22.17 (L1) Ensure 'ASR: Block Office communication application from creating child processes' is set to 'Audit' or higher

Information

This rule prevents Outlook from creating child processes, while still allowing legitimate Outlook functions.

The recommended state for this setting is: Audit Configuring this setting to Block also conforms to the benchmark.

This ASR rule protects against social engineering attacks and prevents exploiting code from abusing vulnerabilities in Outlook. It also protects against Outlook rules and forms exploits that attackers can use when a user's credentials are compromised.

Solution

To establish the recommended configuration via configuration profiles, set the following Settings Catalog path to Audit or Block

Defender\Block Office communication application from creating child processes

Impact:

This rule will block DLP policy tips and ToolTips in Outlook, and applies to Outlook and Outlook.com only.

See Also

https://workbench.cisecurity.org/benchmarks/21767

Item Details

Category: SYSTEM AND INFORMATION INTEGRITY

References: 800-53|SI-16, CSCv7|8.3

Plugin: Windows

Control ID: f08abeb946dba1edee54cafe5b3140de7b98ee8bf776fd7014f8cfebbed1149f