Replies: 3 comments 2 replies
-
This is great post! I will provide answers and update the articles as soon as possible. |
Beta Was this translation helpful? Give feedback.
-
Time to unpack this and sorry for the late reply :) You're right about Smart App Control, it turns itself off when it detects that turning itself on would block lots of the files you use frequently. The talk you mentioned is a great source of info about it! However, we cannot change the Smart App Control's workflow other than turning it off/on. We cannot allow list a file that it blocks. The reason for this is that there are 2 types of WDAC policies, Signed and Unsigned. Signed policies are tamper proof, they cannot be modified without having access to the certificate (certificate's private keys to be precise). Smart App Control gets deployed as a Signed policy on the system, Microsoft is the only entity that owns the certificate for it. This means that we cannot modify the policy to allow list a file. So to put it simply, when Smart App Control is turned on, it defines a security baseline that we can only tighten from that point on. We cannot loosen it. The way we tighten it is by adding more WDAC policies to the system (Signed or Unsigned). You will probably find out that some of the files you use or download get blocked by Smart App Control, most likely because they were unsigned. Python itself is not an enlightened script host so WDAC can't directly control things it runs. Installing Python would mean you automatically trust all of the scripts it runs, but some Python packages contain executables that are not signed and would be blocked by Smart App Control. About the questions regarding lightly managed WDAC policy
I'll definitely overhaul all of the documents to make them clearer and update them to remove the 32 limit of the WDAC policies! I hope this helps, let me know if you have any more questions, i'll be happy to answer ^^ |
Beta Was this translation helpful? Give feedback.
-
I agree with this sentiment. I attempted another go with WDAC module and couldn't keep in enabled as too many things stop working and don't want sit in powershell making policies for different programs and updates. Hoepfully microsoft makes some way where smart app can whitelist even if its a few hoops or a gui for apps signature if ephemeral. i.e. i already uploaded an exe to virustotal and trust it well from the source I should be able to approve it knowing there still is potential for compromise. I wanted to use the lightly managed WDAC but tools like WSL are blocked by it. I hope one day ms makes it usable without needing an entire module to figure out the complexities. The lockdown is very useful just the process to override it is too cumbersome. The download defense policy is great though. I think the biggest opportunity to get more adoption is if there was a gui for the WDAC that allowed people to select their apps to work with the signed policy. A guided process to do it where generates keys encrypts with ms hello etc. |
Beta Was this translation helpful? Give feedback.
-
Hey there!
WDACConfig is a powerful module and caters to large number of use cases for IT admins. Though as a beginner, I find it a little confusing and intimidating to use. Don't get me wrong! The documentation you have provided is extensive and any experienced person who works with Intune or on server side or manages IT infra at their workplace would find it much easier to use.
Rationale behind this post:
When I did a fresh install of Win 11 Beta a few months ago, Smart App Control was running in evaluation. I never changed it, even when I deployed the Hardening Module on my PC. Smart app control never caused any issue for me and it turned itself off sometime in these months. I think it goes with this talk when David Weston mentions that it will turn off automatically if it detects that the user runs certain types of programs. (https://youtu.be/8T6ClX-y2AE?si=Ohdl2q3KKCfnKZiz&t=1999)
I am planning a reinstall of the OS but this time with Smart App Control on. Since it can block certain types of scripts, apps, dlls, executables etc, I want to know how can I use WDACConfig to put them in allowlist and continue working.
To give you some details on my work, I am a Data Scientist by profession. I work with a lot of python scripts, some of which are taken from the internet, some that I wrote, code from places like textbooks, courses etc. Relating to this are a lot of tools like Github Desktop Beta, Visual Studio Code Insiders (and stable), JetBrains IDEs, Azul Zulu JDK, git, a lot of command line tools and utilities, some related and some unrelated to my job, all downloaded majorly from winget or directly from the website if not available on winget. I can provide you a list if you want privately.
Some queries about the documentation
The documentation is extensive but I have some queries.
Going into the intro post , the 5th point talks about Smart App Control: "It uses a special kind of WDAC policy that provides more protection than a lightly managed workstation but less protection than a fully managed workstation."
Since the machine in question is my personal machine, I guess the next stop would be to the lightly managed workstations. Here, it talks about creating a base policy and supplemental policy for apps(referring to regular Win32 programs as well as Microsoft Store installed apps; Basically, any software that you can run.).
Queries here
.cer
and other policy files when creating the base and supplemental policies? I mean what are the best practices here to store these files? Can I move them if I want?These are some of my current queries about WDACConfig. These may have been answered in the docs already but as I said, the docs contain a lot of technical jargon that a beginner (like me) might not understand. I believe the docs can be simplified a bit.
On a side note, this section can be updated. I believe, the limit has now been removed or I guess updated from 32.
Thank you for reading. Let me know if any input is required from my side.
Beta Was this translation helpful? Give feedback.
All reactions