Information
This rule prevents Outlook from creating child processes, while still allowing legitimate Outlook functions.
The recommended state for this setting is: Audit Configuring this setting to Block also conforms to the benchmark.
This ASR rule protects against social engineering attacks and prevents exploiting code from abusing vulnerabilities in Outlook. It also protects against Outlook rules and forms exploits that attackers can use when a user's credentials are compromised.
Solution
To establish the recommended configuration via configuration profiles, set the following Settings Catalog path to Audit or Block
Defender\Block Office communication application from creating child processes
Impact:
This rule will block DLP policy tips and ToolTips in Outlook, and applies to Outlook and Outlook.com only.