surface reduction rules report

  1. Open the Microsoft Defender portal.

  2. In the navigation pane, select Reports. In the main section, under Reports, select Security report.

  3. Scroll down to Devices to find the Attack surface reduction rules summary cards. The summary report cards for ASR rules resemble the following image:

Shows the ASR rules report summary cards

ASR rules report summary cards

The ASR rules report summary is divided into two cards:

ASR rules detections summary card

The ASR rules detections summary card shows a summary of the number of detected threats blocked by ASR rules. This card includes two action buttons:

  • View detections: Opens the Detections tab
  • Add exclusions: Opens the Exclusions tab

Screenshot that shows the ASR rules report summary detections card.

Selecting the ASR rules detections link at the top of the card also opens the main Attack surface reduction rules Detections tab.

ASR rules configuration summary card

The top section focuses on three recommended rules, which protect against common attack techniques. This card shows current-state information about the computers in your organization that have the following Three (ASR) standard protection rules set in Block mode, Audit mode, or off (not configured). The Protect devices button shows full configuration details for only the three rules; customers can quickly take action to enable these rules.

The bottom section surfaces six rules based on the number of unprotected devices per rule. The View configuration button surfaces all configuration details for all ASR rules. The Add exclusions button shows the add exclusion page with all detected file/process names listed for Security Operation Center (SOC) to evaluate. The Add exclusion page is linked to Microsoft Intune.

The card also includes two action buttons:

  • View configuration: Opens the Detections tab
  • Add exclusions: Opens the Exclusions tab

Shows the ASR rules report summary configuration card.

Selecting the ASR rules configuration link at the top of the card also opens the main Attack surface reduction rules Configuration tab.

Simplified standard protection option

The configuration summary card provides a button to Protect devices with the three standard protection rules. At minimum, Microsoft recommends that you enable these three attack surface reduction standard protection rules:

To enable the three standard protection rules:

  1. Select Protect devices. The main Configuration tab opens.

  2. On the Configuration tab, Basic rules automatically toggles from All rules to Standard protection rules enabled.

  3. In the Devices list, select the devices for which you want the standard protection rules to apply, and then select Save.

This card has two other navigation buttons:

  • View configuration: Opens the Configuration tab.
  • Add exclusions: Opens the Exclusions tab.

Selecting the ASR rules configuration link at the top of the card also opens the main Attack surface reduction rules Configuration tab.

Attack surface reduction rules main tabs

While the ASR rules report summary cards are useful for getting quick summary of your ASR rules status, the main tabs provide more in-depth, information with filtering and configuration capabilities:

Search capabilities

Search capability is added to Detection, Configuration, and Add exclusion main tabs. With this capability, you can search by using device ID, file name, or process name.

Shows the ASR rules report search feature.

Filtering

Filtering provides a way for you to specify what results are returned:

  • Date enables you to specify a date range for data results.
  • Filters

Note

When filtering by rule, the number of individual detected items listed in the lower half of the report is currently limited to 200 rules. You can use Export to save the full list of detections to Excel.

Tip

As the filter currently functions in this release, every time you want to "group by," you must first scroll down to last detection in the list to load the complete data set. After you have loaded the complete data set, you can then launch the "sort by" filtering. If you don't scroll down to last detection listed on every use or when changing filtering options (for example, the ASR rules applied to the current filter run), then results are incorrect for any result that has more than one viewable page of listed detections.

Screenshot that shows the ASR rules report search feature on the configuration tab.

Attack surface reduction rules main detections tab

  • Audit Detections: Shows how many threat detections are captured by rules set in Audit mode.
  • Blocked Detections: Shows how many threat detections are blocked by rules set in Block mode.
  • Large, consolidated graph: Shows blocked and audited detections.

Shows the ASR rules report main detections tab, with _Audit detections_ and _Blocked detections_ outlined.

The graphs provide detection data over the displayed date range, with the capability to hover over a specific location to gather date-specific information.

The bottom section of the report lists detected threats - on a per-device basis - with the following fields:

Field name Definition
Detected file The file determined to contain a possible or known threat
Detected on The date the threat was detected
Blocked/Audited? Whether the detecting rule for the specific event was in Block or Audit mode
Rule Which rule detected the threat
Source app The application that made the call to the offending "detected file"
Device The name of the device on which the Audit or Block event occurred
Device group The Active Directory group to which the device belongs
User The machine account responsible for the call
Publisher The company that released the particular .exe or application

For more information about ASR rule audit and block modes, see Attack surface reduction rule modes.

Actionable flyout

The "Detection" main page has a list of all detections (files/processes) in the last 30 days. Select on any of the detections to open with drill-down capabilities.

Shows the ASR rules report main detections tab flyout

The Possible exclusion and impact section provides the effect of the selected file or process. You can:

  • Select Go hunt which opens the Advanced Hunting query page
  • Open file page opens Microsoft Defender for Endpoint detection
  • The Add exclusion button is linked with the add exclusion main page.

The following image illustrates how the Advanced Hunting query page opens from the link on the actionable flyout:

Shows the attack surface reduction rules report main detections tab flyout link opening Advanced Hunting

For more information about Advanced hunting, see Proactively hunt for threats with advanced hunting in Microsoft Defender XDR

Attack surface reduction rules main Configuration tab

The ASR rules main Configuration tab provides summary and per-device ASR rules configuration details. There are three main aspects to the Configuration tab:

Basic rules Provides a method to toggle results between Basic rules and All Rules. By default, Basic rules is selected.

Device configuration overview Provides a current snapshot of devices in one of the following states:

  • All exposed Devices (devices with missing prerequisites, rules in Audit mode, misconfigured rules, or rules not configured)
  • Devices with rules not configured
  • Devices with rules in audit mode
  • Devices with rules in block mode

The lower, unnamed section of the Configuration tab provides a listing of the current state of your devices (on a per-device basis):

  • Device (name)
  • Overall configuration (Whether any rules are on or all are off)
  • Rules in block mode (the number of rules per-device set to block)
  • Rules in audit mode (the number of rules in audit mode)
  • Rules turned off (rules that are turned off or aren't enabled)
  • Device ID (device GUID)

These elements are shown in the following figure.

Shows the ASR rules report main configuration tab

To enable ASR rules:

  1. Under Device, select the device or devices for which you want to apply ASR rules.

  2. In the flyout window, verify your selections and then select Add to policy. The Configuration tab and add rule flyout are shown in the following image.

    Shows the ASR rules fly-out to add ASR rules to devices

[NOTE!] If you have devices that require that different ASR rules be applied, you should configure those devices individually.

Attack surface reduction rules Add exclusions tab

The Add exclusions tab presents a ranked list of detections by file name and provides a method to configure exclusions. By default, Add exclusions information is listed for three fields:

  • File name: The name of the file that triggered the ASR rules event.
  • Detections: The total number of detected events for named file. Individual devices can trigger multiple ASR rules events.
  • Devices: The number of devices on which the detection occurred.

Shows the ASR rules report add exclusions tab.

Important

Excluding files or folders can severely reduce the protection provided by ASR rules. Excluded files are allowed to run, and no report or event is recorded. If ASR rules are detecting files that you believe shouldn't be detected, you should use audit mode first to test the rule.

When you select a file, a Summary & expected impact fly out opens, presenting the following types of information:

  • Files selected - The number of files you've selected for exclusion
  • (number of) detections - States the expected reduction in detections after adding the selected exclusions. The reduction in detections is represented graphically for Actual detections and Detections after exclusions.
  • (number of) affected devices - States the expected reduction in devices that report detections for the selected exclusions.

The Add exclusion page has two buttons for actions that can be used on any detected files (after selection). You can:

  • Add exclusion which opens Microsoft Intune ASR policy page. For more information, see Intune in "Enable ASR rules alternate configuration methods."
  • Get exclusion paths which downloads file paths in a csv format.

Shows the ASR rules report add exclusions tab flyout impact summary.

See also

Tip

Do you want to learn more? Engage with the Microsoft Security community in our Tech Community: Microsoft Defender for Endpoint Tech Community.