Jump to content

Eset Alternative to Microsoft Defender Attack Surface Reduction


INDUS_MH

Recommended Posts

Hello,

are the rules from Defender Attack Surface Reduction or equivalent implemented in Eset Endpoint Security? 
https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/customize-attack-surface-reduction

If not, is there any way to enable the rules with Eset enabled?

 

Kind regards

Martin

Link to comment
Share on other sites

11 minutes ago, INDUS_MH said:

If not, is there any way to enable the rules with Eset enabled?

Some of the ASR rule protections are incorporated into the various Eset protection mechanisms; namely the HIPS.

Some of the ASR protection rules are not; for example, "Block execution of potentially obfuscated scripts." Eset scans such scripts but will only block their execution if known malware exists or highly suspicious activity is being performed.

Other ASR rules such as "Block Office applications from creating executable content" can be had in Eset by creating custom HIPS rules for like activity.

Link to comment
Share on other sites

Hello @Marcos

I added the HIPS rules from KB6119 and noticed afterward that the powershell can not even be opened, as it always tries to open conhost.exe with it. I set the disallowed child processes from all to just the scripting executables.

Maybe the KB6119 needs a small update?

Also do you know if Eset intends to add additional HIPS rules to the KB or plans to implement the functionality out of the box?

 

Kind regards

Martin

Link to comment
Share on other sites

Guest
This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...