Introduction to Attack Surface Reduction
In this chapter, we will address which additional layers of defense can be applied to your endpoints for additional opportunities to prevent attacks from gaining a foothold. Elements of this layered defense include the prevention of certain user- or application-initiated actions but also blocking connections to bad destinations, including those in use by attackers that have already had some success gaining a level of control over a device. Since some of these additional controls can have an impact on the user experience, your business software, or other (security-related) tools, you may need to carefully consider which can be safely applied.
We will cover the following topics:
- What is attack surface reduction (ASR)?
- Examining ASR rules
- Network protection (NP) layers and controls
- Controlled folder access (CFA) ransomware mitigations
- Exploit protection for advanced mitigations
Cold snack
ASR features used to...