22.16 (L1) Ensure 'ASR: Block Office applications from injecting code into other processes' is set to 'Block'

Information

Attackers might attempt to use Office apps to migrate malicious code into other processes through code injection, so the code can masquerade as a clean process. There are no known legitimate business purposes for using code injection.

This rule applies to Word, Excel, OneNote, and PowerPoint.

The recommended state for this setting is: Block

Attack surface reduction helps prevent actions and apps that are typically used by exploit-seeking malware to infect machines.

Solution

To establish the recommended configuration via configuration profiles, set the following Settings Catalog path to Block

Defender\Block Office applications from injecting code into other processes

Impact:

When a rule is triggered, a notification will be displayed from the Action Center.

Note: While Microsoft states that 'there are no known legitimate business purposes for using code injection', this ASR will trigger on legitimate processes so it is recommended to start in Audit mode before creating a list of exceptions and moving finally to Block

See Also

https://workbench.cisecurity.org/benchmarks/21719

Item Details

Category: SYSTEM AND INFORMATION INTEGRITY

References: 800-53|SI-16, CSCv7|8.3

Plugin: Windows

Control ID: ebd05c41b3a9a2a75224dd8a986501321a6343eb0bf72cead5e3076f0e33beed