Issue
- Configure additional HIPS rules in the following ESET business applications for Windows or create a policy in ESET PROTECT or ESET PROTECT On-Prem with additional HIPS settings to protect against ransomware malware (filecoder)
- ESET Endpoint Security
- ESET Endpoint Antivirus
- ESET Mail Security for Microsoft Exchange Server
- ESET Server Security for Microsoft Windows Server
- Manually create an ESET PROTECT or ESET PROTECT On-Prem Policy / configure the settings in ESET business applications
- Download and import the ESET PROTECT or ESET PROTECT On-Prem Policy
Click an image to open the ESET Knowledgebase article for anti-ransomware best practices and additional application configurations:
Details
Click to expand
ESET's Host-based Intrusion Prevention System (HIPS) is included in ESET Endpoint Security, ESET Endpoint Antivirus, ESET Mail Security for Microsoft Exchange Server, and ESET Server Security for Microsoft Windows Server. HIPS monitors system activity and uses a pre-defined set of rules to recognize suspicious system behavior.
When this type of activity is identified, the HIPS self-defense mechanism stops the offending program or process from carrying out a potentially harmful activity. By prohibiting the standard execution of JavaScript and other scripts, ransomware cannot download or execute. To further help prevent ransomware malware on your Windows systems, create the following rules in the latest ESET business applications with HIPS, or create and apply an ESET PROTECT or ESET PROTECT On-Prem Policy.
Solution
Manually create an ESET PROTECT or ESET PROTECT On-Prem Policy / configure the settings in ESET business applications
-
Open the HIPS rules editor in the policy wizard or ESET application configuration:
ESET PROTECT or ESET PROTECT On-Prem Policy
-
In the Settings section, select ESET Endpoint for Windows from the drop-down menu. Click HIPS and click Edit next to Rules.

ESET application
-
Open the main program window of your ESET Windows endpoint application.
-
Press the F5 key to access Advanced setup.
-
Click HIPS and click Edit next to Rules.

-
Click the option (I. to VII.) to expand each section below to create all additional HIPS rules.
I. Deny processes from script executables
-
In the HIPS rules window, click Add.

-
Type
Deny child processes from script executablesinto the Rule name field. From the Action drop-down menu, select Block. Click the toggle next to Applications, Enabled, and Notify user to enable these settings. From the Logging severity drop-down menu, select Warning and click Next.
-
In the Source applications window, click Add and type in the following names, clicking OK → Add after each one:
C:\Windows\System32\wscript.exeC:\Windows\System32\cscript.exeC:\Windows\SysWOW64\wscript.exeC:\Windows\SysWOW64\cscript.exeC:\Windows\System32\ntvdm.exe
Click Next.

-
In the Application operations window, click the toggle next to Start new application to enable it and click Next.

-
Select All applications from the drop-down menu and click Finish.

-
Leave the HIPS rules window open and continue to the next section.
II. Deny script processes started by explorer
-
In the HIPS rules window, click Add.
-
Type
Deny script processes started by explorerinto the Rule name field.From the Action drop-down menu, select Block.
Enable the toggle next to Applications.
From the Logging severity drop-down menu, select Warning and click Next.

-
In the Source applications window click Add, type
C:\Windows\explorer.exeinto the Specify file path field, and click OK → Next.
-
In the Application operations window, click the toggle next to Start new application to enable it and click Next.

-
In the Applications window, click Add and type in the following names, clicking OK → Add after each one:
C:\Windows\System32\wscript.exeC:\Windows\System32\cscript.exeC:\Windows\SysWOW64\wscript.exeC:\Windows\SysWOW64\cscript.exe
Click Finish.

-
Leave the HIPS rules window open and continue to the next section.
III. Deny child processes from Office 2024 processes
-
In the HIPS rules window, click Add.
-
Type
Deny child processes from Office 2024 processesinto the Rule name field. From the Action drop-down menu, select Block. Click the toggle next to Applications, Enabled, and Notify user to enable these settings. From the Logging severity drop-down menu, select Warning and click Next.
-
In the Source applications window, click Add and type in the following names, clicking OK → Add after each one:
C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEC:\Program Files\Microsoft Office\root\Office16\OUTLOOK.EXEC:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEC:\Program Files\Microsoft Office\root\Office16\POWERPNT.EXEC:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEC:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEC:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEC:\Program Files (x86)\Microsoft Office\root\Office16\POWERPNT.EXE
Click Next.

-
In the Application operations window, click the toggle next to Start new application to enable it and click Next.

-
In the Applications window, click Add and type in the following names, clicking OK → Add after each one:
C:\Windows\System32\cmd.exeC:\Windows\SysWOW64\cmd.exeC:\Windows\System32\wscript.exeC:\Windows\SysWOW64\wscript.exeC:\Windows\System32\cscript.exeC:\Windows\SysWOW64\cscript.exeC:\Windows\System32\ntvdm.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\regsvr32.exeC:\Windows\SysWOW64\regsvr32.exeC:\Windows\System32\rundll32.exeC:\Windows\SysWOW64\rundll32.exe
Click Finish.

-
Add additional Office versions as needed, repeating the same instructions as above.
- 2013 = Office15 (
C:\Program Files (x86)\Microsoft Office\Office15\...) - 2010 = Office14
- 2013 = Office15 (
-
Leave the HIPS rules window open and continue to the next section.
IV. Deny child processes for regsrv32.exe
-
In the HIPS rules window, click Add.
-
Type
Deny child processes for regsrv32.exeinto the Rule name field.From the Action drop-down menu, select Block.
Click the toggle next to the following settings to enable them:
- Applications
- Enabled
- Notify user
From the Logging severity drop-down menu, select Warning and click Next.

-
In the Source applications window, click Add and type in the following names, clicking OK → Add after each one:
C:\Windows\System32\regsvr32.exeC:\Windows\SysWOW64\regsvr32.exe
Click Next.

-
In the Application operations window, click the toggle next to Start new application to enable it and click Next.

-
In the Applications window, click Add and type in the following names, clicking OK → Add after each one:
C:\Windows\System32\cmd.exeC:\Windows\SysWOW64\cmd.exeC:\Windows\System32\wscript.exeC:\Windows\SysWOW64\wscript.exeC:\Windows\System32\cscript.exeC:\Windows\SysWOW64\cscript.exeC:\Windows\System32\ntvdm.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
Click Finish.

-
Leave the HIPS rules window open and continue to the next section.
V. Deny child processes for mshta.exe
-
In the HIPS rules window, click Add.
-
Type
Deny child processes for mshta.exeinto the Rule name field.From the Action drop-down menu, select Block.
Click the toggle next to the following settings to enable them:
- Applications
- Enabled
- Notify user
From the Logging severity drop-down menu, select Warning and click Next.

-
In the Source applications window, click Add and type in the following names, clicking OK → Add after each one:
C:\Windows\System32\mshta.exeC:\Windows\SysWOW64\mshta.exe
Click Next.

-
In the Application operations window, click the toggle next to Start new application to enable it and click Next.

-
Select All applications from the drop-down menu and click Finish.
-
Leave the HIPS rules window open and continue to the next section.
VI. Deny child processes for rundll32.exe
-
In the HIPS rules window, click Add.
-
Type
Deny child processes for rundll32.exeinto the Rule name field.From the Action drop-down menu, select Block.
Click the toggle next to the following settings to enable them:
- Applications
- Enabled
- Notify user
From the Logging severity drop-down menu, select Warning and click Next.

-
In the Source applications window, click Add, type
C:\Windows\System32\rundll32.exeinto the Specify file path field, and then click OK → Next.
-
In the Application operations window, click the toggle next to Start new application to enable it and click Next.

-
In the Applications window, click Add and type in the following names, clicking OK → Add after each one:
C:\Windows\System32\cmd.exeC:\Windows\SysWOW64\cmd.exeC:\Windows\System32\wscript.exeC:\Windows\SysWOW64\wscript.exeC:\Windows\System32\cscript.exeC:\Windows\SysWOW64\cscript.exeC:\Windows\System32\ntvdm.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
Click Finish.

-
Leave the HIPS rules window open and continue to the next section.
VII. Deny child processes for powershell.exe
-
In the HIPS rules window, click Add.
-
Type
Deny child processes for powershell.exeinto the Rule name field.From the Action drop-down menu, select Block.
Click the toggle next to the following settings to enable them:
- Applications
- Enabled
- Notify user
From the Logging severity drop-down menu, select Warning and click Next.

-
In the Source applications window, click Add and type in the following names, clicking OK → Add after each one:
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
Click Next.

-
In the Application operations window, click the toggle next to Start new application to enable it and click Next.

-
Select All applications from the drop-down menu and click Finish.
-
-
If you are creating a policy, in the HIPS rules window, click OK and finish the policy wizard.
If you are configuring an ESET business application, click OK → OK.
Download and import the ESET PROTECT or ESET PROTECT On-Prem Policy
The ESET PROTECT or ESET PROTECT On-Prem Policy for ESET business applications with additional HIPS settings to protect against ransomware malware (filecoder) can be downloaded from the links below. Policies are available only for the latest version of ESET applications. Compatibility with earlier versions cannot be guaranteed.
-
Download the Additional HIPS Protection ESET PROTECT or ESET PROTECT On-Prem Policy for:
-
Open policy import window:
ESET PROTECT
Click Configuration → Advanced setup → Actions → Import.

ESET PROTECT On-Prem
Click Policies → Actions → Import.

-
Click Choose file to upload, select the downloaded policy, and click Import.

-
Assign the policy to a client or assign the policy to a group.