22.18 (L1) Ensure 'ASR: Block persistence through WMI event subscription' is set to 'Block'

Information

This rule prevents malware from abusing WMI to attain persistence on a device.

Note: If CcmExec.exe (SCCM Agent) is detected on the device, the ASR rule is classified as 'not applicable' in Defender for Endpoint settings in the Microsoft Defender portal.

The recommended state for this setting is: Block

Fileless threats employ various tactics to stay hidden, to avoid being seen in the file system, and to gain periodic execution control. Some threats can abuse the WMI repository and event model to stay hidden.

Solution

To establish the recommended configuration via configuration profiles, set the following Settings Catalog path to Block

Defender\Block persistence through WMI event subscription

Impact:

When a rule is triggered, a notification will be displayed from the Action Center.

See Also

https://workbench.cisecurity.org/benchmarks/21719

Item Details

Category: SYSTEM AND INFORMATION INTEGRITY

References: 800-53|SI-16, CSCv7|8.3

Plugin: Windows

Control ID: 9585faf4f0d53137cbdaf77b17b202b1c2646932931cc125484155d21c04f063