Information
This rule blocks Office apps from creating child processes. Office apps include Word, Excel, PowerPoint, OneNote, and Access.
Creating malicious child processes is a common malware strategy. Malware that abuses Office as a vector often runs VBA macros and exploit code to download and attempt to run more payloads. However, some legitimate line-of-business applications might also generate child processes for benign purposes; such as spawning a command prompt or using PowerShell to configure registry settings.
The recommended state for this setting is: Audit Configuring this setting to Block also conforms to the benchmark.
Attack surface reduction helps prevent actions and apps that are typically used by exploit-seeking malware to infect machines.
Solution
To establish the recommended configuration via configuration profiles, set the following Settings Catalog path to Audit or Block
Defender\Block all Office applications from creating child processes
Impact:
When a rule is triggered, a notification will be displayed from the Action Center.