🛡️ Essential 8 Guide

Implementation guidance for Australian Essential Eight controls in Microsoft environments - ISM controls with PSPF mappings

About
HOME ← ISM-1667
ISM-1669 →

Microsoft Office is blocked from creating executable content.

Property Value
ISM Control ISM-1668
Revision 0
Updated Sep-21
Guideline Not provided
Section User application hardening
Topic Hardening user application configurations
Essential Eight ML2, ML3
PSPF Levels NC, OS, P, S, TS

Summary

Block Office applications from creating executable content by enabling the ASR rule for Office apps/macros via Intune, reducing the risk of Office macros or documents delivering executable payloads.12

The specific ASR rule is Block Office applications from creating executable content (GUID: 3B576869-A4EC-4529-8536-B80A7769E899). This rule prevents Word, Excel, PowerPoint, and other Office applications from writing executable files (.exe, .dll, .scr, .ps1, .js, .vbs) to disk. It complements ISM-1667 (Block Office from creating child processes), which acts at a later stage by blocking process execution.

Justification

Not provided in source documentation.

Design Decision

[!NOTE] The policy Block Office applications from creating executable content will be deployed via Intune Attack Surface Reduction rules. Office apps from creating executable content will be blocked.

Prerequisites

Implementation Steps

Enable ASR rule to block Office apps from creating executable content via Intune

  1. In the Intune ASR policy, locate the setting Block Office applications from creating executable content (Office apps/macros creating executable content).1
  2. Set the value to Block.2
  3. For direct OMA-URI deployment, use:
    • OMA-URI: ./Vendor/MSFT/Policy/Config/Defender/AttackSurfaceReductionRules
    • Data type: String
    • Value (audit mode): 3B576869-A4EC-4529-8536-B80A7769E899=2
    • Change =2 to =1 to switch to Block mode after audit validation.
  4. Monitor audit events: Event ID 1122 (audit) and 1121 (block) in Microsoft-Windows-Windows Defender/Operational. In Microsoft 365 Defender Advanced Hunting, filter on ActionType = AsrOfficeExecutableContentAudited or AsrOfficeExecutableContentBlocked.
  5. Validate by testing the ASR policy in audit mode before enforcement to ensure compatibility in your environment.5

[!NOTE] ASR rules should be tested for compatibility issues in any environment before enforcement.5

HOME ← ISM-1667
ISM-1669 →