windows-itpro-docs/windows/device-security/applocker/requirements-for-deploying-applocker-policies.md
Nicholas Brower 1ae3f0b230 Merged PR 4822: "msdate update (generated from most recent commit date)"
"msdate update (generated from most recent commit date)"
2017-12-05 22:36:05 +00:00

8.2 KiB

title, description, ms.assetid, ms.prod, ms.mktglfcycl, ms.sitesec, ms.pagetype, author, ms.date
title description ms.assetid ms.prod ms.mktglfcycl ms.sitesec ms.pagetype author ms.date
Requirements for deploying AppLocker policies (Windows 10) This deployment topic for the IT professional lists the requirements that you need to consider before you deploy AppLocker policies. 3e55bda2-3cd7-42c7-bad3-c7dfbe193d48 w10 deploy library security brianlic-msft 09/21/2017

Requirements for deploying AppLocker policies

Applies to

  • Windows 10
  • Windows Server

This deployment topic for the IT professional lists the requirements that you need to consider before you deploy AppLocker policies.

The following requirements must be met or addressed before you deploy your AppLocker policies:

Deployment plan

An AppLocker policy deployment plan is the result of investigating which applications are required and necessary in your organization, which apps are optional, and which apps are forbidden. To develop this plan, see AppLocker Design Guide. The following table is an example of the data you need to collect and the decisions you need to make to successfully deploy AppLocker policies on the supported operating systems (as listed in Requirements to use AppLocker).

Business group Organizational unit Implement AppLocker? Apps Installation path Use default rule or define new rule condition Allow or deny GPO name Support policy

Bank Tellers

Teller-East and Teller-West

Yes

Teller software

C:\Program Files\Woodgrove\Teller.exe

File is signed; create a publisher condition

Allow

Tellers

Web help

Windows files

C:\Windows

Create a path exception to the default rule to exclude \Windows\Temp

Allow

Help Desk

Time Sheet Organizer

C:\Program Files\Woodgrove\HR\Timesheet.exe

File is not signed; create a file hash condition

Allow

Web help

Human Resources

HR-All

Yes

Check Payout

C:\Program Files\Woodgrove\HR\Checkcut.exe

File is signed; create a publisher condition

Allow

HR

Web help

Internet Explorer 7

C:\Program Files\Internet Explorer\

File is signed; create a publisher condition

Deny

Help Desk

Windows files

C:\Windows

Use the default rule for the Windows path

Allow

Help Desk

  **Event processing policy**
Business group AppLocker event collection location Archival policy Analyzed? Security policy

Bank Tellers

Forwarded to: srvBT093

Standard

None

Standard

Human Resources

Do not forward

60 months

Yes; summary reports monthly to managers

Standard

  **Policy maintenance policy**
Business group Rule update policy App decommission policy App version policy App deployment policy

Bank Tellers

Planned: Monthly through business office triage

Emergency: Request through Help Desk

Through business office triage; 30-day notice required

General policy: Keep past versions for 12 months

List policies for each application

Coordinated through business office; 30-day notice required

Human Resources

Planned: Through HR triage

Emergency: Request through Help Desk

Through HR triage; 30-day notice required

General policy: Keep past versions for 60 months

List policies for each application

Coordinated through HR; 30-day notice required

  ### Supported operating systems

AppLocker is supported only on certain operating systems. Some features are not available on all operating systems. For more information, see Requirements to use AppLocker.

Policy distribution mechanism

You need a way to distribute the AppLocker policies throughout the targeted business groups. AppLocker uses Group Policy management architecture to effectively distribute application control policies. AppLocker policies can also be configured on individual computers by using the Local Security Policy snap-in.

Event collection and analysis system

Event processing is important to understand application usage. You must have a process in place to collect and analyze AppLocker events so that application usage is appropriately restricted and understood. For procedures to monitor AppLocker events, see:

See also