Jump to content

Public Preview: Attack Surface Reduction (ASR) Rules Report 2.0 in Microsoft 365 Defender


Recommended Posts

Guest OludeleOgunrinde
Posted

Attack Surface Reduction (ASR) rules reporting was one of the first reports we completed as an end-to-end Endpoint Protection Platform (EPP) report several years ago. We are improving the ASR Rules report based on your feedback. These improvements will make the ASR Rules report easier to understand, enable, and configure in block mode. We invest in modern ASR rules because they provide strong prevention benefits for organizations.

 

 

 

Important note: This report is currently available to Public Preview customers.

 

 

 

To access the report (detection card, configuration card, and main report respectively), go to the M365D portal (security.microsoft.com) -> Reports ->:

 

  1. Security report -> Devices -> ASR rule detections
  2. Security report -> Devices -> ASR rule configuration
  3. Reports -> attack surface reduction rules

 

Requirements:

 

  • Protected devices have or later, or Windows server 2012 R2 (some rules are not applicable) or later.
  • Your organization uses Microsoft Defender Antivirus with cloud–delivered protection enabled. See Use cloud-delivered protection.
  • Microsoft Defender for Endpoint is in active mode.
  • Engine version is 1.1.17300.4 or later.

 

Link: Enable attack surface reduction rules | Microsoft Docs

 

 

 

What is new with the ASR rules report 2.0?

 

  1. Insightful summary cards: The new card experience provides summary information about ASR detection and configuration state in your digital estate. The detection card (figure 1) is divided into two sections, that is as shown below:

 

 

 

mediumvv2px400.png.d709be73b15ad18e352732a43fc0e24f.png

 

 

 

Figure 1: Detection card

 

 

 

The configuration card (Figure 2) also has top and bottom sections.

 

  • The top section focuses on (Standard rules) which protect against common attack techniques. Moreover, the “Protect devices” button will show only full configuration details for the three rules, and customers can quickly take action to enable these rules.
  • The bottom section surfaces six rules based on the number of unprotected devices per rule. The “View configuration” button surfaces all configuration details for all ASR rules. The “Add exclusion” button shows the add exclusion page with all detected file/process names listed for Security Operation Center (SOC) to evaluate.

 

 

 

mediumvv2px400.png.7fc85d45b4ec29af810f4b242be33af7.png

 

 

 

Figure 2: Configuration card

 

 

  1. Filters: A new capability to filter (Figure 3 and Figure 4) based on, date, device group, and includes a toggle to set “Standard protection” or all rules. This will allow users to streamline what they want to view in the report.

 

 

 

mediumvv2px400.png.e4637a85c02fc6a492f16471298a707c.png

 

 

 

Figure 3: Detection filter

 

 

 

mediumvv2px400.png.bf8ac779a8db93b3dbaf9ebef613a0c2.png

 

 

 

Figure 4: Detection filter flyout

 

 

 

  1. New detection trend: The ASR rules report 2.0 includes small but insightful charts (Figure 5) to help the SOC team visualize how ASR detections are trending in their environments.

 

 

 

mediumvv2px400.png.617fe49bebd4728621ef0b89ee67decb.png

 

 

 

Figure 5: Detection trends

 

 

 

  1. Search bar: A new search capability is added to the detection (Figure 6), configuration (Figure 7), and “Add exclusion” (Figure 8)
    landing pages. With this capability, you can search by using a file name, process name, or device ID.

 

mediumvv2px400.png.a34ad79c17c114d457596b0700150854.png

 

 

 

Figure 6: Detection search bar

 

 

 

mediumvv2px400.png.90ec6f8eb7411c58547a094931b13188.png

 

 

 

Figure 7: Configuration page search bar

 

 

 

mediumvv2px400.png.eac8bb573d56303c81639347c022685e.png

 

 

 

Figure 8: Add exclusion page search bar

 

 

 

  1. Actionable flyout: The “Detection” main page has a list of all detections (files/processes) in the last four weeks. By clicking any of the detections (Figure 9), an intuitive flyout with a drill down capability will surface on the right side of the page. The “Possible exclusion and impact” (Figure 9) section provides the impact of the file/process in your digital estate. Customers can click on “Go hunt” (Figure 9) which will open the Advanced Hunting query page (Figure 10). Also, the “Open file page” (Figure 9) will open Microsoft Defender for Endpoint (MDE) detection (Figure 11), and the “Add exclusion” (Figure 9) button is linked with the add exclusion main page.

 

 

 

mediumvv2px400.png.1a6a079eb1b60fa3e1bc04138c880c64.png

 

 

 

Figure 9: Detection flyout

 

 

 

mediumvv2px400.png.6f773ee0f81a2566b3705ef99a92f34f.png

 

 

 

Figure 10: Advanced hunting page

 

 

 

mediumvv2px400.png.5ad664c2bad6a34c065e874f1b22e863.png

 

 

 

Figure 11: MDE page

 

 

  1. Device configuration state: The “configuration” main page has a detailed summary of all ASR rules for all onboarded MDE devices. Also, it has radio buttons (Rules – Figure 12) to select either Standard protection” or “All”. The image (Figure 12) below shows the “Device configuration overview” section on the page.

 

mediumvv2px400.png.27318a0c2badd7ee394d3dcbd4f769c4.png

 

 

 

Figure 12: Device configuration overview section

 

 

 

 

 

  1. Device configuration flyout: The flyout (Figure 13) displays the state of each MDE onboarded device in your environment. Also, the flyout surfaces a new category called warn mode. Furthermore, you can add the device to your policy in MEM through “Add policy” (Figure 13) button.

 

mediumvv2px400.png.801e752f1c56387f94f1d96a2e725706.png

 

 

 

Figure 13: Device configuration overview section

 

 

 

  1. Updated “Add exclusion” page: The page (Figure 14) has two buttons for actions that can be performed on any detected files (after selection). You can “Add exclusion” which will open the ASR policy page in MEM or “Get exclusion paths” which will download file paths in a CSV format.

 

 

 

mediumvv2px400.png.3a886d0a0f5dc271e3ec2c7535ccb9db.png

 

 

 

Figure 14: Add exclusions page

 

 

 

  1. Export of detections: The export button (Figure 15) will download 10,000 rows of the detections (CSV format) in your environment. Note, the ASR team is working on improving the number of downloadable rows.

 

mediumvv2px400.png.100c1848d96f6d6356caf5f04aec12bf.png

 

 

 

Figure 15: Add exclusions page

 

 

 

Let us know what you think!

 

We are excited to bring a new ASR Rules report 2.0 to you. Try out the report and let us know what you think. Email: ASR_Report_Support@microsoft.com

 

Continue reading...

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

×
×
  • Create New...