mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-12 13:27:23 +00:00
Update create-a-rule-that-uses-a-path-condition.md
This commit is contained in:
parent
dda8089bd3
commit
367bd67856
@ -1,37 +1,36 @@
|
||||
---
|
||||
title: Create a rule that uses a path condition
|
||||
description: This topic for IT professionals shows how to create an AppLocker rule with a path condition.
|
||||
description: This article for IT professionals shows how to create an AppLocker rule with a path condition.
|
||||
ms.localizationpriority: medium
|
||||
ms.topic: conceptual
|
||||
ms.date: 09/21/2017
|
||||
ms.date: 12/21/2023
|
||||
---
|
||||
|
||||
# Create a rule that uses a path condition
|
||||
|
||||
>[!NOTE]
|
||||
>Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Windows Defender Application Control feature availability](/windows/security/threat-protection/windows-defender-application-control/feature-availability).
|
||||
|
||||
This topic for IT professionals shows how to create an AppLocker rule with a path condition.
|
||||
This article for IT professionals shows how to create an AppLocker rule with a path condition.
|
||||
|
||||
The path condition identifies an app by its location in the file system of the computer or on the network.
|
||||
|
||||
>**Important:** When creating a rule that uses a deny action, path conditions are less secure for preventing access to a file because a user could easily copy the file to a different location than what is specified in the rule. Because path rules correspond to locations within the file system, you should ensure that there are no subdirectories that are writable by non-administrators. For example, if you create a path rule for C:\\ with the allow action, any file within C:\\ will be allowed to run, including users' profiles.
|
||||
|
||||
> [!IMPORTANT]
|
||||
> When creating Deny rules, path conditions are less effective for preventing access to a file because a user (or malware acting as the user) could easily copy the file to a different location than what is specified in the rule. Because path rules correspond to locations within the file system, you should ensure that there are no subdirectories that are writable by non-administrators. For example, if you create a path rule for C:\\ with the allow action, any file within C:\\ will be allowed to run, including users' profiles.
|
||||
|
||||
For info about the path condition, see [Understanding the path rule condition in AppLocker](understanding-the-path-rule-condition-in-applocker.md).
|
||||
|
||||
You can perform this task by using the Group Policy Management Console for an AppLocker policy in a Group Policy Object (GPO) or by using the Local Security Policy snap-in for an AppLocker policy on a local computer or in a security template. For information how to use these MMC snap-ins to administer AppLocker, see [Administer AppLocker](administer-applocker.md#bkmk-using-snapins).
|
||||
To manage an AppLocker policy in a Group Policy Object (GPO), you can perform this task by using the Group Policy Management Console. To manage an AppLocker policy for the local computer or for use in a security template, use the Local Security Policy snap-in. For info how to use these MMC snap-ins to administer AppLocker, see [Administer AppLocker](administer-applocker.md#using-the-mmc-snap-ins-to-administer-applocker).
|
||||
|
||||
**To create a new rule with a path condition**
|
||||
## To create a new rule with a path condition
|
||||
|
||||
1. Open the AppLocker console, and then click the rule collection that you want to create the rule for.
|
||||
2. On the **Action** menu, click **Create New Rule**.
|
||||
3. On the **Before You Begin** page, click **Next**.
|
||||
4. On the **Permissions** page, select the action (allow or deny) and the user or group that the rule should apply to, and then click **Next**.
|
||||
5. On the **Conditions** page, select the **Path** rule condition, and then click **Next**.
|
||||
6. Click **Browse Files** to locate the targeted folder for the app.
|
||||
1. Open the AppLocker console, and then select the rule collection that you want to create the rule for.
|
||||
2. On the **Action** menu, select **Create New Rule**.
|
||||
3. On the **Before You Begin** page, select **Next**.
|
||||
4. On the **Permissions** page, select the action (allow or deny) and the user or group that the rule should apply to, and then select **Next**.
|
||||
5. On the **Conditions** page, select the **Path** rule condition, and then select **Next**.
|
||||
6. Select **Browse Files** to locate the targeted folder for the app.
|
||||
|
||||
>**Note:** When you browse to a file or folder location, the wizard automatically converts absolute file paths to use AppLocker path variables. You may edit the path after browsing to specify an absolute path, or you may type the path directly into the **Path** box. To learn more about AppLocker path variables, see [Understanding the path rule condition in AppLocker](understanding-the-path-rule-condition-in-applocker.md).
|
||||
|
||||
7. Click **Next**.
|
||||
8. (Optional) On the **Exceptions** page, specify conditions by which to exclude files from being affected by the rule. Click **Next**.
|
||||
9. On the **Name** page, either accept the automatically generated rule name or type a new rule name, and then click **Create**.
|
||||
> [!NOTE]
|
||||
> When you browse to a file or folder location, the wizard automatically converts absolute file paths to use AppLocker path variables. You may edit the path after browsing to specify an absolute path, or you may type the path directly into the **Path** box. To learn more about AppLocker path variables, see [Understanding the path rule condition in AppLocker](understanding-the-path-rule-condition-in-applocker.md).
|
||||
|
||||
7. Select **Next**.
|
||||
8. (Optional) On the **Exceptions** page, specify conditions by which to exclude files from being affected by the rule. Select **Next**.
|
||||
9. On the **Name** page, either accept the automatically generated rule name or type a new rule name, and then select **Create**.
|
||||
|
Loading…
x
Reference in New Issue
Block a user