Troubleshoot attack surface reduction rules
Applies to:
- Microsoft Defender for Endpoint Plan 1
- Microsoft Defender for Endpoint Plan 2
- Microsoft Defender XDR
Want to experience Defender for Endpoint? Sign up for a free trial.
When you use attack surface reduction rules you might run into issues, such as:
- A rule blocks a file, process, or performs some other action that it shouldn't (false positive); or
- A rule doesn't work as described, or doesn't block a file or process that it should (false negative).
There are four steps to troubleshooting these problems:
- Confirm prerequisites
- Use audit mode to test the rule
- Add exclusions for the specified rule (for false positives)
- Submit support logs
Confirm prerequisites
Attack surface reduction rules only work on devices with the following conditions:
- Devices are running Windows 10 Enterprise or later.
- Devices are using Microsoft Defender Antivirus as the sole antivirus protection app. Using any other antivirus app causes Microsoft Defender Antivirus to disable itself.
- Real-time protection is enabled.
- Audit mode isn't enabled. Use Group Policy to set the rule to
Disabled
(value:0
) as described in Enable attack surface reduction rules.
If these prerequisites are met, proceed to the next step to test the rule in audit mode.
Best practices when setting up attack surface reduction rules using Group Policy
When setting up the attack surface reduction rules by using Group Policy, here are a few best practices to avoid making common mistakes:
Make sure when adding the GUID for attack surface reduction rules, there are no double quotes (like this: "ASR Rules GUID") at the beginning or at the end of the GUID.
Make sure that there are no spaces at the beginning or at the end when adding the GUID for attack surface reduction rules.
Use audit mode to test the rule
Follow these instructions in Use the demo tool to see how attack surface reduction rules work to test the specific rule you're encountering problems with.
Enable audit mode for the specific rule you want to test. Use Group Policy to set the rule to
Audit mode
(value:2
) as described in Enable attack surface reduction rules. Audit mode allows the rule to report the file or process, but allows it to run.Perform the activity that is causing an issue. For example, open the file or run the process that should be blocked, but is allowed.
Review the attack surface reduction rule event logs to see if the rule would block the file or process if the rule were set to
Enabled
.If a rule isn't blocking a file or process that you're expecting it should block, first check to see if audit mode is enabled. Audit mode might be enabled for testing another feature, or by an automated PowerShell script, and might not be disabled after the tests were completed.
If you've tested the rule with the demo tool and with audit mode, and attack surface reduction rules are working on preconfigured scenarios, but the rule isn't working as expected, proceed to either of the following sections based on your situation:
- If the attack surface reduction rule is blocking something that it shouldn't block (also known as a false positive), you can first add an attack surface reduction rule exclusion.
- If the attack surface reduction rule isn't blocking something that it should block (also known as a false negative), you can proceed immediately to the last step, collecting diagnostic data and submitting the issue to us.
Add exclusions for a false positive
If the attack surface reduction rule is blocking something that it shouldn't block (also known as a false positive), you can add exclusions to prevent attack surface reduction rules from evaluating the excluded files or folders.
To add an exclusion, see Customize attack surface reduction.
Important
You can specify individual files and folders to be excluded, but you cannot specify individual rules. This means any files or folders that are excluded will be excluded from all ASR rules.
Report a false positive or false negative
Use the Microsoft Security Intelligence web-based submission form to report a false negative or false positive for network protection. With a Windows E5 subscription, you can also provide a link to any associated alert.
Collect diagnostic data for file submissions
When you report a problem with attack surface reduction rules, you're asked to collect and submit diagnostic data that can be used by Microsoft support and engineering teams to help troubleshoot issues.
Open Command Prompt as an administrator and open the Windows Defender directory:
cd "c:\program files\Windows Defender"
Run this command to generate the diagnostic logs:
mpcmdrun -getfiles
By default, they're saved to
C:\ProgramData\Microsoft\Windows Defender\Support\MpSupportFiles.cab
. Attach the file to the submission form.
Related articles
- Attack surface reduction rules
- Enable attack surface reduction rules
- Evaluate attack surface reduction rules
Tip
Do you want to learn more? Engage with the Microsoft Security community in our Tech Community: Microsoft Defender for Endpoint Tech Community.