Information
This rule blocks executable files, such as .exe, .dll, or .scr, from launching.
Rule ID and name:
- 01443614-cd74-433a-b99e-2ecdc07bfc25 (Block executable files from running unless they meet a prevalence, age, or trusted list criterion)
The recommended state for this setting is: 01443614-cd74-433a-b99e-2ecdc07bfc25:2 (Audit) or higher. Configuring this setting to 01443614-cd74-433a-b99e-2ecdc07bfc25:1 (Block) also conforms to the benchmark.
Note: More information on ASR rules can be found at the following link: Use Attack surface reduction rules to prevent malware infection | Microsoft Docs https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard
Note #2: Cloud-delivered protection must be enabled to use this rule.
Attack surface reduction helps prevent actions and apps that are typically used by exploit-seeking malware to infect machines.
Launching untrusted or unknown executable files can be risky, as it might not be initially clear if the files are malicious.
Organizations may find implementing Block to be too strict, however in Audit mode there is still valuable information that can be logged for threat hunters to sift through and analyze.
Solution
To establish the recommended configuration via GP, set the following UI path to 01443614-cd74-433a-b99e-2ecdc07bfc25 with a value of 2 or 1 :
Computer Configuration\Policies\Administrative Templates\Windows Components\Microsoft Defender Antivirus\Microsoft Defender Exploit Guard\Attack Surface Reduction\Configure Attack Surface Reduction rules: Set the state for each ASR rule
Note: This Group Policy path is provided by the Group Policy template WindowsDefender.admx/adml that is included with the Microsoft Windows 10 Release 1709 Administrative Templates (or newer).
Impact:
When a rule is triggered, a notification will be displayed from the Action Center. To parse audit logs effectively an organization may need to implement a SIEM solution.
Warning: Prior to configuring this rule in Block mode, it should be enabled in Audit mode to verify that it does not introduce issues, especially for Microsoft Outlook. This rule will block legitimate programs.