Merge pull request #3659 from MicrosoftDocs/master
Publish 8/28/2020 10:30 AM PT
@ -38,11 +38,10 @@ Organizations that use Windows Server Update Services (WSUS) must take action to
|
|||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> You must download the FOD .cab file that matches your operating system version.
|
> You must download the FOD .cab file that matches your operating system version.
|
||||||
|
|
||||||
1. Use `Add-Package` to add Windows Mixed Reality FOD to the image.
|
1. Use `Dism` to add Windows Mixed Reality FOD to the image.
|
||||||
|
|
||||||
```powershell
|
```powershell
|
||||||
Add-Package
|
Dism /Online /Add-Package /PackagePath:(path)
|
||||||
Dism /Online /add-package /packagepath:(path)
|
|
||||||
```
|
```
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
|
@ -220,6 +220,9 @@ If Windows cannot load the system registry hive into memory, you must restore th
|
|||||||
|
|
||||||
If the problem persists, you may want to restore the system state backup to an alternative location, and then retrieve the registry hives to be replaced.
|
If the problem persists, you may want to restore the system state backup to an alternative location, and then retrieve the registry hives to be replaced.
|
||||||
|
|
||||||
|
> [!NOTE]
|
||||||
|
> Starting in Windows 10, version 1803, Windows no longer automatically backs up the system registry to the RegBack folder.This change is by design, and is intended to help reduce the overall disk footprint size of Windows. To recover a system with a corrupt registry hive, Microsoft recommends that you use a system restore point. For more details, check [this article](https://support.microsoft.com/en-us/help/4509719/the-system-registry-is-no-longer-backed-up-to-the-regback-folder-start).
|
||||||
|
|
||||||
## Kernel Phase
|
## Kernel Phase
|
||||||
|
|
||||||
If the system gets stuck during the kernel phase, you experience multiple symptoms or receive multiple error messages. These include, but are not limited to, the following:
|
If the system gets stuck during the kernel phase, you experience multiple symptoms or receive multiple error messages. These include, but are not limited to, the following:
|
||||||
@ -392,3 +395,6 @@ If the dump file shows an error that is related to a driver (for example, window
|
|||||||
3. Navigate to C:\Windows\System32\Config\.
|
3. Navigate to C:\Windows\System32\Config\.
|
||||||
4. Rename the all five hives by appending ".old" to the name.
|
4. Rename the all five hives by appending ".old" to the name.
|
||||||
5. Copy all the hives from the Regback folder, paste them in the Config folder, and then try to start the computer in Normal mode.
|
5. Copy all the hives from the Regback folder, paste them in the Config folder, and then try to start the computer in Normal mode.
|
||||||
|
|
||||||
|
> [!NOTE]
|
||||||
|
> Starting in Windows 10, version 1803, Windows no longer automatically backs up the system registry to the RegBack folder.This change is by design, and is intended to help reduce the overall disk footprint size of Windows. To recover a system with a corrupt registry hive, Microsoft recommends that you use a system restore point. For more details, check [this article](https://support.microsoft.com/en-us/help/4509719/the-system-registry-is-no-longer-backed-up-to-the-regback-folder-start).
|
||||||
|
@ -119,8 +119,13 @@ A compliance deadline policy (released in June 2019) enables you to set separate
|
|||||||
|
|
||||||
This policy enables you to specify the number of days from an update's publication date that it must be installed on the device. The policy also includes a configurable grace period that specifies the number of days from when the update is installed on the device until the device is forced to restart. This is extremely beneficial in a vacation scenario as it allows, for example, users who have been away to have a bit of time before being forced to restart their devices when they return from vacation.
|
This policy enables you to specify the number of days from an update's publication date that it must be installed on the device. The policy also includes a configurable grace period that specifies the number of days from when the update is installed on the device until the device is forced to restart. This is extremely beneficial in a vacation scenario as it allows, for example, users who have been away to have a bit of time before being forced to restart their devices when they return from vacation.
|
||||||
|
|
||||||
|
#### Update Baseline
|
||||||
|
The large number of different policies offered for Windows 10 can be overwhelming. Update Baseline provides a clear list of recommended Windows update policy settings for IT administrators who want the best user experience while also meeting their update compliance goals. The Update Baseline for Windows 10 includes policy settings recommendations covering deadline configuration, restart behavior, power policies, and more.
|
||||||
|
|
||||||
|
The Update Baseline toolkit makes it easy by providing a single command for IT Admins to apply the Update Baseline to devices. You can get the Update Baseline toolkit from the [Download Center](https://www.microsoft.com/download/details.aspx?id=101056).
|
||||||
|
|
||||||
|
>[!NOTE]
|
||||||
|
>The Update Baseline toolkit is available only for Group Policy. Update Baseline does not affect your offering policies, whether you’re using deferrals or target version to manage which updates are offered to your devices when.
|
||||||
|
|
||||||
<!--
|
<!--
|
||||||
|
|
||||||
|
@ -21,7 +21,8 @@ ms.custom:
|
|||||||
# Manage Windows Defender Credential Guard
|
# Manage Windows Defender Credential Guard
|
||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
- Windows 10
|
- Windows 10 <=1903 Enterprise and Education SKUs
|
||||||
|
- Windows 10 >=1909
|
||||||
- Windows Server 2016
|
- Windows Server 2016
|
||||||
- Windows Server 2019
|
- Windows Server 2019
|
||||||
|
|
||||||
|
@ -31,7 +31,8 @@ device](https://docs.microsoft.com/mem/intune/user-help/enroll-device-android-co
|
|||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> **Microsoft Defender ATP for Android is now available on Google Play.**
|
> **Microsoft Defender ATP for Android is now available on Google Play.**
|
||||||
You can connect to Google Play from Intune to deploy app across Device Administrator and Android Enterprise entrollment modes. Updates to the app are automatic via Google Play.
|
> You can connect to Google Play from Intune to deploy Microsoft Defender ATP app across Device Administrator and Android Enterprise entrollment modes.
|
||||||
|
Updates to the app are automatic via Google Play.
|
||||||
|
|
||||||
## Deploy on Device Administrator enrolled devices
|
## Deploy on Device Administrator enrolled devices
|
||||||
|
|
||||||
@ -40,10 +41,6 @@ Administrator enrolled devices**
|
|||||||
|
|
||||||
This topic describes how to deploy Microsoft Defender ATP for Android on Intune Company Portal - Device Administrator enrolled devices.
|
This topic describes how to deploy Microsoft Defender ATP for Android on Intune Company Portal - Device Administrator enrolled devices.
|
||||||
|
|
||||||
> [!NOTE]
|
|
||||||
> If you have already deployed **Preview APK as "Line of Business (LOB)" app**, you need to redeploy by adding new app as "Android store app"
|
|
||||||
|
|
||||||
|
|
||||||
### Add as Android store app
|
### Add as Android store app
|
||||||
|
|
||||||
1. In [Microsoft Endpoint Manager admin
|
1. In [Microsoft Endpoint Manager admin
|
||||||
@ -97,9 +94,6 @@ completed successfully.
|
|||||||
2. Tap the Microsoft Defender ATP app icon and follow the on-screen instructions
|
2. Tap the Microsoft Defender ATP app icon and follow the on-screen instructions
|
||||||
to complete onboarding the app. The details include end-user acceptance of Android permissions required by Microsoft Defender ATP for Android.
|
to complete onboarding the app. The details include end-user acceptance of Android permissions required by Microsoft Defender ATP for Android.
|
||||||
|
|
||||||
> [!NOTE]
|
|
||||||
> If you already have **preview version of Microsoft Defender ATP app** installed, follow onboarding instruction to replace the existing version of app
|
|
||||||
|
|
||||||
3. Upon successful onboarding, the device will start showing up on the Devices
|
3. Upon successful onboarding, the device will start showing up on the Devices
|
||||||
list in Microsoft Defender Security Center.
|
list in Microsoft Defender Security Center.
|
||||||
|
|
||||||
@ -116,9 +110,6 @@ Options](https://docs.microsoft.com/mem/intune/enrollment/android-enroll) .
|
|||||||
Currently only Personal devices with Work Profile enrolled are supported for deployment.
|
Currently only Personal devices with Work Profile enrolled are supported for deployment.
|
||||||
|
|
||||||
|
|
||||||
>[!NOTE]
|
|
||||||
> If you have already deployed **Preview version of Microsoft Defender for Android app**, you need to redeploy by adding new app as 'managed Google Play App'
|
|
||||||
|
|
||||||
|
|
||||||
## Add Microsoft Defender ATP for Android as a Managed Google Play app
|
## Add Microsoft Defender ATP for Android as a Managed Google Play app
|
||||||
|
|
||||||
@ -127,7 +118,7 @@ Defender ATP app into your managed Google Play.
|
|||||||
|
|
||||||
1. In [Microsoft Endpoint Manager admin
|
1. In [Microsoft Endpoint Manager admin
|
||||||
center](https://go.microsoft.com/fwlink/?linkid=2109431) , go to **Apps** \>
|
center](https://go.microsoft.com/fwlink/?linkid=2109431) , go to **Apps** \>
|
||||||
**Android Apps** \> **Add** and select **managed Google Play app**.
|
**Android Apps** \> **Add** and select **Managed Google Play app**.
|
||||||
|
|
||||||
> [!div class="mx-imgBorder"]
|
> [!div class="mx-imgBorder"]
|
||||||
> 
|
> 
|
||||||
|
Before Width: | Height: | Size: 54 KiB After Width: | Height: | Size: 47 KiB |
Before Width: | Height: | Size: 83 KiB After Width: | Height: | Size: 65 KiB |
Before Width: | Height: | Size: 38 KiB After Width: | Height: | Size: 31 KiB |
Before Width: | Height: | Size: 61 KiB After Width: | Height: | Size: 35 KiB |
@ -155,7 +155,7 @@ registry HKEY_CURRENT_USER\Console
|
|||||||
|
|
||||||
```
|
```
|
||||||
# Show information about a specific registry value
|
# Show information about a specific registry value
|
||||||
registry HKEY_CURRENT_USER\Console\\ScreenBufferSize
|
registry HKEY_CURRENT_USER\Console\ScreenBufferSize
|
||||||
```
|
```
|
||||||
|
|
||||||
|
|
||||||
|
@ -19,13 +19,17 @@ ms.topic: conceptual
|
|||||||
|
|
||||||
# Schedule scans with Microsoft Defender ATP for Mac
|
# Schedule scans with Microsoft Defender ATP for Mac
|
||||||
|
|
||||||
While you can start a threat scan at any time with Microsoft Defender ATP, your enterprise might benefit from scheduled or timed scans. For example, you can schedule a scan to run at the beginning of every workday or week. Create a scanning schedule using launchd on a macOS computer.
|
While you can start a threat scan at any time with Microsoft Defender ATP, your enterprise might benefit from scheduled or timed scans. For example, you can schedule a scan to run at the beginning of every workday or week.
|
||||||
|
|
||||||
## Schedule a scan with launchd
|
## Schedule a scan with *launchd*
|
||||||
|
|
||||||
1. Create a new .xml file. Use the following example to create your scanning schedule file.
|
You can create a scanning schedule using the *launchd* daemon on a macOS device.
|
||||||
|
|
||||||
```xml
|
1. The following code shows the schema you need to use to schedule a scan. Open a text editor and use this example as a guide for your own scheduled scan file.
|
||||||
|
|
||||||
|
For more information on the *.plist* file format used here, see [About Information Property List Files](https://developer.apple.com/library/archive/documentation/General/Reference/InfoPlistKeyReference/Articles/AboutInformationPropertyListFiles.html) at the official Apple developer website.
|
||||||
|
|
||||||
|
```XML
|
||||||
<?xml version="1.0" encoding="UTF-8"?>
|
<?xml version="1.0" encoding="UTF-8"?>
|
||||||
<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN"
|
<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN"
|
||||||
"http://www.apple.com/DTDs/PropertyList-1.0.dtd">
|
"http://www.apple.com/DTDs/PropertyList-1.0.dtd">
|
||||||
@ -60,22 +64,30 @@ While you can start a threat scan at any time with Microsoft Defender ATP, your
|
|||||||
</plist>
|
</plist>
|
||||||
```
|
```
|
||||||
|
|
||||||
2. Save the file as a program configuration file (.plist) with the name com.microsoft.wdav.schedquickscan.plist.
|
2. Save the file as *com.microsoft.wdav.schedquickscan.plist*.
|
||||||
|
|
||||||
>[!NOTE]
|
> [!TIP]
|
||||||
>To change a quick scan to a full scan, use /usr/local/bin/mdatp --scan –full in the array string and update your .plist filename.
|
> To run a full scan instead of a quick scan, change line 12, `<string>/usr/local/bin/mdatp --scan --quick</string>`, to use the `--full` option instead of `--quick` (i.e. `<string>/usr/local/bin/mdatp --scan --full</string>`) and save the file as *com.microsoft.wdav.sched**full**scan.plist* instead of *com.microsoft.wdav.sched**quick**scan.plist*.
|
||||||
|
|
||||||
3. Search for, and then open **Terminal**.
|
3. Open **Terminal**.
|
||||||
4. To load your file into **launchd**, enter the following commands:
|
4. Enter the following commands to load your file:
|
||||||
|
|
||||||
```bash
|
```bash
|
||||||
launchctl load /Library/LaunchDaemons/<your file name.plist>
|
launchctl load /Library/LaunchDaemons/<your file name.plist>
|
||||||
```
|
|
||||||
```bash
|
|
||||||
launchctl start <your file name>
|
launchctl start <your file name>
|
||||||
```
|
```
|
||||||
|
|
||||||
5. Your scheduled scan runs at the date, time, and frequency you defined in your .plist file. In the example, the scan runs at 2:00 AM every seven days on a Friday, with the StartInterval using 604,800 seconds for one week.
|
5. Your scheduled scan will run at the date, time, and frequency you defined in your p-list. In the example, the scan runs at 2:00 AM every Friday.
|
||||||
|
|
||||||
> [!NOTE]
|
Note that the `StartInterval` value is in seconds, indicating that scans should run every 604,800 seconds (one week), while the `Weekday` value of `StartCalendarInterval` uses an integer to indicate the fifth day of the week, or Friday.
|
||||||
> Agents executed with launchd will not run at the scheduled time if the computer is asleep, but will run once the computer is awake. If the computer is off, the scan will not run until the computer is on at the next scheduled time.
|
|
||||||
|
> [!IMPORTANT]
|
||||||
|
> Agents executed with *launchd* will not run at the scheduled time while the device is asleep. They will instead run once the device resumes from sleep mode.
|
||||||
|
>
|
||||||
|
> If the device is turned off, the scan will run at the next scheduled scan time.
|
||||||
|
|
||||||
|
## Schedule a scan with Intune
|
||||||
|
|
||||||
|
You can also schedule scans with Microsoft Intune. The [runMDATPQuickScan.sh](https://github.com/microsoft/shell-intune-samples/tree/master/Misc/MDATP#runmdatpquickscansh) shell script available at [Scripts for Microsoft Defender Advanced Threat Protection](https://github.com/microsoft/shell-intune-samples/tree/master/Misc/MDATP) will persist when the device resumes from sleep mode.
|
||||||
|
|
||||||
|
See [Use shell scripts on macOS devices in Intune](https://docs.microsoft.com/mem/intune/apps/macos-shell-scripts) for more detailed instructions on how to use this script in your enterprise.
|
||||||
|
@ -85,7 +85,7 @@ For more information, see [Deploy Microsoft Defender ATP for Android with Micros
|
|||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> **Microsoft Defender ATP for Android is available on Google Play now.**
|
> **Microsoft Defender ATP for Android is available on Google Play now.**
|
||||||
You can connect to Google Play from Intune directly to deploy app across Device Administrator and Android Enterprise entrollment modes.
|
> You can connect to Google Play from Intune to deploy Microsoft Defender ATP app, across Device Administrator and Android Enterprise entrollment modes.
|
||||||
|
|
||||||
## How to Configure Microsoft Defender ATP for Android
|
## How to Configure Microsoft Defender ATP for Android
|
||||||
|
|
||||||
|
@ -81,16 +81,13 @@ None. Changes to this policy become effective without a device restart when they
|
|||||||
|
|
||||||
### Safe mode considerations
|
### Safe mode considerations
|
||||||
|
|
||||||
When you start a device in safe mode, the disabled administrator account is enabled only if the computer is non-domain joined and there are no other active local administrator accounts. If the computer is joined to a domain, the disabled administrator account is not enabled.
|
When you start a device in safe mode, the disabled administrator account is enabled only if the computer is non-domain joined and there are no other active local administrator accounts. In this case, you can access the computer by using safe mode with the current administrative credentials. If the computer is joined to a domain, the disabled administrator account is not enabled.
|
||||||
If the administrator account is disabled, you can still access the computer by using safe mode with the current administrative credentials. For example, if a failure occurs using a secure channel with a domain-joined computer, and there is no other local administrator account, you must restart the device in safe mode to fix the failure.
|
|
||||||
|
|
||||||
### How to access a disabled Administrator account
|
### How to access a disabled Administrator account
|
||||||
|
|
||||||
You can use the following methods to access a disabled Administrator account:
|
You can use the following methods to access a disabled Administrator account:
|
||||||
- When there is only one local administrator account that is disabled, start the device in safe mode (locally or over a network), and sign in by using the credentials for the administrator account on that computer.
|
- For non-domain joined computers: when all the local administrator accounts are disabled, start the device in safe mode (locally or over a network), and sign in by using the credentials for the default local administrator account on that computer.
|
||||||
- When there are local administrator accounts in addition to the built-in account, start the computer in safe mode (locally or over a network), and sign in by using the credentials for the administrator account on that device. An alternate method is to sign in to Windows by using another local
|
- For domain-joined computers: remotely run the command **net user administrator /active: yes** by using psexec to enable the default local administrator account.
|
||||||
Administrator account that was created.
|
|
||||||
- When multiple domain-joined servers have a disabled local Administrator account that can be accessed in safe mode, you can remotely run psexec by using the following command: **net user administrator /active: no**.
|
|
||||||
|
|
||||||
## Security considerations
|
## Security considerations
|
||||||
|
|
||||||
|
@ -61,7 +61,12 @@ This setting has these possible values:
|
|||||||
This change makes this setting consistent with the functionality of the new **Privacy** setting.
|
This change makes this setting consistent with the functionality of the new **Privacy** setting.
|
||||||
To display no user information, enable the Group Policy setting **Interactive logon: Don't display last signed-in**.
|
To display no user information, enable the Group Policy setting **Interactive logon: Don't display last signed-in**.
|
||||||
|
|
||||||
- Blank.
|
- **Domain and user names only**
|
||||||
|
|
||||||
|
For a domain logon only, the domain\username is displayed.
|
||||||
|
The **Privacy** setting is automatically on and grayed out.
|
||||||
|
|
||||||
|
- **Blank**
|
||||||
|
|
||||||
Default setting.
|
Default setting.
|
||||||
This translates to “Not defined,” but it will display the user’s full name in the same manner as the option **User display name only**.
|
This translates to “Not defined,” but it will display the user’s full name in the same manner as the option **User display name only**.
|
||||||
@ -89,7 +94,7 @@ For all versions of Windows 10, only the user display name is shown by default.
|
|||||||
If **Block user from showing account details on sign-in** is enabled, then only the user display name is shown regardless of any other Group Policy settings.
|
If **Block user from showing account details on sign-in** is enabled, then only the user display name is shown regardless of any other Group Policy settings.
|
||||||
Users will not be able to show details.
|
Users will not be able to show details.
|
||||||
|
|
||||||
If **Block user from showing account details on sign-in** is not enabled, then you can set **Interactive logon: Display user information when the session is locked** to **User display name, domain and user names** to show additional details such as domain\username.
|
If **Block user from showing account details on sign-in** is not enabled, then you can set **Interactive logon: Display user information when the session is locked** to **User display name, domain and user names** or **Domain and user names only** to show additional details such as domain\username.
|
||||||
In this case, clients that run Windows 10 version 1607 need [KB 4013429](https://www.catalog.update.microsoft.com/Search.aspx?q=KB4013429) applied.
|
In this case, clients that run Windows 10 version 1607 need [KB 4013429](https://www.catalog.update.microsoft.com/Search.aspx?q=KB4013429) applied.
|
||||||
Users will not be able to hide additional details.
|
Users will not be able to hide additional details.
|
||||||
|
|
||||||
|
@ -41,7 +41,8 @@
|
|||||||
|
|
||||||
|
|
||||||
## [Windows Defender Application Control operational guide](windows-defender-application-control-operational-guide.md)
|
## [Windows Defender Application Control operational guide](windows-defender-application-control-operational-guide.md)
|
||||||
### [Understanding Application Control events](event-id-explanations.md)
|
### [Understanding Application Control event IDs](event-id-explanations.md)
|
||||||
|
### [Understanding Application Control event tags](event-tag-explanations.md)
|
||||||
### [Query WDAC events with Advanced hunting](querying-application-control-events-centrally-using-advanced-hunting.md)
|
### [Query WDAC events with Advanced hunting](querying-application-control-events-centrally-using-advanced-hunting.md)
|
||||||
|
|
||||||
## [AppLocker](applocker\applocker-overview.md)
|
## [AppLocker](applocker\applocker-overview.md)
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Understanding Application Control events (Windows 10)
|
title: Understanding Application Control event IDs (Windows 10)
|
||||||
description: Learn what different Windows Defender Application Control events signify.
|
description: Learn what different Windows Defender Application Control event IDs signify.
|
||||||
keywords: security, malware
|
keywords: security, malware
|
||||||
ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb
|
ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
@ -21,8 +21,9 @@ ms.date: 3/17/2020
|
|||||||
|
|
||||||
A Windows Defender Application Control (WDAC) policy logs events locally in Windows Event Viewer in either enforced or audit mode. These events are generated under two locations:
|
A Windows Defender Application Control (WDAC) policy logs events locally in Windows Event Viewer in either enforced or audit mode. These events are generated under two locations:
|
||||||
|
|
||||||
1. Event IDs beginning with 30 appear in Applications and Services logs – Microsoft – Windows – CodeIntegrity – Operational
|
- Event IDs beginning with 30 appear in Applications and Services logs – Microsoft – Windows – CodeIntegrity – Operational
|
||||||
2. Event IDs beginning with 80 appear in Applications and Services logs – Microsoft – Windows – AppLocker – MSI and Script
|
|
||||||
|
- Event IDs beginning with 80 appear in Applications and Services logs – Microsoft – Windows – AppLocker – MSI and Script
|
||||||
|
|
||||||
## Microsoft Windows CodeIntegrity Operational log event IDs
|
## Microsoft Windows CodeIntegrity Operational log event IDs
|
||||||
|
|
||||||
|
@ -0,0 +1,83 @@
|
|||||||
|
---
|
||||||
|
title: Understanding Application Control event tags (Windows 10)
|
||||||
|
description: Learn what different Windows Defender Application Control event tags signify.
|
||||||
|
keywords: security, malware
|
||||||
|
ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb
|
||||||
|
ms.prod: w10
|
||||||
|
ms.mktglfcycl: deploy
|
||||||
|
ms.sitesec: library
|
||||||
|
ms.pagetype: security
|
||||||
|
ms.localizationpriority: medium
|
||||||
|
audience: ITPro
|
||||||
|
ms.collection: M365-security-compliance
|
||||||
|
author: jsuther1974
|
||||||
|
ms.reviewer: isbrahm
|
||||||
|
ms.author: dansimp
|
||||||
|
manager: dansimp
|
||||||
|
ms.date: 8/27/2020
|
||||||
|
---
|
||||||
|
|
||||||
|
# Understanding Application Control event tags
|
||||||
|
|
||||||
|
Windows Defender Application Control (WDAC) events include a number of fields which provide helpful troubleshooting information to figure out exactly what an event means. Below, we have documented the values and meanings for a few useful event tags.
|
||||||
|
|
||||||
|
## SignatureType
|
||||||
|
|
||||||
|
Represents the type of signature which verified the image.
|
||||||
|
|
||||||
|
| SignatureType Value | Explanation |
|
||||||
|
|----------|---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
|
||||||
|
| 0 | Unsigned or verification has not been attempted |
|
||||||
|
| 1 | Embedded signature |
|
||||||
|
| 2 | Cached signature; presence of CI EA shows that file had been previously verified |
|
||||||
|
| 4 | Un-cached catalog verified via Catalog Database or searching catalog directly |
|
||||||
|
| 5 | Successfully verified using an EA that informs CI which catalog to try first |
|
||||||
|
|6 | AppX / MSIX package catalog verified |
|
||||||
|
| 7 | File was verified |
|
||||||
|
|
||||||
|
## ValidatedSigningLevel
|
||||||
|
|
||||||
|
Represents the signature level at which the code was verified.
|
||||||
|
|
||||||
|
| ValidatedSigningLevel Value | Explanation |
|
||||||
|
|----------|---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
|
||||||
|
| 0 | Signing level has not yet been checked |
|
||||||
|
| 1 | File is unsigned |
|
||||||
|
| 2 | Trusted by WDAC policy |
|
||||||
|
| 3 | Developer signed code |
|
||||||
|
| 4 | Authenticode signed |
|
||||||
|
| 5 | Microsoft Store signed app PPL (Protected Process Light) |
|
||||||
|
| 6 | Microsoft Store-signed |
|
||||||
|
| 7 | Signed by an Antimalware vendor whose product is using AMPPL |
|
||||||
|
| 8 | Microsoft signed |
|
||||||
|
| 11 | Only used for signing of the .NET NGEN compiler |
|
||||||
|
| 12 | Windows signed |
|
||||||
|
| 14 | Windows Trusted Computing Base signed |
|
||||||
|
|
||||||
|
## VerificationError
|
||||||
|
|
||||||
|
Represents why verification failed, or if it succeeded.
|
||||||
|
|
||||||
|
| VerificationError Value | Explanation |
|
||||||
|
|----------|---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
|
||||||
|
| 0 | Successfully verified signature |
|
||||||
|
| 2 | File contains shared writable sections |
|
||||||
|
| 4 | Revoked signature |
|
||||||
|
| 5 | Expired signature |
|
||||||
|
| 7 | Invalid root certificate |
|
||||||
|
| 8 | Signature was unable to be validated; generic error |
|
||||||
|
| 9 | Signing time not trusted |
|
||||||
|
| 12 | Not valid for a PPL (Protected Process Light) |
|
||||||
|
| 13 | Not valid for a PP (Protected Process) |
|
||||||
|
| 15 | Failed WHQL check |
|
||||||
|
| 16 | Default policy signing level not met |
|
||||||
|
| 17 | Custom policy signing level not met; returned when signature doesn't validate against an SBCP-defined set of certs |
|
||||||
|
| 18 | Custom signing level not met; returned if signature fails to match CISigners in UMCI |
|
||||||
|
| 19 | Binary is revoked by file hash |
|
||||||
|
| 20 | SHA1 cert hash's timestamp is missing or after valid cutoff as defined by Weak Crypto Policy |
|
||||||
|
| 21 | Failed to pass WDAC policy |
|
||||||
|
| 22 | Not IUM (Isolated User Mode) signed; indicates trying to load a non-trustlet binary into a trustlet |
|
||||||
|
| 23 | Invalid image hash |
|
||||||
|
| 24 | Flight root not allowed; indicates trying to run flight-signed code on production OS |
|
||||||
|
| 26 | Explicitly denied by WADC policy |
|
||||||
|
| 28 | Resource page hash mismatch |
|
@ -24,38 +24,55 @@ ms.date: 04/09/2019
|
|||||||
- Windows 10
|
- Windows 10
|
||||||
- Windows Server 2016 and above
|
- Windows Server 2016 and above
|
||||||
|
|
||||||
Members of the security community<sup>\*</sup> continuously collaborate with Microsoft to help protect customers. With the help of their valuable reports, Microsoft has identified a list of valid applications that an attacker could also potentially use to bypass Windows Defender Application Control.
|
Members of the security community<sup>*</sup> continuously collaborate with Microsoft to help protect customers. With the help of their valuable reports, Microsoft has identified a list of valid applications that an attacker could also potentially use to bypass Windows Defender Application Control.
|
||||||
|
|
||||||
Unless your use scenarios explicitly require them, Microsoft recommends that you block the following applications. These applications or files can be used by an attacker to circumvent application allow policies, including Windows Defender Application Control:
|
Unless your use scenarios explicitly require them, Microsoft recommends that you block the following applications. These applications or files can be used by an attacker to circumvent application allow policies, including Windows Defender Application Control:
|
||||||
|
|
||||||
- addinprocess.exe
|
- addinprocess.exe
|
||||||
- addinprocess32.exe
|
- addinprocess32.exe
|
||||||
- addinutil.exe
|
- addinutil.exe
|
||||||
|
- aspnet_compiler.exe
|
||||||
- bash.exe
|
- bash.exe
|
||||||
- bginfo.exe<sup>[1]</sup>
|
- bginfo.exe<sup>1</sup>
|
||||||
- cdb.exe
|
- cdb.exe
|
||||||
- csi.exe
|
- csi.exe
|
||||||
- dbghost.exe
|
- dbghost.exe
|
||||||
- dbgsvc.exe
|
- dbgsvc.exe
|
||||||
- dnx.exe
|
- dnx.exe
|
||||||
|
- dotnet.exe
|
||||||
- fsi.exe
|
- fsi.exe
|
||||||
- fsiAnyCpu.exe
|
- fsiAnyCpu.exe
|
||||||
|
- infdefaultinstall.exe
|
||||||
- kd.exe
|
- kd.exe
|
||||||
- ntkd.exe
|
- kill.exe
|
||||||
- lxssmanager.dll
|
- lxssmanager.dll
|
||||||
- msbuild.exe<sup>[2]</sup>
|
- lxrun.exe
|
||||||
|
- Microsoft.Build.dll
|
||||||
|
- Microsoft.Build.Framework.dll
|
||||||
|
- Microsoft.Workflow.Compiler.exe
|
||||||
|
- msbuild.exe<sup>2</sup>
|
||||||
|
- msbuild.dll
|
||||||
- mshta.exe
|
- mshta.exe
|
||||||
|
- ntkd.exe
|
||||||
- ntsd.exe
|
- ntsd.exe
|
||||||
|
- powershellcustomhost.exe
|
||||||
- rcsi.exe
|
- rcsi.exe
|
||||||
|
- runscripthelper.exe
|
||||||
|
- texttransform.exe
|
||||||
|
- visualuiaverifynative.exe
|
||||||
- system.management.automation.dll
|
- system.management.automation.dll
|
||||||
|
- wfc.exe
|
||||||
- windbg.exe
|
- windbg.exe
|
||||||
- wmic.exe
|
- wmic.exe
|
||||||
|
- wsl.exe
|
||||||
|
- wslconfig.exe
|
||||||
|
- wslhost.exe
|
||||||
|
|
||||||
<sup>[1]</sup>A vulnerability in bginfo.exe has been fixed in the latest version 4.22. If you use BGInfo, for security, make sure to download and run the latest version here [BGInfo 4.22](https://docs.microsoft.com/sysinternals/downloads/bginfo). Note that BGInfo versions earlier than 4.22 are still vulnerable and should be blocked.
|
<sup>1</sup> A vulnerability in bginfo.exe has been fixed in the latest version 4.22. If you use BGInfo, for security, make sure to download and run the latest version here [BGInfo 4.22](https://docs.microsoft.com/sysinternals/downloads/bginfo). Note that BGInfo versions earlier than 4.22 are still vulnerable and should be blocked.
|
||||||
|
|
||||||
<sup>[2]</sup>If you are using your reference system in a development context and use msbuild.exe to build managed applications, we recommend that you allow msbuild.exe in your code integrity policies. However, if your reference system is an end user device that is not being used in a development context, we recommend that you block msbuild.exe.
|
<sup>2</sup> If you are using your reference system in a development context and use msbuild.exe to build managed applications, we recommend that you allow msbuild.exe in your code integrity policies. However, if your reference system is an end user device that is not being used in a development context, we recommend that you block msbuild.exe.
|
||||||
|
|
||||||
<sup>*</sup>Microsoft recognizes the efforts of those in the security community who help us protect customers through responsible vulnerability disclosure, and extends thanks to the following people:
|
<sup>*</sup> Microsoft recognizes the efforts of those in the security community who help us protect customers through responsible vulnerability disclosure, and extends thanks to the following people:
|
||||||
|
|
||||||
<br />
|
<br />
|
||||||
|
|
||||||
@ -121,44 +138,45 @@ Pick the correct version of each .dll for the Windows release you plan to suppor
|
|||||||
<!-- File Rules
|
<!-- File Rules
|
||||||
-->
|
-->
|
||||||
<FileRules>
|
<FileRules>
|
||||||
|
<Deny ID="ID_DENY_ADDINPROCESS" FriendlyName="AddInProcess.exe" FileName="AddInProcess.exe" MinimumFileVersion="65535.65535.65535.65535"/>
|
||||||
|
<Deny ID="ID_DENY_ADDINPROCESS32" FriendlyName="AddInProcess32.exe" FileName="AddInProcess32.exe" MinimumFileVersion="65535.65535.65535.65535"/>
|
||||||
|
<Deny ID="ID_DENY_ADDINUTIL" FriendlyName="AddInUtil.exe" FileName="AddInUtil.exe" MinimumFileVersion="65535.65535.65535.65535"/>
|
||||||
|
<Deny ID="ID_DENY_ASPNET" FriendlyName="aspnet_compiler.exe" FileName="aspnet_compiler.exe" MinimumFileVersion="65535.65535.65535.65535"/>
|
||||||
|
<Deny ID="ID_DENY_BASH" FriendlyName="bash.exe" FileName="bash.exe" MinimumFileVersion="65535.65535.65535.65535"/>
|
||||||
<Deny ID="ID_DENY_BGINFO" FriendlyName="bginfo.exe" FileName="BGINFO.Exe" MinimumFileVersion="4.21.0.0"/>
|
<Deny ID="ID_DENY_BGINFO" FriendlyName="bginfo.exe" FileName="BGINFO.Exe" MinimumFileVersion="4.21.0.0"/>
|
||||||
<Deny ID="ID_DENY_CBD" FriendlyName="cdb.exe" FileName="CDB.Exe" MinimumFileVersion="65535.65535.65535.65535"/>
|
<Deny ID="ID_DENY_CBD" FriendlyName="cdb.exe" FileName="CDB.Exe" MinimumFileVersion="65535.65535.65535.65535"/>
|
||||||
|
<Deny ID="ID_DENY_CSI" FriendlyName="csi.exe" FileName="csi.Exe" MinimumFileVersion="65535.65535.65535.65535"/>
|
||||||
|
<Deny ID="ID_DENY_DBGHOST" FriendlyName="dbghost.exe" FileName="DBGHOST.Exe" MinimumFileVersion="2.3.0.0"/>
|
||||||
|
<Deny ID="ID_DENY_DBGSVC" FriendlyName="dbgsvc.exe" FileName="DBGSVC.Exe" MinimumFileVersion="2.3.0.0"/>
|
||||||
|
<Deny ID="ID_DENY_DNX" FriendlyName="dnx.exe" FileName="dnx.Exe" MinimumFileVersion="65535.65535.65535.65535"/>
|
||||||
|
<Deny ID="ID_DENY_DOTNET" FriendlyName="dotnet.exe" FileName="dotnet.exe" MinimumFileVersion="65535.65535.65535.65535" />
|
||||||
|
<Deny ID="ID_DENY_FSI" FriendlyName="fsi.exe" FileName="fsi.exe" MinimumFileVersion="65535.65535.65535.65535"/>
|
||||||
|
<Deny ID="ID_DENY_FSI_ANYCPU" FriendlyName="fsiAnyCpu.exe" FileName="fsiAnyCpu.exe" MinimumFileVersion="65535.65535.65535.65535"/>
|
||||||
|
<Deny ID="ID_DENY_INFINSTALL" FriendlyName="infdefaultinstall.exe" FileName="infdefaultinstall.exe" MinimumFileVersion="65535.65535.65535.65535"/>
|
||||||
<Deny ID="ID_DENY_KD" FriendlyName="kd.exe" FileName="kd.Exe" MinimumFileVersion="65535.65535.65535.65535"/>
|
<Deny ID="ID_DENY_KD" FriendlyName="kd.exe" FileName="kd.Exe" MinimumFileVersion="65535.65535.65535.65535"/>
|
||||||
<Deny ID="ID_DENY_KD_KMCI" FriendlyName="kd.exe" FileName="kd.Exe" MinimumFileVersion="65535.65535.65535.65535"/>
|
<Deny ID="ID_DENY_KD_KMCI" FriendlyName="kd.exe" FileName="kd.Exe" MinimumFileVersion="65535.65535.65535.65535"/>
|
||||||
<Deny ID="ID_DENY_NTKD" FriendlyName="ntkd.exe" FileName="ntkd.Exe" MinimumFileVersion="65535.65535.65535.65535"/>
|
<Deny ID="ID_DENY_KILL" FriendlyName="kill.exe" FileName="kill.exe" MinimumFileVersion="65535.65535.65535.65535" />
|
||||||
<Deny ID="ID_DENY_WINDBG" FriendlyName="windbg.exe" FileName="windbg.Exe" MinimumFileVersion="65535.65535.65535.65535"/>
|
<Deny ID="ID_DENY_LXRUN" FriendlyName="lxrun.exe" FileName="lxrun.exe" MinimumFileVersion="65535.65535.65535.65535"/>
|
||||||
|
<Deny ID="ID_DENY_LXSS" FriendlyName="LxssManager.dll" FileName="LxssManager.dll" MinimumFileVersion="65535.65535.65535.65535"/>
|
||||||
|
<Deny ID="ID_DENY_MS_BUILD" FriendlyName="Microsoft.Build.dll" FileName="Microsoft.Build.dll" MinimumFileVersion="65535.65535.65535.65535" />
|
||||||
|
<Deny ID="ID_DENY_MS_BUILD_FMWK" FriendlyName="Microsoft.Build.Framework.dll" FileName="Microsoft.Build.Framework.dll" MinimumFileVersion="65535.65535.65535.65535" />
|
||||||
|
<Deny ID="ID_DENY_MWFC" FriendlyName="Microsoft.Workflow.Compiler.exe" FileName="Microsoft.Workflow.Compiler.exe" MinimumFileVersion="65535.65535.65535.65535" />
|
||||||
<Deny ID="ID_DENY_MSBUILD" FriendlyName="MSBuild.exe" FileName="MSBuild.Exe" MinimumFileVersion="65535.65535.65535.65535"/>
|
<Deny ID="ID_DENY_MSBUILD" FriendlyName="MSBuild.exe" FileName="MSBuild.Exe" MinimumFileVersion="65535.65535.65535.65535"/>
|
||||||
<Deny ID="ID_DENY_CSI" FriendlyName="csi.exe" FileName="csi.Exe" MinimumFileVersion="65535.65535.65535.65535"/>
|
<Deny ID="ID_DENY_MSBUILD_DLL" FriendlyName="MSBuild.dll" FileName="MSBuild.dll" MinimumFileVersion="65535.65535.65535.65535" />
|
||||||
<Deny ID="ID_DENY_DBGHOST" FriendlyName="dbghost.exe" FileName="DBGHOST.Exe" MinimumFileVersion="2.3.0.0"/>
|
|
||||||
<Deny ID="ID_DENY_DBGSVC" FriendlyName="dbgsvc.exe" FileName="DBGSVC.Exe" MinimumFileVersion="2.3.0.0"/>
|
|
||||||
<Deny ID="ID_DENY_DNX" FriendlyName="dnx.exe" FileName="dnx.Exe" MinimumFileVersion="65535.65535.65535.65535"/>
|
|
||||||
<Deny ID="ID_DENY_RCSI" FriendlyName="rcsi.exe" FileName="rcsi.Exe" MinimumFileVersion="65535.65535.65535.65535"/>
|
|
||||||
<Deny ID="ID_DENY_NTSD" FriendlyName="ntsd.exe" FileName="ntsd.Exe" MinimumFileVersion="65535.65535.65535.65535"/>
|
|
||||||
<Deny ID="ID_DENY_LXSS" FriendlyName="LxssManager.dll" FileName="LxssManager.dll" MinimumFileVersion="65535.65535.65535.65535"/>
|
|
||||||
<Deny ID="ID_DENY_BASH" FriendlyName="bash.exe" FileName="bash.exe" MinimumFileVersion="65535.65535.65535.65535"/>
|
|
||||||
<Deny ID="ID_DENY_FSI" FriendlyName="fsi.exe" FileName="fsi.exe" MinimumFileVersion="65535.65535.65535.65535"/>
|
|
||||||
<Deny ID="ID_DENY_FSI_ANYCPU" FriendlyName="fsiAnyCpu.exe" FileName="fsiAnyCpu.exe" MinimumFileVersion="65535.65535.65535.65535"/>
|
|
||||||
<Deny ID="ID_DENY_MSHTA" FriendlyName="mshta.exe" FileName="mshta.exe" MinimumFileVersion="65535.65535.65535.65535"/>
|
<Deny ID="ID_DENY_MSHTA" FriendlyName="mshta.exe" FileName="mshta.exe" MinimumFileVersion="65535.65535.65535.65535"/>
|
||||||
<Deny ID="ID_DENY_VISUALUIAVERIFY" FriendlyName="visualuiaverifynative.exe" FileName="visualuiaverifynative.exe" MinimumFileVersion="65535.65535.65535.65535"/>
|
<Deny ID="ID_DENY_NTKD" FriendlyName="ntkd.exe" FileName="ntkd.Exe" MinimumFileVersion="65535.65535.65535.65535"/>
|
||||||
|
<Deny ID="ID_DENY_NTSD" FriendlyName="ntsd.exe" FileName="ntsd.Exe" MinimumFileVersion="65535.65535.65535.65535"/>
|
||||||
|
<Deny ID="ID_DENY_PWRSHLCUSTOMHOST" FriendlyName="powershellcustomhost.exe" FileName="powershellcustomhost.exe" MinimumFileVersion="65535.65535.65535.65535"/>
|
||||||
|
<Deny ID="ID_DENY_RCSI" FriendlyName="rcsi.exe" FileName="rcsi.Exe" MinimumFileVersion="65535.65535.65535.65535"/>
|
||||||
<Deny ID="ID_DENY_RUNSCRIPTHELPER" FriendlyName="runscripthelper.exe" FileName="runscripthelper.exe" MinimumFileVersion="65535.65535.65535.65535"/>
|
<Deny ID="ID_DENY_RUNSCRIPTHELPER" FriendlyName="runscripthelper.exe" FileName="runscripthelper.exe" MinimumFileVersion="65535.65535.65535.65535"/>
|
||||||
<Deny ID="ID_DENY_ADDINPROCESS" FriendlyName="AddInProcess.exe" FileName="AddInProcess.exe" MinimumFileVersion="65535.65535.65535.65535"/>
|
<Deny ID="ID_DENY_TEXTTRANSFORM" FriendlyName="texttransform.exe" FileName="texttransform.exe" MinimumFileVersion="65535.65535.65535.65535"/>
|
||||||
<Deny ID="ID_DENY_ADDINPROCESS32" FriendlyName="AddInProcess32.exe" FileName="AddInProcess32.exe" MinimumFileVersion="65535.65535.65535.65535"/>
|
<Deny ID="ID_DENY_VISUALUIAVERIFY" FriendlyName="visualuiaverifynative.exe" FileName="visualuiaverifynative.exe" MinimumFileVersion="65535.65535.65535.65535"/>
|
||||||
<Deny ID="ID_DENY_ADDINUTIL" FriendlyName="AddInUtil.exe" FileName="AddInUtil.exe" MinimumFileVersion="65535.65535.65535.65535"/>
|
<Deny ID="ID_DENY_WFC" FriendlyName="WFC.exe" FileName="wfc.exe" MinimumFileVersion="65535.65535.65535.65535" />
|
||||||
|
<Deny ID="ID_DENY_WINDBG" FriendlyName="windbg.exe" FileName="windbg.Exe" MinimumFileVersion="65535.65535.65535.65535"/>
|
||||||
|
<Deny ID="ID_DENY_WMIC" FriendlyName="wmic.exe" FileName="wmic.exe" MinimumFileVersion="65535.65535.65535.65535"/>
|
||||||
<Deny ID="ID_DENY_WSL" FriendlyName="wsl.exe" FileName="wsl.exe" MinimumFileVersion="65535.65535.65535.65535"/>
|
<Deny ID="ID_DENY_WSL" FriendlyName="wsl.exe" FileName="wsl.exe" MinimumFileVersion="65535.65535.65535.65535"/>
|
||||||
<Deny ID="ID_DENY_WSLCONFIG" FriendlyName="wslconfig.exe" FileName="wslconfig.exe" MinimumFileVersion="65535.65535.65535.65535"/>
|
<Deny ID="ID_DENY_WSLCONFIG" FriendlyName="wslconfig.exe" FileName="wslconfig.exe" MinimumFileVersion="65535.65535.65535.65535"/>
|
||||||
<Deny ID="ID_DENY_WSLHOST" FriendlyName="wslhost.exe" FileName="wslhost.exe" MinimumFileVersion="65535.65535.65535.65535"/>
|
<Deny ID="ID_DENY_WSLHOST" FriendlyName="wslhost.exe" FileName="wslhost.exe" MinimumFileVersion="65535.65535.65535.65535"/>
|
||||||
<Deny ID="ID_DENY_INFINSTALL" FriendlyName="infdefaultinstall.exe" FileName="infdefaultinstall.exe" MinimumFileVersion="65535.65535.65535.65535"/>
|
|
||||||
<Deny ID="ID_DENY_LXRUN" FriendlyName="lxrun.exe" FileName="lxrun.exe" MinimumFileVersion="65535.65535.65535.65535"/>
|
|
||||||
<Deny ID="ID_DENY_PWRSHLCUSTOMHOST" FriendlyName="powershellcustomhost.exe" FileName="powershellcustomhost.exe" MinimumFileVersion="65535.65535.65535.65535"/>
|
|
||||||
<Deny ID="ID_DENY_TEXTTRANSFORM" FriendlyName="texttransform.exe" FileName="texttransform.exe" MinimumFileVersion="65535.65535.65535.65535"/>
|
|
||||||
<Deny ID="ID_DENY_WMIC" FriendlyName="wmic.exe" FileName="wmic.exe" MinimumFileVersion="65535.65535.65535.65535"/>
|
|
||||||
<Deny ID="ID_DENY_MWFC" FriendlyName="Microsoft.Workflow.Compiler.exe" FileName="Microsoft.Workflow.Compiler.exe" MinimumFileVersion="65535.65535.65535.65535" />
|
|
||||||
<Deny ID="ID_DENY_WFC" FriendlyName="WFC.exe" FileName="wfc.exe" MinimumFileVersion="65535.65535.65535.65535" />
|
|
||||||
<Deny ID="ID_DENY_KILL" FriendlyName="kill.exe" FileName="kill.exe" MinimumFileVersion="65535.65535.65535.65535" />
|
|
||||||
<Deny ID="ID_DENY_MSBUILD_DLL" FriendlyName="MSBuild.dll" FileName="MSBuild.dll" MinimumFileVersion="65535.65535.65535.65535" />
|
|
||||||
<Deny ID="ID_DENY_DOTNET" FriendlyName="dotnet.exe" FileName="dotnet.exe" MinimumFileVersion="65535.65535.65535.65535" />
|
|
||||||
<Deny ID="ID_DENY_MS_BUILD" FriendlyName="Microsoft.Build.dll" FileName="Microsoft.Build.dll" MinimumFileVersion="65535.65535.65535.65535" />
|
|
||||||
<Deny ID="ID_DENY_MS_BUILD_FMWK" FriendlyName="Microsoft.Build.Framework.dll" FileName="Microsoft.Build.Framework.dll" MinimumFileVersion="65535.65535.65535.65535" />
|
|
||||||
|
|
||||||
<!-- pick the correct version of msxml3.dll, msxml6.dll, and jscript9.dll based on the release you are supporting -->
|
<!-- pick the correct version of msxml3.dll, msxml6.dll, and jscript9.dll based on the release you are supporting -->
|
||||||
<!-- the versions of these files in the 1903 release have this issue fixed, so they don’t need to be blocked -->
|
<!-- the versions of these files in the 1903 release have this issue fixed, so they don’t need to be blocked -->
|
||||||
@ -859,48 +877,51 @@ Pick the correct version of each .dll for the Windows release you plan to suppor
|
|||||||
<SigningScenario Value="12" ID="ID_SIGNINGSCENARIO_WINDOWS" FriendlyName="User Mode Signing Scenarios">
|
<SigningScenario Value="12" ID="ID_SIGNINGSCENARIO_WINDOWS" FriendlyName="User Mode Signing Scenarios">
|
||||||
<ProductSigners>
|
<ProductSigners>
|
||||||
<FileRulesRef>
|
<FileRulesRef>
|
||||||
|
<FileRuleRef RuleID="ID_DENY_ADDINPROCESS"/>
|
||||||
|
<FileRuleRef RuleID="ID_DENY_ADDINPROCESS32"/>
|
||||||
|
<FileRuleRef RuleID="ID_DENY_ADDINUTIL"/>
|
||||||
|
<FileRuleRef RuleID="ID_DENY_ASPNET"/>
|
||||||
|
<FileRuleRef RuleID="ID_DENY_BASH"/>
|
||||||
<FileRuleRef RuleID="ID_DENY_BGINFO"/>
|
<FileRuleRef RuleID="ID_DENY_BGINFO"/>
|
||||||
<FileRuleRef RuleID="ID_DENY_CBD"/>
|
<FileRuleRef RuleID="ID_DENY_CBD"/>
|
||||||
<FileRuleRef RuleID="ID_DENY_KD"/>
|
|
||||||
<FileRuleRef RuleID="ID_DENY_NTKD"/>
|
|
||||||
<FileRuleRef RuleID="ID_DENY_WINDBG"/>
|
|
||||||
<FileRuleRef RuleID="ID_DENY_MSBUILD"/>
|
|
||||||
<FileRuleRef RuleID="ID_DENY_CSI"/>
|
<FileRuleRef RuleID="ID_DENY_CSI"/>
|
||||||
<FileRuleRef RuleID="ID_DENY_DBGHOST"/>
|
<FileRuleRef RuleID="ID_DENY_DBGHOST"/>
|
||||||
<FileRuleRef RuleID="ID_DENY_DBGSVC"/>
|
<FileRuleRef RuleID="ID_DENY_DBGSVC"/>
|
||||||
<FileRuleRef RuleID="ID_DENY_DNX"/>
|
<FileRuleRef RuleID="ID_DENY_DNX"/>
|
||||||
<FileRuleRef RuleID="ID_DENY_RCSI"/>
|
<FileRuleRef RuleID="ID_DENY_DOTNET" />
|
||||||
<FileRuleRef RuleID="ID_DENY_NTSD"/>
|
|
||||||
<FileRuleRef RuleID="ID_DENY_LXSS"/>
|
|
||||||
<FileRuleRef RuleID="ID_DENY_BASH"/>
|
|
||||||
<FileRuleRef RuleID="ID_DENY_FSI"/>
|
<FileRuleRef RuleID="ID_DENY_FSI"/>
|
||||||
<FileRuleRef RuleID="ID_DENY_FSI_ANYCPU"/>
|
<FileRuleRef RuleID="ID_DENY_FSI_ANYCPU"/>
|
||||||
|
<FileRuleRef RuleID="ID_DENY_INFINSTALL"/>
|
||||||
|
<FileRuleRef RuleID="ID_DENY_KD"/>
|
||||||
|
<FileRuleRef RuleID="ID_DENY_KILL"/>
|
||||||
|
<FileRuleRef RuleID="ID_DENY_LXSS"/>
|
||||||
|
<FileRuleRef RuleID="ID_DENY_LXRUN"/>
|
||||||
|
<FileRuleRef RuleID="ID_DENY_MS_BUILD" />
|
||||||
|
<FileRuleRef RuleID="ID_DENY_MS_BUILD_FMWK" />
|
||||||
|
<FileRuleRef RuleID="ID_DENY_MWFC" />
|
||||||
|
<FileRuleRef RuleID="ID_DENY_MSBUILD"/>
|
||||||
|
<FileRuleRef RuleID="ID_DENY_MSBUILD_DLL" />
|
||||||
<FileRuleRef RuleID="ID_DENY_MSHTA"/>
|
<FileRuleRef RuleID="ID_DENY_MSHTA"/>
|
||||||
<FileRuleRef RuleID="ID_DENY_VISUALUIAVERIFY"/>
|
<FileRuleRef RuleID="ID_DENY_NTKD"/>
|
||||||
|
<FileRuleRef RuleID="ID_DENY_NTSD"/>
|
||||||
|
<FileRuleRef RuleID="ID_DENY_PWRSHLCUSTOMHOST"/>
|
||||||
|
<FileRuleRef RuleID="ID_DENY_RCSI"/>
|
||||||
<FileRuleRef RuleID="ID_DENY_RUNSCRIPTHELPER"/>
|
<FileRuleRef RuleID="ID_DENY_RUNSCRIPTHELPER"/>
|
||||||
<FileRuleRef RuleID="ID_DENY_ADDINPROCESS"/>
|
<FileRuleRef RuleID="ID_DENY_TEXTTRANSFORM"/>
|
||||||
<FileRuleRef RuleID="ID_DENY_ADDINPROCESS32"/>
|
<FileRuleRef RuleID="ID_DENY_VISUALUIAVERIFY"/>
|
||||||
<FileRuleRef RuleID="ID_DENY_ADDINUTIL"/>
|
<FileRuleRef RuleID="ID_DENY_WFC" />
|
||||||
|
<FileRuleRef RuleID="ID_DENY_WINDBG"/>
|
||||||
|
<FileRuleRef RuleID="ID_DENY_WMIC"/>
|
||||||
<FileRuleRef RuleID="ID_DENY_WSL"/>
|
<FileRuleRef RuleID="ID_DENY_WSL"/>
|
||||||
<FileRuleRef RuleID="ID_DENY_WSLCONFIG"/>
|
<FileRuleRef RuleID="ID_DENY_WSLCONFIG"/>
|
||||||
<FileRuleRef RuleID="ID_DENY_WSLHOST"/>
|
<FileRuleRef RuleID="ID_DENY_WSLHOST"/>
|
||||||
<FileRuleRef RuleID="ID_DENY_INFINSTALL"/>
|
|
||||||
<FileRuleRef RuleID="ID_DENY_LXRUN"/>
|
|
||||||
<FileRuleRef RuleID="ID_DENY_PWRSHLCUSTOMHOST"/>
|
|
||||||
<FileRuleRef RuleID="ID_DENY_TEXTTRANSFORM"/>
|
|
||||||
<FileRuleRef RuleID="ID_DENY_KILL"/>
|
|
||||||
<FileRuleRef RuleID="ID_DENY_WMIC"/>
|
|
||||||
<FileRuleRef RuleID="ID_DENY_MWFC" />
|
|
||||||
<FileRuleRef RuleID="ID_DENY_WFC" />
|
|
||||||
<!-- uncomment the relevant line(s) below if you have uncommented them in the rule definitions above
|
<!-- uncomment the relevant line(s) below if you have uncommented them in the rule definitions above
|
||||||
<FileRuleRef RuleID="ID_DENY_MSXML3" />
|
<FileRuleRef RuleID="ID_DENY_MSXML3" />
|
||||||
<FileRuleRef RuleID="ID_DENY_MSXML6" />
|
<FileRuleRef RuleID="ID_DENY_MSXML6" />
|
||||||
<FileRuleRef RuleID="ID_DENY_JSCRIPT9" />
|
<FileRuleRef RuleID="ID_DENY_JSCRIPT9" />
|
||||||
-->
|
-->
|
||||||
<FileRuleRef RuleID="ID_DENY_MSBUILD_DLL" />
|
|
||||||
<FileRuleRef RuleID="ID_DENY_DOTNET" />
|
|
||||||
<FileRuleRef RuleID="ID_DENY_MS_BUILD" />
|
|
||||||
<FileRuleRef RuleID="ID_DENY_MS_BUILD_FMWK" />
|
|
||||||
<FileRuleRef RuleID="ID_DENY_D_1"/>
|
<FileRuleRef RuleID="ID_DENY_D_1"/>
|
||||||
<FileRuleRef RuleID="ID_DENY_D_2"/>
|
<FileRuleRef RuleID="ID_DENY_D_2"/>
|
||||||
<FileRuleRef RuleID="ID_DENY_D_3"/>
|
<FileRuleRef RuleID="ID_DENY_D_3"/>
|
||||||
|
@ -24,20 +24,22 @@ ms.date: 03/16/2020
|
|||||||
- Windows 10
|
- Windows 10
|
||||||
- Windows Server 2016 and above
|
- Windows Server 2016 and above
|
||||||
|
|
||||||
After designing and deploying your Windows Defender Application Control (WDAC) policies, this guide covers understanding the effects your policies are having and troubleshooting when they are not behaving as expected. It contains information on where to find events and what they mean, and also querying these events with Microsoft Defender Advanted Threat Protection (MDATP) Advanced Hunting feature.
|
After designing and deploying your Windows Defender Application Control (WDAC) policies, this guide covers understanding the effects your policies are having and troubleshooting when they are not behaving as expected. It contains information on where to find events and what they mean, and also querying these events with Microsoft Defender Advanced Threat Protection (MDATP) Advanced Hunting feature.
|
||||||
|
|
||||||
## WDAC Events Overview
|
## WDAC Events Overview
|
||||||
|
|
||||||
WDAC generates and logs events when a policy is loaded as well as when a binary attempts to execute and is blocked. These events include information that identifies the policy and gives more details about the block. Generally, WDAC does not generate events when a binary is allowed; however, there is the option to enable allow events when Managed Installer and/or the Intelligent Security Graph (ISG) is configured.
|
WDAC generates and logs events when a policy is loaded as well as when a binary attempts to execute and is blocked. These events include information that identifies the policy and gives more details about the block. Generally, WDAC does not generate events when a binary is allowed; however, there is the option to enable events when Managed Installer and/or the Intelligent Security Graph (ISG) is configured.
|
||||||
|
|
||||||
WDAC events are generated under two locations:
|
WDAC events are generated under two locations:
|
||||||
|
|
||||||
1. Applications and Services logs – Microsoft – Windows – CodeIntegrity – Operational
|
- Applications and Services logs – Microsoft – Windows – CodeIntegrity – Operational
|
||||||
2. Applications and Services logs – Microsoft – Windows – AppLocker – MSI and Script
|
|
||||||
|
- Applications and Services logs – Microsoft – Windows – AppLocker – MSI and Script
|
||||||
|
|
||||||
## In this section
|
## In this section
|
||||||
|
|
||||||
| Topic | Description |
|
| Topic | Description |
|
||||||
| - | - |
|
| - | - |
|
||||||
| [Understanding Application Control events](event-id-explanations.md) | This topic explains the meaning of different WDAC events. |
|
| [Understanding Application Control event IDs](event-id-explanations.md) | This topic explains the meaning of different WDAC event IDs. |
|
||||||
|
| [Understanding Application Control event tags](event-tag-explanations.md) | This topic explains the meaning of different WDAC event tags. |
|
||||||
| [Query WDAC events with Advanced hunting](querying-application-control-events-centrally-using-advanced-hunting.md) | This topic covers how to view WDAC events centrally from all systems that are connected to Microsoft Defender ATP. |
|
| [Query WDAC events with Advanced hunting](querying-application-control-events-centrally-using-advanced-hunting.md) | This topic covers how to view WDAC events centrally from all systems that are connected to Microsoft Defender ATP. |
|
||||||
|