WNDF-AV-000033 - Windows Defender AV must be configured block Office applications from creating child processes.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Office apps, such as Word or Excel, will not be allowed to create child processes.
This is a typical malware behavior, especially for macro-based attacks that attempt to use Office apps to launch or download malicious executables.

Solution

Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Windows Defender Antivirus -> Windows Defender Exploit Guard -> Attack Surface Reduction -> 'Configure Attack Surface Reduction rules' to 'Enabled'. Click 'Show...'. Set the Value name to 'D4F940AB-401B-4EFC-AADC-AD5F3C50688A' and the Value to '1'.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_MS_Windows_Defender_Antivirus_V2R3_STIG.zip

Item Details

Category: SYSTEM AND INFORMATION INTEGRITY

References: 800-53|SI-3, CAT|II, CCI|CCI-001170, Rule-ID|SV-213457r569189_rule, STIG-ID|WNDF-AV-000033, STIG-Legacy|SV-92663, STIG-Legacy|V-77967, Vuln-ID|V-213457

Plugin: Windows

Control ID: 73e8a823395f601fbd8066defb212ad46ab585044afa5b0291c0c1a7c445540b