πŸ›‘οΈ Essential 8 Guide

Implementation guidance for Australian Essential Eight controls in Microsoft environments - ISM controls with PSPF mappings

About
HOME ← ISM-1669
ISM-1671 β†’

PDF applications are blocked from creating child processes.

Property Value
ISM Control ISM-1670
Revision 1
Updated Jun-25
Guideline Not provided
Section User application hardening
Topic Hardening user application configurations
Essential Eight ML2, ML3
PSPF Levels NC, OS, P, S, TS

Summary

The control enables the Block Adobe Reader from creating child processes ASR rule (GUID 7674ba52-37eb-4a4f-a9a1-f0f9a1619a2c) via Intune, reducing the risk of PDF-based malware execution1. This mitigates living-off-the-land techniques that rely on spawning child processes from PDF content2.

[!NOTE] This ASR rule applies only to Adobe Reader (AcroRd32.exe). It does not cover other PDF viewers such as Foxit Reader, Nitro, or browser-based PDF rendering. Organisations using non-Adobe PDF readers should implement equivalent controls via AppLocker or WDAC.

Justification

Design Decision

[!NOTE] The Block Adobe Reader from creating child processes ASR rule will be enabled via Intune to block Adobe Reader from creating child processes. It will be applied through the Attack Surface Reduction policy profile in Endpoint Security to enforce this setting.

Prerequisites

Licensing

Permissions/Roles

Dependencies

Implementation Steps

Enable ASR Rule to Block Adobe Reader from Creating Child Processes

[!NOTE] Start in Audit mode before enforcing Block mode. Some enterprise PDF workflows (e.g., Adobe Sign integrations) may spawn child processes legitimately.

  1. In Intune, navigate to Endpoint Security > Attack Surface Reduction.2
  2. Create (or modify) an Attack Surface Reduction Endpoint Security Policy: Platform: Windows 10 and later.2
  3. Set Block Adobe Reader from creating child processes to Audit first, then Block after validation.2
  4. Assign the Attack Surface Reduction Endpoint Security Policy to the target device group.2

Option B β€” Custom OMA-URI

Field Value
OMA-URI ./Device/Vendor/MSFT/Defender/AttackSurfaceReductionRules/7674ba52-37eb-4a4f-a9a1-f0f9a1619a2c
Data type Integer
Value 2 (Audit) β†’ 1 (Block)

Create a Device configuration β†’ Custom profile, add the OMA-URI row, and assign it to target groups.

Verify and monitor

Event ID Mode Description
1121 Block Child process creation by Adobe Reader was blocked
1122 Audit Child process creation would have been blocked (audit mode)
5007 N/A ASR rule configuration changed

Events appear in Applications and Services Logs β†’ Microsoft β†’ Windows β†’ Windows Defender β†’ Operational.

In Microsoft Defender for Endpoint, use Advanced Hunting:

DeviceEvents
| where ActionType in ("AsrAdobeReaderChildProcessAudited", "AsrAdobeReaderChildProcessBlocked")
| project Timestamp, DeviceName, InitiatingProcessFileName, FileName, ActionType
HOME ← ISM-1669
ISM-1671 β†’