Information
This rule detects suspicious properties within an obfuscated script.
Rule ID and name:
- 5beb7efe-fd9a-4556-801d-275e5ffc04cc (Block execution of potentially obfuscated scripts)
The recommended state for this setting is: 5beb7efe-fd9a-4556-801d-275e5ffc04cc:2 (Audit). Configuring this setting to 5beb7efe-fd9a-4556-801d-275e5ffc04cc:1 (Block) also conforms to the benchmark.
Note: More information on ASR rules can be found at the following link: Use Attack surface reduction rules to prevent malware infection | Microsoft Docs https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard
Attack surface reduction helps prevent actions and apps that are typically used by exploit-seeking malware to infect machines.
Script obfuscation is a common technique that both malware authors and legitimate applications use to hide intellectual property or decrease script loading times. Malware authors also use obfuscation to make malicious code harder to read, which hampers close scrutiny by humans and security software.
Solution
To establish the recommended configuration via GP, set the following UI path to 5beb7efe-fd9a-4556-801d-275e5ffc04cc with a value of 2 or 1 :
Computer Configuration\Policies\Administrative Templates\Windows Components\Microsoft Defender Antivirus\Microsoft Defender Exploit Guard\Attack Surface Reduction\Configure Attack Surface Reduction rules: Set the state for each ASR rule
Note: This Group Policy path is provided by the Group Policy template WindowsDefender.admx/adml that is included with the Microsoft Windows 10 Release 1709 Administrative Templates (or newer).
Impact:
When a rule is triggered, a notification will be displayed from the Action Center.
Note: Cloud-delivered protection must be enabled to use this rule.