4.3 - Implement Windows security enhancements with Microsoft Defender for Endpoint Flashcards

- Explain Attack Surface Reduction in Windows - Enable Attack Surface Reduction rules on Windows 10 devices - Configure Attack Surface Reduction rules on Windows 10 devices (55 cards)

1
Q

What is the purpose of Attack Surface Reduction?

A

Hardening the places where a threat is likely to attack

As a Security Analyst, it is crucial to understand protection options and provide recommendations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What role does a Security Analyst play in relation to Attack Surface Reduction?

A

Understand protection options and provide recommendations

Performing alert investigations involves knowing the events generated by Attack Surface Reduction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Name one component of Attack Surface Reduction.

A
  • Attack surface reduction rules
  • Hardware-based isolation
  • Application control
  • Exploit protection
  • Network protection
  • Web protection
  • Controlled folder access
  • Device control

Each component serves a specific purpose in enhancing security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What do attack surface reduction rules do?

A

Reduce vulnerabilities in applications with intelligent rules that help stop malware

Requires Microsoft Defender Antivirus.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the function of hardware-based isolation?

A

Protect and maintain the integrity of a system as it starts and runs

Validates system integrity through local and remote attestation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does application control require for applications to run?

A

Applications must earn trust

This ensures only trusted applications are executed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the purpose of exploit protection?

A

Help protect operating systems and apps from being exploited

Works with third-party antivirus solutions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does network protection extend to?

A

Protection of network traffic and connectivity on devices

Requires Microsoft Defender Antivirus.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does web protection secure against?

A

Web threats and unwanted content

Helps regulate access to harmful websites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does controlled folder access help prevent?

A

Malicious or suspicious apps from making changes to files in key system folders

Requires Microsoft Defender Antivirus.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the role of device control?

A

Protects against data loss by monitoring and controlling media used on devices

Includes removable storage and USB drives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does attack surface refer to?

A

All the places where an attacker could compromise your organization’s devices or networks

Reducing your attack surface means protecting your organization’s devices and network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the purpose of attack surface reduction?

A

To protect your organization’s devices and network, leaving attackers with fewer ways to perform attacks

This involves implementing rules that target certain software behaviors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Name one behavior that attack surface reduction rules target.

A
  • Launching executable files and scripts that attempt to download or run files
  • Running obfuscated or otherwise suspicious scripts
  • Performing behaviors that apps don’t usually initiate during normal day-to-day work

These behaviors are often abused by attackers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

True or false: Attack surface reduction rules can only be applied to malware.

A

FALSE

Such behaviors are sometimes seen in legitimate applications but are considered risky.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the four settings for each Attack Surface Reduction rule?

A
  • Not configured
  • Block
  • Audit
  • Warn

Each setting determines how the attack surface reduction rule is applied.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Fill in the blank: The Not configured setting for an Attack Surface Reduction rule means to _______.

A

Disable the attack surface reduction rule

This setting does not apply any restrictions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What does the Block setting do in Attack Surface Reduction rules?

A

Enable the Attack Surface Reduction rule

This setting actively prevents risky behaviors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is the purpose of the Audit setting in Attack Surface Reduction rules?

A

Evaluate how the attack surface reduction rule would impact your organization if enabled

This setting does not enforce any rules but assesses potential impacts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What does the Warn setting allow in Attack Surface Reduction rules?

A

Enable the Attack Surface Reduction rule but allow the end user to bypass the block

This setting provides a warning while still allowing user discretion.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What does it mean to exclude files and folders from attack surface reduction rules?

A

Files and folders will not be evaluated by most attack surface reduction rules

Even if a rule determines a file or folder contains malicious behavior, it will not block the file from running.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

How can you specify exclusions for attack surface reduction rules?

A
  • Individual files
  • Folders (using folder paths or fully qualified resource names)

You cannot specify which rules the exclusions apply to.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

True or false: An exclusion is applied only when the excluded application or service starts.

A

TRUE

If an exclusion is added for a service that is already running, it will continue to trigger events until stopped and restarted.

24
Q

What is the purpose of audit mode in evaluating attack surface reduction rules?

A

To evaluate how rules would impact the organization if enabled

Running all rules in audit mode helps understand their impact on line-of-business applications.

25
Why is it important to monitor **audit data** when using attack surface reduction rules?
To add exclusions for necessary applications and avoid impacting productivity ## Footnote Many line-of-business applications may perform tasks that resemble malware.
26
What happens when a **rule is triggered** in attack surface reduction?
A notification will be displayed on the device ## Footnote Notifications can be customized with company details and contact information.
27
Fill in the blank: You can exclude attack surface reduction rules from triggering based on _______ and file hashes.
certificate ## Footnote This allows specified Defender for Endpoint file and certificate indicators.
28
What are the minimum windows/windows server licenses that support attack surface reduction rules?
- 10 Pro v1709 or later - Windows Server 2012 R2 v 1803 or later
29
What are the **methods** to enable attack surface reduction rules?
* Microsoft Intune * Mobile Device Management (MDM) * Microsoft Endpoint Configuration Manager * Group Policy * PowerShell ## Footnote These methods provide various ways to manage security settings across devices.
30
Which management method is **recommended** for enabling attack surface reduction rules?
Enterprise-level management such as Intune or Microsoft Endpoint Configuration Manager ## Footnote Enterprise-level management will overwrite any conflicting Group Policy or PowerShell settings on startup.
31
What is the first step to create a new **Device Configuration Profile** in Intune?
Select Device configuration > Profiles ## Footnote This is where you can choose an existing profile or create a new one.
32
To create a new endpoint protection profile, what should you select after entering the profile information?
Create profile ## Footnote You must also select **Profile type** as **Endpoint protection**.
33
In the **Endpoint protection pane**, which feature should you select to configure Attack Surface Reduction?
Windows Defender Exploit Guard ## Footnote This allows you to select the desired setting for each rule.
34
What should you enter under **Attack Surface Reduction exceptions**?
Individual files and folders ## Footnote You can also import a CSV file with the required format.
35
What is the required format for each line in the CSV file for exclusions?
C:\folder, %ProgramFiles%\folder\file, C:\path ## Footnote This format is necessary for excluding files and folders from attack surface reduction rules.
36
What should you select after configuring the settings in the three configuration panes?
Select OK ## Footnote Then select **Create** for a new profile or **Save** for an existing one.
37
To create a new **Endpoint Security Policy**, what is the first action to take?
Select Endpoint Security > Attack surface reduction ## Footnote This allows you to choose an existing rule or create a new one.
38
What should you select for **Profile type** when creating a new policy?
Attack surface reduction rules ## Footnote This is essential for defining the type of policy being created.
39
In the **Configuration settings pane**, what feature do you select to configure Attack Surface Reduction?
Attack Surface Reduction ## Footnote You then select the desired setting for each rule.
40
What should you enter under **List of additional folders that need to be protected**?
Individual files and folders ## Footnote You can also import a CSV file for exclusions.
41
What action should you take after entering the necessary information in the configuration settings?
Select Next ## Footnote Then select **Create** for a new policy or **Save** for an existing one.
42
What is the **OMA-URI path** for managing attack surface reduction rules in mobile device management?
./Vendor/MSFT/Policy/Config/Defender/AttackSurfaceReductionRules ## Footnote This path is used to individually enable and set the mode for each rule.
43
What are the **values** to enable, disable, or enable in audit mode for attack surface reduction rules?
* Disable = 0 * Block (enable rule) = 1 * Audit = 2 ## Footnote These values determine the action taken for each rule in mobile device management.
44
How do you add **exclusions** for attack surface reduction rules in mobile device management?
Use the ./Vendor/MSFT/Policy/Config/Defender/AttackSurfaceReductionOnlyExclusions configuration service provider (CSP) ## Footnote Example value: c:\path|e:\path|c:\wlisted.exe.
45
In Microsoft Endpoint Configuration Manager, where do you go to manage the attack surface reduction rules?
Assets and Compliance > Endpoint Protection > Windows Defender Exploit Guard ## Footnote This is the navigation path to access the relevant settings.
46
What is the first step to create an **Exploit Guard Policy** in Microsoft Endpoint Configuration Manager?
Select Home > Create Exploit Guard Policy ## Footnote This initiates the process of creating a new policy.
47
What should you do after creating the **Exploit Guard Policy** in Microsoft Endpoint Configuration Manager?
Select Close ## Footnote This finalizes the policy creation process.
48
What is the purpose of **Group Policy** in managing attack surface reduction rules?
To configure settings for managing attack surface reduction rules ## Footnote Group Policy allows administrators to manage security settings across multiple devices.
49
What happens if you manage your computers with **Intune** or **Configuration Manager** regarding Group Policy settings?
Management software will overwrite any conflicting Group Policy settings on startup ## Footnote This ensures that the most current management settings are applied.
50
Which console do you open to manage Group Policy settings?
Group Policy Management Console ## Footnote This console is used to edit Group Policy Objects.
51
In the Group Policy Management Editor, where do you navigate to configure attack surface reduction rules?
Computer configuration > Administrative templates > Windows components > Microsoft Defender Antivirus > Windows Defender Exploit Guard > Attack surface reduction ## Footnote This path leads to the settings for configuring attack surface reduction.
52
What should you select to enable attack surface reduction rules?
Configure Attack surface reduction rules and select Enabled ## Footnote This allows you to set individual states for each rule.
53
What are the possible states you can set for attack surface reduction rules?
* Disable = 0 * Block (enable attack surface reduction rule) = 1 * Audit = 2 ## Footnote These states determine how the rules will be applied.
54
To exclude files and folders from attack surface reduction rules, which setting should you enable?
Exclude files and paths from Attack surface reduction rules ## Footnote This setting allows specific files or folders to be exempt from the rules.
55
When excluding files or folders, what should you enter in the Value column?
0 for each item ## Footnote This indicates that the specified files or folders are excluded from the attack surface reduction rules.