Windows-itpro-docs: Add Windows version and SCCM version that rules were introduced

Created on 10 May 2019  Â·  11Comments  Â·  Source: MicrosoftDocs/windows-itpro-docs

For each WDEG ASR rule, it would be useful to list which version of Windows 10, Windows Server, and SCCM CB the rule was introduced.

As an example for the "Block persistence through WMI event subscription" rule there could be something like below.

This rule was introduced in:

  • Windows 10: 1903
  • Windows Server: 1903, LTSC vNext
  • SCCM CB: 1902

Could also flatten it too:

This rule was introduced in Windows 10 1903, Windows Server 1903, Windows Server LTSC vNext, SCCM CB 1902

Below are my notes for each rule, but I'm not sure if it is totally accurate. I wasn't sure about some of the versions (denoted with ???):

  • Block executable content from email client and webmail - Windows 10 1709, Windows Server 1809, Windows Server 2019, SCCM CB 1710
  • Block Office applications from creating child processes - Windows 10 1709, Windows Server 1809, Windows Server 2019, SCCM CB 1710
  • Block Office applications from creating executable content - Windows 10 1709, Windows Server 1809, Windows Server 2019, SCCM CB 1710
  • Block Office applications from injecting code into other processes - Windows 10 1709, Windows Server 1809, Windows Server 2019, SCCM CB 1710
  • Block JavaScript or VBScript from launching downloaded executable content - Windows 10 1709, Windows Server 1809, Windows Server 2019, SCCM CB 1710
  • Block execution of potentially obfuscated scripts - Windows 10 1709, Windows Server 1809, Windows Server 2019, SCCM CB 1710
  • Block Win32 API calls from Office macro - Windows 10 1709, Windows Server 1809, Windows Server 2019, SCCM CB 1710
  • Block executable files from running unless they meet a prevalence, age, or trusted list criteria - Windows 10 1803, Windows Server 1809, Windows Server 2019, SCCM CB 1802???
  • Use advanced protection against ransomware - Windows 10 1803, Windows Server 1809, Windows Server 2019, SCCM CB 1802
  • Block credential stealing from the Windows local security authority subsystem (lsass.exe) - Windows 10 1803, Windows Server 1809, Windows Server 2019, SCCM CB 1802
  • Block process creations originating from PSExec and WMI commands - Windows 10 1803, Windows Server 1809, Windows Server 2019, SCCM CB 1802???
  • Block untrusted and unsigned processes that run from USB - Windows 10 1803, Windows Server 1809, Windows Server 2019, SCCM CB 1802
  • Block Office communication applications from creating child processes - Windows 10 1809, Windows Server 1809, Windows Server 2019, SCCM CB 1810???
  • Block Adobe Reader from creating child processes - Windows 10 1809, Windows Server 1809, Windows Server 2019, SCCM CB 1810???
  • Block persistence through WMI event subscription - Windows 10 1903???, Windows Server 1903???, Windows Server LTSC vNext, SCCM CB 1902???

My sources for SCCM versions are:

My sources for Windows Server and Windows Server LTSC are:


Document Details

⚠ Do not edit this section. It is required for docs.microsoft.com ➟ GitHub issue linking.

Most helpful comment

@e0i
I will likely open another issue to capture additional changes that may need to be made based on my previous comment.

All 11 comments

@officedocsbot assign @e0i

@iadgovuser1

The issue has been noted and the document will be revised in the light of your feedback.

Thank you.

@e0i this issue is solved by the PR #4430, please review and merge !

@iadgovuser1 : Please have a look at the commit and recent changes to the Github source page:
Rich text diff view:
https://github.com/MicrosoftDocs/windows-itpro-docs/commit/99331095c18b04e588b1942e30be337bdf6d8dfd?short_path=9467fe2#diff-9467fe25b71e6c0368355a30ce380a89

Github page:
windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard.md

@illfated I can double check these tomorrow in my SCCM 1902 instance to try and answer some of these questions below. Here are my comments:

Block process creations originating from PSExec and WMI commands
SCCM name: Not applicable.

Is that correct? Makes sense if that's true because it isn't compatible with SCCM. Might want to remove "SCCM CB 1802" then.

Block Office communication application from creating child processes
SCCM name: Not yet available.

Is that correct? Seems like it should be there. Might want to remove "SCCM CB 1810" then.

Block Adobe Reader from creating child processes
SCCM name: Not applicable

Is that correct? Seems like it should be there. Might want to remove "SCCM CB 1810" then.

Block persistence through WMI event subscription
SCCM name: Not yet available

This might actually be true since it is so new. This one is missing "This rule was introduced in:" phrasing. It should be in Windows 10 1903.

Thank you for those comments and your suggestions for what else needs to be remediated.
I am confident that this can be resolved too, as soon as any of the other contributors will add it to their work list.
I would have taken the time myself, but I have got too many distractions going on in my life at the moment.

@illfated So it turns out that those 4 rules are not in SCCM CB 1902. I'd remove all mentions of SCCM CB for those rules in their "introduced in" lines. Outside of that, I wonder why the Adobe Reader one is listed as "Not applicable" instead of "Not yet available". It makes sense that "Block process creations originating from PSExec and WMI commands" is Not Applicable because it will break SCCM. I don't think that would be true for the Adobe Reader rule. That's the only other thing that might need to be changed other than what I mentioned already.

@iadgovuser1

We are closing the issue since the original subject of the issue has been addressed via pull request #4430

Thank you for taking the time to provide feedback and engaging in discussion to improve the documentation. Much appreciated.

@officedocsbot close

@e0i
I will likely open another issue to capture additional changes that may need to be made based on my previous comment.

Good choice. It will be easier to manage 1 pull request / page change per issue ticket.

Was this page helpful?
0 / 5 - 0 ratings

Related issues

RAJU2529 picture RAJU2529  Â·  3Comments

ang216 picture ang216  Â·  3Comments

LanceMcCarthy picture LanceMcCarthy  Â·  3Comments

zjalexander picture zjalexander  Â·  3Comments

thohun picture thohun  Â·  3Comments