Added known issues page for AppId Tagging policies

This commit is contained in:
Jordan Geurten
2023-05-26 12:08:00 -04:00
parent 8b6821dad9
commit 80ec8c1157
5 changed files with 50 additions and 0 deletions

View File

@ -38,6 +38,10 @@ You can use the Windows Defender Application Control (WDAC) Wizard and the Power
Start with the Policy Creator task and select Multiple Policy Format and Base Policy. Select the Base Template to use for the policy. The example below shows beginning with the [Default Windows Mode](../wdac-wizard-create-base-policy.md#template-base-policies) template and build on top of these rules. Start with the Policy Creator task and select Multiple Policy Format and Base Policy. Select the Base Template to use for the policy. The example below shows beginning with the [Default Windows Mode](../wdac-wizard-create-base-policy.md#template-base-policies) template and build on top of these rules.
![Configuring the policy base and template.](../images/appid-wdac-wizard-1.png) ![Configuring the policy base and template.](../images/appid-wdac-wizard-1.png)
> [!NOTE]
> If your AppId Tagging Policy does build off the base templates or does not allow Windows in-box processes, you will notice significant performance regressions, especially during boot. For this reason, it is strongly recommended to build off the base templates. Otherwise, see the [AppId Tagging Known Issues page](./known-issues-appid-tagging-policies).
2. Set the following rule-options using the Wizard toggles: 2. Set the following rule-options using the Wizard toggles:

View File

@ -0,0 +1,44 @@
---
title: Known Issues with Windows Defender Application Control AppId Tagging Policies
description: Issues known to Microsoft with Windows Defender Application Control AppId tagging policies.
keywords: security, malware
ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb
ms.prod: windows-client
ms.mktglfcycl: deploy
ms.sitesec: library
ms.pagetype: security
ms.localizationpriority: medium
audience: ITPro
author: jgeurten
ms.reviewer: jsuther1974
ms.author: jogeurte
manager: justher
ms.date: 05/26/2023
ms.technology: itpro-security
ms.topic: article
---
# WDAC AppId Tagging Policies Known Issues
**Applies to:**
- Windows 10
- Windows 11
- Windows Server 2022 and above
This article covers tips and mitigations for known issues with Windows Defender Application Control (WDAC) AppId Tagging Policies. Test this configuration in your lab before enabling it in production.
## Known Issues
### Slow Boot and Performance Regressions
If the AppId Tagging Policy was not built off the WDAC base templates or does not allow the Windows in-box signers, you will notice a significant increase in boot times (~2 minutes).
If you cannot allowlist the Windows signers, or build off the WDAC base templates, you can create the following rule to your policies to improve the performance:
![Allow all DLLs in the policy](../images/appid-DLL-rule.png)
![Allow all DLLs in the policy](../images/appid-DLL-rule-xml.png)
Since AppId Tagging policies evaluate but cannot tag DLLs, this rule will short circuit DLL evaluation and improve evaluation performance.

View File

@ -130,6 +130,8 @@
href: AppIdTagging/deploy-appid-tagging-policies.md href: AppIdTagging/deploy-appid-tagging-policies.md
- name: Testing and Debugging AppId Tagging Policies - name: Testing and Debugging AppId Tagging Policies
href: AppIdTagging/debugging-operational-guide-appid-tagging-policies.md href: AppIdTagging/debugging-operational-guide-appid-tagging-policies.md
- name: AppId Tagging Policies Known Issues
href: AppIdTagging/known-issues-appid-tagging-policies.md
- name: AppLocker - name: AppLocker
href: applocker\applocker-overview.md href: applocker\applocker-overview.md
items: items:

Binary file not shown.

After

Width:  |  Height:  |  Size: 30 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 52 KiB