Information
This rule blocks Adobe Reader from creating processes.
Rule ID and name:
- 7674ba52-37eb-4a4f-a9a1-f0f9a1619a2c (Block Adobe Reader from creating child processes)
The recommended state for this setting is: 7674ba52-37eb-4a4f-a9a1-f0f9a1619a2c:1 (Block).
Note: More information on ASR rules can be found at the following link: Use Attack surface reduction rules to prevent malware infection | Microsoft Docs https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard
Attack surface reduction helps prevent actions and apps that are typically used by exploit-seeking malware to infect machines.
Malware can download and launch payloads and break out of Adobe Reader through social engineering or exploits. By blocking child processes from being generated by Adobe Reader, malware attempting to use Adobe Reader as an attack vector are prevented from spreading.
Solution
To establish the recommended configuration via GP, set the following UI path to 7674ba52-37eb-4a4f-a9a1-f0f9a1619a2c with a value of 1 :
Computer Configuration\Policies\Administrative Templates\Windows Components\Microsoft Defender Antivirus\Microsoft Defender Exploit Guard\Attack Surface Reduction\Configure Attack Surface Reduction rules: Set the state for each ASR rule
Note: This Group Policy path is provided by the Group Policy template WindowsDefender.admx/adml that is included with the Microsoft Windows 10 Release 1709 Administrative Templates (or newer).
Impact:
When a rule is triggered, a notification will be displayed from the Action Center.