mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-28 16:53:40 +00:00
Merge pull request #5854 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to master to sync with https://github.com/MicrosoftDocs/windows-itpro-docs (branch public)
This commit is contained in:
@ -14,7 +14,7 @@ author: jsuther1974
|
|||||||
ms.reviewer: isbrahm
|
ms.reviewer: isbrahm
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
ms.date: 08/10/2021
|
ms.date: 10/19/2021
|
||||||
ms.technology: mde
|
ms.technology: mde
|
||||||
---
|
---
|
||||||
|
|
||||||
@ -41,8 +41,7 @@ Ensure that the WDAC policy allows the system/boot components and any other auth
|
|||||||
|
|
||||||
## Security considerations with managed installer
|
## Security considerations with managed installer
|
||||||
|
|
||||||
Since managed installer is a heuristic-based mechanism, it doesn't provide the same security guarantees that explicit allow or deny rules do.
|
Since managed installer is a heuristic-based mechanism, it doesn't provide the same security guarantees that explicit allow or deny rules do. The managed installer is best suited for use where each user operates as a standard user and where all software is deployed and installed by a software distribution solution, such as Microsoft Endpoint Configuration Manager (MEMCM).
|
||||||
It's best suited for use where each user operates as a standard user and where all software is deployed and installed by a software distribution solution, such as Microsoft Endpoint Configuration Manager (MEMCM).
|
|
||||||
|
|
||||||
Users with administrator privileges, or malware running as an administrator user on the system, may be able to circumvent the intent of Windows Defender Application Control when the managed installer option is allowed.
|
Users with administrator privileges, or malware running as an administrator user on the system, may be able to circumvent the intent of Windows Defender Application Control when the managed installer option is allowed.
|
||||||
|
|
||||||
@ -85,19 +84,19 @@ Currently, neither the AppLocker policy creation UI in GPO Editor nor the PowerS
|
|||||||
|
|
||||||
2. Manually rename the rule collection to ManagedInstaller
|
2. Manually rename the rule collection to ManagedInstaller
|
||||||
|
|
||||||
Change
|
Change:
|
||||||
|
|
||||||
```powershell
|
```powershell
|
||||||
<RuleCollection Type="Exe" EnforcementMode="NotConfigured">
|
<RuleCollection Type="Exe" EnforcementMode="NotConfigured">
|
||||||
```
|
```
|
||||||
|
|
||||||
to
|
to:
|
||||||
|
|
||||||
```powershell
|
```powershell
|
||||||
<RuleCollection Type="ManagedInstaller" EnforcementMode="AuditOnly">
|
<RuleCollection Type="ManagedInstaller" EnforcementMode="AuditOnly">
|
||||||
```
|
```
|
||||||
|
|
||||||
An example of a valid Managed Installer rule collection, using Microsoft Endpoint Config Manager (MEMCM), MEM (Intune), Powershell, and PowerShell ISE, is shown below. Remove any rules that you do not wish to designate as a Managed Installer.
|
An example of a valid Managed Installer rule collection, using Microsoft Endpoint Config Manager (MEMCM), MEM (Intune), PowerShell, and PowerShell ISE, is shown below. Remove any rules that you do not wish to designate as a Managed Installer.
|
||||||
|
|
||||||
```xml
|
```xml
|
||||||
<AppLockerPolicy Version="1">
|
<AppLockerPolicy Version="1">
|
||||||
@ -177,45 +176,9 @@ An example of a valid Managed Installer rule collection, using Microsoft Endpoin
|
|||||||
</RuleCollection>
|
</RuleCollection>
|
||||||
</AppLockerPolicy>
|
</AppLockerPolicy>
|
||||||
```
|
```
|
||||||
### Enable service enforcement in AppLocker policy
|
|
||||||
|
|
||||||
Since many installation processes rely on services, it is typically necessary to enable tracking of services.
|
>[!NOTE]
|
||||||
Correct tracking of services requires the presence of at least one rule in the rule collection. So, a simple audit-only rule will suffice. The audit rule can be added to the policy created above, which specifies the rule collection of your managed installer.
|
>Since many installation processes rely on services, it is typically necessary to enable tracking of services. Correct tracking of services requires the presence of at least one rule in the rule collection. So, a simple audit-only rule will suffice.
|
||||||
|
|
||||||
For example:
|
|
||||||
|
|
||||||
```xml
|
|
||||||
<RuleCollection Type="Dll" EnforcementMode="AuditOnly" >
|
|
||||||
<FilePathRule Id="86f235ad-3f7b-4121-bc95-ea8bde3a5db5" Name="Dummy Rule" Description="" UserOrGroupSid="S-1-1-0" Action="Deny">
|
|
||||||
<Conditions>
|
|
||||||
<FilePathCondition Path="%OSDRIVE%\ThisWillBeBlocked.dll" />
|
|
||||||
</Conditions>
|
|
||||||
</FilePathRule>
|
|
||||||
<RuleCollectionExtensions>
|
|
||||||
<ThresholdExtensions>
|
|
||||||
<Services EnforcementMode="Enabled" />
|
|
||||||
</ThresholdExtensions>
|
|
||||||
<RedstoneExtensions>
|
|
||||||
<SystemApps Allow="Enabled"/>
|
|
||||||
</RedstoneExtensions>
|
|
||||||
</RuleCollectionExtensions>
|
|
||||||
</RuleCollection>
|
|
||||||
<RuleCollection Type="Exe" EnforcementMode="AuditOnly">
|
|
||||||
<FilePathRule Id="9420c496-046d-45ab-bd0e-455b2649e41e" Name="Dummy Rule" Description="" UserOrGroupSid="S-1-1-0" Action="Deny">
|
|
||||||
<Conditions>
|
|
||||||
<FilePathCondition Path="%OSDRIVE%\ThisWillBeBlocked.exe" />
|
|
||||||
</Conditions>
|
|
||||||
</FilePathRule>
|
|
||||||
<RuleCollectionExtensions>
|
|
||||||
<ThresholdExtensions>
|
|
||||||
<Services EnforcementMode="Enabled" />
|
|
||||||
</ThresholdExtensions>
|
|
||||||
<RedstoneExtensions>
|
|
||||||
<SystemApps Allow="Enabled"/>
|
|
||||||
</RedstoneExtensions>
|
|
||||||
</RuleCollectionExtensions>
|
|
||||||
</RuleCollection>
|
|
||||||
```
|
|
||||||
|
|
||||||
## Enable the managed installer option in WDAC policy
|
## Enable the managed installer option in WDAC policy
|
||||||
|
|
||||||
@ -234,7 +197,7 @@ Below are steps to create a WDAC policy that allows Windows to boot and enables
|
|||||||
Set-CIPolicyIdInfo -FilePath <XML filepath> -PolicyName "<friendly name>" -ResetPolicyID
|
Set-CIPolicyIdInfo -FilePath <XML filepath> -PolicyName "<friendly name>" -ResetPolicyID
|
||||||
```
|
```
|
||||||
|
|
||||||
3. Set Option 13 (Enabled:Managed Installer)
|
3. Set Option 13 (Enabled:Managed Installer).
|
||||||
|
|
||||||
```powershell
|
```powershell
|
||||||
Set-RuleOption -FilePath <XML filepath> -Option 13
|
Set-RuleOption -FilePath <XML filepath> -Option 13
|
||||||
|
Reference in New Issue
Block a user