ASD's Blueprint for Secure Cloud

Endpoint security policies

This section describes the configuration of endpoint security policies within Microsoft Defender associated with systems built according to the guidance provided by ASD's Blueprint for Secure Cloud.

Estimated reading time: 5 minutes

Windows policies

ASD Windows Hardening Guidelines - Antivirus

Policy details
ItemValue
PlatformWindows 10, Windows 11 and Windows Server
TemplateMicrosoft Defender Antivirus
Policy setting values
ItemValue
Allow Archive ScanningAllowed. Scans the archive files.
Allow Behavior MonitoringAllowed. Turns on real-time behavior monitoring.
Allow Cloud ProtectionAllowed. Turns on Cloud Protection.
Allow Email ScanningNot allowed. Turns off email scanning.
Allow Full Scan On Mapped Network DrivesNot configured
Allow Full Scan Removable Drive ScanningAllowed. Scans removable drives.
[Deprecated] Allow Intrusion Prevention SystemAllowed.
Allow scanning of all downloaded files and attachmentsAllowed.
Allow Realtime MonitoringAllowed. Turns on and runs the real-time monitoring service.
Allow Scanning Network FilesAllowed. Scans network files.
Allow Script ScanningAllowed.
Allow User UI AccessNot allowed. Prevents users from accessing UI.
Avg CPU Load Factor50
Archive Max DepthNot Configured
Archive Max SizeNot Configured
Check For Signatures Before Running ScanEnabled
Cloud Block LevelHigh
Cloud Extended TimeoutNot Configured
Days To Retain Cleaned MalwareNot Configured
Disable Catchup Full ScanEnabled
Disable Catchup Quick ScanEnabled
Enable Low CPU PriorityEnabled
Enable Network ProtectionEnabled (block mode)
Excluded ExtensionsNot configured
Excluded PathsNot configured
Excluded ProcessesNot configured
PUA ProtectionPUA Protection on. Detected items are blocked. They will show in history along with other threats.
Real Time Scan DirectionMonitor all files (bi-directional).
Scan ParameterQuick scan
Schedule Quick Scan Time120
Schedule Scan DayEvery day
Schedule Scan Time120
Signature Update Fallback OrderNot configured
Signature Update File Shares SourcesNot configured
Signature Update Interval4
Submit Samples ConsentSend safe samples automatically.
Disable Local Admin MergeNot configured
Allow On Access ProtectionAllowed.
Remediation action for High severity threatsNot configured
Remediation action for Severe threatsBlock. Blocks file execution.
Remediation action for Low severity threatsClean. Service tries to recover files and try to disinfect.
Remediation action for Moderate severity threatsQuarantine. Moves files to quarantine.
Allow Network Protection Down LevelNot configured
Allow Datagram Processing On Win ServerNot configured
Disable Dns Over Tcp ParsingNot configured
Disable Http ParsingNot configured
Disable Ssh ParsingNot configured
Disable Tls ParsingNot configured
[Deprecated] Enable Dns SinkholeNot configured
Engine Updates ChannelNot configured
Metered Connection UpdatesNot configured
Platform Updates ChannelNot configured
Security Intelligence Updates ChannelNot configured
Randomize Schedule Task TimesNot Configured
Scheduler Randomization TimeNot Configured
Archive Max SizeNot Configured
Disable Core Service ECS IntegrationNot configured
Disable Core Service TelemetryNot configured
Assignments
ItemValue
GroupOrganisation group name(s)

ASD Windows Hardening Guidelines - Attack Surface Reduction

Policy details
ItemValue
PlatformWindows 10, Windows 11 and Windows Server
TemplateAttack Surface Reduction Rules
Policy setting values
ItemValue
Block execution of potentially obfuscated scriptsBlock
Block Win32 API calls from Office macrosBlock
Block executable files from running unless they meet a prevalence, age, or trusted list criterionBlock
Block Office communication application from creating child processesBlock
Block all Office applications from creating child processesBlock
Block Adobe Reader from creating child processesBlock
Block credential stealing from the Windows local security authority subsystemBlock
Block JavaScript or VBScript from launching downloaded executable contentBlock
Block Webshell creation for ServersBlock
Block untrusted and unsigned processes that run from USBBlock
Block persistence through WMI event subscriptionBlock
[PREVIEW] Block use of copied or impersonated system toolsBlock
Block abuse of exploited vulnerable signed drivers (Device)Block
Block process creations originating from PSExec and WMI commandsBlock
Block Office applications from creating executable contentBlock
Block Office applications from injecting code into other processesBlock
[PREVIEW] Block rebooting machine in Safe ModeBlock
Use advanced protection against ransomwareBlock
Block executable content from email client and webmailBlock
Enable Controlled Folder AccessNot configured
Assignments
ItemValue
GroupOrganisation group name(s)

ASD Windows Hardening Guidelines - Endpoint Detection and Response

Policy details
ItemValue
PlatformWindows 10, Windows 11 and Windows Server
TemplateEndpoint Detection and Response
Policy setting values
ItemValue
Microsoft Defender for Endpoint client configuration package typeNot configured
Sample SharingNone
[Deprecated] Telemetry Reporting FrequencyExpedite
Assignments
ItemValue
GroupOrganisation group name(s)

Mac policies

Not configured

Linux policies

Not configured

Security & Governance

Design

Configuration

References

Do you have a suggestion on how the above page could be improved? Get in touch! ASD's Blueprint for Secure Cloud is an open source project, and we would love to get your input. Submit an issue on our GitHub, or send us an email at blueprint@asd.gov.au

Acknowledgement of Country icon

Acknowledgement of Country
We acknowledge the Traditional Owners and Custodians of Country throughout Australia and their continuing connections to land, sea and communities. We pay our respects to them, their cultures and their Elders; past, present and emerging. We also recognise Australia's First Peoples' enduring contribution to Australia's national security.

Authorised by the Australian Government, Canberra