Anavem
Languagefr
How to Block Office Applications from Creating Executable Content Using Intune

How to Block Office Applications from Creating Executable Content Using Intune

Configure Attack Surface Reduction rules in Microsoft Intune to prevent Office applications from spawning executable files, strengthening endpoint security against malware delivered through malicious macros.

April 3, 2026 15 min
hardintune 10 steps 15 min

Why Block Office Applications from Creating Executable Content?

Macro-based malware remains one of the most prevalent attack vectors in modern cybersecurity threats. Attackers commonly embed malicious macros in Office documents that, when executed, download and run additional malware payloads on victim systems. The "Block Office applications from creating executable content" Attack Surface Reduction (ASR) rule specifically targets this attack method by preventing Office applications like Word, Excel, and PowerPoint from spawning or creating executable files.

What Are Attack Surface Reduction Rules in Microsoft Defender?

Attack Surface Reduction rules are a set of intelligent security controls built into Microsoft Defender Antivirus that help prevent common malware infection techniques. These rules work by monitoring application behavior and blocking suspicious activities that are commonly associated with malware, while allowing legitimate business operations to continue. The ASR rule we'll configure (GUID: 3B576869-A4EC-4529-8536-B80A7769E899) specifically monitors Office applications for attempts to create, modify, or execute files with executable extensions.

How Does Microsoft Intune Simplify ASR Rule Deployment?

Microsoft Intune provides centralized management for ASR rules across your entire Windows estate through its Endpoint Security portal. Rather than manually configuring each device or relying on Group Policy, Intune allows you to create, test, and deploy ASR policies to specific groups of users or devices. This approach enables gradual rollouts, comprehensive monitoring, and quick policy adjustments when legitimate applications are inadvertently blocked. The integration with Microsoft Defender for Endpoint also provides detailed telemetry and reporting on rule effectiveness and potential false positives.

Implementation Guide

Full Procedure

01

Access Microsoft Intune Admin Center and Navigate to Attack Surface Reduction

Start by signing into the Microsoft Intune admin center where you'll configure the ASR policy. This is your central hub for managing endpoint security policies across your organization.

Open your web browser and navigate to https://endpoint.microsoft.com. Sign in with your Global Administrator or Intune Administrator credentials.

Once logged in, navigate to Endpoint security in the left navigation pane, then select Attack surface reduction. This section contains all ASR-related policies and configurations.

Pro tip: Bookmark the Intune admin center URL and consider using a dedicated browser profile for administrative tasks to avoid session conflicts.

Verification: You should see the Attack surface reduction overview page with options to create new policies and view existing ones. If you don't see these options, verify your role permissions include Endpoint Security Manager rights.

02

Create a New Attack Surface Reduction Policy

Now you'll create a new ASR policy specifically designed to block Office applications from creating executable content. This policy will use the dedicated ASR rule with GUID 3B576869-A4EC-4529-8536-B80A7769E899.

Click Create policy in the Attack surface reduction section. You'll be presented with platform and profile options.

Select the following configuration:

  • Platform: Windows 10, Windows 11, and Windows Server
  • Profile: Attack surface reduction rules

Click Create to proceed to the policy configuration wizard.

Warning: Ensure you select the correct platform. Choosing the wrong platform will prevent the policy from applying to your target devices.

Verification: The policy creation wizard should open with the "Basics" tab selected. The breadcrumb should show "Endpoint security > Attack surface reduction > Create policy".

03

Configure Policy Basics and Naming

Proper naming and documentation of your ASR policy is crucial for ongoing management and troubleshooting. Use descriptive names that clearly indicate the policy's purpose and scope.

Fill in the following fields on the Basics tab:

  • Name: ASR - Block Office Executable Content Creation
  • Description: Prevents Office applications (Word, Excel, PowerPoint) from creating executable content to mitigate macro-based malware attacks. Applies to Windows 10 1709+ and Windows 11 devices.

The description should be detailed enough that other administrators understand the policy's purpose without needing to examine the configuration.

Click Next to proceed to the configuration settings.

Pro tip: Include the deployment date and your initials in the description for audit trails: "Deployed 2026-04-03 by [Your Initials] - Prevents Office applications..."

Verification: The Configuration settings tab should now be active, showing a list of available Attack Surface Reduction rules.

04

Configure the Office Executable Content Block Rule

This is the core configuration step where you'll enable the specific ASR rule that prevents Office applications from creating executable files. The rule targets common attack vectors used by macro-based malware.

In the Configuration settings section, locate the rule "Block Office applications from creating executable content". This corresponds to GUID 3B576869-A4EC-4529-8536-B80A7769E899.

Configure the rule with one of these modes:

  • Block: Recommended for production environments - completely prevents the action
  • Audit: Recommended for initial testing - logs events but allows the action
  • Warn: Available on Windows 10 1809+ and Windows 11 - prompts users before blocking

For initial deployment, select Audit to monitor potential impacts. You can change this to Block after testing.

Consider enabling these complementary rules for comprehensive protection:

  • Block Office applications from injecting code into other processes (GUID: 75668C1F-73B5-4CF0-BB93-3ECF5CB7CC84)
  • Block Office child processes (GUID: D4F940AB-401B-4EFC-AADC-AD5F3C50688A)
Warning: Starting with Block mode in production can cause legitimate business applications to fail. Always test in Audit mode first.

Click Next to proceed to assignments.

Verification: The selected rule should show your chosen mode (Audit/Block/Warn) next to the rule name.

05

Assign the Policy to Target Groups

Proper group assignment ensures your ASR policy reaches the right devices while avoiding disruption to critical systems. Start with a pilot group before full deployment.

On the Assignments tab, configure the following:

Included groups: Click Add groups and select your pilot group first. This should be a small group of test devices or users who can validate the policy's impact.

Example pilot group selection:

Group Name: IT-Pilot-Devices-ASR-Testing
Description: 10-15 devices for ASR policy validation
Members: Mix of different Office usage patterns

Excluded groups: Consider excluding:

  • VIP users or executives (initially)
  • Devices running critical business applications
  • Servers with automated Office processing
Pro tip: Create a dedicated security group for ASR testing that includes devices from different departments to catch diverse use cases.

Click Next to proceed to the review step.

Verification: The Assignments section should show your selected included groups and any excluded groups. The estimated device count should match your expectations.

06

Review and Deploy the ASR Policy

The final review step ensures all configurations are correct before deployment. Take time to verify each setting as policy changes can take several hours to propagate.

On the Review + create tab, verify the following settings:

  • Policy name: ASR - Block Office Executable Content Creation
  • Platform: Windows 10, Windows 11, and Windows Server
  • Profile: Attack surface reduction rules
  • Rule configuration: Block Office applications from creating executable content = Audit (or your chosen mode)
  • Assignments: Your pilot group is included

If everything looks correct, click Create to deploy the policy.

The policy will begin deploying to assigned devices. Deployment typically takes 1-8 hours depending on device check-in frequency and network conditions.

Warning: Once created, you cannot change the policy platform or profile type. You'll need to create a new policy if these need modification.

Verification: You should see a success message and be redirected to the policy overview page. The policy status should show "Active" and begin showing deployment progress.

07

Monitor Policy Deployment Status in Intune

Tracking deployment progress helps identify devices that haven't received the policy and troubleshoot any assignment issues before testing begins.

Navigate back to Endpoint security > Attack surface reduction and click on your newly created policy name.

Review the following sections:

Device status: Shows how many devices have successfully received the policy:

  • Succeeded: Policy applied successfully
  • Error: Policy failed to apply (investigate these devices)
  • Conflict: Multiple conflicting policies detected
  • Not applicable: Device doesn't meet requirements

User status: Shows per-user deployment status if using user-based assignments.

Click on individual status categories to see detailed device lists and error messages.

Pro tip: Set up a recurring calendar reminder to check policy deployment status daily during the first week, then weekly thereafter.

Verification: Within 8 hours, most devices should show "Succeeded" status. If devices show "Error" or "Not applicable," investigate the specific error messages by clicking on those categories.

08

Verify ASR Rule Activation Using Event Viewer

Event Viewer provides the most reliable method to confirm that ASR rules are active and functioning on target devices. This verification step is crucial before proceeding to testing.

On a test device that received the policy, open Event Viewer by pressing Windows + R, typing eventvwr.msc, and pressing Enter.

Navigate to the following path:

Applications and Services Logs > Microsoft > Windows > Windows Defender > Operational

Look for these specific Event IDs related to your ASR rule:

  • Event ID 1121: ASR rule triggered in Audit mode
  • Event ID 1122: ASR rule triggered in Block mode
  • Event ID 5007: ASR configuration change detected

Filter the log to show only ASR-related events by right-clicking the Operational log, selecting Filter Current Log, and entering Event IDs: 1121,1122,5007.

Pro tip: Create a custom view in Event Viewer for ASR events to quickly monitor rule activity across multiple devices.

Verification: You should see Event ID 5007 entries indicating the ASR rule configuration was applied. If testing has begun, you may also see 1121 (audit) or 1122 (block) events.

09

Test the ASR Rule with Controlled Office Macro Execution

Controlled testing validates that your ASR rule correctly identifies and handles Office applications attempting to create executable content. This step confirms the policy is working as expected.

On a test device with the policy applied, create a test scenario:

Method 1 - Word Macro Test:

  1. Open Microsoft Word
  2. Create a new document
  3. Press Alt + F11 to open the VBA editor
  4. Insert a new module and add this test code:
Sub TestExecutableCreation()
    Dim fso As Object
    Set fso = CreateObject("Scripting.FileSystemObject")
    
    ' Attempt to create a .exe file (this should be blocked)
    Dim testFile As Object
    Set testFile = fso.CreateTextFile("C:\temp\test.exe", True)
    testFile.WriteLine "This is a test executable"
    testFile.Close
    
    MsgBox "Test completed"
End Sub
  1. Run the macro by pressing F5

Expected Results:

  • Audit mode: Macro runs but Event ID 1121 is logged
  • Block mode: Macro is prevented and Event ID 1122 is logged
  • Warn mode: User receives a warning prompt
Warning: Only test on isolated devices or in a controlled environment. Never test with actual malware samples.

Verification: Check Event Viewer for the corresponding Event ID (1121 or 1122) with details about the blocked action. The event should reference the Office application and attempted executable creation.

10

Configure Exclusions and Transition to Production Mode

After testing reveals any legitimate applications being blocked, configure appropriate exclusions before transitioning from Audit to Block mode for full protection.

Adding Exclusions (if needed):

Return to your ASR policy in the Intune admin center. Click Properties, then Edit next to Configuration settings.

For the "Block Office applications from creating executable content" rule, you can add exclusions for:

  • File paths: C:\Program Files\TrustedApp\*
  • File names: legitimate-tool.exe
  • Process names: trusted-process.exe

Example exclusion configuration:

Exclusion Type: File Path
Path: C:\Program Files\RemoteManagement\winagent.exe
Reason: Legitimate RMM tool blocked by ASR rule

Transitioning to Block Mode:

Once testing is complete and exclusions are configured:

  1. Edit the policy configuration settings
  2. Change the rule mode from Audit to Block
  3. Expand assignment to broader user groups
  4. Monitor for 48-72 hours before full deployment
Pro tip: Keep a rollback plan ready. Document all exclusions and maintain a quick-disable procedure for emergency situations.

Verification: After transitioning to Block mode, monitor Event Viewer for Event ID 1122 entries and user reports of blocked legitimate applications. Adjust exclusions as needed.

Frequently Asked Questions

What happens to legitimate applications that create executable files when ASR rules are enabled?+
Legitimate applications may be blocked initially, which is why Microsoft recommends starting with Audit mode to identify false positives. You can then add specific exclusions for trusted applications like remote management tools or business software that legitimately create executable content. The exclusions can be configured by file path, file name, or process name to ensure business continuity while maintaining security.
How long does it take for ASR policy changes to apply to devices in Intune?+
ASR policy deployment through Intune typically takes 1-8 hours depending on device check-in frequency and network conditions. Devices check for policy updates based on their configured sync schedule, usually every 8 hours for user policies and every 3 hours for device policies. You can force an immediate sync by going to the Company Portal app and selecting 'Check for updates' or using the Intune remote action 'Sync' on specific devices.
Can ASR rules be configured differently for different groups of users or devices?+
Yes, Intune allows granular assignment of ASR policies to specific Azure AD groups, enabling different configurations for different organizational units. For example, you might deploy stricter Block mode rules to general users while keeping Audit mode for developers or IT staff who legitimately need to create executable content. You can also exclude specific groups from policies entirely and create multiple policies with different rule configurations for various scenarios.
What's the difference between Audit, Block, and Warn modes for ASR rules?+
Audit mode logs ASR rule triggers without blocking the action, allowing you to assess potential impact before enforcement. Block mode completely prevents the action and logs the event, providing full protection but potentially disrupting legitimate activities. Warn mode (available on Windows 10 1809+ and Windows 11) displays a user prompt before blocking, allowing end users to proceed if they determine the action is legitimate. Most organizations start with Audit, analyze the logs, configure exclusions, then transition to Block mode.
How can I monitor and troubleshoot ASR rule effectiveness after deployment?+
Monitor ASR rules through multiple channels: Windows Event Viewer (Event IDs 1121 for audit, 1122 for block), Microsoft Defender for Endpoint Advanced Hunting queries using tables like DeviceEvents with ActionType containing 'AsrExecutableOfficeContent', and Intune device compliance reports. Set up automated alerts for high volumes of blocked events that might indicate false positives. Regular review of blocked applications helps fine-tune exclusions and ensures the rules provide security without impacting productivity.

Discussion

Share your thoughts and insights

Sign in to join the discussion