Skip to content

Files

Latest commit

6d07ef8 · Jan 30, 2025

History

History
20 lines (20 loc) · 1.77 KB
·

asr_rules.csv

File metadata and controls

20 lines (20 loc) · 1.77 KB
·
1
IDASR_Rule
2
56A863A9-875E-4185-98A7-B882C64B5CE5Block abuse of exploited vulnerable signed drivers
3
7674BA52-37EB-4A4F-A9A1-F0F9A1619A2CBlock Adobe Reader from creating child processes
4
D4F940AB-401B-4EFC-AADC-AD5F3C50688ABlock all Office applications from creating child processes
5
9E6C4E1F-7D60-472F-BA1A-A39EF669E4B2Block credential stealing from the Windows local security authority subsystem (lsass.exe)
6
BE9BA2D9-53EA-4CDC-84E5-9B1EEEE46550Block executable content from email client and webmail
7
01443614-CD74-433A-B99E-2ECDC07BFC25Block executable files from running unless they meet a prevalence - age - or trusted list criterion
8
5BEB7EFE-FD9A-4556-801D-275E5FFC04CCBlock execution of potentially obfuscated scripts
9
D3E037E1-3EB8-44C8-A917-57927947596DBlock JavaScript or VBScript from launching downloaded executable content
10
3B576869-A4EC-4529-8536-B80A7769E899Block Office applications from creating executable content
11
75668C1F-73B5-4CF0-BB93-3ECF5CB7CC84Block Office applications from injecting code into other processes
12
26190899-1602-49E8-8B27-EB1D0A1CE869Block Office communication application from creating child processes
13
E6DB77E5-3DF2-4CF1-B95A-636979351E5BBlock persistence through WMI event subscription
14
D1E49AAC-8F56-4280-B9BA-993A6D77406CBlock process creations originating from PSExec and WMI commands
15
33DDEDF1-C6E0-47CB-833E-DE6133960387Block rebooting machine in Safe Mode
16
B2B3F03D-6A65-4F7B-A9C7-1C7EF74A9BA4Block untrusted and unsigned processes that run from USB
17
C0033C00-D16D-4114-A5A0-DC9B3A7D2CEBBlock use of copied or impersonated system tools
18
92E97FA1-2EDF-4476-BDD6-9DD0B4DDDC7BBlock Win32 API calls from Office macros
19
C1DB55AB-C21A-4637-BB3F-A12568109D35Use advanced protection against ransomware
20
A8F5898E-1DC8-49A9-9878-85004B8A61E6Block Webshell creation for Servers