IntuneASRRulesPolicyWindows10

Parameters

Parameter Attribute DataType Description Allowed Values
Identity Write String Identity of the endpoint protection attack surface protection rules policy for Windows 10.
DisplayName Key String Display name of the endpoint protection attack surface protection rules policy for Windows 10.
Description Write String Description of the endpoint protection attack surface protection rules policy for Windows 10.
Assignments Write MSFT_DeviceManagementConfigurationPolicyAssignments[] Assignments of the Intune Policy.
ProcessCreationType Write String This rule blocks processes created through PsExec and WMI from running. notConfigured, userDefined, block, auditMode, warn, disable
AdvancedRansomewareProtectionType Write String This rule provides an extra layer of protection against ransomware. notConfigured, userDefined, enable, auditMode
BlockPersistenceThroughWmiType Write String This rule prevents malware from abusing WMI to attain persistence on a device. notConfigured, userDefined, block, auditMode, warn, disable
ScriptObfuscatedMacroCodeType Write String This rule detects suspicious properties within an obfuscated script. notConfigured, userDefined, block, auditMode, warn, disable
OfficeMacroCodeAllowWin32ImportsType Write String This rule prevents VBA macros from calling Win32 APIs. notConfigured, userDefined, block, auditMode, warn, disable
OfficeAppsLaunchChildProcessType Write String This rule blocks Office apps from creating child processes. Office apps include Word, Excel, PowerPoint, OneNote, and Access. notConfigured, userDefined, block, auditMode, warn, disable
GuardMyFoldersType Write String This rule enable Controlled folder access which protects your data by checking apps against a list of known, trusted apps. notConfigured, userDefined, enable, auditMode, blockDiskModification, auditDiskModification
UntrustedUSBProcessType Write String With this rule, admins can prevent unsigned or untrusted executable files from running from USB removable drives, including SD cards. notConfigured, userDefined, block, auditMode, warn, disable
AttackSurfaceReductionExcludedPaths Write StringArray[] Exclude files and paths from attack surface reduction rules
UntrustedExecutableType Write String This rule blocks executable files that don't meet a prevalence, age, or trusted list criteria, such as .exe, .dll, or .scr, from launching. notConfigured, userDefined, block, auditMode, warn, disable
OfficeCommunicationAppsLaunchChildProcess Write String This rule prevents Outlook from creating child processes, while still allowing legitimate Outlook functions. notConfigured, userDefined, enable, auditMode, warn, disable
EmailContentExecutionType Write String This rule blocks the following file types from launching from email opened within the Microsoft Outlook application, or Outlook.com and other popular webmail providers. notConfigured, userDefined, block, auditMode, warn, disable
ScriptDownloadedPayloadExecutionType Write String This rule prevents scripts from launching potentially malicious downloaded content. notConfigured, userDefined, block, auditMode, warn, disable
AdditionalGuardedFolders Write StringArray[] List of additional folders that need to be protected
AdobeReaderLaunchChildProcess Write String This rule prevents attacks by blocking Adobe Reader from creating processes. notConfigured, userDefined, enable, auditMode, warn
OfficeAppsExecutableContentCreationOrLaunchType Write String This rule prevents Office apps, including Word, Excel, and PowerPoint, from creating potentially malicious executable content, by blocking malicious code from being written to disk. notConfigured, userDefined, block, auditMode, warn, disable
PreventCredentialStealingType Write String This rule helps prevent credential stealing by locking down Local Security Authority Subsystem Service (LSASS). notConfigured, userDefined, enable, auditMode, warn
OfficeAppsOtherProcessInjectionType Write String This rule blocks code injection attempts from Office apps into other processes. notConfigured, userDefined, block, auditMode, warn, disable
GuardedFoldersAllowedAppPaths Write StringArray[] List of apps that have access to protected folders.
Ensure Write String Present ensures the site collection exists, absent ensures it is removed Present, Absent
Credential Write PSCredential Credentials of the Intune Admin
ApplicationId Write String Id of the Azure Active Directory application to authenticate with.
TenantId Write String Name of the Azure Active Directory tenant used for authentication. Format contoso.onmicrosoft.com
ApplicationSecret Write PSCredential Secret of the Azure Active Directory tenant used for authentication.
CertificateThumbprint Write String Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.
ManagedIdentity Write Boolean Managed ID being used for authentication.
AccessTokens Write StringArray[] Access token used for authentication.

MSFT_DeviceManagementConfigurationPolicyAssignments

Parameters

Parameter Attribute DataType Description Allowed Values
dataType Write String The type of the target assignment. #microsoft.graph.groupAssignmentTarget, #microsoft.graph.allLicensedUsersAssignmentTarget, #microsoft.graph.allDevicesAssignmentTarget, #microsoft.graph.exclusionGroupAssignmentTarget, #microsoft.graph.configurationManagerCollectionAssignmentTarget
deviceAndAppManagementAssignmentFilterType Write String The type of filter of the target assignment i.e. Exclude or Include. Possible values are:none, include, exclude. none, include, exclude
deviceAndAppManagementAssignmentFilterId Write String The Id of the filter for the target assignment.
groupId Write String The group Id that is the target of the assignment.
groupDisplayName Write String The group Display Name that is the target of the assignment.
collectionId Write String The collection Id that is the target of the assignment.(ConfigMgr)

Description

This resource configures a Intune Endpoint Protection Attack Surface Reduction rules policy for a Windows 10 Device. This resource returns ASR rules created using deviceConfiguration Graph settings.

Permissions

Microsoft Graph

To authenticate with the Microsoft Graph API, this resource required the following permissions:

Delegated permissions

  • Read

    • Group.Read.All, DeviceManagementConfiguration.Read.All
  • Update

    • Group.Read.All, DeviceManagementConfiguration.ReadWrite.All

Application permissions

  • Read

    • Group.Read.All, DeviceManagementConfiguration.Read.All
  • Update

    • Group.Read.All, DeviceManagementConfiguration.ReadWrite.All

Examples

Example 1

This example is used to test new resources and showcase the usage of new resources being worked on. It is not meant to use as a production baseline.

Configuration Example
{
    param(
        [Parameter()]
        [System.String]
        $ApplicationId,

        [Parameter()]
        [System.String]
        $TenantId,

        [Parameter()]
        [System.String]
        $CertificateThumbprint
    )
    Import-DscResource -ModuleName Microsoft365DSC

    node localhost
    {
        IntuneASRRulesPolicyWindows10 'myASRRulesPolicy'
        {
            DisplayName                                     = 'test'
            AdditionalGuardedFolders                        = @()
            AdobeReaderLaunchChildProcess                   = 'auditMode'
            AdvancedRansomewareProtectionType               = 'enable'
            Assignments                                     = @()
            AttackSurfaceReductionExcludedPaths             = @('c:\Novo')
            BlockPersistenceThroughWmiType                  = 'auditMode'
            Description                                     = ''
            EmailContentExecutionType                       = 'auditMode'
            GuardedFoldersAllowedAppPaths                   = @()
            GuardMyFoldersType                              = 'enable'
            OfficeAppsExecutableContentCreationOrLaunchType = 'block'
            OfficeAppsLaunchChildProcessType                = 'auditMode'
            OfficeAppsOtherProcessInjectionType             = 'block'
            OfficeCommunicationAppsLaunchChildProcess       = 'auditMode'
            OfficeMacroCodeAllowWin32ImportsType            = 'block'
            PreventCredentialStealingType                   = 'enable'
            ProcessCreationType                             = 'block'
            ScriptDownloadedPayloadExecutionType            = 'block'
            ScriptObfuscatedMacroCodeType                   = 'block'
            UntrustedExecutableType                         = 'block'
            UntrustedUSBProcessType                         = 'block'
            Ensure                                          = 'Present'
            ApplicationId         = $ApplicationId;
            TenantId              = $TenantId;
            CertificateThumbprint = $CertificateThumbprint;
        }
    }
}

Example 2

This example is used to test new resources and showcase the usage of new resources being worked on. It is not meant to use as a production baseline.

Configuration Example
{
    param(
        [Parameter()]
        [System.String]
        $ApplicationId,

        [Parameter()]
        [System.String]
        $TenantId,

        [Parameter()]
        [System.String]
        $CertificateThumbprint
    )
    Import-DscResource -ModuleName Microsoft365DSC

    node localhost
    {
        IntuneASRRulesPolicyWindows10 'myASRRulesPolicy'
        {
            DisplayName                                     = 'test'
            AdditionalGuardedFolders                        = @()
            AdobeReaderLaunchChildProcess                   = 'auditMode'
            AdvancedRansomewareProtectionType               = 'enable'
            Assignments                                     = @()
            AttackSurfaceReductionExcludedPaths             = @('c:\Novo')
            BlockPersistenceThroughWmiType                  = 'auditMode'
            Description                                     = ''
            EmailContentExecutionType                       = 'auditMode'
            GuardedFoldersAllowedAppPaths                   = @()
            GuardMyFoldersType                              = 'enable'
            OfficeAppsExecutableContentCreationOrLaunchType = 'block'
            OfficeAppsLaunchChildProcessType                = 'auditMode'
            OfficeAppsOtherProcessInjectionType             = 'block'
            OfficeCommunicationAppsLaunchChildProcess       = 'auditMode'
            OfficeMacroCodeAllowWin32ImportsType            = 'block'
            PreventCredentialStealingType                   = 'enable'
            ProcessCreationType                             = 'userDefined' # Updated Property
            ScriptDownloadedPayloadExecutionType            = 'block'
            ScriptObfuscatedMacroCodeType                   = 'block'
            UntrustedExecutableType                         = 'block'
            UntrustedUSBProcessType                         = 'block'
            Ensure                                          = 'Present'
            ApplicationId         = $ApplicationId;
            TenantId              = $TenantId;
            CertificateThumbprint = $CertificateThumbprint;
        }
    }
}

Example 3

This example is used to test new resources and showcase the usage of new resources being worked on. It is not meant to use as a production baseline.

Configuration Example
{
    param(
        [Parameter()]
        [System.String]
        $ApplicationId,

        [Parameter()]
        [System.String]
        $TenantId,

        [Parameter()]
        [System.String]
        $CertificateThumbprint
    )
    Import-DscResource -ModuleName Microsoft365DSC

    node localhost
    {
        IntuneASRRulesPolicyWindows10 'myASRRulesPolicy'
        {
            DisplayName                                     = 'test'
            Ensure                                          = 'Absent'
            ApplicationId         = $ApplicationId;
            TenantId              = $TenantId;
            CertificateThumbprint = $CertificateThumbprint;
        }
    }
}