Information
This rule prevents scripts from launching potentially malicious downloaded content.
Rule ID and name:
- d3e037e1-3eb8-44c8-a917-57927947596d (Block JavaScript or VBScript from launching downloaded executable content)
The recommended state for this setting is: d3e037e1-3eb8-44c8-a917-57927947596d:1 (Block).
Note: More information on ASR rules can be found at the following link: Use Attack surface reduction rules to prevent malware infection | Microsoft Docs https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard
Attack surface reduction helps prevent actions and apps that are typically used by exploit-seeking malware to infect machines.
Malware written in JavaScript or VBScript often acts as a downloader to fetch and launch other malware from the Internet. Although not common, line-of-business applications sometimes use scripts to download and launch installers.
Solution
To establish the recommended configuration via GP, set the following UI path to d3e037e1-3eb8-44c8-a917-57927947596d with a value of 1 :
Computer Configuration\Policies\Administrative Templates\Windows Components\Microsoft Defender Antivirus\Microsoft Defender Exploit Guard\Attack Surface Reduction\Configure Attack Surface Reduction rules: Set the state for each ASR rule
Note: This Group Policy path is provided by the Group Policy template WindowsDefender.admx/adml that is included with the Microsoft Windows 10 Release 1709 Administrative Templates (or newer).
Impact:
When a rule is triggered, a notification will be displayed from the Action Center.