What is the purpose of Attack Surface Reduction?
Hardening the places where a threat is likely to attack
As a Security Analyst, it is crucial to understand protection options and provide recommendations.
What role does a Security Analyst play in relation to Attack Surface Reduction?
Understand protection options and provide recommendations
Performing alert investigations involves knowing the events generated by Attack Surface Reduction.
Name one component of Attack Surface Reduction.
Each component serves a specific purpose in enhancing security.
What do attack surface reduction rules do?
Reduce vulnerabilities in applications with intelligent rules that help stop malware
Requires Microsoft Defender Antivirus.
What is the function of hardware-based isolation?
Protect and maintain the integrity of a system as it starts and runs
Validates system integrity through local and remote attestation.
What does application control require for applications to run?
Applications must earn trust
This ensures only trusted applications are executed.
What is the purpose of exploit protection?
Help protect operating systems and apps from being exploited
Works with third-party antivirus solutions.
What does network protection extend to?
Protection of network traffic and connectivity on devices
Requires Microsoft Defender Antivirus.
What does web protection secure against?
Web threats and unwanted content
Helps regulate access to harmful websites.
What does controlled folder access help prevent?
Malicious or suspicious apps from making changes to files in key system folders
Requires Microsoft Defender Antivirus.
What is the role of device control?
Protects against data loss by monitoring and controlling media used on devices
Includes removable storage and USB drives.
What does attack surface refer to?
All the places where an attacker could compromise your organization’s devices or networks
Reducing your attack surface means protecting your organization’s devices and network.
What is the purpose of attack surface reduction?
To protect your organization’s devices and network, leaving attackers with fewer ways to perform attacks
This involves implementing rules that target certain software behaviors.
Name one behavior that attack surface reduction rules target.
These behaviors are often abused by attackers.
True or false: Attack surface reduction rules can only be applied to malware.
FALSE
Such behaviors are sometimes seen in legitimate applications but are considered risky.
What are the four settings for each Attack Surface Reduction rule?
Each setting determines how the attack surface reduction rule is applied.
Fill in the blank: The Not configured setting for an Attack Surface Reduction rule means to _______.
Disable the attack surface reduction rule
This setting does not apply any restrictions.
What does the Block setting do in Attack Surface Reduction rules?
Enable the Attack Surface Reduction rule
This setting actively prevents risky behaviors.
What is the purpose of the Audit setting in Attack Surface Reduction rules?
Evaluate how the attack surface reduction rule would impact your organization if enabled
This setting does not enforce any rules but assesses potential impacts.
What does the Warn setting allow in Attack Surface Reduction rules?
Enable the Attack Surface Reduction rule but allow the end user to bypass the block
This setting provides a warning while still allowing user discretion.
What does it mean to exclude files and folders from attack surface reduction rules?
Files and folders will not be evaluated by most attack surface reduction rules
Even if a rule determines a file or folder contains malicious behavior, it will not block the file from running.
How can you specify exclusions for attack surface reduction rules?
You cannot specify which rules the exclusions apply to.
True or false: An exclusion is applied only when the excluded application or service starts.
TRUE
If an exclusion is added for a service that is already running, it will continue to trigger events until stopped and restarted.
What is the purpose of audit mode in evaluating attack surface reduction rules?
To evaluate how rules would impact the organization if enabled
Running all rules in audit mode helps understand their impact on line-of-business applications.