Information
With this rule, admins can prevent unsigned or untrusted executable files from running from USB removable drives, including SD cards. Blocked file types include executable files (such as .exe, .dll, or .scr).
Rule ID and name:
- b2b3f03d-6a65-4f7b-a9c7-1c7ef74a9ba4 (Block untrusted and unsigned processes that run from USB)
The recommended state for this setting is: b2b3f03d-6a65-4f7b-a9c7-1c7ef74a9ba4:1 (Block).
Note: More information on ASR rules can be found at the following link: Use Attack surface reduction rules to prevent malware infection | Microsoft Docs https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard
Attack surface reduction helps prevent actions and apps that are typically used by exploit-seeking malware to infect machines.
Solution
To establish the recommended configuration via GP, set the following UI path to b2b3f03d-6a65-4f7b-a9c7-1c7ef74a9ba4 with a value of 1 :
Computer Configuration\Policies\Administrative Templates\Windows Components\Microsoft Defender Antivirus\Microsoft Defender Exploit Guard\Attack Surface Reduction\Configure Attack Surface Reduction rules: Set the state for each ASR rule
Note: This Group Policy path is provided by the Group Policy template WindowsDefender.admx/adml that is included with the Microsoft Windows 10 Release 1709 Administrative Templates (or newer).
Impact:
Files copied from the USB to the disk drive will be blocked by this rule if and when it's about to be executed on the disk drive.