mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-13 13:57:22 +00:00
Update querying-application-control-events-centrally-using-advanced-hunting.md
This commit is contained in:
parent
82eb5fd829
commit
b24797ff9a
@ -30,15 +30,29 @@ This capability is supported beginning with Windows version 1607.
|
||||
|
||||
## Action Types
|
||||
|
||||
| ActionType Name | Description |
|
||||
| - | - |
|
||||
| AppControlPolicyApplied | WDAC policy successfully deployed event |
|
||||
| AppControlExecutableAudited | WDAC policy user mode binary audited |
|
||||
| AppControlCodeIntegritySigningInformation | WDAC policy user mode binary audit event associated signing information |
|
||||
| AppControlCodeIntegrityPolicyAudited | |
|
||||
| AppControlCodeIntegrityOriginAudited | The user mode binary would have been blocked because of managed installer or the reputation returned by ISG. Since the policy is in audit mode, the app was allowed to run |
|
||||
| AppControlCodeIntegrityOriginAllowed | The user mode binary was allowed because of managed installer or the reputation returned by ISG |
|
||||
| AppControlCIScriptAudited | The script would have been blocked by WDAC. Since the policy is in audit mode, the app was allowed to run |
|
||||
| ActionType Name | ETW Source Event ID | Description |
|
||||
| - | - | - |
|
||||
| AppControlCodeIntegrityDriverRevoked | 3023 | The driver file under validation did not meet the requirements to pass the application control policy. |
|
||||
| AppControlCodeIntegrityImageRevoked | 3036 | The signed file under validation is signed by a code signing certificate that has been revoked by Microsoft or the certificate issuing authority. |
|
||||
| AppControlCodeIntegrityPolicyAudited | 3076 | This event is the main WDAC block event for audit mode policies. It indicates that the file would have been blocked if the WDAC policy was enforced. |
|
||||
| AppControlCodeIntegrityPolicyBlocked | 3077 | This event is the main WDAC block event for enforced policies. It indicates that the file did not pass your WDAC policy and was blocked. |
|
||||
| AppControlExecutableAudited | 8003 | Applied only when the Audit only enforcement mode is enabled. Specifies that the .exe or .dll file would be blocked if the Enforce rules enforcement mode were enabled. |
|
||||
| AppControlExecutableBlocked | 8004 | The .exe or .dll file cannot run. |
|
||||
| AppControlPackagedAppAudited | 8021 | Applied only when the Audit only enforcement mode is enabled. Specifies that the packaged app would be blocked if the Enforce rules enforcement mode were enabled. |
|
||||
| AppControlPackagedAppBlocked | 8022 | The packaged app was blocked by the policy. |
|
||||
| AppControlScriptAudited | 8006 | Applied only when the Audit only enforcement mode is enabled. Specifies that the script or .msi file would be blocked if the Enforce rules enforcement mode were enabled. |
|
||||
| AppControlScriptBlocked | 8007 | Access to <file name> is restricted by the administrator. Applied only when the Enforce rules enforcement mode is set either directly or indirectly through Group Policy inheritance. The script or .msi file cannot run. |
|
||||
| AppControlCIScriptAudited | 8028 | Audit script/MSI file generated by Windows LockDown Policy (WLDP) being called by the scripthosts themselves. |
|
||||
| AppControlCIScriptBlocked | 8029 | Block script/MSI file generated by Windows LockDown Policy (WLDP) being called by the scripthosts themselves. |
|
||||
| AppControlCodeIntegrityOriginAllowed | 3090 | File was allowed due to good reputation (ISG) or installation source (managed installer). |
|
||||
| AppControlCodeIntegrityOriginAudited | 3091 | Reputation (ISG) and installation source (managed installer) information for an audited file. |
|
||||
| AppControlCodeIntegrityOriginBlocked | 3092 | Reputation (ISG) and installation source (managed installer) information for a blocked file. |
|
||||
| AppControlCodeIntegrityPolicyLoaded | 3099 | Indicates that a policy has been successfully loaded. |
|
||||
| AppControlCodeIntegritySigningInformation | 3089 | Signing information event correlated with either a 3076 or 3077 event. One 3089 event is generated for each signature of a file. |
|
||||
| AppControlPolicyApplied | 8001 | Indicates that the AppLocker policy was successfully applied to the computer. |
|
||||
|
||||
Learn more about the [Understanding Application Control event IDs (Windows)](event-id-explanations)
|
||||
|
||||
|
||||
Here is a simple example query that shows all the WDAC events generated in the last seven days from machines being monitored by Microsoft Defender for Endpoint:
|
||||
|
||||
@ -57,8 +71,9 @@ The query results can be used for several important functions related to managin
|
||||
- Monitoring blocks from policies in enforced mode
|
||||
Policies deployed in enforced mode may block executables or scripts that fail to meet any of the included allow rules. Legitimate new applications and updates or potentially unwanted or malicious software could be blocked. In either case, the Advanced hunting queries report the blocks for further investigation.
|
||||
|
||||
Query Example 1:
|
||||
Context: Query the application control action types summarized by type for past 7 days
|
||||
## Example Advanced Hunting Application Control Queries ##
|
||||
Query Example 1: Query the application control action types summarized by type for past 7 days
|
||||
|
||||
```
|
||||
DeviceEvents
|
||||
| where Timestamp > ago(7d)
|
||||
@ -67,9 +82,8 @@ DeviceEvents
|
||||
| order by Count desc
|
||||
```
|
||||
|
||||
Query Example #2:
|
||||
Query Example #2: Query to determine audit blocks in the past 7 days
|
||||
|
||||
Context: Query to determine audit blocks in the past 7 days
|
||||
```
|
||||
DeviceEvents
|
||||
| where ActionType startswith "AppControlExecutableAudited"
|
||||
|
Loading…
x
Reference in New Issue
Block a user