Just by reading their guide and noticing what parts their focus was on, I can say that in my personal opinion, those rules once implemented into the users configuration would end up as being beneficial for most.
Scripts are a very common deployment technique, and PowerShell is widely used by malware authors.
Although personally I would just completely block features like PowerShell from the first day you setup the environment - but this can be troublesome because an attacker can re-name things and come with its own copy, etc.