Information
This rule prevents malware from abusing WMI to attain persistence on a device.
Note: If CcmExec.exe (SCCM Agent) is detected on the device, the ASR rule is classified as 'not applicable' in Defender for Endpoint settings in the Microsoft Defender portal.
The recommended state for this setting is: Block
Fileless threats employ various tactics to stay hidden, to avoid being seen in the file system, and to gain periodic execution control. Some threats can abuse the WMI repository and event model to stay hidden.
Solution
To establish the recommended configuration via configuration profiles, set the following Settings Catalog path to Block
Defender\Block persistence through WMI event subscription
Impact:
When a rule is triggered, a notification will be displayed from the Action Center.