Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Updating documents with new information #537

Merged
merged 4 commits into from
Jan 16, 2025
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 2 additions & 0 deletions Wiki posts/AppControl Manager/Create AppControl Policy.md
Original file line number Diff line number Diff line change
Expand Up @@ -24,6 +24,8 @@ Use [AppControl Manager](https://github.com/HotCakeX/Harden-Windows-Security/wik

* **Auto update**: It will create a scheduled task on the system that will check every week for the latest Microsoft Recommended block rules and update the policy automatically. [Please refer to this page for more info.](https://github.com/HotCakeX/Harden-Windows-Security/wiki/Fast-and-Automatic-Microsoft-Recommended-Driver-Block-Rules-updates)

* **Strict Kernel-mode policy**: It's a special kind of policy that will only enforce Kernel-mode files without blocking user-mode files. Please refer [to this article](https://github.com/HotCakeX/Harden-Windows-Security/wiki/WDAC-policy-for-BYOVD-Kernel-mode-only-protection) for more information.

<br>

Deploying any of them is optional. You can create the policies and then deploying them on remote systems using Intune or other methods.
Expand Down
30 changes: 30 additions & 0 deletions Wiki posts/AppControl Manager/Create Supplemental Policy.md
Original file line number Diff line number Diff line change
Expand Up @@ -52,3 +52,33 @@ If you have certificate `.cer` files, you can use this feature to scan them and
* **Signing Scenario**: Choose between User Mode or Kernel Mode signing scenarios. If you choose User Mode, the supplemental policy will only allow User Mode files signed by that certificate to run and Kernel mode files such as drivers will remain blocked.

<br>

## Create ISG-based Supplemental Policy

This supplemental policy does not explicitly permit any files or applications by default. Instead, it leverages [the Intelligent Security Graph (ISG)](https://learn.microsoft.com/en-us/windows/security/application-security/application-control/app-control-for-business/design/use-appcontrol-with-intelligent-security-graph#how-does-wdac-work-with-the-isg) to dynamically evaluate and automatically authorize trusted files and applications.

### Configuration Details

* **Policy Name**: Enter a name for the Supplemental policy. You will be able to use this name to detect it after deployment in the **System Information** section of the AppControl Manager.

* **Base Policy File**: Browse for the path to the base policy XML file that this Supplemental policy will be expanding.

<br>

## Create Kernel-mode Supplemental Policy

This supplemental policy can be created only for Kernel-mode files/drivers, typically after creating and deploying the [Strict Kernel-mode base policy](https://github.com/HotCakeX/Harden-Windows-Security/wiki/WDAC-policy-for-BYOVD-Kernel-mode-only-protection). When you press the `Create Supplemental Policy` button, any logs available in the `View Detected Kernel-mode files` section will be included in the policy. You can select and delete logs that you don't want to be included.

### Configuration Details

* **Auto Driver Detection**: Use this feature to automatically detect all drivers on the system. The results will be available in the `View Detected Kernel-mode files` section at the bottom.

* **Scan for All Kernel-mode logs**: Use this button to scan the entire Code Integrity logs for Kernel-mode files and display the results in the `View Detected Kernel-mode files` section.

* **Scan for All Kernel-mode logs Since Last Reboot**: Use this button to scan the Code Integrity logs that were generated since the last computer reboot for Kernel-mode files and display the results in the `View Detected Kernel-mode files` section.

* **Policy Name**: Enter a name for the Supplemental policy. You will be able to use this name to detect it after deployment in the **System Information** section of the AppControl Manager.

* **Base Policy File**: Browse for the path to the base policy XML file that this Supplemental policy will be expanding.

<br>
5 changes: 5 additions & 0 deletions Wiki posts/AppControl Manager/View File Certificates.md
Original file line number Diff line number Diff line change
Expand Up @@ -19,6 +19,11 @@ Use this [AppControl Manager](https://github.com/HotCakeX/Harden-Windows-Securit

<br>

> [!NOTE]\
> This feature supports displaying the certificates of the files signed by Security Catalogs.

<br>

The following data is displayed for each member of the certificate chain:

| Name | Description |
Expand Down