πŸ›‘οΈ Essential 8 Guide

Implementation guidance for Australian Essential Eight controls in Microsoft environments - ISM controls with PSPF mappings

About
HOME ← ISM-1668
ISM-1670 β†’

Microsoft Office is blocked from injecting code into other processes.

Property Value
ISM Control ISM-1669
Revision 0
Updated Sep-21
Guideline Not provided
Section User application hardening
Topic Hardening user application configurations
Essential Eight ML2, ML3
PSPF Levels NC, OS, P, S, TS

Summary

The control blocks Office applications from injecting code into other processes (ASR rule GUID 75668C1F-73B5-4CF0-BB93-3ECF5CB7CC84) to mitigate code-injection risks from Office components. This is implemented by enabling the ASR rule via Intune to block Office apps from injecting code into other processes. 12

Justification

Code injection is a core technique in Office-based malware campaigns. A malicious macro or document can use VBA’s CreateObject, CallWindowProc, or Dynamic Data Exchange (DDE) fields to:

Blocking this at the Win32 API interception layer (ASR) prevents privilege escalation and lateral movement even when the macro itself gets past initial execution controls. This rule is complementary to ISM-1668 (blocking executable content creation) and ISM-1673 (blocking Win32 API calls from macros).

Design Decision

[!NOTE] The Block Office applications from injecting code into other processes ASR rule will be implemented via Intune and deployed as an Endpoint security Attack Surface Reduction policy to block Office apps from injecting code into other processes. It will block code injection by Office apps across managed devices.

Prerequisites

Licensing

Permissions/Roles

Dependencies

Implementation Steps

Enable ASR rule to block Office apps from injecting code into other processes via Intune

[!NOTE] The Block Office applications from injecting code into other processes rule (GUID 75668C1F-73B5-4CF0-BB93-3ECF5CB7CC84) is off by default. It must be explicitly enabled in Block or Audit mode. Start in Audit mode to identify any legitimate processes that inject code before enforcing Block mode.

  1. Open the Microsoft Intune console and navigate to Endpoint Security > Attack surface reduction. 2
  2. Create a new policy: Platform: Windows 10 and later, Profile type: Attack surface reduction rules. 2
  3. In Configuration settings, set Block Office applications from injecting code into other processes to Audit initially, then Block after validation. 3
  4. Optionally add exclusions under Exclude files and paths from Attack surface reduction rules for any line-of-business add-ins that legitimately inject into other processes. 3
  5. Assign the profile to the target device group and save. 2
  6. Restart Microsoft 365 Apps for the rule to take effect. 3

Option B β€” Custom OMA-URI

Field Value
OMA-URI ./Device/Vendor/MSFT/Defender/AttackSurfaceReductionRules/75668C1F-73B5-4CF0-BB93-3ECF5CB7CC84
Data type Integer
Value 2 (Audit) β†’ 1 (Block)

Create a Device configuration β†’ Custom profile, add the OMA-URI row above, and assign to target groups.

Verify and monitor

Event ID Mode Description
1121 Block Code injection attempt from Office was blocked
1122 Audit Code injection attempt would have been blocked (audit mode)
5007 N/A ASR rule configuration changed

Events appear in Applications and Services Logs β†’ Microsoft β†’ Windows β†’ Windows Defender β†’ Operational.

In Microsoft Defender for Endpoint, use Advanced Hunting:

DeviceEvents
| where ActionType startswith "AsrOfficeProcessInjection"
| project Timestamp, DeviceName, InitiatingProcessFileName, FileName, ActionType
HOME ← ISM-1668
ISM-1670 β†’