Merge pull request #4389 from jgeurten/master
Merging new WDAC Wizard topic into windows-docs-pr
@ -21,6 +21,12 @@
|
|||||||
##### [Create a WDAC policy for lightly-managed devices](create-wdac-policy-for-lightly-managed-devices.md)
|
##### [Create a WDAC policy for lightly-managed devices](create-wdac-policy-for-lightly-managed-devices.md)
|
||||||
##### [Create a WDAC policy for fully-managed devices](create-wdac-policy-for-fully-managed-devices.md)
|
##### [Create a WDAC policy for fully-managed devices](create-wdac-policy-for-fully-managed-devices.md)
|
||||||
##### [Create a WDAC policy for fixed-workload devices](create-initial-default-policy.md)
|
##### [Create a WDAC policy for fixed-workload devices](create-initial-default-policy.md)
|
||||||
|
##### [Microsoft recommended block rules](microsoft-recommended-block-rules.md)
|
||||||
|
#### [Using the WDAC Wizard tool](wdac-wizard.md)
|
||||||
|
##### [Create a base WDAC policy with the Wizard](wdac-wizard-create-base-policy.md)
|
||||||
|
##### [Create a supplemental WDAC policy with the Wizard](wdac-wizard-create-supplemental-policy.md)
|
||||||
|
##### [Editing a WDAC policy with the Wizard](wdac-wizard-editing-policy.md)
|
||||||
|
##### [Merging multiple WDAC policies with the Wizard](wdac-wizard-merging-policies.md)
|
||||||
|
|
||||||
|
|
||||||
## [Windows Defender Application Control deployment guide](windows-defender-application-control-deployment-guide.md)
|
## [Windows Defender Application Control deployment guide](windows-defender-application-control-deployment-guide.md)
|
||||||
|
After Width: | Height: | Size: 39 KiB |
After Width: | Height: | Size: 149 KiB |
After Width: | Height: | Size: 164 KiB |
After Width: | Height: | Size: 56 KiB |
After Width: | Height: | Size: 45 KiB |
After Width: | Height: | Size: 26 KiB |
After Width: | Height: | Size: 42 KiB |
After Width: | Height: | Size: 111 KiB |
After Width: | Height: | Size: 42 KiB |
After Width: | Height: | Size: 40 KiB |
After Width: | Height: | Size: 49 KiB |
After Width: | Height: | Size: 58 KiB |
After Width: | Height: | Size: 120 KiB |
@ -0,0 +1,138 @@
|
|||||||
|
---
|
||||||
|
title: Windows Defender Application Control Wizard Base Policy Creation
|
||||||
|
description: Creating new base application control policies with the Microsoft Windows Defender Application (WDAC) Wizard.
|
||||||
|
keywords: allow listing, block listing, security, malware
|
||||||
|
ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb
|
||||||
|
ms.prod: w10
|
||||||
|
ms.mktglfcycl: deploy
|
||||||
|
ms.sitesec: library
|
||||||
|
ms.pagetype: security
|
||||||
|
ms.localizationpriority: medium
|
||||||
|
audience: ITPro
|
||||||
|
ms.collection: M365-security-compliance
|
||||||
|
author: jgeurten
|
||||||
|
ms.reviewer: isbrahm
|
||||||
|
ms.author: dansimp
|
||||||
|
manager: dansimp
|
||||||
|
ms.topic: conceptual
|
||||||
|
ms.date: 10/14/2020
|
||||||
|
---
|
||||||
|
|
||||||
|
# Creating a new Base Policy with the Wizard
|
||||||
|
|
||||||
|
**Applies to**
|
||||||
|
- Windows 10
|
||||||
|
- Windows Server 2016 and above
|
||||||
|
|
||||||
|
When creating policies for use with Windows Defender Application Control (WDAC), it is recommended to start with a template policy and then add or remove rules to suit your application control scenario. For this reason, the WDAC Wizard offers three template policies to start from and customize during the base policy creation workflow. Prerequisite information about application control can be accessed through the [WDAC design guide](windows-defender-application-control-design-guide.md). This page outlines the steps to create a new application control policy from a template, configure the policy options, and the signer and file rules.
|
||||||
|
|
||||||
|
|
||||||
|
## Template Base Policies
|
||||||
|
|
||||||
|
Each of the template policies has a unique set of policy allow list rules that will affect the circle-of-trust and security model of the policy. The following table lists the policies in increasing order of trust and freedom. For instance, the Default Windows mode policy trusts fewer application publishers and signers than the Signed and Reputable mode policy. The Default Windows policy will have a smaller circle-of-trust with better security than the Signed and Reputable policy, but at the expense of compatibility.
|
||||||
|
|
||||||
|
|
||||||
|
| Template Base Policy | Description |
|
||||||
|
|---------------------------------|-------------------------------------------------------------------|
|
||||||
|
| **Default Windows Mode** | Default Windows mode will authorize the following components: </br><ul><li>Windows operating components - any binary installed by a fresh install of Windows</li><li>Apps installed from the Microsoft Store</li><li>Microsoft Office365 apps, OneDrive, and Microsoft Teams</li><li>Third-party [Windows Hardware Compatible drivers](https://docs.microsoft.com/windows-hardware/drivers/install/whql-release-signature)</li></ul>|
|
||||||
|
| **Allow Microsoft Mode** | Allow mode will authorize the following components: </br><ul><li>Windows operating components - any binary installed by a fresh install of Windows</li><li>Apps installed from the Microsoft Store</li><li>Microsoft Office365 apps, OneDrive, and Microsoft Teams</li><li>Third-party [Windows Hardware Compatible drivers](https://docs.microsoft.com/windows-hardware/drivers/install/whql-release-signature)</li><li>*All Microsoft-signed software*</li></ul>|
|
||||||
|
| **Signed and Reputable Mode** | Signed and Reputable mode will authorize the following components: </br><ul><li>Windows operating components - any binary installed by a fresh install of Windows</li><li>Apps installed from the Microsoft Store</li><li>Microsoft Office365 apps, OneDrive, and Microsoft Teams</li><li>Third-party [Windows Hardware Compatible drivers](https://docs.microsoft.com/windows-hardware/drivers/install/whql-release-signature)</li><li>All Microsoft-signed software</li><li>*Files with good reputation per [Microsoft Defender's Intelligent Security Graph technology](use-windows-defender-application-control-with-intelligent-security-graph.md)*</li></ul>|
|
||||||
|
|
||||||
|
*Italicized content denotes the changes in the current policy with respect to the policy prior.*
|
||||||
|
|
||||||
|
More information about the Default Windows Mode and Allow Microsoft Mode policies can be accessed through the [Example WDAC base policies article](example-wdac-base-policies.md).
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
Once the base template is selected, give the policy a name and choose where to save the application control policy on disk.
|
||||||
|
|
||||||
|
## Configuring Policy Rules
|
||||||
|
|
||||||
|
Upon page launch, policy rules will be automatically enabled/disabled depending on the chosen template from the previous page. Choose to enable or disable the desired policy rule options by pressing the slider button next to the policy rule titles. A short description of each rule will appear at the bottom of the page when the mouse hovers over the rule title.
|
||||||
|
|
||||||
|
### Policy Rules Description
|
||||||
|
|
||||||
|
A description of each policy rule, beginning with the left-most column, is provided below. The [Policy rules article](select-types-of-rules-to-create.md#windows-defender-application-control-policy-rules) provides a full description of each policy rule.
|
||||||
|
|
||||||
|
| Rule option | Description |
|
||||||
|
|------------ | ----------- |
|
||||||
|
| **Advanced Boot Options Menu** | The F8 preboot menu is disabled by default for all WDAC policies. Setting this rule option allows the F8 menu to appear to physically present users. |
|
||||||
|
| **Allow Supplemental Policies** | Use this option on a base policy to allow supplemental policies to expand it. |
|
||||||
|
| **Disable Script Enforcement** | This option disables script enforcement options. Unsigned PowerShell scripts and interactive PowerShell are no longer restricted to [Constrained Language Mode](https://docs.microsoft.com/powershell/module/microsoft.powershell.core/about/about_language_modes). NOTE: This option is only supported with the Windows 10 May 2019 Update (1903) and higher. Using it on earlier versions of Windows 10 is not supported and may have unintended results. |
|
||||||
|
|**[Hypervisor-protected code integrity (HVCI)](https://docs.microsoft.com/windows/security/threat-protection/device-guard/enable-virtualization-based-protection-of-code-integrity)**| When enabled, policy enforcement uses virtualization-based security to run the code integrity service inside a secure environment. HVCI provides stronger protections against kernel malware.|
|
||||||
|
| **Intelligent Security Graph Authorization** | Use this option to automatically allow applications with "known good" reputation as defined by Microsoft’s Intelligent Security Graph (ISG). |
|
||||||
|
| **Managed Installer** | Use this option to automatically allow applications installed by a software distribution solution, such as Microsoft Endpoint Configuration Manager, that has been defined as a managed installer. |
|
||||||
|
| **Require WHQL** | By default, legacy drivers that are not Windows Hardware Quality Labs (WHQL) signed are allowed to execute. Enabling this rule requires that every executed driver is WHQL signed and removes legacy driver support. Going forward, every new Windows 10–compatible driver must be WHQL certified. |
|
||||||
|
| **Update Policy without Rebooting** | Use this option to allow future WDAC policy updates to apply without requiring a system reboot. |
|
||||||
|
| **Unsigned System Integrity Policy** | Allows the policy to remain unsigned. When this option is removed, the policy must be signed and have UpdatePolicySigners added to the policy to enable future policy modifications. |
|
||||||
|
| **User Mode Code Integrity** | WDAC policies restrict both kernel-mode and user-mode binaries. By default, only kernel-mode binaries are restricted. Enabling this rule option validates user mode executables and scripts. |
|
||||||
|
|
||||||
|
> [!div class="mx-imgBorder"]
|
||||||
|
> 
|
||||||
|
|
||||||
|
### Advanced Policy Rules Description
|
||||||
|
|
||||||
|
Selecting the **+ Advanced Options** label will show another column of policy rules; advanced policy rules. A description of each policy rule is provided below.
|
||||||
|
|
||||||
|
| Rule option | Description |
|
||||||
|
|------------ | ----------- |
|
||||||
|
| **Boot Audit on Failure** | Used when the WDAC policy is in enforcement mode. When a driver fails during startup, the WDAC policy will be placed in audit mode so that Windows will load. Administrators can validate the reason for the failure in the CodeIntegrity event log. |
|
||||||
|
| **Disable Flight Signing** | If enabled, WDAC policies will not trust flightroot-signed binaries. This would be used in the scenario in which organizations only want to run released binaries, not flight/preview-signed builds. |
|
||||||
|
| **Disable Runtime FilePath Rule Protection** | Disable default FilePath rule protection (apps and executables allowed based on file path rules must come from a file path that’s only writable by an administrator) for any FileRule that allows a file based on FilePath. |
|
||||||
|
| **Dynamic Code Security** | Enables policy enforcement for .NET applications and dynamically loaded libraries (DLLs). |
|
||||||
|
| **Invalidate EAs on Reboot** | When the Intelligent Security Graph option (14) is used, WDAC sets an extended file attribute that indicates that the file was authorized to run. This option will cause WDAC to periodically revalidate the reputation for files that were authorized by the ISG.|
|
||||||
|
| **Require EV Signers** | In addition to being WHQL signed, this rule requires that drivers must have been submitted by a partner that has an Extended Verification (EV) certificate. All Windows 10 and later drivers will meet this requirement. |
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
> [!NOTE]
|
||||||
|
> We recommend that you **enable Audit Mode** initially because it allows you to test new WDAC policies before you enforce them. With audit mode, no application is blocked—instead the policy logs an event whenever an application outside the policy is started. For this reason, all templates have Audit Mode enabled by default.
|
||||||
|
|
||||||
|
## Creating custom file rules
|
||||||
|
|
||||||
|
[File rules](select-types-of-rules-to-create.md#windows-defender-application-control-file-rule-levels) in an application control policy will specify the level at which applications will be identified and trusted. File rules are the main mechanism for defining trust in the application control policy. Selecting the **+ Custom Rules** will open the custom file rule conditions panel to create custom file rules for your policy. The Wizard supports four types of file rules:
|
||||||
|
|
||||||
|
### Publisher Rules
|
||||||
|
|
||||||
|
The Publisher file rule type uses properties in the code signing certificate chain to base file rules. Once the file to base the rule off of, called the *reference file*, is selected, use the slider to indicate the specificity of the rule. The table below shows the relationship between the slider placement, the corresponding WDAC rule level and its description. The lower the placement on the table and the UI slider, the greater the specificity of the rule.
|
||||||
|
|
||||||
|
| Rule Condition | WDAC Rule Level | Description |
|
||||||
|
|------------ | ----------- | ----------- |
|
||||||
|
| **Issuing CA** | PCACertificate | Highest available certificate is added to the signers. This is typically the PCA certificate, one level below the root certificate. Any file signed by this certificate will be affected. |
|
||||||
|
| **Publisher** | Publisher | This rule is a combination of the PCACertificate rule and the common name (CN) of the leaf certificate. Any file signed by a major CA but with a leaf from a specific company, for example a device driver corp, is affected. |
|
||||||
|
| **File version** | SignedVersion | This rule is a combination of PCACertificate, publisher, and a version number. Anything from the specified publisher with a version at or above the one specified is affected. |
|
||||||
|
| **File name** | FilePublisher | Most specific. Combination of the file name, publisher, and PCA certificate as well as a minimum version number. Files from the publisher with the specified name and greater or equal to the specified version are affected. |
|
||||||
|
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
### Filepath Rules
|
||||||
|
|
||||||
|
Filepath rules do not provide the same security guarantees that explicit signer rules do, as they are based on mutable access permissions. To create a filepath rule, select the file using the *Browse* button.
|
||||||
|
|
||||||
|
### File Attribute Rules
|
||||||
|
|
||||||
|
The Wizard supports the creation of [file name rules](select-types-of-rules-to-create.md#windows-defender-application-control-filename-rules) based on authenticated file attributes. File name rules are useful when an application and its dependencies (for example, DLLs) may all share the same product name, for instance. This rule level allows users to easily create targeted policies based on the Product Name file name parameter. To select the file attribute to create the rule, move the slider on the Wizard to the desired attribute. The table below describes each of the supported file attributes off which to create a rule.
|
||||||
|
|
||||||
|
| Rule level | Description |
|
||||||
|
|------------ | ----------- |
|
||||||
|
| **Original Filename** | Specifies the original file name, or the name with which the file was first created, of the binary. |
|
||||||
|
| **File description** | Specifies the file description provided by the developer of the binary. |
|
||||||
|
| **Product name** | Specifies the name of the product with which the binary ships. |
|
||||||
|
| **Internal name** | Specifies the internal name of the binary. |
|
||||||
|
|
||||||
|
> [!div class="mx-imgBorder"]
|
||||||
|
> 
|
||||||
|
|
||||||
|
### File Hash Rules
|
||||||
|
|
||||||
|
Lastly, the Wizard supports creating file rules using the hash of the file. Although this level is specific, it can cause additional administrative overhead to maintain the current product versions’ hash values. Each time a binary is updated, the hash value changes, therefore requiring a policy update. By default, the Wizard will use file hash as the fallback in case a file rule cannot be created using the specified file rule level.
|
||||||
|
|
||||||
|
|
||||||
|
#### Deleting Signing Rules
|
||||||
|
|
||||||
|
The policy signing rules list table on the left of the page will document the allow and deny rules in the template, as well as any custom rules you create. Template signing rules and custom rules can be deleted from the policy by selecting the rule from the rules list table. Once the rule is highlighted, press the delete button underneath the table. you will be prompted for additional confirmation. Select `Yes` to remove the rule from the policy and the rules table.
|
||||||
|
|
||||||
|
## Up next
|
||||||
|
|
||||||
|
- [Editing a WDAC policy using the Wizard](wdac-wizard-editing-policy.md)
|
@ -0,0 +1,111 @@
|
|||||||
|
---
|
||||||
|
title: Windows Defender Application Control Wizard Supplemental Policy Creation
|
||||||
|
description: Creating supplemental application control policies with the WDAC Wizard.
|
||||||
|
keywords: allowlisting, blocklisting, security, malware, supplemental policy
|
||||||
|
ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb
|
||||||
|
ms.prod: w10
|
||||||
|
ms.mktglfcycl: deploy
|
||||||
|
ms.sitesec: library
|
||||||
|
ms.pagetype: security
|
||||||
|
ms.localizationpriority: medium
|
||||||
|
audience: ITPro
|
||||||
|
ms.collection: M365-security-compliance
|
||||||
|
author: jgeurten
|
||||||
|
ms.reviewer: isbrahm
|
||||||
|
ms.author: dansimp
|
||||||
|
manager: dansimp
|
||||||
|
ms.topic: conceptual
|
||||||
|
ms.date: 10/14/2020
|
||||||
|
---
|
||||||
|
|
||||||
|
# Creating a new Supplemental Policy with the Wizard
|
||||||
|
|
||||||
|
**Applies to**
|
||||||
|
- Windows 10
|
||||||
|
- Windows Server 2016 and above
|
||||||
|
|
||||||
|
Beginning in Windows 10 version 1903, WDAC supports the creation of multiple active policies on a device. One or more supplemental policies allow customers to expand a [WDAC base policy](wdac-wizard-create-base-policy.md) to increase the circle of trust of the policy. A supplemental policy can expand only one base policy, but multiple supplementals can expand the same base policy. When using supplemental policies, applications allowed by the base or its supplemental policy/policies will be allowed to execute.
|
||||||
|
|
||||||
|
Prerequisite information about application control can be accessed through the [WDAC design guide](windows-defender-application-control-design-guide.md). This page outlines the steps to create a supplemental application control policy, configure the policy options, and the signer and file rules.
|
||||||
|
|
||||||
|
## Expanding a Base Policy
|
||||||
|
|
||||||
|
Once the Supplemental Policy type is chosen on the New Policy page, policy name and file dialog fields can be used to name and save the supplemental policy. The next step requires selecting a base policy to expand. To expand a base policy, the base must allow supplemental policies. The WDAC Wizard will verify if the base policy allows supplementals and will show the following confirmation.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
If the base policy is not configured for supplemental policies, the Wizard will attempt to convert the policy to one that can be supplemented. Once successful, the Wizard will show a dialog demonstrating that the addition of the Allow Supplemental Policy rule was completed.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
Policies that cannot be supplemented, for instance, a supplemental policy, will be detected by the Wizard and will show the following error. Only a base policy can be supplemented. More information on supplemental policies can be found on our [Multiple Policies article](deploy-multiple-windows-defender-application-control-policies.md).
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
## Configuring Policy Rules
|
||||||
|
|
||||||
|
Upon page launch, policy rules will be automatically enabled/disabled depending on the chosen base policy from the previous page. Most of the supplemental policy rules must be inherited from the base policy. The Wizard will automatically parse the base policy and set the required supplemental policy rules to match the base policy rules. Inherited policy rules will be grayed out and will not be modifiable in the user interface.
|
||||||
|
|
||||||
|
A short description of the rule will be shown at the bottom of the page when the cursor is placed on the rule title.
|
||||||
|
|
||||||
|
### Configurable Supplemental Policy Rules Description
|
||||||
|
|
||||||
|
There are only three policy rules that can be configured by the supplemental policy. A description of each policy rule, beginning with the left-most column, is provided below. Selecting the **+ Advanced Options** label will show another column of policy rules; advanced policy rules.
|
||||||
|
|
||||||
|
|
||||||
|
| Rule option | Description |
|
||||||
|
|------------ | ----------- |
|
||||||
|
| **Intelligent Security Graph Authorization** | Use this option to automatically allow applications with "known good" reputation as defined by Microsoft’s Intelligent Security Graph (ISG). |
|
||||||
|
| **Managed Installer** | Use this option to automatically allow applications installed by a software distribution solution, such as Microsoft Endpoint Configuration Manager, that has been defined as a managed installer. |
|
||||||
|
| **Disable Runtime FilePath Rule Protection** | Disable default FilePath rule protection (apps and executables allowed based on file path rules must come from a file path that’s only writable by an administrator) for any FileRule that allows a file based on FilePath. |
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
## Creating custom file rules
|
||||||
|
|
||||||
|
File rules in an application control policy will specify the level at which applications will be identified and trusted. File rules are the main mechanism for defining trust in the application control policy. Selecting the **+ Custom Rules** will open the custom file rule conditions panel to create and customize targeted file rules for your policy. The Wizard supports four types of file rules:
|
||||||
|
|
||||||
|
### Publisher Rules
|
||||||
|
|
||||||
|
The Publisher file rule type uses properties in the code signing certificate chain to base file rules. Once the file to base the rule off of, called the *reference file*, is selected, use the slider to indicate the specificity of the rule. The table below shows the relationship between the slider placement, the corresponding WDAC rule level, and its description. The lower the placement on the table and the UI slider, the greater the specificity of the rule.
|
||||||
|
|
||||||
|
| Rule Condition | WDAC Rule Level | Description |
|
||||||
|
|------------ | ----------- | ----------- |
|
||||||
|
| **Issuing CA** | PCACertificate | Highest available certificate is added to the signers. This certificate is typically the PCA certificate, one level below the root certificate. Any file signed by this certificate will be affected. |
|
||||||
|
| **Publisher** | Publisher | This rule is a combination of the PCACertificate rule and the common name (CN) of the leaf certificate. Any file signed by a major CA but with a leaf from a specific company, for example a device driver publisher, is affected. |
|
||||||
|
| **File version** | SignedVersion | This rule is a combination of the PCACertificate and Publisher rule, and a version number. Anything from the specified publisher with a version at or above the one specified is affected. |
|
||||||
|
| **File name** | FilePublisher | Most specific. Combination of the file name, publisher, and PCA certificate and a minimum version number. Files from the publisher with the specified name and greater or equal to the specified version are affected. |
|
||||||
|
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
### Filepath Rules
|
||||||
|
|
||||||
|
Filepath rules do not provide the same security guarantees that explicit signer rules do, as they are based on mutable access permissions. To create a filepath rule, select the file using the *Browse* button.
|
||||||
|
|
||||||
|
### File Attribute Rules
|
||||||
|
|
||||||
|
The Wizard supports the creation of [file name rules](select-types-of-rules-to-create.md#windows-defender-application-control-filename-rules) based on authenticated file attributes. File name rules are useful when an application and its dependencies (for example, DLLs) may all share the same product name, for instance. This rule level allows users to easily create targeted policies based on the Product Name file name. To select the file attribute to create the rule, move the slider on the Wizard to the desired attribute. The table below describes each of the supported file attributes off which to create a rule.
|
||||||
|
|
||||||
|
| Rule level | Description |
|
||||||
|
|------------ | ----------- |
|
||||||
|
| **Original Filename** | Specifies the original file name, or the name with which the file was first created, of the binary. |
|
||||||
|
| **File description** | Specifies the file description provided by the developer of the binary. |
|
||||||
|
| **Product name** | Specifies the name of the product with which the binary ships. |
|
||||||
|
| **Internal name** | Specifies the internal name of the binary. |
|
||||||
|
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
### File Hash Rules
|
||||||
|
|
||||||
|
Lastly, the Wizard supports creating file rules using the hash of the file. Although this level is specific, it can cause extra administrative overhead to maintain the current product versions’ hash values. Each time a binary is updated, the hash value changes, therefore requiring a policy update. By default, the Wizard will use file hash as the fallback in case a file rule cannot be created using the specified file rule level.
|
||||||
|
|
||||||
|
|
||||||
|
#### Deleting Signing Rules
|
||||||
|
|
||||||
|
The table on the left of the page will document the allow and deny rules in the template, and any custom rules you create. Rules can be deleted from the policy by selecting the rule from the rules list table. Once the rule is highlighted, press the delete button underneath the table. you will be prompted for additional confirmation. Select `Yes` to remove the rule from the policy and the rules table.
|
||||||
|
|
||||||
|
## Up next
|
||||||
|
|
||||||
|
- [Editing a WDAC policy using the Wizard](wdac-wizard-editing-policy.md)
|
@ -0,0 +1,72 @@
|
|||||||
|
---
|
||||||
|
title: Editing Windows Defender Application Control Policies with the Wizard
|
||||||
|
description: Editing existing base and supplemental policies with the Microsoft WDAC Wizard.
|
||||||
|
keywords: allowlisting, blocklisting, security, malware
|
||||||
|
ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb
|
||||||
|
ms.prod: w10
|
||||||
|
ms.mktglfcycl: deploy
|
||||||
|
ms.sitesec: library
|
||||||
|
ms.pagetype: security
|
||||||
|
ms.localizationpriority: medium
|
||||||
|
audience: ITPro
|
||||||
|
ms.collection: M365-security-compliance
|
||||||
|
author: jgeurten
|
||||||
|
ms.reviewer: isbrahm
|
||||||
|
ms.author: dansimp
|
||||||
|
manager: dansimp
|
||||||
|
ms.topic: conceptual
|
||||||
|
ms.date: 10/14/2020
|
||||||
|
---
|
||||||
|
|
||||||
|
# Editing existing base and supplemental WDAC policies with the Wizard
|
||||||
|
|
||||||
|
**Applies to**
|
||||||
|
- Windows 10
|
||||||
|
- Windows Server 2016 and above
|
||||||
|
|
||||||
|
The WDAC Wizard makes editing and viewing WDAC policies easier than the PowerShell cmdlets or manually. The Wizard currently supports the following editing capabilities:
|
||||||
|
<ul>
|
||||||
|
<li>[Configuring policy rules](#configuring-policy-rules)</li>
|
||||||
|
<li>[Adding new allow or block file rules to existing policies](#adding-file-rules)</li>
|
||||||
|
<li>[Removing allow or block file rules on existing policies](#removing-file-rules)</li>
|
||||||
|
</ul>
|
||||||
|
|
||||||
|
## Configuring Policy Rules
|
||||||
|
|
||||||
|
The `Policy Rules` page will load with the in-edit policy rules configured per the set rules. Selecting the `+ Advanced Options` button will reveal the advanced policy rule options panel. This grouping of rules contains additional policy rule options that are less common to the majority of users. To edit any of the rules, flip the corresponding policy rule state. For instance, to disable Audit Mode and enable Enforcement Mode in the figure below, the button beside the `Audit Mode` label needs only to be pressed. Once the policy rules are configured, select the Next button to continue the next stage of editing: [Adding File Rules](#adding-file-rules).
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
A description of the policy rule is shown at the bottom of the page when the cursor is placed over the rule title. For a complete list of the policy rules and their capabilities, see the [Windows Defender Application Control policy rules table](select-types-of-rules-to-create.md#windows-defender-application-control-policy-rules).
|
||||||
|
|
||||||
|
## Adding File Rules
|
||||||
|
|
||||||
|
The WDAC Wizard allows users to add rules to their existing policy seamlessly. Previously, this would have involved creating a new policy with the new rules and merging it with the existing policy.
|
||||||
|
|
||||||
|
Selecting the `+ Custom Rules` button will open the Custom Rules panel. For more information on creating new policy file rules, see the guidelines provided in the [creating policy file rules section](wdac-wizard-create-base-policy.md#creating-custom-file-rules).
|
||||||
|
|
||||||
|
## Removing File Rules
|
||||||
|
|
||||||
|
The WDAC Wizard makes deleting file rules from an existing policy quick and easy. To remove any type of file rule: publisher rule, path rule, filename rule, or a hash rule, select the rule in the `Policy Signing Rules List` table on the left-hand side of the page. Selecting the rule will highlight the entire row. Once the row is highlighted, select the remove icon underneath the table. The Wizard will prompt for user confirmation before removing the file rule. Once removed, the rule will no longer appear in the policy or the table.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
**Note:** removing a publisher rule will also remove the associated File Attribute rules. For instance, in the xml block below, removing ID_SIGNER_CONTOSO_PUBLISHER would also remove the rules ID_FILEATTRIB_LOB_APP_1 and ID_FILEATTRIB_LOB_APP_2.
|
||||||
|
|
||||||
|
```xml
|
||||||
|
<Signer ID="ID_SIGNER_CONTOSO_PUBLISHER" Name="Contoso LOB Publisher CA">
|
||||||
|
<CertRoot Type="TBS" Value="0123456789ABCDEF0123456789ABCDEF0123456789ABCDEF0123456789ABCDEF" />
|
||||||
|
<CertPublisher Value="Contoso IT Dept App Publisher" />
|
||||||
|
<FileAttribRef RuleID="ID_FILEATTRIB_LOB_APP_1" />
|
||||||
|
<FileAttribRef RuleID="ID_FILEATTRIB_LOB_APP_2" />
|
||||||
|
```
|
||||||
|
|
||||||
|
[comment]: <> (## Editing File Rules Coming soon!)
|
||||||
|
|
||||||
|
### Policy Creation
|
||||||
|
|
||||||
|
Once the policy is created, the new policy will be written to the same path as the in-edit policy. The new policy file name will have the policy version appended to the end of the file name. For instance, if the in-edit policy is saved at MyDocuments\BasePolicy.xml, after edit, the new policy will be saved at MyDocuments\BasePolicy_v10.0.0.1.xml.
|
||||||
|
|
||||||
|
## Up next
|
||||||
|
|
||||||
|
- [Merging WDAC policies using the Wizard](wdac-wizard-merging-policies.md)
|
@ -0,0 +1,32 @@
|
|||||||
|
---
|
||||||
|
title: Windows Defender Application Control Wizard Policy Merging Operation
|
||||||
|
description: Merging multiple policies into a single application control policy with the Microsoft WDAC Wizard.
|
||||||
|
keywords: allowlisting, blocklisting, security, malware
|
||||||
|
ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb
|
||||||
|
ms.prod: w10
|
||||||
|
ms.mktglfcycl: deploy
|
||||||
|
ms.sitesec: library
|
||||||
|
ms.pagetype: security
|
||||||
|
ms.localizationpriority: medium
|
||||||
|
audience: ITPro
|
||||||
|
ms.collection: M365-security-compliance
|
||||||
|
author: jgeurten
|
||||||
|
ms.reviewer: isbrahm
|
||||||
|
ms.author: dansimp
|
||||||
|
manager: dansimp
|
||||||
|
ms.topic: conceptual
|
||||||
|
ms.date: 10/14/2020
|
||||||
|
---
|
||||||
|
|
||||||
|
# Merging existing policies with the WDAC Wizard
|
||||||
|
|
||||||
|
Beginning in Windows 10 version 1903, WDAC supports multiple policies. Before version 1903, however, Windows 10 could only have one WDAC policy. Consequently, users were required to merge multiple WDAC policies into one. The WDAC Wizard has a simple to use user interface to allow users to merge multiple WDAC policies. The Wizard can support up to 15 policy files as input during the merge workflow.
|
||||||
|
|
||||||
|
Select the policies you wish to merge into one policy using the `+ Add Policy` button under the table. Once added, policies will be enumerated within the table. To remove a policy from the table, if accidentally added, highlight the policy row and select the `- Remove Policy` button. Confirmation will be required before the policy is withdrawn from the table.
|
||||||
|
|
||||||
|
> [!NOTE]
|
||||||
|
> The policy type and ID of the final output policy will be determined based on the type and ID of the **first policy** in the policy list table. For instance, if a legacy policy format policy and a multi-policy format policy are merged together, the output format of the policy will be whichever policy is specified first in the table. For more information on policy formats, visit the [Multiple WDAC Policies page](deploy-multiple-windows-defender-application-control-policies.md).
|
||||||
|
|
||||||
|
Lastly, select a filepath save location for the final merged policy using the `Browse` button. If a minimum of two policies are selected, and the save location is specified, select the `Next` button to build the policy.
|
||||||
|
|
||||||
|

|
@ -0,0 +1,50 @@
|
|||||||
|
---
|
||||||
|
title: Windows Defender Application Control Wizard
|
||||||
|
description: Microsoft Defender Application Control Wizard (WDAC) Wizard allows users to create, edit, and merge application control policies in a simple to use Windows application.
|
||||||
|
keywords: allowlisting, blocklisting, security, malware
|
||||||
|
ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb
|
||||||
|
ms.prod: w10
|
||||||
|
ms.mktglfcycl: deploy
|
||||||
|
ms.sitesec: library
|
||||||
|
ms.pagetype: security
|
||||||
|
ms.localizationpriority: medium
|
||||||
|
audience: ITPro
|
||||||
|
ms.collection: M365-security-compliance
|
||||||
|
author: jgeurten
|
||||||
|
ms.reviewer: isbrahm
|
||||||
|
ms.author: dansimp
|
||||||
|
manager: dansimp
|
||||||
|
ms.topic: conceptual
|
||||||
|
ms.date: 10/14/2020
|
||||||
|
---
|
||||||
|
|
||||||
|
# Windows Defender Application Control Wizard
|
||||||
|
|
||||||
|
**Applies to:**
|
||||||
|
|
||||||
|
- Windows 10
|
||||||
|
- Windows Server 2016 and above
|
||||||
|
|
||||||
|
The Windows Defender Application Control (WDAC) policy Wizard is an open source Windows desktop application written in C# and bundled as an MSIX package. The Wizard was built to provide security architects, security and system administrators with a more user-friendly means to create, edit, and merge WDAC policies. The Wizard desktop application uses the [ConfigCI PowerShell Cmdlets](https://docs.microsoft.com/powershell/module/configci) in the backend so the output policy of the Wizard and PowerShell cmdlets is identical.
|
||||||
|
|
||||||
|
## Downloading the application
|
||||||
|
|
||||||
|
The WDAC Wizard can be downloaded from the official [Wizard installer website](https://bit.ly/3koHwYs) as an MSIX packaged application. The Wizard's source code is available as part of Microsoft's Open Source Software offerings on GitHub at the [WDAC Wizard Repo](https://github.com/MicrosoftDocs/WDAC-Toolkit).
|
||||||
|
|
||||||
|
**Supported Clients**
|
||||||
|
|
||||||
|
As the WDAC Wizard uses the cmdlets in the background, the Wizard is functional on clients only where the cmdlets are supported as outlined in [WDAC feature availability](feature-availability.md). Specifically, the tool will verify that the client meets one of the following requirements:
|
||||||
|
|
||||||
|
- Windows builds 1909+
|
||||||
|
- For pre-1909 builds, the Enterprise SKU of Windows is installed
|
||||||
|
|
||||||
|
If neither requirement is satisfied, the Wizard will throw an error as the cmdlets are not available.
|
||||||
|
|
||||||
|
## In this section
|
||||||
|
|
||||||
|
| Topic | Description |
|
||||||
|
| - | - |
|
||||||
|
| [Creating a new base policy](wdac-wizard-create-base-policy.md) | This article describes how to create a new base policy using one of the supplied policy templates. |
|
||||||
|
| [Creating a new supplemental policy](wdac-wizard-create-supplemental-policy.md) | This article describes the steps necessary to create a supplemental policy, from one of the supplied templates, for an existing base policy. |
|
||||||
|
| [Editing a base or supplemental policy](wdac-wizard-editing-policy.md) | This article demonstrates how to modify an existing policy and the Wizard's editing capabilities. |
|
||||||
|
| [Merging policies](wdac-wizard-merging-policies.md) | This article describes how to merge policies into a single application control policy. |
|
@ -45,5 +45,6 @@ Once these business factors are in place, you are ready to begin planning your W
|
|||||||
| [Understand WDAC policy design decisions](understand-windows-defender-application-control-policy-design-decisions.md) | This topic lists the design questions, possible answers, and ramifications of the decisions when you plan a deployment of application control policies. |
|
| [Understand WDAC policy design decisions](understand-windows-defender-application-control-policy-design-decisions.md) | This topic lists the design questions, possible answers, and ramifications of the decisions when you plan a deployment of application control policies. |
|
||||||
| [Understand WDAC policy rules and file rules](select-types-of-rules-to-create.md) | This topic lists resources you can use when selecting your application control policy rules by using WDAC. |
|
| [Understand WDAC policy rules and file rules](select-types-of-rules-to-create.md) | This topic lists resources you can use when selecting your application control policy rules by using WDAC. |
|
||||||
| [Policy creation for common WDAC usage scenarios](types-of-devices.md) | This set of topics outlines common use case scenarios and helps you begin to develop a plan for deploying WDAC in your organization. |
|
| [Policy creation for common WDAC usage scenarios](types-of-devices.md) | This set of topics outlines common use case scenarios and helps you begin to develop a plan for deploying WDAC in your organization. |
|
||||||
|
| [Policy creation using the WDAC Wizard tool](wdac-wizard.md) | This set of topics describes how to use the WDAC Wizard desktop app to easily create, edit and merge WDAC policies. |
|
||||||
|
|
||||||
After planning is complete, the next step is to deploy WDAC. The [Windows Defender Application Control Deployment Guide](windows-defender-application-control-deployment-guide.md) covers the creation and testing of policies, deploying the enforcement setting, and managing and maintaining the policies.
|
After planning is complete, the next step is to deploy WDAC. The [Windows Defender Application Control Deployment Guide](windows-defender-application-control-deployment-guide.md) covers the creation and testing of policies, deploying the enforcement setting, and managing and maintaining the policies.
|
||||||
|