Files
windows-itpro-docs/windows/security/threat-protection/windows-defender-application-control/understand-windows-defender-application-control-policy-design-decisions.md
Trond B. Krokli 0f3980bbc3 WDAC/policy design decisions: typo correction
Description:

As reported in issue ticket #6346 (Typo), one of the sentences in the bullet point list 
ends with a malformed word or phrase: "... application management and deployed."

Thanks to TokenRing (Zach) for finding and reporting this grammatical typo.

Proposed change:
- Replace the word "deployed" with *deployment* to match the grammar.

Ticket closure or reference:

Closes #6346
2020-03-27 21:45:52 +01:00

9.9 KiB
Raw Blame History

title, description, keywords, ms.assetid, ms.reviewer, manager, ms.author, ms.prod, ms.mktglfcycl, ms.sitesec, ms.pagetype, ms.localizationpriority, audience, ms.collection, author, ms.reviewer, ms.author, manager, ms.date
title description keywords ms.assetid ms.reviewer manager ms.author ms.prod ms.mktglfcycl ms.sitesec ms.pagetype ms.localizationpriority audience ms.collection author ms.reviewer ms.author manager ms.date
Understand Windows Defender Application Control policy design decisions (Windows 10) Understand Windows Defender Application Control policy design decisions. whitelisting, security, malware 8d6e0474-c475-411b-b095-1c61adb2bdbb dansimp dansimp w10 deploy library security medium ITPro M365-security-compliance jsuther1974 isbrahm dansimp dansimp 02/08/2018

Understand Windows Defender Application Control policy design decisions

Applies to:

  • Windows 10
  • Windows Server 2016 and above

This topic is for the IT professional and lists the design questions, possible answers, and ramifications of the decisions when you plan a deployment of application control policies by using Windows Defender Application Control (WDAC) within a Windows operating system environment.

When you begin the design and planning process, you should consider the ramifications of your design choices. The resulting decisions will affect your policy deployment scheme and subsequent application control policy maintenance.

You should consider using WDAC as part of your organization's application control policies if the following are true:

  • You have deployed or plan to deploy the supported versions of Windows in your organization.
  • You need improved control over the access to your organization's applications and the data your users access.
  • Your organization has a well-defined process for application management and deployment.
  • You have resources to test policies against the organization's requirements.
  • You have resources to involve Help Desk or to build a self-help process for end-user application access issues.
  • The group's requirements for productivity, manageability, and security can be controlled by restrictive policies.

Decide what policies to create

Beginning with Windows 10, version 1903, WDAC allows multiple simultaneous policies to be applied to each device. While this opens up many new use cases for organizations, your policy management can easily become unwieldy without a well-thought-out plan for the number and types of policies to create.

The first step is to define the desired "circle-of-trust" for your WDAC policies. By "circle-of-trust", we mean a description of the business intent of the policy expressed in natural language. This "circle-of-trust" definition will guide you as you create the actual policy rules for your policy XML.

For example, the DefaultWindows policy, which can be found under %OSDrive%\Windows\schemas\CodeIntegrity\ExamplePolicies, establishes a "circle-of-trust" that allows Windows, 3rd-party hardware and software kernel drivers, and applications from the Microsoft Store.

Microsoft Endpoint Configuration Manager, previously known as System Center Configuration Manager, uses the DefaultWindows policy as the basis for its policy but then modifies the policy rules to allow Configuration Manager and its dependencies, sets the managed installer policy rule, and additionally configures Configuration Manager as a managed installer. It also can optionally authorize apps with positive reputation and perform a one-time scan of folder paths specified by the Configuration Manager administrator which adds rules for any apps found in the specified paths on the managed endpoint. This establishes the "circle-of-trust" for Configuration Manager's native WDAC integration.

The following questions can help you plan your WDAC deployment and determine the right "circle-of-trust" for your policies. They are not in priority or sequential order and are not meant to be an exhaustive set of design considerations.

WDAC design considerations

How are apps managed and deployed in your organization?

Organizations with well-defined, centrally-managed app management and deployment processes can create more restrictive, more secure policies. Other organizations may be able to deploy WDAC with more relaxed rules or may choose to deploy WDAC in audit mode to gain better visibility to the apps being used in their organization.

Possible answers Design considerations
All apps are centrally managed and deployed using endpoint management tools like Microsoft Endpoint Manager. Organizations that centrally manage all apps are best-suited for application control. WDAC options like managed installer can make it easy to authorize apps that are deployed by the organization's app distribution management solution.
Some apps are centrally managed and deployed, but teams can install additional apps for their members. Supplemental policies can be used to allow team-specific exceptions to your core organization-wide WDAC policy. Alternatively, teams can leverage managed installers to install their team-specific apps or admin-only file path rules can be used to allow apps installed by admin users.
Users and teams are free to download and install apps but the organization wants to restrict that right to prevalent and reputable apps only. WDAC can integrate with Microsoft's Intelligent Security Graph (the same source of intelligence that powers Windows Defender Antivirus and Windows Defender SmartScreen) to allow only apps and binaries that have positive reputation.
Users and teams are free to download and install apps without restriction. WDAC policies can be deployed in audit mode to gain insight into the apps and binaries running in your organization without impacting user and team productivity.

Are internally-developed line-of-business (LOB) apps and apps developed by 3rd parties digitally signed?

Traditional Win32 apps on Windows can run without being digitally signed. This practice can expose Windows devices to malicious or tampered code and presents a security vulnerability to your Windows devices. Adopting code-signing as part of your organization's app development practices or augmenting apps with signed catalog files as part of your app ingestion and distribution can greatly improve the integrity and security of apps used.

Possible answers Design considerations
All apps used in your organization must be signed. Organizations that enforce codesigning for all executable code are best-positioned to protect their Windows computers from malicious code execution. WDAC rules can be created to authorize apps and binaries from the organization's internal development teams and from trusted independent software vendors (ISV).
Apps used in your organization do not need to meet any codesigning requirements. Organizations can use built-in Windows 10 tools to add organization-specific App Catalog signatures to existing apps as a part of the app deployment process which can be used to authorize code execution. Solutions like Microsoft Endpoint Manager offer multiple ways to distribute signed App Catalogs.

Are there specific groups in your organization that need customized application control policies?

Most business teams or departments have specific security requirements that pertain to data access and the applications used to access that data. You should consider the scope of the project for each group and the groups priorities before you deploy application control policies for the entire organization. There is overhead in managing policies which may lead you to choose between broad, organization-wide policies and multiple team-specific policies.

Possible answers Design considerations
Yes WDAC policies can be created unique per team, or team-specific supplemental policies can be used to expand what is allowed by a common, centrally-defined base policy.
No WDAC policies can be applied globally to applications that are installed on PCs running Windows 10. Depending on the number of apps you need to control, managing all the rules and exceptions might be challenging.

Does your IT department have resources to analyze application usage, and to design and manage the policies?

The time and resources that are available to you to perform the research and analysis can affect the detail of your plan and processes for continuing policy management and maintenance.

Possible answers Design considerations
Yes Invest the time to analyze your organization's application control requirements, and plan a complete deployment that uses rules that are as simply constructed as possible.
No Consider a focused and phased deployment for specific groups by using a small number of rules. As you apply controls to applications in a specific group, learn from that deployment to plan your next deployment. Alternatively, you can create a policy with a broad trust profile to authorize as many apps as possible.

Does your organization have Help Desk support?

Preventing your users from accessing known, deployed, or personal applications will initially cause an increase in end-user support. It will be necessary to address the various support issues in your organization so security policies are followed and business workflow is not hampered.

Possible answers Design considerations
Yes Involve the support department early in the planning phase because your users may inadvertently be blocked from using their applications, or they may seek exceptions to use specific applications.
No Invest time in developing online support processes and documentation before deployment.