all posts
12 min read

ASR Rules: What They Are, Why They're Scary to Enable, and How to Do It Without Breaking Your Users


If you've spent any time on the Microsoft Defender portal or the Intune admin center, you've probably come across Attack Surface Reduction rules, commonly called ASR rules. In this post we're going to break down what ASR rules actually are, why admins are hesitant to enable them, and the right way to roll them out without generating a flood of helpdesk tickets.

What Are ASR Rules?

Attack Surface Reduction rules are a feature of Microsoft Defender for Endpoint that work by blocking specific behaviors at the OS level before a threat even has a chance to reach your antivirus or EDR solution. Think of them as guardrails that prevent common attack paths from being exploited in the first place.

The goal is to reduce the number of entry points a threat actor has into your environment. ASR rules are particularly effective at stopping malware and ransomware delivery techniques dead in their tracks before your other security layers ever need to get involved. That said, ASR rules are one layer of a defense-in-depth strategy, not a replacement for everything else in your stack.

Why Are They Scary to Enable?

Here's the honest answer: because if you do it wrong, you will cause interruptions for your users.

Every admin has to constantly balance security with keeping the operation functioning. In an ideal world you'd lock everything down as tight as possible and make it nearly impossible for a threat actor to move through your environment. In reality, your job as an admin is to be an operational multiplier — putting in security controls and processes that protect the organization while keeping people able to do their jobs efficiently. Locking down too hard without planning gets you a secure environment that nobody can work in, and that's its own kind of failure.

ASR rules are a prime example of this tension. Several of them will break legitimate business applications if you enable them in block mode without testing first. Enable all rules in block mode on day one and you'll find out very quickly what your users can't live without.

Requirements

Before you can use ASR rules, make sure your environment meets the following requirements:

licensing note ASR rules do not require a Microsoft 365 E5 license, but E5 gives you significantly better reporting, optics, and data insights through the Defender portal. On E3 you can still use ASR rules, but visibility into what the rules are catching will be more limited.

The Three Modes: Audit, Warn, and Block

Before we get into deployment methodology, you need to understand the three modes ASR rules operate in — this is what makes safe rollout possible.

The Right Way to Roll Out ASR Rules

Step 1: Plan

Start by identifying your business units and understanding what each group of users actually does day to day. Find your ASR champions — individuals across the organization with above-average technical knowledge who can act as your first line of feedback if something breaks. Build a line-item inventory of approved business applications before you touch anything. Finally, define your deployment rings: Ring 1 is IT and technical staff, Ring 2 is a broader pilot group, Ring 3 is the rest of the organization.

Step 2: Start in Audit Mode

Enable the ASR rules you want to apply to Ring 1 in Audit mode. Let it run for at least 30 days. During this time the rules are logging everything they would have blocked without actually blocking anything. Pull the reports from the Defender portal and review what's being flagged. Anything that corresponds to legitimate business activity needs to go on your exclusion list before you move to the next step.

Step 3: Move to Block or Warn

After your audit period and exclusion tuning, move Ring 1 to Block or Warn mode. Watch your helpdesk queue and your Defender reporting closely. Assess any issues that come in and adjust your exclusions accordingly.

Step 4: Repeat Per Ring

Once Ring 1 is stable, repeat the process for Ring 2, then Ring 3. During this time you will continue to adjust your exclusion list where needed to ensure nothing is interrupting organizational workflow.

How to Configure ASR Rules in Intune

There are several ways to configure ASR rules including Group Policy, PowerShell, MDM, and Microsoft Endpoint Configuration Manager. Here's how to configure them inside Intune.

In the Intune admin center, navigate to Endpoint Security > Attack Surface Reduction.

Intune sidebar showing Attack Surface Reduction navigation
Navigate to Endpoint Security → Attack Surface Reduction in the Intune admin center

Select an existing policy or choose Create Policy.

Attack Surface Reduction policies page with Create Policy button
Click Create Policy to start a new ASR policy

For Platform select Windows and for Profile select Attack Surface Reduction Rules.

Policy creation screen showing Windows platform and Attack Surface Reduction Rules profile selected
Select Windows as the platform and Attack Surface Reduction Rules as the profile

In the Configuration settings pane, configure each rule to your desired setting (Audit, Warn, or Block). Microsoft recommends starting with these three standard protection rules which typically have minimal impact on end users:

Configuration settings showing Block mode for credential stealing, vulnerable signed drivers, and WMI persistence rules
The three Microsoft-recommended standard protection rules set to Block mode

Under Attack Surface Reduction Only Exclusions, enter any exclusions you've identified during your audit period. You can also use Import to bring in a CSV file — each line should follow this format: C:\folder, %ProgramFiles%\folder\file, C:\path.

ASR Only Exclusions section showing C:\Program Files\ShareX as an exclusion
Adding per-rule exclusions — in this example ShareX is excluded from ASR enforcement

Select Next through the remaining panes, then Create for a new policy or Save if editing an existing one.

For the full current list of ASR rules including their GUIDs and what each one blocks, Microsoft maintains a comprehensive reference at learn.microsoft.com.

Exclusion Gotchas Worth Knowing

ASR rule exclusions have some quirks that will catch you off guard if you're not aware of them:

Closing Thoughts

ASR rules are one of the most effective tools in the Microsoft Defender toolkit when deployed correctly, and one of the fastest ways to generate user complaints when deployed carelessly. The ring methodology, the audit-first approach, and understanding the exclusion system are what separate an admin who creates friction for the business from one who quietly makes it more secure. Take your time with the planning phase, let audit mode do its job, and you'll end up with a meaningful security improvement your users will never even notice.

Defender Intune ASR Security Endpoint
0 comments