What is User Application Hardening and how does it work?
Each day thousands of malicious files and scripts are created with malicious intent. These files are created by bad actors to cause damage to organisations and are designed to bypass traditional security measures such as Antivirus.
User Application Hardening is an activity undertaken by organisations to configure applications used by individuals to ensure that applications work correctly and securely within an organisation. User Application Hardening limits an application’s ability to be used in an unintended manner to compromise a system’s security
The tools and techniques used to implement User Application Hardening are varied and are dependent on each organisation’s specific business needs and the applications used by the organisations.
Bad actors use Microsoft files with embedded Macros as part of phishing emails targeting users within an organisation. When a user opens the file, the Macro executes, performing malicious activity. This technique is one of the most prolific ways of compromising an organisation’s network and has a very high success rate.
It is difficult for anti-virus software to determine which Macros are malicious; as the software may be behaving as designed.