22.11 (L1) Ensure 'ASR: Block executable content from email client and webmail' is set to 'Block'

Information

This rule blocks email opened within the Microsoft Outlook application, or Outlook.com and other popular webmail providers from propagating the following file types:

- Executable files (such as .exe, .dll, or .scr)
- Script files (such as a PowerShell .ps1, Visual Basic .vbs, or JavaScript .js file)

The recommended state for this setting is: Block

Attack surface reduction helps prevent actions and apps that are typically used by exploit-seeking malware to infect machines.

Solution

To establish the recommended configuration via configuration profiles, set the following Settings Catalog path to Block

Defender\Block executable content from email client and webmail

Impact:

When a rule is triggered, a notification will be displayed from the Action Center.

See Also

https://workbench.cisecurity.org/benchmarks/21719

Item Details

Category: SYSTEM AND INFORMATION INTEGRITY

References: 800-53|SI-16, CSCv7|8.3

Plugin: Windows

Control ID: 8dee99bec0b7ea52ccefefc0579d3fcab49e49d4309b32186e6873fb79144a37