Implementation guidance for Australian Essential Eight controls in Microsoft environments - ISM controls with PSPF mappings
| Property | Value |
|---|---|
| ISM Control | ISM-1667 |
| Revision | 0 |
| Updated | Sep-21 |
| Guideline | Not provided |
| Section | User application hardening |
| Topic | Hardening user application configurations |
| Essential Eight | ML2, ML3 |
| PSPF Levels | NC, OS, P, S, TS |
This control blocks all Office applications from creating child processes, reducing the attack surface by preventing Office from spawning subprocesses that could be abused for code execution or malware propagation12. Implementation is achieved by importing the ASR policy for Office child process blocking into Intune, as documented in the ACSC Windows Hardening Guidelines1.
The specific ASR rule is Block all Office applications from creating child processes (GUID: D4F940AB-401B-4EFC-AADC-AD5F3C50688A). This rule blocks any child process spawned by Word, Excel, PowerPoint, OneNote, Access, or other Office applications — including PowerShell, cmd, and any external executable launched from an Office document. It complements ISM-1668 (Block Office from creating executable content), which acts at an earlier stage by preventing payload files being written to disk.
[!NOTE] Enable both ISM-1667 (child process) and ISM-1668 (executable content) rules for defence-in-depth: the executable content rule blocks payload creation; the child process rule blocks post-creation execution.
Not provided in source documentation.
[!NOTE] The Block all Office applications from creating child processes ASR rule will be enabled via Intune configuration profiles. This will block Office applications from creating child processes.
Licensing: Microsoft Intune Plan 1 licensing for target devices (typically in Microsoft 365 E3+)1
./Vendor/MSFT/Policy/Config/Defender/AttackSurfaceReductionRulesD4F940AB-401B-4EFC-AADC-AD5F3C50688A=2=2 to =1 to switch to Block mode after audit validation.Microsoft-Windows-Windows Defender/Operational. In Microsoft 365 Defender Advanced Hunting, filter on ActionType = AsrOfficeChildProcessAudited or AsrOfficeChildProcessBlocked.[!NOTE] This implementation imports the ASR policy in audit mode to validate compatibility before enforcement.1