Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

IntuneSettingCatalogASRRulesPolicyWindows10: Latest two Attack Surface Reduction rules not supported #4713

Closed
fmdkrenepedersen opened this issue May 28, 2024 · 0 comments · Fixed by #4714 or #4718

Comments

@fmdkrenepedersen
Copy link

fmdkrenepedersen commented May 28, 2024

Description of the issue

When running the M365TenantConfig.ps1 it fails due to the two latest ASR rules (added in februrary).

Microsoft 365 DSC Version

1.24.522.1

Which workloads are affected

Intune

The DSC configuration

IntuneSettingCatalogASRRulesPolicyWindows10 "IntuneSettingCatalogASRRulesPolicyWindows10-Windows - ASR"
        {
            ApplicationId                                                              = $ConfigurationData.NonNodeData.ApplicationId;
            Assignments                                                                = @(
                MSFT_DeviceManagementConfigurationPolicyAssignments{
                    deviceAndAppManagementAssignmentFilterType = 'none'
                    groupDisplayName = 'All devices'
                    dataType = '#microsoft.graph.allDevicesAssignmentTarget'
                }
            );
            blockabuseofexploitedvulnerablesigneddrivers                               = "block";
            blockadobereaderfromcreatingchildprocesses                                 = "block";
            blockallofficeapplicationsfromcreatingchildprocesses                       = "block";
            blockcredentialstealingfromwindowslocalsecurityauthoritysubsystem          = "block";
            blockexecutablecontentfromemailclientandwebmail                            = "block";
            blockexecutablefilesrunningunlesstheymeetprevalenceagetrustedlistcriterion = "block";
            blockexecutionofpotentiallyobfuscatedscripts                               = "block";
            blockjavascriptorvbscriptfromlaunchingdownloadedexecutablecontent          = "block";
            blockofficeapplicationsfromcreatingexecutablecontent                       = "block";
            blockofficeapplicationsfrominjectingcodeintootherprocesses                 = "block";
            blockofficecommunicationappfromcreatingchildprocesses                      = "block";
            blockpersistencethroughwmieventsubscription                                = "block";
            blockprocesscreationsfrompsexecandwmicommands                              = "block";
            blockrebootingmachineinsafemode                                            = "notConfigured";
            blockuntrustedunsignedprocessesthatrunfromusb                              = "block";
            blockuseofcopiedorimpersonatedsystemtools                                  = "notConfigured";
            blockwebshellcreationforservers                                            = "block";
            blockwin32apicallsfromofficemacros                                         = "block";
            CertificateThumbprint                                                      = $ConfigurationData.NonNodeData.CertificateThumbprint;
            Description                                                                = "";
            DisplayName                                                                = "Windows - ASR";
            Ensure                                                                     = "Present";
            Identity                                                                   = "d2a3108f-f37b-4a49-96de-e348c7342a05";
            TenantId                                                                   = $OrganizationName;
            useadvancedprotectionagainstransomware                                     = "block";
        }

Verbose logs showing the problem

+             blockrebootingmachineinsafemode                           ...
+             ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
The member 'blockrebootingmachineinsafemode' is not valid. Valid members are
'AccessTokens', 'ApplicationId', 'ApplicationSecret', 'Assignments', 'AttackSurfaceReductionOnlyExclusions',
'BlockAbuseOfExploitedVulnerableSignedDrivers', 'BlockAdobeReaderFromCreatingChildProcesses',
'BlockAllOfficeApplicationsFromCreatingChildProcesses',
'BlockCredentialStealingFromWindowsLocalSecurityAuthoritySubsystem',
'BlockExecutableContentFromEmailClientAndWebmail',
'BlockExecutableFilesRunningUnlessTheyMeetPrevalenceAgeTrustedListCriterion',
'BlockExecutionOfPotentiallyObfuscatedScripts', 'BlockJavaScriptOrVBScriptFromLaunchingDownloadedExecutableContent',
'BlockOfficeApplicationsFromCreatingExecutableContent', 'BlockOfficeApplicationsFromInjectingCodeIntoOtherProcesses',
'BlockOfficeCommunicationAppFromCreatingChildProcesses', 'BlockPersistenceThroughWMIEventSubscription',
'BlockProcessCreationsFromPSExecAndWMICommands', 'BlockUntrustedUnsignedProcessesThatRunFromUSB',
'BlockWebShellCreationForServers', 'BlockWin32APICallsFromOfficeMacros', 'CertificateThumbprint',
'ControlledFolderAccessAllowedApplications', 'ControlledFolderAccessProtectedFolders', 'Credential', 'DependsOn',
'Description', 'DisplayName', 'EnableControlledFolderAccess', 'Ensure', 'Identity', 'ManagedIdentity',
'PsDscRunAsCredential', 'TenantId', 'UseAdvancedProtectionAgainstRansomware'.


The member 'blockuseofcopiedorimpersonatedsystemtools' is not valid. Valid members are
'AccessTokens', 'ApplicationId', 'ApplicationSecret', 'Assignments', 'AttackSurfaceReductionOnlyExclusions',
'BlockAbuseOfExploitedVulnerableSignedDrivers', 'BlockAdobeReaderFromCreatingChildProcesses',
'BlockAllOfficeApplicationsFromCreatingChildProcesses',
'BlockCredentialStealingFromWindowsLocalSecurityAuthoritySubsystem',
'BlockExecutableContentFromEmailClientAndWebmail',
'BlockExecutableFilesRunningUnlessTheyMeetPrevalenceAgeTrustedListCriterion',
'BlockExecutionOfPotentiallyObfuscatedScripts', 'BlockJavaScriptOrVBScriptFromLaunchingDownloadedExecutableContent',
'BlockOfficeApplicationsFromCreatingExecutableContent', 'BlockOfficeApplicationsFromInjectingCodeIntoOtherProcesses',
'BlockOfficeCommunicationAppFromCreatingChildProcesses', 'BlockPersistenceThroughWMIEventSubscription',
'BlockProcessCreationsFromPSExecAndWMICommands', 'BlockUntrustedUnsignedProcessesThatRunFromUSB',
'BlockWebShellCreationForServers', 'BlockWin32APICallsFromOfficeMacros', 'CertificateThumbprint',
'ControlledFolderAccessAllowedApplications', 'ControlledFolderAccessProtectedFolders', 'Credential', 'DependsOn',
'Description', 'DisplayName', 'EnableControlledFolderAccess', 'Ensure', 'Identity', 'ManagedIdentity',                  'PsDscRunAsCredential', 'TenantId', 'UseAdvancedProtectionAgainstRansomware'.                                               + CategoryInfo          : ParserError: (:) [], ParseException                                                           + FullyQualifiedErrorId : InvalidInstanceProperty

Environment Information + PowerShell Version

PSVersion 5.1.26100.268
PSEdition Desktop
PSCompatibleVersions {1.0, 2.0, 3.0, 4.0...}
BuildVersion 10.0.26100.268
CLRVersion 4.0.30319.42000
WSManStackVersion 3.0
PSRemotingProtocolVersion 2.3
SerializationVersion 1.1.0.1

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
1 participant