I have enabled ASR and used the GUI tool to turn on the checks as per a recent newsletter. I can confirm that all would appear to be working well as I have had some prompts about programs that are blocked and do not run. I am happy with that, and I know how to add entries to enable these programs to work as expected and that is all OK too.
I am still seeing entries in the event log like:
”
Microsoft Defender Exploit Guard has blocked an operation that is not allowed by your IT administrator. For more information please contact your IT administrator
Path : C:\Windows\System32\taskhostw.exe
ProcessName : C:\Windows\System32\lsass.exe
TargetCommandline : taskhostw.exe -RegisterDevice -Periodic
”
I post the above as it is an MS process and I wonder why it is being flagged. I have also had items for the Macrium backup program that say the same thing, but nothing seems to be going wrong with the backups, so why the entry?
I now have a little PowerShell script to process these event log entries so I can decide what to do. Adding entries to allow something to happen is a trivial addition but I wanted to understand a bit more first.
The rule they fall foul of is:
Block credential stealing from the Windows local security authority subsystem (lsass.exe)
So what credentials are they trying to access, and should they be accessing lsass.exe?