CCE-47725-7Platform: cpe:/o:microsoft:windows_server_2016 | Date: (C)2022-09-02 (M)2023-07-04 |
Set the state for each Attack Surface Reduction (ASR) rule. After enabling this setting, you can set each rule to the following in the Options section:- Block: the rule will be applied- Audit Mode: if the rule would normally cause an event, then it will be recorded (although the rule will not actually be applied)- Off: the rule will not be applied- Not Configured: the rule is enabled with default values- Warn: the rule will be applied and the end-user will have the option to bypass the block Unless the ASR rule is disabled, a subsample of audit events are collected for ASR rules will the value of not configured. Enabled:Specify the state for each ASR rule under the Options section for this setting.Enter each rule on a new line as a name-value pair:- Name column: Enter a valid ASR rule ID- Value column: Enter the status ID that relates to state you want to specify for the associated rule The following status IDs are permitted under the value column:- 1 (Block)- 0 (Off)- 2 (Audit)- 5 (Not Configured)- 6 (Warn) Example:xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx 0xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx 1xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx 2 Disabled:No ASR rules will be configured. Not configured:Same as Disabled. You can exclude folders or files in the "Exclude files and paths from Attack Surface Reduction Rules" GP setting.Fix:(1) GPO: Computer ConfigurationAdministrative TemplatesWindows ComponentsMicrosoft Defender AntivirusMicrosoft Defender Exploit GuardAttack Surface ReductionConfigure Attack Surface Reduction rules(2) REG: HKEY_LOCAL_MACHINESoftwarePoliciesMicrosoftWindows DefenderWindows Defender Exploit GuardASR!ExploitGuard_ASR_Rules
Parameter:
[enabled/disabled]
Technical Mechanism:
(1) GPO: Computer Configuration\Administrative Templates\Windows Components\Microsoft Defender Antivirus\Microsoft Defender Exploit Guard\Attack Surface Reduction\Configure Attack Surface Reduction rules
(2) REG: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Windows Defender Exploit Guard\ASR!ExploitGuard_ASR_Rules
CCSS Severity: | CCSS Metrics: |
CCSS Score : 7.0 | Attack Vector: LOCAL |
Exploit Score: 1.0 | Attack Complexity: HIGH |
Impact Score: 5.9 | Privileges Required: LOW |
Severity: HIGH | User Interaction: NONE |
Vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H | Scope: UNCHANGED |
| Confidentiality: HIGH |
| Integrity: HIGH |
| Availability: HIGH |
| |
References: Resource Id | Reference |
---|
SCAP Repo OVAL Definition | oval:org.secpod.oval:def:83660 |