Skip to content

TechDirectArchive

Hands-on IT, Cloud, Security & DevOps Insights

  • Home
  • About
  • Advertise With US
  • Reviews
  • Contact
  • Toggle search form
Home » Windows » Attack Surface Reduction Configuration with Microsoft Defender
  • Install and configure wds 1
    Install Windows Deployment Services on Windows Server 2022 Windows Server
  • Screenshot 2020 08 07 at 21.09.01
    Error 0x204: Unable to Connect to Remote PC [Part 2] Windows
  • sandbox
    How to Configure Windows Sandbox Virtualization
  • uninstall gtla runner
    How to uninstall GitLab Runner from your Windows device Version Control System
  • change default apps windows 10 1
    Fresh Start, Clean Install and PC Reset: How to perform a Fresh Start installation of Windows 10 Windows
  • Dellupdate 1
    Fix for security vulnerabilities in the BIOS firmware for some Intel Processors Windows
  • VBR upgrade to 12.3.1
    Upgrade VBR to 12.3.1: Setup detected inconsistent configuration Backup
  • How to Completely Uninstall Norton Security
    How to remove Norton from Mac using the RemoveNortonMacFiles tool Anti-Virus Solution

Attack Surface Reduction Configuration with Microsoft Defender

Posted on 23/08/202206/12/2024 Imoh Etuk By Imoh Etuk No Comments on Attack Surface Reduction Configuration with Microsoft Defender
Attack Surface Reduction Configuration with Microsoft Defender

In this articele, we wil discuss Attack Surface Reduction Configuration with Microsoft Defender. Microsoft Defender is a free, built-in antivirus for Windows. Until May 10th, 2020, it was known as Windows Defender, and in the most recent versions of Windows 10. Please see How to install and debug logs with the CMTrace Tool, and Insight on Full Disk Encryption with PBA / without PBA, UEFI, Secure Boot, BIOS, File and Directory Encryption and Container Encryption.

Windows Defender is also referred to as Windows Security. It contains several security features aimed at protecting devices and the internet from malware such as spyware, adware, ransomware, and other threats. It is an easy-to-use antivirus program for Windows users.

Windows devices have broad appeal due to the pre-installed and free availability of Windows Defender, the antivirus program. In addition to the features mentioned above, other security features are also available with Microsoft Defender. These include lowering the attack surface, which hardens software like Adobe Reader, Office, and browsers.

In this write-up, I show you how to configure Microsoft Defender using PowerShell. The feature is not turned on by default. Malicious code thrives in email attachments—scripts, executables, or tainted Office macros. Web browsers and products like Adobe Reader pose vulnerabilities. Defender enhances security beyond app-specific efforts, adding a layer against attacks.

For instance, group policies can significantly control office macros. Attack Surface Reduction (ASR) rules further enclose them. For instance, you can stop Office from producing executable content, injecting code into other processes, or establishing new processes. For example, you might also need to require the latter for Adobe Reader. Defender can stop executable content from entering the computer through a mail client.

Configure ASR in Microsoft Defender Using PowerShell

It’s also intriguing to observe the configuration of advanced ransomware prevention. The system collects data on suspicious files via Microsoft Cloud, verifying common ransomware or known harmlessness. Enabling cloud-based protection is necessary for the function to work.

Here I show you how to configure Attack Surface Reduction in Microsoft Defender via PowerShell. But before we do that, if you need to ascertain the current status of the ASR rules, use the PowerShell Cmdlet below to do so:

Get-MpPreference | select AttackSurfaceReductionRules_Ids, AttackSurfaceReductionRules_Actions
No Rules have been configured
Status of ASR Rules

The above command displays the configured rules and their status. The output screen shows that no rules have been configured yet.

Invoke the Set-MpPreference to specify directories and files that are excluded as follows:

Configure exclusions for ASR rules with PowerShell
Configure exclusions for ASR rules with PowerShell

Then use the Get-MpPreference query the status of this property as shown on the above screenshot.

Take a look at the following related articles to learn more: How to enable Exploit Protection on Windows using Windows Security App, Microsoft Endpoint Configuration Manager, and Group Policy Editor, and

Configure ASR rules using group policies

Another method for enabling or configuring ASR rules is through Group Policy. In the Group Policy, two settings are available for the central management of ASR: one for enabling/disabling rules and the other for defining exclusions.

To access the ASR, navigate to Computer Configuration > Policies > Administrative Templates > Windows Components > Microsoft Defender Antivirus > Microsoft Defender Exploit Guard > Attack Surface Reduction by searching for and opening Group Policy on your PC’s search menu.

In configuring the GUID for Attack Surface Reduction, the values 0, 1, 2, and 6 specify the status (“Actions”). 0 stands for deactivated, 1 for activated, 2 for audit mode and 6 for warning, where users receive a notification about the possible danger but can bypass the blocking. Configure this folder’s other property to create directories and file exclusions.

Configuring Attack Surface Reduction via Group Policy
Configuring Attack Surface Reduction via Group Policy

As shown above, we also enter the Value names in a table in this case, and we always set the field in the right-hand column to 0. Enter the GUID for an ASR rule and the value for the action Disable 0 Block 1 Audit 2 Warn 6 in the GPO setting

Configure Attack Surface Reduction rules

You can utilize a standard configuration for all of the rules rather than just turning on a different option for each one (“Configure Attack Surface Reduction rules“). There, you input the action’s numerical value and the aforementioned GUID into a table. For instance, here we want to

Configure for all

Here are some more guides you may want to read: How to turn on Windows 10 Tamper Protection for Microsoft Defender, and how to manage Microsoft Defender Antivirus with Group Policy and Microsoft Malware Protection from the Command Line.

I hope you found this blog post helpful. Please let me know in the comment session if you have any questions.

5/5 - (1 vote)

Thank you for reading this post. Kindly share it with others.

  • Click to share on X (Opens in new window) X
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on WhatsApp (Opens in new window) WhatsApp
  • Click to share on Pocket (Opens in new window) Pocket
  • Click to share on Mastodon (Opens in new window) Mastodon
  • Click to share on Bluesky (Opens in new window) Bluesky
  • Click to share on Threads (Opens in new window) Threads
  • Click to share on Nextdoor (Opens in new window) Nextdoor
Scripts, Security | Vulnerability Scans and Assessment, Windows, Windows Server Tags:Defender, Defender Antivirus, group policy, Microsoft Defender, Microsoft Defender Antivirus, Microsoft Windows, MicrosoftDefender, security, Windows Defender, Windows Defender Antivirus

Post navigation

Previous Post: How to remove third-party cookies from Microsoft Edge
Next Post: Download and install Norton 360 Anti-Virus on your Mac device

Related Posts

  • username
    Is my AD user or service account password correct? Run App as a different User and switch Users in Windows Windows
  • TPM 1
    How to fix unable to find compatible TPM Windows
  • update set expire
    Windows 10 and Windows 11 updates will now expire for better performance Windows
  • How do I disable credentials from Remote Desktop
    Disable credential Prompts for Remote Desktop Connections Windows
  • sdfgh
    Get a list of installed applications on Windows Scripts
  • BitLocker beviour when MBAM Agent is removed   No uninstall options in control panel to remove app
    BitLocker behavior when MBAM agent is removed: No Uninstall Option in Control Panel Windows

More Related Articles

username Is my AD user or service account password correct? Run App as a different User and switch Users in Windows Windows
TPM 1 How to fix unable to find compatible TPM Windows
update set expire Windows 10 and Windows 11 updates will now expire for better performance Windows
How do I disable credentials from Remote Desktop Disable credential Prompts for Remote Desktop Connections Windows
sdfgh Get a list of installed applications on Windows Scripts
BitLocker beviour when MBAM Agent is removed   No uninstall options in control panel to remove app BitLocker behavior when MBAM agent is removed: No Uninstall Option in Control Panel Windows

Leave a Reply Cancel reply

You must be logged in to post a comment.

Microsoft MVP

VEEAMLEGEND

vexpert-badge-stars-5

Virtual Background

GoogleNews

Categories

veeaam100

sysadmin top30a

  • Install and configure wds 1
    Install Windows Deployment Services on Windows Server 2022 Windows Server
  • Screenshot 2020 08 07 at 21.09.01
    Error 0x204: Unable to Connect to Remote PC [Part 2] Windows
  • sandbox
    How to Configure Windows Sandbox Virtualization
  • uninstall gtla runner
    How to uninstall GitLab Runner from your Windows device Version Control System
  • change default apps windows 10 1
    Fresh Start, Clean Install and PC Reset: How to perform a Fresh Start installation of Windows 10 Windows
  • Dellupdate 1
    Fix for security vulnerabilities in the BIOS firmware for some Intel Processors Windows
  • VBR upgrade to 12.3.1
    Upgrade VBR to 12.3.1: Setup detected inconsistent configuration Backup
  • How to Completely Uninstall Norton Security
    How to remove Norton from Mac using the RemoveNortonMacFiles tool Anti-Virus Solution

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 1,836 other subscribers
  • RSS - Posts
  • RSS - Comments
  • About
  • Authors
  • Write for us
  • Advertise with us
  • General Terms and Conditions
  • Privacy policy
  • Feedly
  • Telegram
  • Youtube
  • Facebook
  • Instagram
  • LinkedIn
  • Tumblr
  • Pinterest
  • Twitter
  • mastodon

Tags

Active Directory AWS Azure Bitlocker Microsoft Windows PowerShell WDS Windows 10 Windows 11 Windows Server 2016

Copyright © 2025 TechDirectArchive

 

Loading Comments...
 

You must be logged in to post a comment.