Attack Surface Reduction rules
GPTKB entity
Statements (110)
Predicate | Object |
---|---|
gptkbp:instanceOf |
gptkb:security
|
gptkbp:block |
credential theft
process injection malicious scripts JavaScript and VBScript launched from Office Win32 API calls from Office macros child processes from Office apps credential stealing executable content from email and web executable content from email and web downloads malicious DLLs malicious Office files malicious code in memory malicious use of Adobe Reader malicious use of LSASS malicious use of Office applications malicious use of PowerShell malicious use of WMI malicious use of access.exe malicious use of acrobat.exe malicious use of at.exe malicious use of audiodg.exe malicious use of bitsadmin.exe malicious use of calc.exe malicious use of certutil.exe malicious use of chrome.exe malicious use of cmd.exe malicious use of conhost.exe malicious use of cscript.exe malicious use of csrss.exe malicious use of dllhost.exe malicious use of dwm.exe malicious use of edge.exe malicious use of excel.exe malicious use of explorer.exe malicious use of firefox.exe malicious use of fontdrvhost.exe malicious use of foxitreader.exe malicious use of ftp.exe malicious use of iexplore.exe malicious use of installutil.exe malicious use of lsass.exe malicious use of mimikatz malicious use of msbuild.exe malicious use of mshta.exe malicious use of msiexec.exe malicious use of mspaint.exe malicious use of msxsl.exe malicious use of net.exe malicious use of net1.exe malicious use of notepad.exe malicious use of onenote.exe malicious use of opera.exe malicious use of outlook.exe malicious use of paint.exe malicious use of powerpnt.exe malicious use of powershell.exe malicious use of procdump.exe malicious use of psexec.exe malicious use of publisher.exe malicious use of reader.exe malicious use of reg.exe malicious use of regsvr32.exe malicious use of rundll32.exe malicious use of safari.exe malicious use of sc.exe malicious use of schtasks.exe malicious use of scripting engines malicious use of sdbinst.exe malicious use of services.exe malicious use of smss.exe malicious use of snippingtool.exe malicious use of spoolsv.exe malicious use of sumatrapdf.exe malicious use of svchost.exe malicious use of system tools malicious use of taskhostw.exe malicious use of taskmgr.exe malicious use of telnet.exe malicious use of tftp.exe malicious use of visio.exe malicious use of web browsers malicious use of wininit.exe malicious use of winlogon.exe malicious use of winword.exe malicious use of wmic.exe malicious use of wmiprvse.exe malicious use of wordpad.exe malicious use of wscript.exe network protection bypass obfuscated scripts processes created by Office apps untrusted USB and removable drives untrusted fonts untrusted processes |
gptkbp:canBe |
gptkb:PowerShell
gptkb:Intune gptkb:Group_Policy gptkb:Microsoft_Endpoint_Manager |
gptkbp:developedBy |
gptkb:Microsoft
|
https://www.w3.org/2000/01/rdf-schema#label |
Attack Surface Reduction rules
|
gptkbp:introducedIn |
gptkb:Windows_10
gptkb:Windows_Server_2019 |
gptkbp:partOf |
Microsoft Defender Exploit Guard
|
gptkbp:purpose |
reduce attack surface
block known threats prevent malware execution |
gptkbp:requires |
gptkb:Microsoft_Defender_Antivirus
|
gptkbp:bfsParent |
gptkb:Windows_Defender_Exploit_Protection
|
gptkbp:bfsLayer |
8
|