Introduction
In my previous post I looked at some barebones configuration
to get started with MDE, now let’s look at locking down your environment.
MDE includes many settings to minimise the overall attack
surface of your Windows devices, one of these features is the ability to apply
Attack Surface Reduction (ASR) rules. In a nutshell they prevent malware
infection by blocking certain software behaviours, like:
- Scripts and executables attempting to download or run files
- Running suspicious scripts
- Behaviours outside of the normal day-to-day operation
Microsoft provide Security Baselines for Windows and
Defender which include ASR rules, but the default setting for these can be a little on the overzealous side and from experience can impede end users’ ability to work,
so tuning these to suit your environment is important.
Before implementing a block rule across your Windows estate, ensure you’ve run the rule in audit mode to verify normal end user operations won’t be impacted. Microsoft’s recommendation is as follows:
If issues are discovered during the testing phase, instead
of completely disabling a rule it may be possible to simply exclude an
executable from ASR rules. This obviously comes with risk, but worth exploring
if the need arises. More information on this can be found here
Configuration
The settings below are the result of implementing ASR rules
into various environments and discovering which ones are too intrusive. These
may work for most environments, but make sure to test, test, test.
- Block untrusted and unsigned processes that run from USB Block
- Block Adobe Reader from creating child processes Block
- Block executable content from email client and webmail Block
- Block JavaScript or VBScript from launching downloaded executable content Block
- Block persistence through WMI event subscription Block
- Block credential stealing from the Windows local security authority subsystem (lsass.exe) Block
- Block Office applications from creating executable content Block
- Block Office applications from injecting code into other processes Audit
- Block Win32 API calls from Office macros Audit
- Block all Office applications from creating child processes Audit
- Block execution of potentially obfuscated scripts Audit
- Block executable files from running unless they meet a prevalence, age, or trusted list criterion Audit
- Use advanced protection against ransomware Audit
- Block process creations originating from PSExec and WMI commands Audit
- Block Office communication applications from creating child processes Audit
- Use advanced protection against ransomware Audit
In my next post, I’ll be looking at further settings to lock
down your Windows environment.
0 comments:
Post a Comment