Rule: Block executable files from running unless they meet a prevalence, age, or trusted list criteria
This rule blocks the following file types from being run or launched unless they meet prevalence or age criteria set by admins, or they are in a trusted list or exclusion list:
- Executable files (such as .exe, .dll, or .scr)
I searched my damn hardest but I couldn't find how or where to set the "criteria set by admins"
Funnily enough, it turns out that ASR Exclusions only work on Windows 10 Enterprise (or Server), yet you can enable ASR on Windows 10 Pro
At least that's what I get from here:
Use Attack surface reduction rules to prevent malware infection , I haven't tested it but the Evaluate page says you can use ASR on Windows 10 Pro, so does the Enable page, however the Customize page says it only applies to Windows 10 Enterprise (or Server), while the Troubleshoot page says
If you've tested the rule with the demo tool and with audit mode, and ASR is working on pre-configured scenarios, but the rule is not working as expected, proceed to either of the following sections based on your situation:
- If the ASR rule is blocking something that it should not block (also known as a false positive), you can first add an ASR exclusion.
- If the ASR rule is not blocking something that it should block (also known as a false negative), you can proceed immediately to the last step, collecting diagnostic data and submitting the issue to us
However the demo tool only supports 7 rules, Block executable files from running unless they meet a prevalence, age, or trusted list criteria not being one of them, and it gives me unhandled exceptions anyway, you can find it on the Evaluate page
You can try to use Audit mode and see what this rule would block with a lot of testing. But then again, why do that when you can just use Windows Defender (or your preferred AV) + something like appguard / voodoo shield / nvt exe radar pro instead of troubling yourself with this stupid thing