Microsoft Defender XDR’s New ASR Rule: Block Execution of RMM Tools

Listen to this Post

Featured Image
Microsoft Defender XDR has introduced a new Attack Surface Reduction (ASR) rule—”Block execution of files related to Remote Monitoring & Management (RMM) tools”—though it hasn’t been officially documented yet. This rule aims to prevent unauthorized RMM tool usage, reducing risks from threat actors exploiting tools like TeamViewer, AnyDesk, and other remote access software.

You Should Know:

  1. How to Check & Enable the ASR Rule

– Navigate to:

https://security.microsoft.com/asr?viewid=detections 

– Filter rules to “All” to locate the new rule.

2. PowerShell Command to Enable ASR Rules

Use this PowerShell command to enable ASR rules (replace GUID with the new rule’s ID once available):

Set-MpPreference -AttackSurfaceReductionRules_Ids <RULE-GUID> -AttackSurfaceReductionRules_Actions Enabled

3. Verify ASR Rule Status

Check current ASR rule status via PowerShell:

Get-MpPreference | Select-Object AttackSurfaceReductionRules_Ids, AttackSurfaceReductionRules_Actions

4. Exclude Trusted RMM Tools (If Needed)

If your org uses approved RMM tools, exclude them via:

Add-MpPreference -AttackSurfaceReductionOnlyExclusions "<PathToRMMTool>"

5. Monitor ASR Rule Detections

Check Defender logs for ASR-triggered events:

Get-WinEvent -LogName "Microsoft-Windows-Windows Defender/Operational" | Where-Object { $_.Id -eq 1121 }

6. Linux Equivalent (For Hybrid Environments)

If managing Linux systems, use auditd to monitor RMM tool executions:

sudo auditctl -w /usr/bin/teamviewer -p x -k rmm_block

Check logs with:

sudo ausearch -k rmm_block | aureport -f -i
  1. Windows Firewall Rule to Block RMM Traffic

Block outgoing RMM connections via PowerShell:

New-NetFirewallRule -DisplayName "Block RMM Tools" -Direction Outbound -Program "C:\Path\To\RMM-Tool.exe" -Action Block

What Undercode Say:

Microsoft’s move to block unauthorized RMM tools is a strong step toward Zero Trust, preventing attackers from leveraging legitimate tools for lateral movement. However, organizations must:
– Test the rule in Audit Mode first before enforcement.
– Maintain an exclusion list for approved remote management tools.
– Monitor logs for false positives.

For defenders, combining ASR rules with firewall restrictions and endpoint monitoring (via Defender for Endpoint or SIEM) ensures layered protection against RMM abuse.

Prediction:

As attackers increasingly abuse RMM tools, expect more vendors to enforce default-deny policies for remote access software, pushing organizations toward VPN-less, identity-based remote access solutions like Azure AD Conditional Access.

Expected Output:

  • ASR rule logs in Defender XDR.
  • Blocked RMM tool executions in security logs.
  • Reduced attack surface from RMM-based intrusions.

Relevant URLs:

References:

Reported By: Wjpvandenheuvel Microsoftsecurity – Hackers Feeds
Extra Hub: Undercode MoN
Basic Verification: Pass ✅

Join Our Cyber World:

💬 Whatsapp | 💬 Telegram