Application Control - AppLocker and Windows Defender Application Control Overview
Process to reduce risk
The administrator uses application control to restrict
applications users are allowed to run. Application
control policies are used to block unsigned scripts and MSIs and implement
Windows PowerShell constrained mode. Security
administrators will want to use application control alongside endpoint protection
products such as antivirus and endpoint detection and response.
Application control uses a predetermined list of parameters
to allow applications to be trusted to run on the endpoint while blocking
others. Implementing application control
can stop malware and unauthorized software.
Microsoft implements application control for their operating
systems. Microsoft Windows 10 and
Windows 11 include Windows Defender Application Control (WDAC) and AppLocker. AppLocker will run on older Windows versions
such as Windows 7, Windows 8/8.1, and Windows Server 2008 up through Windows 11
and Windows Server 2019. It is
preferable to use application control software that comes with a product to
simplify deployment and reduce cost.
AppLocker is centrally managed using the existing Group Policy
infrastructure, which makes testing and modifications easier. Intune, Configuration Manager, and PowerShell
can manage AppLocker.
Administrators can use the AppLocker policy in audit mode to
produce event logs that contain application activity. They can use PowerShell scripts to parse the
event logs to produce data about applications, which he or she can use to build
a list of allowed applications and remove other ones. AppLocker uses the application publisher,
installation path, or file hash to identify allowed software. Any software that is not recognized is
blocked, which can include malware.
AppLocker enforces allow and deny options a certain way. Microsoft recommends using allow actions with
exceptions because deny actions override allow actions. Only files explicitly allowed in a rule are
permitted. The administrator can
configure rules to allow files to run for users or groups of users and
configure exceptions. He or she can
configure deny rules that disallow certain files and set exceptions for those. Deny actions for a certain file or folder
path still allow those users to run the file from any other path; however, for
allow actions, only the specified files and files paths are allowed others are
excluded.
AppLocker rule collections are in the five types below.
·
Executable files: .exe and .com
·
Windows Installer files: .msi, .mst, and .msp
·
Scripts: .ps1, .bat, .cmd, .vbs, and .js
·
DLLs: .dll and .ocx
·
Packaged apps and packaged app installers: .appx
DLL rule collection may cause performance problems because
it checks each DLL before AppLocker allows it to run. However, not checking DLLs increasing the
risk of an AppLocker bypass.
WDAC is available on Windows 10, Windows 11, and Windows
Server 2016 and later. The policies are
device-wide and not per-user or per-group, use kernel mode, and managed by
Intune, Microsoft Configuration Manager (limited), group policy, and scripting. WDAC applies to the following file types:
·
Driver files: .sys
·
Executable files: .exe and .com
·
DLLs: .dll and .ocx
·
Windows Installer files: .msi, .mst, and .msp
·
Scripts: .ps1, .vbs, and .js
·
Packaged apps and packaged app installers: .appx
WDAC advantages include it using the Windows kernel and agentless
operation. It applies the policy early
in the boot process before nearly all OS code and traditional antivirus. The administrator uses WDAC to set
application control policies for any code, including kernel mode drivers and Windows
code. The network administrator can
protect WDAC policy tampering from local administrators by using digital
signing. The network administrator can
protect the WDAC enforcement mechanism with memory integrity.
More about AppLocker: https://learn.microsoft.com/en-us/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-policies-deployment-guide
More about WDAC: https://learn.microsoft.com/en-us/windows/security/threat-protection/windows-defender-application-control/feature-availability
This blog is about the security of the site to reduce the risk of malicious activity which might effect the software performance.
ReplyDeleteMedical Coding Courses in Bangalore