Skip to main content

Controled Software Restriction Policies

Software Restriction Policies:

Software restriction policies can help organizations protect themselves because they provide another layer of defense against viruses, Trojan horses, and other types of malicious software. You can configure the Software Restriction Policies settings in the following location within the Group Policy Management Console:

Computer Configuration\Windows Settings\Security Settings\Software Restriction Policies



Software restriction policies do not prevent restricted processes that run under the System account. For example, if a malicious program has set up a malicious service that starts under the Local System account, it starts successfully even if there is a software restriction policy configured to restrict it. A flawed software restriction policy implementation can disable necessary applications or allow malicious software to run.

A policy consists of a default rule that specifies whether programs are allowed to run and exceptions to that rule. The default rule can be set to Unrestricted (the program is allowed to run) or Disallowed (the program is not allowed to run). Setting the default rule to Unrestricted allows an administrator to define exceptions (programs that are not allowed to run). A more secure approach is to set the default rule to Disallowed, and specify only the programs that are known and trusted to run.

There are two ways to use software restriction policies:
•    If an administrator knows all of the programs that should run, then a software restriction policy can be applied to allow only this list of trusted applications.
•    If all the applications that users might run are not known, then administrators can disallow undesired applications or file types as needed.
Software Restriction Policies has four rules with which to identify software. The purpose of a rule is to identify one or more software applications, and specify whether or not they are allowed to run. Creating rules largely consists of identifying software that is an exception to the default rule. Each rule can include descriptive text to help communicate why the rule was created.
   
A software restriction policy supports the following four ways to identify software:
•    Hash: A cryptographic fingerprint of the file.
•    Certificate: A software publisher certificate that is used to digitally sign a file.
•    Path: The local or universal naming convention (UNC) path of where the file is stored.
•    Zone: The Internet zone as specified through Internet Explorer


App locker:

You can configure application restrictions in Windows 7 by using a tool called App locker. With it you can configure Application Control Policies, which allow you to block the execution of a program by file name or hash calculation. App locker helps you to allow the applications you want, and block the rest. But App Locker is present only in the Enterprise and Ultimate editions of Windows 7. App locker provides the following functionalities:
•    Prevent unlicensed software from running in the desktop environment if the software is not on the allowed list
•    Prevent vulnerable, unauthorized applications from running in the desktop environment, including mal ware
•    Stop users from running applications that needlessly consume network bandwidth or otherwise affect the enterprise computing environment
•    Prevent users from running applications that destabilize their desktop environment and increase help desk support costs
•    Provide more options for effective desktop configuration management
•    Allow users to run approved applications and software updates based upon policies while preserving the requirement that only users with administrative credentials can install or run applications and software updates
•    Help to ensure that the desktop environment is in compliance with corporate policies and industry regulations
•    App Locker introduces publisher rules that are based upon application digital signatures. Publisher rules make it possible to build rules that survive application updates by being able to specify attributes such as the version of an application.
To access App locker and block applications with it, follow these steps:
1.    Click Start and type gpedit.msc into the search box.
2.    In Local Computer Policy go to Computer Configuration \ Windows Settings \ Security Settings \ Application Control Policies \ App Locker. Here you can see overall controls for the applications




3. In the Configure Rule Enforcement window, click the Configure rule enforcement link.

4. In App locker properties Window, click the checkbox for Executable Rules, Windows Installer Rules, or Script Rules depending on which type of application you are trying to control (in this example, we selected Executable Rules). Click OK.
5. In the Overview window, click the Executable Rules.
6. Right-click and select Create New Rule. This opens up the Create Executable Rules wizard and you can select not to show the introduction screen at start up for the next time you access it by clicking the checkbox skip this page by default.

7. Select Permissions under Action, select Deny. Add the user name for whom you want to block the application.


8. In Conditions you can select from Publisher, Path or File hash, whichever you want to block. For example, if you want to block games, for example, select Path. Click Next.


9. Click Browse Folders and select the Microsoft Games folder. If you wanted to block a specific game(s) only, you would click on Browse Files and select the games in you wanted blocked.
10. On the next screen you can add Exceptions like allowing certain applications.


11. Add a description to the rule, and click Create and then click Yes.
12. After creating the rule, start Application Identification and set it to automatically, otherwise the rules won’t work. By default this service is not started so you need to enable it.
Both SRP and App Locker use Group Policy for domain management. However, when both SRP policies and App Locker policies exist in the same Group Policy object (GPO), App Locker policies will take precedence over SRP policies

Comments

Popular posts from this blog

Parental Control on Internet

In windows 7 Microsoft have designed a special feature to set limits on your kids' computer use and help them be safer online without constantly peeking over their shoulders. Parental Controls helps you limit how much computer time children have, as well as which programs and games they can use. With the Parental Controls you can also block access to objectionable TV shows and movies. How to Configure Parental Controls in Windows 7 To Set up Parental Controls for any user, you'll need your own administrator user account. Before you get started, make sure each user/person that you want to set up Parental Controls for has a standard user account. Parental Controls can be applied only to standard user accounts. Steps to Apply Parental Controls: 1. Click the Start button to view the Start Menu and then choose the Control Panel option. 2. The Control Panel window opens up. Click on the All Control Panel Items. 3. Window shows all control panel items. Click on Pa

Installing and Configuring Active Directory

What is Active Directory? Active Directory Domain Services (AD DS) is designed by Microsoft for the Enterprise Environment of Microsoft or others. This act as a tool to store the information about the identities of the users, computers and services to authenticate the user or a computer to access the data in the Enterprise. Stores Information About the Users, Computers and Services? If a user is using a shared folder on a server. The document can be secured by using the Access Control List (ACL). This accessing of the document is managed and control by the security subsystem of the computer. The user identity and the identity defined on the ACL to determine whether the user request for accessing can be Granted to Denied. The identity store is the one component of an IDA Infrastructure