IntuneSettingCatalogASRRulesPolicyWindows10¶
Parameters¶
| Parameter | Attribute | DataType | Description | Allowed Values | 
|---|---|---|---|---|
| Identity | Write | String | Identity of the endpoint protection attack surface protection rules policy for Windows 10. | |
| DisplayName | Key | String | Display name of the endpoint protection attack surface protection rules policy for Windows 10. | |
| Description | Write | String | Description of the endpoint protection attack surface protection rules policy for Windows 10. | |
| RoleScopeTagIds | Write | StringArray[] | List of Scope Tags for this Entity instance. | |
| Assignments | Write | MSFT_DeviceManagementConfigurationPolicyAssignments[] | Assignments of the endpoint protection. | |
| AttackSurfaceReductionOnlyExclusions | Write | StringArray[] | Exclude files and paths from attack surface reduction rules | |
| BlockAbuseOfExploitedVulnerableSignedDrivers | Write | String | This rule prevents an application from writing a vulnerable signed driver to disk. | off,block,audit,warn | 
| BlockAbuseOfExploitedVulnerableSignedDrivers_ASROnlyPerRuleExclusions | Write | StringArray[] | ASR Only Per Rule Exclusions | |
| BlockAdobeReaderFromCreatingChildProcesses | Write | String | This rule prevents attacks by blocking Adobe Reader from creating processes. | off,block,audit,warn | 
| BlockAdobeReaderFromCreatingChildProcesses_ASROnlyPerRuleExclusions | Write | StringArray[] | ASR Only Per Rule Exclusions | |
| BlockAllOfficeApplicationsFromCreatingChildProcesses | Write | String | This rule blocks Office apps from creating child processes. Office apps include Word, Excel, PowerPoint, OneNote, and Access. | off,block,audit,warn | 
| BlockAllOfficeApplicationsFromCreatingChildProcesses_ASROnlyPerRuleExclusions | Write | StringArray[] | ASR Only Per Rule Exclusions (off: Off, block: Block, audit: Audit, warn: Warn) | |
| BlockCredentialStealingFromWindowsLocalSecurityAuthoritySubsystem | Write | String | This rule helps prevent credential stealing by locking down Local Security Authority Subsystem Service (LSASS). | off,block,audit,warn | 
| BlockCredentialStealingFromWindowsLocalSecurityAuthoritySubsystem_ASROnlyPerRuleExclusions | Write | StringArray[] | ASR Only Per Rule Exclusions | |
| BlockExecutableContentFromEmailClientAndWebmail | Write | String | This rule blocks the following file types from launching from email opened within the Microsoft Outlook application, or Outlook.com and other popular webmail providers. | off,block,audit,warn | 
| BlockExecutableContentFromEmailClientAndWebmail_ASROnlyPerRuleExclusions | Write | StringArray[] | ASR Only Per Rule Exclusions | |
| BlockExecutableFilesRunningUnlessTheyMeetPrevalenceAgeTrustedListCriterion | Write | String | This rule blocks executable files that don't meet a prevalence, age, or trusted list criteria, such as .exe, .dll, or .scr, from launching. | off,block,audit,warn | 
| BlockExecutableFilesRunningUnlessTheyMeetPrevalenceAgeTrustedListCriterion_ASROnlyPerRuleExclusions | Write | StringArray[] | ASR Only Per Rule Exclusions | |
| BlockExecutionOfPotentiallyObfuscatedScripts | Write | String | This rule detects suspicious properties within an obfuscated script. | off,block,audit,warn | 
| BlockExecutionOfPotentiallyObfuscatedScripts_ASROnlyPerRuleExclusions | Write | StringArray[] | ASR Only Per Rule Exclusions | |
| BlockJavaScriptOrVBScriptFromLaunchingDownloadedExecutableContent | Write | String | This rule prevents scripts from launching potentially malicious downloaded content. | off,block,audit,warn | 
| BlockJavaScriptOrVBScriptFromLaunchingDownloadedExecutableContent_ASROnlyPerRuleExclusions | Write | StringArray[] | ASR Only Per Rule Exclusions | |
| BlockOfficeApplicationsFromCreatingExecutableContent | Write | String | This rule prevents Office apps, including Word, Excel, and PowerPoint, from creating potentially malicious executable content, by blocking malicious code from being written to disk. | off,block,audit,warn | 
| BlockOfficeApplicationsFromCreatingExecutableContent_ASROnlyPerRuleExclusions | Write | StringArray[] | ASR Only Per Rule Exclusions | |
| BlockOfficeApplicationsFromInjectingCodeIntoOtherProcesses | Write | String | This rule blocks code injection attempts from Office apps into other processes. | off,block,audit,warn | 
| BlockOfficeApplicationsFromInjectingCodeIntoOtherProcesses_ASROnlyPerRuleExclusions | Write | StringArray[] | ASR Only Per Rule Exclusions | |
| BlockOfficeCommunicationAppFromCreatingChildProcesses | Write | String | This rule prevents Outlook from creating child processes, while still allowing legitimate Outlook functions. | off,block,audit,warn | 
| BlockOfficeCommunicationAppFromCreatingChildProcesses_ASROnlyPerRuleExclusions | Write | StringArray[] | ASR Only Per Rule Exclusions | |
| BlockPersistenceThroughWMIEventSubscription | Write | String | This rule prevents malware from abusing WMI to attain persistence on a device. | off,block,audit,warn | 
| BlockProcessCreationsFromPSExecAndWMICommands | Write | String | This rule blocks processes created through PsExec and WMI from running. | off,block,audit,warn | 
| BlockProcessCreationsFromPSExecAndWMICommands_ASROnlyPerRuleExclusions | Write | StringArray[] | ASR Only Per Rule Exclusions | |
| BlockRebootingMachineInSafeMode | Write | String | This rule prevents the execution of commands to restart machines in Safe Mode. | off,block,audit,warn | 
| BlockRebootingMachineInSafeMode_ASROnlyPerRuleExclusions | Write | StringArray[] | ASR Only Per Rule Exclusions | |
| BlockUntrustedUnsignedProcessesThatRunFromUSB | Write | String | With this rule, admins can prevent unsigned or untrusted executable files from running from USB removable drives, including SD cards. | off,block,audit,warn | 
| BlockUntrustedUnsignedProcessesThatRunFromUSB_ASROnlyPerRuleExclusions | Write | StringArray[] | ASR Only Per Rule Exclusions | |
| BlockUseOfCopiedOrImpersonatedSystemTools | Write | String | This rule blocks the use of executable files that are identified as copies of Windows system tools. These files are either duplicates or impostors of the original system tools. | off,block,audit,warn | 
| BlockUseOfCopiedOrImpersonatedSystemTools_ASROnlyPerRuleExclusions | Write | StringArray[] | ASR Only Per Rule Exclusions | |
| BlockWebShellCreationForServers | Write | String | This rule blocks webshell creation for servers. | off,block,audit,warn | 
| BlockWebshellCreationForServers_ASROnlyPerRuleExclusions | Write | StringArray[] | ASR Only Per Rule Exclusions | |
| BlockWin32APICallsFromOfficeMacros | Write | String | This rule prevents VBA macros from calling Win32 APIs. | off,block,audit,warn | 
| BlockWin32APICallsFromOfficeMacros_ASROnlyPerRuleExclusions | Write | StringArray[] | ASR Only Per Rule Exclusions | |
| UseAdvancedProtectionAgainstRansomware | Write | String | This rule provides an extra layer of protection against ransomware. | off,block,audit,warn | 
| UseAdvancedProtectionAgainstRansomware_ASROnlyPerRuleExclusions | Write | StringArray[] | ASR Only Per Rule Exclusions | |
| ControlledFolderAccessProtectedFolders | Write | StringArray[] | List of additional folders that need to be protected | |
| ControlledFolderAccessAllowedApplications | Write | StringArray[] | List of apps that have access to protected folders. | |
| EnableControlledFolderAccess | Write | String | This rule enables Controlled folder access which protects your data by checking apps against a list of known, trusted apps. Possible values: 0=disable, 1=enable, 2=audit, 3=block disk modification only, 4=audit disk modification only | 0,1,2,3,4 | 
| Ensure | Write | String | Present ensures the policy exists, absent ensures it is removed | Present,Absent | 
| Credential | Write | PSCredential | Credentials of the Intune Admin | |
| ApplicationId | Write | String | Id of the Azure Active Directory application to authenticate with. | |
| TenantId | Write | String | Name of the Azure Active Directory tenant used for authentication. Format contoso.onmicrosoft.com | |
| ApplicationSecret | Write | PSCredential | Secret of the Azure Active Directory tenant used for authentication. | |
| CertificateThumbprint | Write | String | Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication. | |
| ManagedIdentity | Write | Boolean | Managed ID being used for authentication. | |
| AccessTokens | Write | StringArray[] | Access token used for authentication. | 
MSFT_DeviceManagementConfigurationPolicyAssignments¶
Parameters¶
| Parameter | Attribute | DataType | Description | Allowed Values | 
|---|---|---|---|---|
| dataType | Write | String | The type of the target assignment. | #microsoft.graph.cloudPcManagementGroupAssignmentTarget,#microsoft.graph.groupAssignmentTarget,#microsoft.graph.allLicensedUsersAssignmentTarget,#microsoft.graph.allDevicesAssignmentTarget,#microsoft.graph.exclusionGroupAssignmentTarget,#microsoft.graph.configurationManagerCollectionAssignmentTarget | 
| deviceAndAppManagementAssignmentFilterType | Write | String | The type of filter of the target assignment i.e. Exclude or Include. Possible values are:none, include, exclude. | none,include,exclude | 
| deviceAndAppManagementAssignmentFilterId | Write | String | The Id of the filter for the target assignment. | |
| deviceAndAppManagementAssignmentFilterDisplayName | Write | String | The display name of the filter for the target assignment. | |
| groupId | Write | String | The group Id that is the target of the assignment. | |
| groupDisplayName | Write | String | The group Display Name that is the target of the assignment. | |
| collectionId | Write | String | The collection Id that is the target of the assignment.(ConfigMgr) | 
Description¶
This resource configures a Intune Endpoint Protection Attack Surface Reduction rules policy for a Windows 10 Device. This resource returns ASR rules created using settings catalog settings.
Permissions¶
Microsoft Graph¶
To authenticate with the Microsoft Graph API, this resource required the following permissions:
Delegated permissions¶
- 
Read - Group.Read.All, DeviceManagementConfiguration.Read.All
 
- 
Update - Group.Read.All, DeviceManagementConfiguration.ReadWrite.All
 
Application permissions¶
- 
Read - Group.Read.All, DeviceManagementConfiguration.Read.All
 
- 
Update - Group.Read.All, DeviceManagementConfiguration.ReadWrite.All
 
Examples¶
Example 1¶
This example is used to test new resources and showcase the usage of new resources being worked on. It is not meant to use as a production baseline.
Configuration Example
{
    param(
        [Parameter()]
        [System.String]
        $ApplicationId,
        [Parameter()]
        [System.String]
        $TenantId,
        [Parameter()]
        [System.String]
        $CertificateThumbprint
    )
    Import-DscResource -ModuleName Microsoft365DSC
    node localhost
    {
        IntuneSettingCatalogASRRulesPolicyWindows10 'myASRRulesPolicy'
        {
            DisplayName                                                                = 'asr 2'
            Assignments                                                                = @(
                MSFT_DeviceManagementConfigurationPolicyAssignments {
                    deviceAndAppManagementAssignmentFilterType = 'none'
                    dataType                                   = '#microsoft.graph.allLicensedUsersAssignmentTarget'
                })
            attacksurfacereductiononlyexclusions                                       = @('Test 10', 'Test2', 'Test3')
            blockabuseofexploitedvulnerablesigneddrivers                               = 'block'
            blockexecutablefilesrunningunlesstheymeetprevalenceagetrustedlistcriterion = 'audit'
            Description                                                                = 'Post'
            Ensure                                                                     = 'Present'
            ApplicationId         = $ApplicationId;
            TenantId              = $TenantId;
            CertificateThumbprint = $CertificateThumbprint;
        }
    }
}
Example 2¶
This example is used to test new resources and showcase the usage of new resources being worked on. It is not meant to use as a production baseline.
Configuration Example
{
    param(
        [Parameter()]
        [System.String]
        $ApplicationId,
        [Parameter()]
        [System.String]
        $TenantId,
        [Parameter()]
        [System.String]
        $CertificateThumbprint
    )
    Import-DscResource -ModuleName Microsoft365DSC
    node localhost
    {
        IntuneSettingCatalogASRRulesPolicyWindows10 'myASRRulesPolicy'
        {
            DisplayName                                                                = 'asr 2'
            Assignments                                                                = @(
                MSFT_DeviceManagementConfigurationPolicyAssignments {
                    deviceAndAppManagementAssignmentFilterType = 'none'
                    dataType                                   = '#microsoft.graph.allLicensedUsersAssignmentTarget'
                })
            attacksurfacereductiononlyexclusions                                       = @('Test 10', 'Test2', 'Test3')
            blockabuseofexploitedvulnerablesigneddrivers                               = 'audit' # Updated Property
            blockexecutablefilesrunningunlesstheymeetprevalenceagetrustedlistcriterion = 'audit'
            Description                                                                = 'Post'
            Ensure                                                                     = 'Present'
            ApplicationId         = $ApplicationId;
            TenantId              = $TenantId;
            CertificateThumbprint = $CertificateThumbprint;
        }
    }
}
Example 3¶
This example is used to test new resources and showcase the usage of new resources being worked on. It is not meant to use as a production baseline.
Configuration Example
{
    param(
        [Parameter()]
        [System.String]
        $ApplicationId,
        [Parameter()]
        [System.String]
        $TenantId,
        [Parameter()]
        [System.String]
        $CertificateThumbprint
    )
    Import-DscResource -ModuleName Microsoft365DSC
    node localhost
    {
        IntuneSettingCatalogASRRulesPolicyWindows10 'myASRRulesPolicy'
        {
            DisplayName                                                                = 'asr 2'
            Ensure                                                                     = 'Absent'
            ApplicationId         = $ApplicationId;
            TenantId              = $TenantId;
            CertificateThumbprint = $CertificateThumbprint;
        }
    }
}