Skip to content

I - Mission Critical Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000210

    <GroupDescription></GroupDescription>
    Group
  • Microsoft Defender AV must be configured block Office applications from creating child processes.

    &lt;VulnDiscussion&gt;Office apps, such as Word or Excel, will not be allowed to create child processes. This is a typical malware behavior, especi...
    Rule Medium Severity
  • SRG-APP-000210

    <GroupDescription></GroupDescription>
    Group
  • Microsoft Defender AV must be configured block Office applications from creating executable content.

    &lt;VulnDiscussion&gt;This rule targets typical behaviors used by suspicious and malicious add-ons and scripts (extensions) that create or launch e...
    Rule Medium Severity
  • SRG-APP-000210

    <GroupDescription></GroupDescription>
    Group
  • Microsoft Defender AV must be configured to block Office applications from injecting into other processes.

    &lt;VulnDiscussion&gt;Office apps, such as Word, Excel, or PowerPoint, will not be able to inject code into other processes. This is typically used...
    Rule Medium Severity
  • SRG-APP-000210

    <GroupDescription></GroupDescription>
    Group
  • Microsoft Defender AV must be configured to impede JavaScript and VBScript to launch executables.

    &lt;VulnDiscussion&gt;JavaScript and VBScript scripts can be used by malware to launch other malicious apps. This rule prevents these scripts from ...
    Rule Medium Severity
  • SRG-APP-000210

    <GroupDescription></GroupDescription>
    Group
  • Microsoft Defender AV must be configured to block execution of potentially obfuscated scripts.

    &lt;VulnDiscussion&gt;Malware and other threats can attempt to obfuscate or hide their malicious code in some script files. This rule prevents scri...
    Rule Medium Severity
  • SRG-APP-000210

    <GroupDescription></GroupDescription>
    Group
  • Microsoft Defender AV must be configured to block Win32 imports from macro code in Office.

    &lt;VulnDiscussion&gt;This rule blocks potentially malicious behavior by not allowing macro code to execute routines in the Win 32 dynamic link lib...
    Rule Medium Severity
  • SRG-APP-000210

    <GroupDescription></GroupDescription>
    Group
  • Microsoft Defender AV must be configured to prevent user and apps from accessing dangerous websites.

    &lt;VulnDiscussion&gt;Enable Microsoft Defender Exploit Guard network protection to prevent employees from using any application to access dangerou...
    Rule Medium Severity
  • SRG-APP-000207

    <GroupDescription></GroupDescription>
    Group
  • Microsoft Defender AV must be configured for automatic remediation action to be taken for threat alert level High.

    &lt;VulnDiscussion&gt;This policy setting allows the customization of which automatic remediation action will be taken for each threat alert level....
    Rule Medium Severity
  • SRG-APP-000207

    <GroupDescription></GroupDescription>
    Group
  • Microsoft Defender AV must be configured for automatic remediation action to be taken for threat alert level Medium.

    &lt;VulnDiscussion&gt;This policy setting allows the customization of which automatic remediation action will be taken for each threat alert level....
    Rule Medium Severity
  • SRG-APP-000207

    <GroupDescription></GroupDescription>
    Group
  • Microsoft Defender AV must be configured for automatic remediation action to be taken for threat alert level Low.

    &lt;VulnDiscussion&gt;This policy setting allows the customization of which automatic remediation action will be taken for each threat alert level....
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules