Configure Attack Surface Reduction rules - 5beb7efe-fd9a-4556-801d-275e5ffc04cc


Set the state for each Attack Surface Reduction (ASR) rule.
After enabling this setting, you can set each rule to the following in the Options section:
- Block: the rule will be applied
- Audit Mode: if the rule would normally cause an event, then it will be recorded (although the rule will not actually be applied)
- Off: the rule will not be applied
Specify the state for each ASR rule under the Options section for this setting.
Enter each rule on a new line as a name-value pair:
- Name column: Enter a valid ASR rule ID
- Value column: Enter the status ID that relates to state you want to specify for the associated rule
The following status IDs are permitted under the value column:
- 1 (Block)
- 0 (Off)
- 2 (Audit)

xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx 0
xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx 1
xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx 2
No ASR rules will be configured.
Not configured:
Same as Disabled.
You can exclude folders or files in the ''Exclude files and paths from Attack Surface Reduction Rules'' GP setting.


Policy Path: Windows Components\Microsoft Defender Antivirus\Microsoft Defender Exploit Guard\Attack Surface Reduction
Policy Setting Name: Configure Attack Surface Reduction rules

See Also

Item Details


References: 800-53|SI-3c.2.

Plugin: Windows

Control ID: a0e7e73c55e3f9bcd6c7137c41fc4bdf61cddc690c048688ea591f16a9da1ba5