Configure Attack Surface Reduction rules - 56a863a9-875e-4185-98a7-b882c64b5ce5

Information

Set the state for each Attack Surface Reduction (ASR) rule.

After enabling this setting you can set each rule to the following in the Options section:
- Block: the rule will be applied
- Audit Mode: if the rule would normally cause an event then it will be recorded (although the rule will not actually be applied) - Off: the rule will not be applied
- Not Configured: the rule is enabled with default values
- Warn: the rule will be applied and the end-user will have the option to bypass the block

Unless the ASR rule is disabled a subsample of audit events are collected for ASR rules will the value of not configured.
Enabled: Specify the state for each ASR rule under the Options section for this setting.

Enter each rule on a new line as a name-value pair:
- Name column: Enter a valid ASR rule ID
- Value column: Enter the status ID that relates to state you want to specify for the associated rule

The following status IDs are permitted under the value column:
- 1 (Block)
- 0 (Off)
- 2 (Audit)
- 5 (Not Configured)
- 6 (Warn)

Example:
xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx 0
xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx 1
xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx 2

Disabled: No ASR rules will be configured.

Not configured: Same as Disabled.

You can exclude folders or files in the ''Exclude files and paths from Attack Surface Reduction Rules'' GP setting.

Solution

Policy Path: Windows Components\Microsoft Defender Antivirus\Microsoft Defender Exploit Guard\Attack Surface Reduction
Policy Setting Name: Configure Attack Surface Reduction rules

See Also

https://techcommunity.microsoft.com/blog/microsoft-security-baselines/windows-11-version-25h2-security-baseline/4456231

Item Details

Category: SYSTEM AND INFORMATION INTEGRITY

References: 800-53|SI-3c.2.

Plugin: Windows

Control ID: 08ca6e1fa5870b89a36ca66b1f5bfb0d2f66ab12f8ec67fba2b4884849a2ec79