22.19 (L1) Ensure 'ASR: Block process creations originating from PSExec and WMI commands' is set to 'Audit' or higher

Information

This rule blocks processes created through PsExec and WMI from running. Both PsExec and WMI can remotely execute code.

The recommended state for this setting is: Audit Configuring this setting to Block also conforms to the benchmark.

There's a risk of malware abusing functionality of PsExec and WMI for command and control purposes, or to spread an infection throughout an organization's network.

Solution

To establish the recommended configuration via configuration profiles, set the following Settings Catalog path to Audit or Block

Defender\Block process creations originating from PSExec and WMI commands

Impact:

Warning: Only use this rule if you're managing your devices with Intune or another MDM solution. This rule is incompatible with management through Microsoft Endpoint Configuration Manager because this rule blocks WMI commands the Configuration Manager client uses to function correctly.

It is recommended to start with Audit mode and move to Block.

See Also

https://workbench.cisecurity.org/benchmarks/21719

Item Details

Category: SYSTEM AND INFORMATION INTEGRITY

References: 800-53|SI-16, CSCv7|8.3

Plugin: Windows

Control ID: 364c45cdc1762663efb0425a1bd16c5a6236de5ab5ee2dd3d627ec37656e1bdd