0xsp-SRD / MDE_Enum

comprehensive .NET tool designed to extract and display detailed information about Windows Defender exclusions and Attack Surface Reduction (ASR) rules without Admin privileges
MIT License
190 stars 16 forks source link

MDE_Enum

MDE_Enum is a comprehensive .NET tool designed to extract and display detailed information about Windows Defender exclusions and Attack Surface Reduction (ASR) rules. It is capable of querying both local and remote systems effectively, even from a low-user context, making it a versatile tool for system administrators and security professionals.

Features

Usage

Windows Defender exclusion paths

This feature extracts the values from Windows Event ID 5007 logs. The tool uses regex pattern matching to accurately extract these values from the event description text.

  1. Enumerate exclusion paths locally
    
    MDE_Enum /local /paths

MDE_Enum /local /paths /access (check if current user has write access)


2. Enumerate exclusion paths on remote computers

MDE_Enum /paths


### Triggered ASR Rules 
This feature extracts the values from Windows Event ID 1121 logs. The tool uses regex pattern matching to accurately extract these values from the event description text.

1. Enumerate logged ASR rules locally 

MDE_Enum /local /asr


2. Enumerate logged ASR rules on remote computers

MDE_Enum /asr

### Enumerate ASR Rules 
This feature extracts the Attack Surface Reduction (ASR) rules from the MSFT_MpPreference WMI class and provides a comprehensive status of the rules along with their corresponding names.

1. Enumerate the rules locally 

MDE_Enum /local /asr /alt

2. Enumerate the rules on remote computers. 

MDE_Enum /asr /alt


## Acknowledgements 

* Thanks to VakninHai (https://x.com/VakninHai/status/1796628601535652289)