top of page
Search

(47) WDAC - Microsoft Recommended Block Rules

  • Writer: Mr B SOE way
    Mr B SOE way
  • Mar 31, 2023
  • 1 min read

The following should be done:


2. In the "new query" section, enter in the following:


The "FileName" can be found in the "Microsoft recommended block rules", if it does get updated, just update the additional ".exe".


DeviceProcessEvents | where FileName in ('addinprocess.exe', 'addinprocess32.exe', 'addinutil.exe', 'aspnet_compiler.exe', 'bash.exe', 'bginfo.exe1', 'cdb.exe', 'cscript.exe', 'csi.exe', 'dbghost.exe', 'dbgsvc.exe', 'dnx.exe', 'dotnet.exe', 'fsi.exe', 'fsiAnyCpu.exe', 'infdefaultinstall.exe', 'kd.exe', 'kill.exe', 'lxssmanager.dll', 'lxrun.exe', 'Microsoft.Build.dll', 'Microsoft.Build.Framework.dll', 'Microsoft.Workflow.Compiler.exe', 'msbuild.exe2', 'msbuild.dll', 'mshta.exe', 'ntkd.exe', 'ntsd.exe', 'powershellcustomhost.exe', 'rcsi.exe', 'runscripthelper.exe', 'texttransform.exe', 'visualuiaverifynative.exe', 'system.management.automation.dll', 'webclnt.dll', 'davsvc.dll', 'wfc.exe', 'windbg.exe', 'wmic.exe', 'wscript.exe', 'wsl.exe', 'wslconfig.exe', 'wslhost.exe')


3. Select "Run Query"

ree













4. Which it will then provide the "Results"

5. To create this as a "Detection rule" after the query has been run and you see what it does.


ree

6. Fill in the details listed. Ensure that your "Device Groups" has been setup in https://security.microsoft.com/preferences2/machine_groups

ree

7. Once saved, your rule will look something like this.


ree





















8. It will then create alerts in Defender


ree

 
 
 

Comments


bottom of page