Microsoft Defender AV must block process creations originating from PSExec and WMI commands.
Severity | Group ID | Group Title | Version | Rule ID | Date | STIG Version |
|---|---|---|---|---|---|---|
| medium | V-278651 | SRG-APP-000210 | WNDF-AV-000047 | SV-278651r1144039_rule | 2025-11-25 | 2 |
| Description |
|---|
| This policy setting blocks processes created through PsExec and WMI from running. Both PsExec and WMI can remotely execute code. There is a risk of malware abusing functionality of PsExec and WMI for command and control purposes, or to spread an infection throughout an organization's network. |
| ℹ️ Check |
|---|
| Verify the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Microsoft Defender Exploit Guard >> Attack Surface Reduction >> Configure Attack Surface Reduction rules is set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows Defender\Windows Defender Exploit Guard\ASR\Rules Criteria: If the value "d1e49aac-8f56-4280-b9ba-993a6d77406c" is REG_SZ = 2, this is not a finding. If the value is other than 2, this is a finding. |
| ✔️ Fix |
|---|
| Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Microsoft Defender Exploit Guard >> Attack Surface Reduction >> Configure Attack Surface Reduction rules to "Enabled". Under the policy option "Set the state for each ASR rule:", then click "Show". Enter GUID "d1e49aac-8f56-4280-b9ba-993a6d77406c" in the "Value Name" column. Enter "2" in the "Value" column. Click "OK". Click "Apply". |