- Nov 11, 2022
- 48
Got a barely used Surface Laptop Go and slapped Windows 11 Pro on it. Here is what I've got:
- Controlled folder access enabled
- OneDrive known folder redirection
- Tamper Protection Enabled
- Real-Time Protection Enabled
- Cloud Delivered Protection Enabled
- Automatic Sample Submission
- Defender connected to Microsoft 365 Security (Business Premium License tier)
- Logs going to Azure Sentinel, machine learning applied
- Windows Firewall default rules
- Proton VPN set to start at boot
- ASR Rules enabled with the following Powershell script:
- Controlled folder access enabled
- OneDrive known folder redirection
- Tamper Protection Enabled
- Real-Time Protection Enabled
- Cloud Delivered Protection Enabled
- Automatic Sample Submission
- Defender connected to Microsoft 365 Security (Business Premium License tier)
- Logs going to Azure Sentinel, machine learning applied
- Windows Firewall default rules
- Proton VPN set to start at boot
- ASR Rules enabled with the following Powershell script:
Code:
#block executable content from email
Set-MpPreference -AttackSurfaceReductionRules_Ids BE9BA2D9-53EA-4CDC-84E5-9B1EEEE46550 -AttackSurfaceReductionRules_Actions Enabled
#block abuse of exploitable signed drivers
Set-MpPreference -AttackSurfaceReductionRules_Ids 56a863a9-875e-4185-98a7-b882c64b5ce5 -AttackSurfaceReductionRules_Actions Enabled
#block office apps from creating child processes
Set-MpPreference -AttackSurfaceReductionRules_Ids d4f940ab-401b-4efc-aadc-ad5f3c50688a -AttackSurfaceReductionRules_Actions Enabled
#Block credential stealing from the Windows local security authority subsystem (lsass.exe)
Set-MpPreference -AttackSurfaceReductionRules_Ids 9e6c4e1f-7d60-472f-ba1a-a39ef669e4b2 -AttackSurfaceReductionRules_Actions Enabled
#Block executable content from email client and webmail
Set-MpPreference -AttackSurfaceReductionRules_Ids be9ba2d9-53ea-4cdc-84e5-9b1eeee46550 -AttackSurfaceReductionRules_Actions Enabled
#Block JavaScript or VBScript from launching downloaded executable content
Set-MpPreference -AttackSurfaceReductionRules_Ids d3e037e1-3eb8-44c8-a917-57927947596d -AttackSurfaceReductionRules_Actions Enabled
#Block Office applications from creating executable content
Set-MpPreference -AttackSurfaceReductionRules_Ids 3b576869-a4ec-4529-8536-b80a7769e899 -AttackSurfaceReductionRules_Actions Enabled
#Block Office applications from injecting code into other processes
Set-MpPreference -AttackSurfaceReductionRules_Ids 75668c1f-73b5-4cf0-bb93-3ecf5cb7cc84 -AttackSurfaceReductionRules_Actions Enabled
#Block Office communication application from creating child processes
Set-MpPreference -AttackSurfaceReductionRules_Ids 26190899-1602-49e8-8b27-eb1d0a1ce869 -AttackSurfaceReductionRules_Actions Enabled
#Block process creations originating from PSExec and WMI commands
Set-MpPreference -AttackSurfaceReductionRules_Ids d1e49aac-8f56-4280-b9ba-993a6d77406c -AttackSurfaceReductionRules_Actions Enabled
#Use advanced protection against ransomware
Set-MpPreference -AttackSurfaceReductionRules_Ids c1db55ab-c21a-4637-bb3f-a12568109d35 -AttackSurfaceReductionRules_Actions Enabled