Introduction
What is AppLocker?
AppLocker, which was introduced in the
Windows 7 operating system and Windows Server 2008 R2, is a security setting
feature that controls which applications users are allowed to run.
AppLocker provides administrators a
variety of methods for determining quickly and concisely the identity of
applications that they may want to restrict, or to which they may want to
permit access.
AppLocker is a powerful but often overlooked tool for increasing
security by restricting user access to applications and other executable files,
scripts, Windows Installer files and Dynamic Link Libraries (DLLs).
You apply AppLocker through Group
Policy to computer objects within an OU. You can also apply Individual
AppLocker rules to individual AD DS users or groups.
Model Solutions
1.
On run, type dsa.msc and
press enter.
In the AppLocker
container, there are four nodes that contain the basic rule types, as follows:
■ Executable Rules
Contains rules that apply to files with .exe and .com extensions.
■ Windows Installer Rules
Contains rules that apply to Windows Installer packages with .msi and
.msp extensions.
■ Script Rules
Contains rules that apply to script files with .ps1, .bat, .cmd, .vbs,
and .js extensions.
■ Packaged App Rules
Contains rules that apply to applications purchased through the Windows
Store.
Each of the rules
you create in each of these containers can allow or block access to specific
resources, based on one of the following criteria:
■ Publisher Identifies
code-signed applications by means of a digital signature extracted from an
application file. You can also create publisher rules that apply to all future
versions of an application.
■ Path Identifies
applications by specifying a file or folder name. The potential vulnerability
of this type of rule is that any file can match the rule, as long as it is the
correct name or location.
■ File Hash Identifies
applications based on a digital fingerprint that remains valid even when the
name or location of the executable file changes. This type of rule functions
much like its equivalent in software restriction policies; in AppLocker,
however, the process of creating the rules and generating file hashes is much
easier.
15. On the Name and Description window, click Create -> click Yes to finish.
18. On the Select GPO window, select AppLocker Software Control GPO then click OK.
20. Next, In the AppLocker Properties box, under Executable rules, select the Configured check box, and then from the drop-down menu, select Audit only and then click OK.
21. Next, In the Group Policy Management Editor, go to System Services, and then double-click Application Identity, click Define this policy setting, under Select service startup mode, click Automatic, and then click OK.
22. Test Publisher rules_01:
-
On Clt01, on run type cmd
and then press enter.
-
Type gpupdate /boot
/force and press enter.
- Then type gpresult /r to check the result of the command and ensure that AppLocker Software Control GPO is displayed under Computer Settings, Applied Group Policy Objects.
- Run Mozilla Firefox (Version 19.0.2)
- In the Event Viewer window, under EXE and DLL, you will see there are few event log 8003 that contains the following text: %PROGRAMFILES%\MOZILLA FIREFOX\FIREFOX.EXE was allowed to run but would have been prevented from running if the AppLocker policy were enforced.
23. On DCSrv2012 (AppLocker server), on Group Policy Management, right click AppLocker Software Control GPO then click Edit.
24. Click AppLocker, and then in the right pane, click Configure rule enforcement.
25. Change settings as show in figure bellow, click OK.
26. Next, on the Window 8 client, in the command prompt, type gpupdate /boot /force and press Enter.
27. Then open Mozilla Firefox and you will receive a message: “You system administrator has blocked this program…”
28. Open Event Viewer on the Windows 8 client, and you should see Event ID 8007 which error stated: “%PROGRAMFILES%\MOZILLA FIREFOX\FIREFOX.EXE was prevented from running.”
29. On the Windows 8 client, uninstall Firefox 19.0.2 and install Firefox 34.0b11 (Firefox releases 21-Nov-2014).
30. Run Firefox 34.0b11 and realize that firefox is running normally.
31. On the DCSrv2012 server, compare Publisher Signature between Firefox 19.0.2 and Firefox 34.0, you have something special.
32. Apply new Publisher Signature (FF 34.0) then on the windows 8 client run Firefox 34.0, you will see a message below.
▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬
► Download this video, lesson for FREE
► MP4 link: updating...
► PDF link: http://fas.li/Hr9Jb
► Youtube: updating...
► Alternate link: http://adf.ly/1n3zmb
► Alternate link: http://viid.me/qWYGK1► Alternate link: http://linkshrink.net/7cOB5y
▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬
No comments:
Post a Comment