Information
Attackers might attempt to use Office apps to migrate malicious code into other processes through code injection, so the code can masquerade as a clean process. There are no known legitimate business purposes for using code injection.
This rule applies to Word, Excel, OneNote, and PowerPoint.
The recommended state for this setting is: Block
Attack surface reduction helps prevent actions and apps that are typically used by exploit-seeking malware to infect machines.
Solution
To establish the recommended configuration via configuration profiles, set the following Settings Catalog path to Block
Defender\Block Office applications from injecting code into other processes
Impact:
When a rule is triggered, a notification will be displayed from the Action Center.
Note: While Microsoft states that 'there are no known legitimate business purposes for using code injection', this ASR will trigger on legitimate processes so it is recommended to start in Audit mode before creating a list of exceptions and moving finally to Block