mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-14 06:17:22 +00:00
Update deploy-managed-installer-for-device-guard.md
Updated references to code integrity to reflect WDAC branding. Also made some minor changes to fix issues or resolve confusing sections.
This commit is contained in:
parent
17162ea24e
commit
d225d27341
@ -9,9 +9,9 @@ author: mdsakibMSFT
|
||||
ms.date: 10/20/2017
|
||||
---
|
||||
|
||||
# Deploy Managed Installer for Windows Defender Device Guard
|
||||
# Deploy Managed Installer for Windows Defender Application Control
|
||||
|
||||
Creating and maintaining application execution control policies has always been challenging, and finding ways to address this issue has been a frequently-cited request for customers of AppLocker and Windows Defender Device Guard [configurable code integrity (CI)](device-guard-deployment-guide.md).
|
||||
Creating and maintaining application execution control policies has always been challenging, and finding ways to address this issue has been a frequently-cited request for customers of AppLocker and [Windows Defender Application Control (WDAC)](device-guard-deployment-guide.md).
|
||||
This is especially true for enterprises with large, ever changing software catalogs.
|
||||
|
||||
Windows 10, version 1703 (also known as the Windows 10 Creators Update) provides a new option, known as a managed installer, that allows IT administrators to automatically authorize applications deployed and installed by a designated software distribution solution, such as System Center Configuration Manager.
|
||||
@ -22,23 +22,23 @@ A managed installer helps an IT admin balance security and manageability require
|
||||
A managed installer uses a new rule collection in AppLocker to specify one or more executables that are trusted by the organization as an authorized source for application deployment.
|
||||
Specifying an executable as a managed installer will cause Windows to tag files that are written from the executable’s process (or processes it launches) as having originated from a trusted installation authority.
|
||||
|
||||
Once the IT administrator adds the Allow: Managed Installer option to a configurable CI policy for Windows Defender Device Guard, the configurable CI component will subsequently check for the presence of the origin information when evaluating other application execution control rules specified in the policy.
|
||||
Once the IT administrator adds the Allow: Managed Installer option to a WDAC policy, the WDAC component will subsequently check for the presence of the origin information when evaluating other application execution control rules specified in the policy.
|
||||
If there are no deny rules present for the file, it will be authorized based on the managed installer origin information.
|
||||
|
||||
> [!NOTE]
|
||||
> Admins needs to ensure that there is a CI policy in place to allow the system to boot and run any other authorized applications that may not be deployed through a managed installer.
|
||||
> Admins needs to ensure that there is a WDAC policy in place to allow the system to boot and run any other authorized applications that may not be deployed through a managed installer.
|
||||
>
|
||||
> Examples of CI policies available in C:\Windows\schemas\CodeIntegrity\ExamplePolicies help authorize Windows OS components, WHQL signed drivers and all Store apps.
|
||||
> Admins can reference and customize them as needed for their Windows Defender Device Guard deployment.
|
||||
> Examples of WDAC policies available in C:\Windows\schemas\CodeIntegrity\ExamplePolicies help authorize Windows OS components, WHQL signed drivers and all Store apps.
|
||||
> Admins can reference and customize them as needed for their Windows Defender Application Control deployment or create a custom WDAC policy as described in [Deploy Windows Defender Application Control: steps](deploy-code-integrity-policies-steps.md#create-a-windows-defender-application-control-policy-from-a-reference-computer).
|
||||
|
||||
## Configuring a managed installer with AppLocker and configurable code integrity policy
|
||||
## Configuring a managed installer with AppLocker and Windows Defender Application Control
|
||||
|
||||
Setting up managed installer tracking and application execution enforcement requires applying both an AppLocker and configurable CI policy with specific rules and options enabled.
|
||||
Setting up managed installer tracking and application execution enforcement requires applying both an AppLocker and WDAC policy with specific rules and options enabled.
|
||||
There are three primary steps to keep in mind:
|
||||
|
||||
- Specify managed installers using the Managed Installer rule collection in AppLocker policy
|
||||
- Enable service enforcement in AppLocker policy
|
||||
- Enable the managed installer option in a configurable CI policy
|
||||
- Enable the managed installer option in a WDAC policy
|
||||
|
||||
### Specify managed installers using the Managed Installer rule collection in AppLocker policy
|
||||
|
||||
@ -105,45 +105,29 @@ For example:
|
||||
</RuleCollection>
|
||||
```
|
||||
|
||||
### Enable the managed installer option in CI policy
|
||||
### Enable the managed installer option in WDAC policy
|
||||
|
||||
In order to enable trust for the binaries laid down by managed installers, the Allow: Managed Installer option must be specified in your configurable CI policy. .
|
||||
In order to enable trust for the binaries laid down by managed installers, the Allow: Managed Installer option must be specified in your WDAC policy.
|
||||
This can be done by using the [Set-RuleOption cmdlet](https://technet.microsoft.com/itpro/powershell/windows/configci/set-ruleoption).
|
||||
An example of the managed installer option being set in policy is shown below.
|
||||
|
||||
```code
|
||||
<Rules>
|
||||
|
||||
<Rule>
|
||||
|
||||
<Option>Enabled:Unsigned System Integrity Policy</Option>
|
||||
|
||||
</Rule>
|
||||
|
||||
<Rule>
|
||||
|
||||
<Option>Enabled:Advanced Boot Options Menu</Option>
|
||||
|
||||
</Rule>
|
||||
|
||||
<Rule>
|
||||
|
||||
<Option>Enabled:UMCI</Option>
|
||||
|
||||
</Rule>
|
||||
|
||||
<Rule>
|
||||
|
||||
<Option>Enabled:Inherit Default Policy</Option>
|
||||
|
||||
</Rule>
|
||||
|
||||
<Rule>
|
||||
|
||||
<Option>Enabled:Managed Installer </Option>
|
||||
|
||||
</Rule>
|
||||
|
||||
</Rules>
|
||||
```
|
||||
|
||||
@ -152,32 +136,31 @@ An example of the managed installer option being set in policy is shown below.
|
||||
Since managed installer is a heuristic-based mechanism, it does not provide the same security guarantees that explicit allow or deny rules do.
|
||||
It is best suited for deployment to systems where each user is configured as a standard user and where all software is deployed and installed by a software distribution solution, such as System Center Configuration Manager.
|
||||
|
||||
Users with administrator privileges on the system may be able to circumvent the intent of Windows Defender Device Guard configurable CI when the managed installer option is allowed.
|
||||
If the authorized managed installer process performs installations in the context of a user with standard privileges, then it is possible that standard users may be able to circumvent the intent of Windows Defender Device Guard configurable CI policy.
|
||||
In some cases, the heuristic tracking and authorizing applications may be active on the first execution of an application that is laid down from a designated managed installer.
|
||||
Typically, this would occur if the managed installer executes the application directly as part of the installation process.
|
||||
Users with administrator privileges or malware running as an administrator user on the system may be able to circumvent the intent of Windows Defender Application Control when the managed installer option is allowed.
|
||||
If the authorized managed installer process performs installations in the context of a user with standard privileges, then it is possible that standard users or malware running as standard user may be able to circumvent the intent of Windows Defender Application Control.
|
||||
Some application installers include an option to automatically run the application at the end of the installation process. If this happens when the installer is run by a managed installer, then the managed installer's heuristic tracking and authorization may continue to apply to all files created during the first run of the application. This could result in over-authorization for executables that were not intended.
|
||||
To avoid this, ensure that the application deployment solution being used as a managed installer limits running applications as part of installation.
|
||||
|
||||
## Known limitations with managed installer
|
||||
|
||||
- Application execution control based on managed installer does not support applications that self-update.
|
||||
If an application deployed by a managed installer subsequently updates itself, the updated application files will no longer include the managed installer origin EA information and will not be authorized to run.
|
||||
If an application deployed by a managed installer subsequently updates itself, the updated application files will no longer include the managed installer origin information and will not be authorized to run.
|
||||
Enterprises should deploy and install all application updates using the managed installer.
|
||||
In some cases, it may be possible to also designate an application binary that performs the self-updates as a managed installer.
|
||||
Proper review for functionality and security should be performed for the application before using this method.
|
||||
|
||||
- Although configurable CI policies can be deployed in both audit and enforced mode, the managed installer option is currently only recommended for use with policies set to enforced except in lab environments.
|
||||
Using the managed installer option with configurable CI policies set to audit only may result in unexpected behavior if the policy is subsequently changed to enforced mode.
|
||||
- Although WDAC policies can be deployed in both audit and enforced mode, the managed installer option is currently only recommended for use with policies set to enforced except in lab environments.
|
||||
Using the managed installer option with WDAC policies set to audit only may result in unexpected behavior if the policy is subsequently changed to enforced mode.
|
||||
|
||||
- Modern apps deployed through a managed installer will not be tracked by the heuristic and will need to be appropriately authorized in policy.
|
||||
- Modern apps deployed through a managed installer will not be tracked by the managed installer heuristic and will need to be separately authorized in your WDAC policy.
|
||||
|
||||
- Executables that extract files and then attempt to execute may fail the heuristic.
|
||||
- Executables that extract files and then attempt to execute may not be allowed by the managed installer heuristic.
|
||||
In some cases, it may be possible to also designate an application binary that performs such an operation as a managed installer.
|
||||
Proper review for functionality and security should be performed for the application before using this method.
|
||||
|
||||
- The managed installer heuristic does not authorize drivers.
|
||||
The configurable code integrity policy being used must have rules that allow the necessary drivers to run.
|
||||
The WDAC policy must have rules that allow the necessary drivers to run.
|
||||
|
||||
- In some cases, the code integrity logs will contain error events for native images generated for .NET assemblies.
|
||||
- In some cases, the code integrity logs where WDAC errors and warnings are written will contain error events for native images generated for .NET assemblies.
|
||||
Typically, the error is functionally benign as a blocked native image will result in the corresponding assembly being re-interpreted.
|
||||
Review for functionality and performance for the related applications using the native images maybe necessary in some cases.
|
Loading…
x
Reference in New Issue
Block a user