Skip to content

Create App Control Policy

Violet Hansen edited this page Dec 27, 2024 · 4 revisions

Create App Control Policy

AppControl Manager Application's Create App Control Policy Page


Use AppControl Manager to create new App Control policies based on the default templates.

  • Allow Microsoft: Only allows files signed by Microsoft certificates to run on the system.

  • Default Windows: Only allows files that come by default with Windows OS to run on the system.

  • Signed And Reputable: Allows files signed by Microsoft certificates to run, it also utilizes the Intelligent Security Graph to allow files that are reputable and safe.

  • Microsoft Recommended Block Rules: It will download the latest Microsoft Recommended (User-Mode) block rules from the official source and create an App Control policy.

  • Microsoft Recommended Driver Block Rules: It will download the latest Microsoft Recommended (Kernel-Mode) block rules from the official source and create an App Control policy.

    • Auto update: It will create a scheduled task on the system that will check every week for the latest Microsoft Recommended block rules and update the policy automatically. Please refer to this page for more info.

Deploying any of them is optional. You can create the policies and then deploying them on remote systems using Intune or other methods.


Configuration Details

There are different settings and options you can use to fine tune the policy according to your requirements.

  • Audit: When a policy has Audit mode turned on for it, it will only log the events and not block any files from running.

  • Log Size: You can configure the max capacity of the Code Integrity/Operational log size. It is recommended to increase it from the default 1MB capacity if you want to begin auditing for App Control events. When the capacity is reached, the log will overwrite the oldest events.

  • Require EVSigners: When this setting is enabled, the policy will only allow files signed by Extended Validation (EV) certificates to run on the system.

  • Enable Script Enforcement: When this setting is enabled, the policy will only allow PowerShell scripts or modules that are signed and their signing certificates are allowed in an App Control policy to run. This greatly reduces the attack surface from the Windows script hosts.

  • Test Mode: Boot Options Menu, such as Safe mode, is disabled for all App Control policies by default. Using Test Mode will allow access to it. It will also automatically enable the Audit mode for the policy in case of a failure in a driver that is critical to system boot. It's only recommended to use this setting in a test environment and not in production due to security reasons.









C#


Clone this wiki locally