Implementation guidance for Australian Essential Eight controls in Microsoft environments - ISM controls with PSPF mappings
| Property | Value |
|---|---|
| ISM Control | ISM-1670 |
| Revision | 1 |
| Updated | Jun-25 |
| Guideline | Not provided |
| Section | User application hardening |
| Topic | Hardening user application configurations |
| Essential Eight | ML2, ML3 |
| PSPF Levels | NC, OS, P, S, TS |
The control enables the Block Adobe Reader from creating child processes ASR rule (GUID 7674ba52-37eb-4a4f-a9a1-f0f9a1619a2c) via Intune, reducing the risk of PDF-based malware execution1. This mitigates living-off-the-land techniques that rely on spawning child processes from PDF content2.
[!NOTE] This ASR rule applies only to Adobe Reader (
AcroRd32.exe). It does not cover other PDF viewers such as Foxit Reader, Nitro, or browser-based PDF rendering. Organisations using non-Adobe PDF readers should implement equivalent controls via AppLocker or WDAC.
CVE-2016-3319: PDF Remote Code Execution vulnerability. Blocking Adobe Reader from creating child processes mitigates exploitation by preventing the spawning of child processes from PDFs.3
Block Adobe Reader from creating child processes: The ASR rule in Intune blocks Adobe Reader from creating child processes, reducing the potential for malicious PDFs to trigger code execution.1
[!NOTE] The Block Adobe Reader from creating child processes ASR rule will be enabled via Intune to block Adobe Reader from creating child processes. It will be applied through the Attack Surface Reduction policy profile in Endpoint Security to enforce this setting.
[!NOTE] Start in Audit mode before enforcing Block mode. Some enterprise PDF workflows (e.g., Adobe Sign integrations) may spawn child processes legitimately.
| Field | Value |
|---|---|
| OMA-URI | ./Device/Vendor/MSFT/Defender/AttackSurfaceReductionRules/7674ba52-37eb-4a4f-a9a1-f0f9a1619a2c |
| Data type | Integer |
| Value | 2 (Audit) β 1 (Block) |
Create a Device configuration β Custom profile, add the OMA-URI row, and assign it to target groups.
| Event ID | Mode | Description |
|---|---|---|
| 1121 | Block | Child process creation by Adobe Reader was blocked |
| 1122 | Audit | Child process creation would have been blocked (audit mode) |
| 5007 | N/A | ASR rule configuration changed |
Events appear in Applications and Services Logs β Microsoft β Windows β Windows Defender β Operational.
In Microsoft Defender for Endpoint, use Advanced Hunting:
DeviceEvents
| where ActionType in ("AsrAdobeReaderChildProcessAudited", "AsrAdobeReaderChildProcessBlocked")
| project Timestamp, DeviceName, InitiatingProcessFileName, FileName, ActionType
Exploit protection guidelines on blocking child processes help mitigate living-off-the-land techniques Donβt allow child processes - Exploit protection
Windows protected print mode information highlights binary mitigations including a child process creation control More information on Windows protected print mode for enterprises and developers
AppLocker DDF file documents the AppLocker configuration service provider for managing executable launch restrictions AppLocker DDF file
ASD Blueprint for User application hardening describes ASD-guided controls for hardening user applications and macros ASD Blueprint: User application hardening