Zustand für jede ASR-Regel festlegen: | |
MSSCT - Block executable content from email client and webmail | 1 |
BE9BA2D9-53EA-4CDC-84E5-9B1EEEE46550 | 1 |
MSSCT - Block all Office applications from creating child processes | 1 |
D4F940AB-401B-4EFC-AADC-AD5F3C50688A | 1 |
MSSCT - Block Office applications from creating executable content | 1 |
3B576869-A4EC-4529-8536-B80A7769E899 | 1 |
MSSCT - Block Office applications from injecting code into other processes | 1 |
75668C1F-73B5-4CF0-BB93-3ECF5CB7CC84 | 1 |
MSSCT - Block JavaScript or VBScript from launching downloaded executable content | 1 |
D3E037E1-3EB8-44C8-A917-57927947596D | 1 |
MSSCT - Block execution of potentially obfuscated scripts | 1 |
5BEB7EFE-FD9A-4556-801D-275E5FFC04CC | 1 |
MSSCT - Block Win32 API calls from Office macro | 1 |
92E97FA1-2EDF-4476-BDD6-9DD0B4DDDC7B | 1 |
Block executable files from running unless they meet a prevalence, age, or trusted list criterion | 1 |
01443614-cd74-433a-b99e-2ecdc07bfc25 | 1 |
MSSCT - Use advanced protection against ransomware | 1 |
c1db55ab-c21a-4637-bb3f-a12568109d35 | 1 |
Block credential stealing from the Windows local security authority subsystem (lsass.exe) | 1 |
9e6c4e1f-7d60-472f-ba1a-a39ef669e4b2 | 1 |
Block process creations originating from PSExec and WMI commands | 1 |
d1e49aac-8f56-4280-b9ba-993a6d77406c | 1 |
Block untrusted and unsigned processes that run from USB | 1 |
b2b3f03d-6a65-4f7b-a9c7-1c7ef74a9ba4 | 1 |
MSSCT - Block Office communication application from creating child processes | 1 |
26190899-1602-49e8-8b27-eb1d0a1ce869 | 1 |
MSSCT - Block Adobe Reader from creating child processes | 1 |
7674ba52-37eb-4a4f-a9a1-f0f9a1619a2c | 1 |
MSSCT - Block persistence through WMI event subscription | 1 |
e6db77e5-3df2-4cf1-b95a-636979351e5b | 1 |