Files
windows-itpro-docs/windows/security/threat-protection/windows-defender-application-control/example-wdac-base-policies.md
2022-12-08 16:56:46 -05:00

6.3 KiB

title, description, keywords, ms.topic, ms.assetid, ms.prod, ms.mktglfcycl, ms.sitesec, ms.pagetype, ms.localizationpriority, audience, author, ms.reviewer, ms.author, manager, ms.date, ms.technology
title description keywords ms.topic ms.assetid ms.prod ms.mktglfcycl ms.sitesec ms.pagetype ms.localizationpriority audience author ms.reviewer ms.author manager ms.date ms.technology
Example Windows Defender Application Control (WDAC) base policies (Windows) When creating a WDAC policy for an organization, start from one of the many available example base policies. security, malware article 8d6e0474-c475-411b-b095-1c61adb2bdbb windows-client deploy library security medium ITPro jsuther1974 jogeurte vinpa aaroncz 11/02/2022 itpro-security

Windows Defender Application Control (WDAC) example base policies

Applies to:

  • Windows 10
  • Windows 11
  • Windows Server 2016 and above

Note

Some capabilities of Windows Defender Application Control (WDAC) are only available on specific Windows versions. Learn more about the Windows Defender Application Control feature availability.

When you create policies for use with Windows Defender Application Control (WDAC), start from an existing base policy and then add or remove rules to build your own custom policy. Windows includes several example policies that can be used, or organizations that use the Device Guard Signing Service can download a starter policy from that service.

Example Base Policies

Example Base Policy Description Where it can be found
DefaultWindows_*.xml This example policy is available in both audit and enforced mode. It includes rules to allow Windows, third-party hardware and software kernel drivers, and Windows Store apps. Used as the basis for all Microsoft Endpoint Manager policies. %OSDrive%\Windows\schemas\CodeIntegrity\ExamplePolicies\DefaultWindows_*.xml
%ProgramFiles%\WindowsApps\Microsoft.WDAC.WDACWizard*\DefaultWindows_Audit.xml
AllowMicrosoft.xml This example policy is available in audit mode. It includes the rules from DefaultWindows and adds rules to trust apps signed by the Microsoft product root certificate. %OSDrive%\Windows\schemas\CodeIntegrity\ExamplePolicies\AllowMicrosoft.xml
%ProgramFiles%\WindowsApps\Microsoft.WDAC.WDACWizard*\AllowMicrosoft.xml
AllowAll.xml This example policy is useful when creating a blocklist. All block policies should include rules allowing all other code to run and then add the DENY rules for your organization's needs. %OSDrive%\Windows\schemas\CodeIntegrity\ExamplePolicies\AllowAll.xml
AllowAll_EnableHVCI.xml This example policy can be used to enable memory integrity (also known as hypervisor-protected code integrity) using WDAC. %OSDrive%\Windows\schemas\CodeIntegrity\ExamplePolicies\AllowAll_EnableHVCI.xml
DenyAllAudit.xml Warning: May cause long boot time on Windows Server 2019. Only deploy this example policy in audit mode to track all binaries running on critical systems or to meet regulatory requirements. %OSDrive%\Windows\schemas\CodeIntegrity\ExamplePolicies\DenyAllAudit.xml
Device Guard Signing Service (DGSS) DefaultPolicy.xml This example policy is available in audit mode. It includes the rules from DefaultWindows and adds rules to trust apps signed with your organization-specific certificates issued by the DGSS. Device Guard Signing Service NuGet Package
MEM Configuration Manager Customers who use Configuration Manager can deploy a policy with Configuration Manager's built-in WDAC integration, and then use the generated policy XML as an example base policy. %OSDrive%\Windows\CCM\DeviceGuard on a managed endpoint
SmartAppControl.xml This example policy includes rules based on Smart App Control that are well-suited for lightly managed systems. This policy includes a rule that is unsupported for enterprise WDAC policies and must be removed. For more information about using this example policy, see Create a custom base policy using an example WDAC base policy). %OSDrive%\Windows\schemas\CodeIntegrity\ExamplePolicies\SmartAppControl.xml
%ProgramFiles%\WindowsApps\Microsoft.WDAC.WDACWizard*\SignedReputable.xml
Example supplemental policy This example policy shows how to use supplemental policy to expand the DefaultWindows_Audit.xml allow a single Microsoft-signed file. %OSDrive%\Windows\schemas\CodeIntegrity\ExamplePolicies\DefaultWindows_Supplemental.xml
Microsoft Recommended Block List This policy includes a list of Windows and Microsoft-signed code that Microsoft recommends blocking when using WDAC, if possible. Microsoft recommended block rules
%ProgramFiles%\WindowsApps\Microsoft.WDAC.WDACWizard*\Recommended_UserMode_Blocklist.xml
Microsoft recommended driver blocklist This policy includes rules to block known vulnerable or malicious kernel drivers. Microsoft recommended driver block rules
%OSDrive%\Windows\schemas\CodeIntegrity\ExamplePolicies\RecommendedDriverBlock_Enforced.xml
%ProgramFiles%\WindowsApps\Microsoft.WDAC.WDACWizard*\Recommended_Driver_Blocklist.xml
Windows S mode This policy includes the rules used to enforce Windows S mode. %ProgramFiles%\WindowsApps\Microsoft.WDAC.WDACWizard*\WinSiPolicy.xml.xml
Windows 11 SE This policy includes the rules used to enforce Windows 11 SE, a version of Windows built for use in schools. %ProgramFiles%\WindowsApps\Microsoft.WDAC.WDACWizard*\WinSEPolicy.xml.xml

Note

Not all policies shown available at %OSDrive%\Windows\schemas\CodeIntegrity\ExamplePolicies can be found on all versions of Windows.