Implementation guidance for Australian Essential Eight controls in Microsoft environments - ISM controls with PSPF mappings
| Property | Value |
|---|---|
| ISM Control | ISM-1669 |
| Revision | 0 |
| Updated | Sep-21 |
| Guideline | Not provided |
| Section | User application hardening |
| Topic | Hardening user application configurations |
| Essential Eight | ML2, ML3 |
| PSPF Levels | NC, OS, P, S, TS |
The control blocks Office applications from injecting code into other processes (ASR rule GUID 75668C1F-73B5-4CF0-BB93-3ECF5CB7CC84) to mitigate code-injection risks from Office components. This is implemented by enabling the ASR rule via Intune to block Office apps from injecting code into other processes. 12
Code injection is a core technique in Office-based malware campaigns. A malicious macro or document can use VBAβs CreateObject, CallWindowProc, or Dynamic Data Exchange (DDE) fields to:
svchost.exe or explorer.exe, overwrite its memory with shellcode, then resume it under the legitimate process identity.Blocking this at the Win32 API interception layer (ASR) prevents privilege escalation and lateral movement even when the macro itself gets past initial execution controls. This rule is complementary to ISM-1668 (blocking executable content creation) and ISM-1673 (blocking Win32 API calls from macros).
[!NOTE] The Block Office applications from injecting code into other processes ASR rule will be implemented via Intune and deployed as an Endpoint security Attack Surface Reduction policy to block Office apps from injecting code into other processes. It will block code injection by Office apps across managed devices.
[!NOTE] The Block Office applications from injecting code into other processes rule (GUID
75668C1F-73B5-4CF0-BB93-3ECF5CB7CC84) is off by default. It must be explicitly enabled in Block or Audit mode. Start in Audit mode to identify any legitimate processes that inject code before enforcing Block mode.
| Field | Value |
|---|---|
| OMA-URI | ./Device/Vendor/MSFT/Defender/AttackSurfaceReductionRules/75668C1F-73B5-4CF0-BB93-3ECF5CB7CC84 |
| Data type | Integer |
| Value | 2 (Audit) β 1 (Block) |
Create a Device configuration β Custom profile, add the OMA-URI row above, and assign to target groups.
| Event ID | Mode | Description |
|---|---|---|
| 1121 | Block | Code injection attempt from Office was blocked |
| 1122 | Audit | Code injection attempt would have been blocked (audit mode) |
| 5007 | N/A | ASR rule configuration changed |
Events appear in Applications and Services Logs β Microsoft β Windows β Windows Defender β Operational.
In Microsoft Defender for Endpoint, use Advanced Hunting:
DeviceEvents
| where ActionType startswith "AsrOfficeProcessInjection"
| project Timestamp, DeviceName, InitiatingProcessFileName, FileName, ActionType
ASD Blueprint for Microsoft Office hardening provides design guidance for Attack Surface Reduction and Office hardening in cloud-managed deployments ASD Blueprint: Microsoft Office hardening
Microsoft Defender for Endpoint security baseline settings reference for Intune explains how ASR rules merge across profiles and baselines during device policy deployment Microsoft Defender for Endpoint security baseline settings reference for Intune
Securely opening Microsoft Office documents that contain Dynamic Data Exchange (DDE) fields details how ASR can block DDE-based malware in Office documents Securely opening Microsoft Office documents that contain Dynamic Data Exchange (DDE) fields
Attack surface reduction rules reference provides in-depth descriptions of ASR rules including the Office injection code rule Attack surface reduction rules reference