Close Menu
  • Home
  • Features
  • Microsoft 365
    • Word
    • Excel
    • Power point
    • Teams
    • Sharepoint
    • One Drive
    • outlook
    • Copilot
  • M365pros_security
    • Defender for M365
    • Defender for Endpoint
  • Intune Zone
  • Windows Server
What's Hot

Deploy the LOLBINS (Living Off The Land Binary Attacks) prevention-focused ASR rules via custom configuration profile (OMA-URI) in Intune

March 27, 2026

Elevating CEH: Transforming a Single Curriculum into Beginner, Intermediate, Advanced, and Expert-Level Cybersecurity Training

March 27, 2026

The Intune Device Lifecycle: From Onboarding to Retirement (Best Practices)

July 3, 2025
Facebook Instagram
  • Download Free Chicklist
Facebook LinkedIn YouTube
Blog.m365pros.comBlog.m365pros.com
  • Home
  • Features
  • Microsoft 365
    • Word
    • Excel
    • Power point
    • Teams
    • Sharepoint
    • One Drive
    • outlook
    • Copilot
  • M365pros_security
    • Defender for M365
    • Defender for Endpoint
  • Intune Zone
  • Windows Server
Blog.m365pros.comBlog.m365pros.com
Home»administrative assistant»Deploy the LOLBINS (Living Off The Land Binary Attacks) prevention-focused ASR rules via custom configuration profile (OMA-URI) in Intune
administrative assistant

Deploy the LOLBINS (Living Off The Land Binary Attacks) prevention-focused ASR rules via custom configuration profile (OMA-URI) in Intune

SachinJung KarkiBy SachinJung KarkiMarch 27, 2026Updated:March 27, 2026No Comments4 Mins Read
Share Facebook LinkedIn Email Copy Link
Deploy the LOLBINS (Living Off The Land Binary Attacks) prevention-focused ASR rules via custom configuration profile (OMA-URI) in Intune
Deploy the LOLBINS (Living Off The Land Binary Attacks) prevention-focused ASR rules via custom configuration profile (OMA-URI) in Intune
Share
Facebook LinkedIn Email Copy Link

Deploy the Stop LOLBINS (Living Off The Land Binary Attacks) prevention-focused ASR rules via custom configuration profile (OMA-URI) in Intune

Creating Attack Surface Reduction (ASR) rules via Microsoft Intune is an effective way to protect against LOLBins (Living Off the Land Binaries), which are legitimate tools (like powershell.exe, rundll32.exe, etc.) abused by threat actors for lateral movement, privilege escalation, and persistence.

Overview: What We Will Do

  1. Understand which ASR rules help mitigate LOLBins.
  2. Create a custom ASR policy in Intune.
  3. Assign the policy to security groups (all devices or specific ones).
  4. Monitor and validate enforcement.
  5. (Optional) Start with audit mode before blocking.

1. Relevant ASR Rules to Block LOLBins

Microsoft recommends these ASR rules to mitigate LOLBin-based attacks:

Block executable content from email and webmail

D3E037E1-3EB8-44C8-A917-57927947596D

Use advanced protection against ransomware

C1DB55AB-C21A-4637-BB3F-A12568109D35

Block credential stealing from LSASS

9E6B8B8A-A4A3-4C36-89B4-1C2C6E7BD7D1

Block Office apps from creating child processes

D4F940AB-401B-4EFC-AADC-AD5F3C50688A

Block Office apps from injecting code into other processes

75668C1F-73B5-4CF0-BB93-3ECF5CB7CC84

Block process creations from PSExec and WMI commands

D1E49AAC-8F56-4280-B9BA-993A6D77406C

Block JavaScript/WSH scripts from launching downloaded executable content

5BEB7EFE-FD9A-4556-801D-275E5FFC04CC

Configure ASR Rules

  • Name: ASR – LOLBin Protection Policy
  • Description: Blocks common LOLBin attack vectors via ASR rules

Click Next and in Configuration settings:

Enable the following rules:

ASR Rule and Action

Block executable content from email and webmail

Block Use advanced protection against ransomware-

Block credential stealing from LSASS

Block Office apps from creating child processes

Block Office apps from injecting code into other processes

Block process creations from PSExec and WMI commands

Block JavaScript/WSH scripts from launching downloaded content

Note: If testing, set Audit instead of Block first, then monitor via Microsoft Defender logs.

Assign to Device Groups

  • Click Next to Assignments
  • Assign to: A dynamic device group (e.g., All Windows 10 Devices) Or use phased deployment to a test group first

Click Next → Review + Create → Create

Enable Microsoft Defender Antivirus (Prerequisite)

ASR rules require Microsoft Defender Antivirus (MDAV) to be running in Active mode.

If using a third-party AV, configure MDAV in Passive mode, but some ASR rules may not fully function.

You can create a Defender Antivirus policy in Intune:

  • Endpoint Security → Antivirus → Windows 10 and later
  • Enable Real-time protection
  • Ensure Cloud-delivered protection is On
  • Set Automatic sample submission to Send safe samples automatically

Monitoring and Reporting

You can monitor ASR events in:

  • Microsoft Defender Security Center: Go to Reports → Attack Surface Reduction Use Advanced Hunting (Query example below)
  • Windows Event Viewer: Path: Applications and Services Logs > Microsoft > Windows > Windows Defender > Operational

DeviceEvents

| where ActionType startswith “Asr”

| summarize count() by ActionType, DeviceName

Summary: Deployment Workflow

Step 1: Identify ASR rules for LOLBins

Step 2: Create ASR policy in Intune

Step 3: Assign to device/security groups

Step 4: Monitor logs and user feedback

Step 5: Tune rules, switch from audit to blockHow to Deploy via Intune (OMA-URI Method)

  1. Go to Intune Admin Center: https://intune.microsoft.com
  2. Navigate to Devices > Configuration profiles > Create profile
Article content
  1. Choose: Platform: Windows 10 and later Profile type: Templates → Custom
Article content
  1. Click Create and enter: Name: ASR – LOLBIN Protection JSON Description: Deploy ASR rules to prevent Living Off the Land attacks
Article content
  1. Under OMA-URI Settings, click Add:
Article content
  1. Name: Attack Surface Reduction Rules
  2. Description: JSON definition for ASR rules
  3. OMA-URI:

./Device/Vendor/MSFT/Policy/Config/Defender/AttackSurfaceReductionRules

Data type: String

  • Value:

[

{

“Id”: “D3E037E1-3EB8-44C8-A917-57927947596D”,

“Action”: “1”

},

{

“Id”: “C1DB55AB-C21A-4637-BB3F-A12568109D35”,

“Action”: “1”

},

{

“Id”: “9E6B8B8A-A4A3-4C36-89B4-1C2C6E7BD7D1”,

“Action”: “1”

},

{

“Id”: “D4F940AB-401B-4EFC-AADC-AD5F3C50688A”,

“Action”: “1”

},

{

“Id”: “75668C1F-73B5-4CF0-BB93-3ECF5CB7CC84”,

“Action”: “1”

},

{

“Id”: “D1E49AAC-8F56-4280-B9BA-993A6D77406C”,

“Action”: “1”

},

{

“Id”: “5BEB7EFE-FD9A-4556-801D-275E5FFC04CC”,

“Action”: “1”

}

]

Article content
Article content

6.       Assign the profile to your test or production device group(s)- Add required device group or click Add all devices

Article content

7.       Click Next > Review + Create > Create

Article content

Now the policy is enforced to block all LOLBINS (Living Off The Land Binary Attacks).

This policy prevents from risky LOLBINS attack but the requirements are devices must be enrolled into Microsoft Intune, Defender for Endpoint must be enabled and Microsoft Intune along with Microsoft Defender integration must be configured correctly. Lastly Microsoft Defender must be enabled on all devices (If require implement tamper protection to prevent users from disabling Defender).

I hope this will help you and if it does, give us like and comment. Also don’t forget to share.

gadgets latestpost technology
Previous ArticleElevating CEH: Transforming a Single Curriculum into Beginner, Intermediate, Advanced, and Expert-Level Cybersecurity Training
SachinJung Karki
  • Website

Related Posts

Defender for Endpoint

Elevating CEH: Transforming a Single Curriculum into Beginner, Intermediate, Advanced, and Expert-Level Cybersecurity Training

March 27, 2026
administrative assistant

The Intune Device Lifecycle: From Onboarding to Retirement (Best Practices)

July 3, 2025
administrative assistant

Proactive Monitoring in Intune: What You Can (and Should) Be Using Right Now

July 3, 2025
Add A Comment

Leave A Reply Cancel Reply

Recent Posts

  • Deploy the LOLBINS (Living Off The Land Binary Attacks) prevention-focused ASR rules via custom configuration profile (OMA-URI) in Intune
  • Elevating CEH: Transforming a Single Curriculum into Beginner, Intermediate, Advanced, and Expert-Level Cybersecurity Training
  • The Intune Device Lifecycle: From Onboarding to Retirement (Best Practices)
  • Proactive Monitoring in Intune: What You Can (and Should) Be Using Right Now
  • How to Use Proactive Remediations in Intune

Recent Comments

  1. Blog.m365pros.com on Ways to Share Files with People at Work Using Microsoft 365
  2. Blog.m365pros.com on How to Use M365 Copilot to Summarize a Word Document
  3. Blog.m365pros.com on How to Buy New Licenses in Microsoft 365 for Business
  4. Blog.m365pros.com on Adding Multiple Users in Microsoft 365
  5. Blog.m365pros.com on Ways to Share Files with People at Work Using Microsoft 365
zencere.com
zencere.com
Top Posts

M365 ERROR CODE 80192EE7 Solution 

April 30, 2024152 Views

How to Get help or support as an end user while using Microsoft 365 App

May 1, 202483 Views

Transform Your PowerPoint Bar Charts into Professional Masterpieces 2024

May 15, 202445 Views
Latest Reviews
hotwiretellecom.com
hotwiretellecom.com

Archives

  • March 2026
  • July 2025
  • June 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
Most Popular

M365 ERROR CODE 80192EE7 Solution 

April 30, 2024152 Views

How to Get help or support as an end user while using Microsoft 365 App

May 1, 202483 Views

Transform Your PowerPoint Bar Charts into Professional Masterpieces 2024

May 15, 202445 Views
People's Favorite

Deploy the LOLBINS (Living Off The Land Binary Attacks) prevention-focused ASR rules via custom configuration profile (OMA-URI) in Intune

March 27, 2026

Elevating CEH: Transforming a Single Curriculum into Beginner, Intermediate, Advanced, and Expert-Level Cybersecurity Training

March 27, 2026

The Intune Device Lifecycle: From Onboarding to Retirement (Best Practices)

July 3, 2025
© 2026 blog.m365pros.com. Designed by blog.m365pros.com
  • Home
  • Microsoft 365
  • Teams
  • One Drive
  • Windows Server
  • outlook

Type above and press Enter to search. Press Esc to cancel.