Information
This rule prevents the Windows scripting host from running VBScript and JavaScript scripts from the Temp directory. This would protect against a large number of trojans and questionable web installation mechanisms that are used by many adware and spyware applications.
NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.
Solution
From the ePO server console System Tree, select the Systems tab, select the asset to be checked, select Actions, select Agent, and select Modify Policies on a Single System. From the product pull down list, select VirusScan Enterprise 8.8.0. Select the policy associated with the Access Protection Policies.
Under the Access Protection tab, locate the 'Access protection rules:' label. In the 'Categories' box, select 'Anti-Spyware Maximum Protection'.
Select the 'Prevent execution of scripts from the Temp folder' (Block and Report) option.
Select Save.