Block All Running EDR Processes via WFP

Description

Enumerates all running processes, matches them against the built-in EDR list, and installs persistent WFP outbound-block rules (IPv4 + IPv6) for each match.

Overview

This script calls Add-WfpBlock, which enumerates all running processes on the current system and compares them against a built-in list of known EDR process names. For every match it finds, it adds two persistent Windows Filtering Platform (WFP) outbound-block rules — one for IPv4 and one for IPv6 — using the process’s application identifier.

The rules are persistent, meaning they survive reboots until explicitly removed. Use Remove-WfpBlock to clean up.

Pre-Requisites

  • High integrity (Administrator) process

Dependencies

  • Firewall

Parameters

None.

Supported EDR Products

The built-in list covers: Microsoft Defender for Endpoint, Elastic EDR, Trellix, Qualys, SentinelOne, Cylance, Cybereason, Carbon Black EDR, Carbon Black Cloud, Tanium, Palo Alto Cortex XDR, FortiEDR, Cisco Secure Endpoint, ESET Inspect, Harfanglab, and Trend Micro Apex One.

Example Output

FilePath                                          FilterIdV4       FilterIdV6       ErrorCodeV4  ErrorCodeV6
--------                                          ----------       ----------       -----------  -----------
C:\Program Files\Windows Defender\MsMpEng.exe    65537            65538            0            0
C:\Program Files\Windows Defender\MsSense.exe    65539            65540            0            0
Scroll to Top