-
Notifications
You must be signed in to change notification settings - Fork 174
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Creating new documentations for App Control (#543)
How To Upload App Control Policies To Intune Using AppControl Manager How To Create and Maintain Strict Kernel‐Mode App Control Policy Updated some other docs.
- Loading branch information
Showing
7 changed files
with
160 additions
and
19 deletions.
There are no files selected for viewing
64 changes: 64 additions & 0 deletions
64
...or Business/How To Create and Maintain Strict Kernel-Mode App Control Policy.md
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,64 @@ | ||
# How To Create and Maintain Strict Kernel-Mode App Control Policy | ||
|
||
A [**Strict Kernel-mode**](https://github.com/HotCakeX/Harden-Windows-Security/wiki/WDAC-policy-for-BYOVD-Kernel-mode-only-protection) App Control policy is a special kind of policy that only enforces Kernel-mode drivers without affecting user-mode files. [The AppControl Manager](https://github.com/HotCakeX/Harden-Windows-Security/wiki/AppControl-Manager) fully supports this unique policy and allows you to create and maintain it effortlessly. | ||
|
||
<br> | ||
|
||
## Creating the Base Policy | ||
|
||
Navigate to the [Create App Control policy](https://github.com/HotCakeX/Harden-Windows-Security/wiki/Create-App-Control-Policy) page and scroll down to the `Create Strict Kernel-Mode Policy` section. | ||
|
||
<img src="https://raw.githubusercontent.com/HotCakeX/.github/1df694f5fc413e27f9cf4621777d85cba60ef0d2/Pictures/PNG%20and%20JPG/How%20To%20Create%20and%20Maintain%20Strict%20Kernel-Mode%20App%20Control%20Policy/Creating%20the%20base%20policy.png" alt="creating new base strict kernel mode policy"> | ||
|
||
<br> | ||
|
||
<br> | ||
|
||
* Toggle the `Audit` switch. We need to deploy the base policy in Audit mode first in order to generate audit logs that we will use later. | ||
|
||
* Toggle the `No flight root certificates` switch if you don't plan to use this policy on the insider builds of Windows on (Dev or Canary channels). Those builds are signed with a different certificate. Release Preview and Beta builds are signed with production certificates and they will work either way. | ||
|
||
* Toggle the `Deploy` button and finally press the `Create` button. In few seconds, the policy will be created and deployed in Audit mode on the system. | ||
|
||
> [!IMPORTANT]\ | ||
> Restart your computer after deploying the policy. The reason we deploy it in Audit mode is that we need audit logs to be generated for kernel-mode drivers that belong to your hardware devices so we can create a supplemental policy for them to allow them to run. | ||
<br> | ||
|
||
## Creating the Supplemental Policy | ||
|
||
After restarting the system and relaunching the AppControl Manager, navigate to the [Create Supplemental Policy](https://github.com/HotCakeX/Harden-Windows-Security/wiki/Create-Supplemental-App-Control-Policy#create-kernel-mode-supplemental-policy) page. Scroll down to the `Kernel-mode policy` section. | ||
|
||
<br> | ||
|
||
<img src="https://raw.githubusercontent.com/HotCakeX/.github/6a635612aef4c1dbb00533689d568eaf7d52c98e/Pictures/PNG%20and%20JPG/How%20To%20Create%20and%20Maintain%20Strict%20Kernel-Mode%20App%20Control%20Policy/Creating%20supplemental%20policy.png" alt="Creating strict kernel mode supplemental policy"> | ||
|
||
<br> | ||
|
||
<br> | ||
|
||
Press the `Scan for Kernel-mode Logs Since Last Reboot` button. It will begin fetching all kernel-mode Code Integrity logs that were generated since the last reboot that belong to signed files and will display the results in a data grid that is accessible by clicking/tapping on the `View detected kernel-mode files` section. | ||
|
||
<br> | ||
|
||
<img src="https://raw.githubusercontent.com/HotCakeX/.github/733d7bafe220df3a484ad0d32172756364a57333/Pictures/PNG%20and%20JPG/How%20To%20Create%20and%20Maintain%20Strict%20Kernel-Mode%20App%20Control%20Policy/scanning%20for%20logs.png" alt="Scan for drivers since last reboot"> | ||
|
||
<br> | ||
|
||
<br> | ||
|
||
While reviewing the detected kernel-mode drivers, you can right-click or tap + hold on a row to open a context menu that allows you to remove the driver from the list and it will be excluded from the supplemental policy. | ||
|
||
<br> | ||
|
||
<img src="https://raw.githubusercontent.com/HotCakeX/.github/733d7bafe220df3a484ad0d32172756364a57333/Pictures/PNG%20and%20JPG/How%20To%20Create%20and%20Maintain%20Strict%20Kernel-Mode%20App%20Control%20Policy/Kernel%20Mode%20Drivers%20Results.png" alt="kernel mode drivers results review"> | ||
|
||
<br> | ||
|
||
<br> | ||
|
||
After reviewing and confirming the results, return to the Supplemental Policy creation page. Locate the strict kernel-mode base policy XML file you created earlier by using the file browser. Enable the `Deploy After Creation` toggle, then click/tap the `Create Supplemental Policy` button. This will generate the Supplemental Policy and automatically deploy it to the system. | ||
|
||
In the future, you can follow the same steps to allow additional kernel-mode files in your base policy by creating separate Supplemental Policies as needed. Additionally, you can explore other powerful features of AppControl Manager, such as scanning the system for logs or authorizing new applications and drivers for streamlined policy management. | ||
|
||
<br> |
71 changes: 71 additions & 0 deletions
71
...siness/How To Upload App Control Policies To Intune Using AppControl Manager.md
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,71 @@ | ||
# How To Upload App Control Policies To Intune Using AppControl Manager | ||
|
||
The [AppControl Manager](https://github.com/HotCakeX/Harden-Windows-Security/wiki/AppControl-Manager) provides native support for Intune, enabling effortless deployment of App Control policies to your Intune-managed devices. | ||
|
||
To do that, navigate to the [Deploy App Control Policy](https://github.com/HotCakeX/Harden-Windows-Security/wiki/Deploy-App-Control-Policy) page, Click the `Sign In` button. A new browser tab will open, prompting you to sign into your Entra ID account. | ||
|
||
<div align="center"> | ||
|
||
<br> | ||
|
||
<img src="https://raw.githubusercontent.com/HotCakeX/.github/7ccc3793b4d21d2fe7d5a79b56d1cc78fa1d0aac/Pictures/PNG%20and%20JPG/How%20To%20Upload%20App%20Control%20Policies%20To%20Intune%20Using%20AppControl%20Manager/Sign%20In%20button.png" alt="Sign In button"> | ||
|
||
<br> | ||
|
||
<br> | ||
|
||
<img src="https://raw.githubusercontent.com/HotCakeX/.github/7ccc3793b4d21d2fe7d5a79b56d1cc78fa1d0aac/Pictures/PNG%20and%20JPG/How%20To%20Upload%20App%20Control%20Policies%20To%20Intune%20Using%20AppControl%20Manager/Azure%20SignIn%20page.png" Height="600" alt="Azure Sign in pages"> | ||
|
||
<br> | ||
|
||
<br> | ||
|
||
<img src="https://raw.githubusercontent.com/HotCakeX/.github/7ccc3793b4d21d2fe7d5a79b56d1cc78fa1d0aac/Pictures/PNG%20and%20JPG/How%20To%20Upload%20App%20Control%20Policies%20To%20Intune%20Using%20AppControl%20Manager/Permissions%20acceptance%20page.png" alt="Azure Permissions page"> | ||
|
||
<br> | ||
|
||
<br> | ||
|
||
</div> | ||
|
||
Once signed in, you'll be redirected back to the AppControl Manager. | ||
|
||
<br> | ||
|
||
## Permissions Required | ||
|
||
To successfully complete the sign-in process and deploy policies, your account must have the following permissions, ***adhering to the Principle of Least Privilege***: | ||
|
||
* [`Group.Read.All`](https://learn.microsoft.com/en-us/graph/permissions-reference#groupreadall): Allows the AppControl Manager to read security groups and display them in the dropdown list. | ||
|
||
* [`DeviceManagementConfiguration.ReadWrite.All`](https://learn.microsoft.com/en-us/graph/permissions-reference#devicemanagementconfigurationreadwriteall): Grants the ability to create, upload, and assign App Control policies. | ||
|
||
By ensuring these permissions are in place, you can seamlessly deploy App Control policies through Intune while maintaining secure and minimal access. | ||
|
||
<br> | ||
|
||
## Select Policies To Deploy | ||
|
||
Select one or more XML files to deploy to Intune. You have the option to deploy them as-is (unsigned) or cryptographically sign them before deployment. Each XML file will be deployed as a separate Intune configuration policy, as Intune does not allow two OMA-URI custom policies to exist within the same configuration policy. | ||
|
||
The name defined in the XML file will become the name of the corresponding Intune configuration policy visible in the Intune portal. | ||
|
||
You can optionally use the `Refresh` button and select a group to assign to the policies you upload to Intune. | ||
|
||
<img src="https://raw.githubusercontent.com/HotCakeX/.github/7ccc3793b4d21d2fe7d5a79b56d1cc78fa1d0aac/Pictures/PNG%20and%20JPG/How%20To%20Upload%20App%20Control%20Policies%20To%20Intune%20Using%20AppControl%20Manager/Group%20Names.png" alt="Intune Groups DropDown"> | ||
|
||
<br> | ||
|
||
<br> | ||
|
||
## How To Change Tenant? | ||
|
||
If you want to change your tenant and sign into another account, press the `Sign Out` button and then use the `Sign In` button again to sign into a different tenant. | ||
|
||
<br> | ||
|
||
## Have Questions or Feature Requests? | ||
|
||
Feel free to [create a new discussion](https://github.com/HotCakeX/Harden-Windows-Security/discussions) to ask questions or request for extra features that don't currently exist in the AppControl Manager application. | ||
|
||
<br> |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters