21.7 (L1) Ensure 'Attack Surface Reduction rules' are configured

Information

This policy setting sets the Attack Surface Reduction rules.

The recommended state for all settings is Block

Block abuse of exploited vulnerable signed drivers (Device)
Block Adobe Reader from creating child processes
Block all Office applications from creating child processes
Block credential stealing from the Windows local security authority subsystem
Block executable content from email client and webmail
Block execution of potentially obfuscated scripts
Block JavaScript or VBScript from launching downloaded executable content
Block Office applications from creating executable content
Block Office applications from injecting code into other processes
Block Office communication application from creating child processes
Block persistence through WMI event subscription
Block untrusted and unsigned processes that run from USB
Block Win32 API calls from Office macros

Note: More information on ASR rules can be found at the following link:

Use Attack surface reduction rules to prevent malware infection | Microsoft Docs

Attack surface reduction helps prevent actions and apps that are typically used by exploit-seeking malware to infect machines.

Solution

To establish the recommended configuration via configuration profiles, set the following Settings Catalog paths to Block

Defender\Block abuse of exploited vulnerable signed drivers (Device)
Defender\Block Adobe Reader from creating child processes
Defender\Block all Office applications from creating child processes
Defender\Block credential stealing from the Windows local security authority subsystem
Defender\Block executable content from email client and webmail
Defender\Block execution of potentially obfuscated scripts
Defender\Block JavaScript or VBScript from launching downloaded executable content
Defender\Block Office applications from creating executable content
Defender\Block Office applications from injecting code into other processes
Defender\Block Office communication application from creating child processes
Defender\Block persistence through WMI event subscription
Defender\Block untrusted and unsigned processes that run from USB
Defender\Block Win32 API calls from Office macros

Impact:

When a rule is triggered, a notification will be displayed from the Action Center.

See Also

https://workbench.cisecurity.org/benchmarks/16853

Item Details

Category: SYSTEM AND INFORMATION INTEGRITY

References: 800-53|SI-16, CSCv7|8.3

Plugin: Windows

Control ID: 71d122c753791cc75c2802b64b53e924ad114c1e5d925afd0c4b46b31092f701