Skip to content

Commit bf9b48d

Browse files
committed
Add policy for remote DCOM traffic
1 parent 7bc82c5 commit bf9b48d

File tree

4 files changed

+20
-0
lines changed

4 files changed

+20
-0
lines changed

AdditionalSystemHardening.admx

Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -18,6 +18,17 @@
1818
<policies>
1919
<!-- Hardening policies section -->
2020
<!-- SYSTEM SETTINGS -->
21+
<!-- Block remote DCOM connections -->
22+
<policy name="RemoteDCOM" class="Machine" displayName="$(string.RemoteDCOM)" explainText="$(string.RemoteDCOM_Explain)" key="SOFTWARE\Microsoft\Ole" valueName="EnableDCOM">
23+
<parentCategory ref="System" />
24+
<supportedOn ref="windows:SUPPORTED_Windows_6_3" />
25+
<enabledValue>
26+
<string>N</string>
27+
</enabledValue>
28+
<disabledValue>
29+
<string>Y</string>
30+
</disabledValue>
31+
</policy>
2132
<!-- Launch VBS in Mandatory mode -->
2233
<policy name="MandatoryVBS" class="Machine" displayName="$(string.MandatoryVBS)" explainText="$(string.MandatoryVBS_Explain)" key="SYSTEM\CurrentControlSet\Control\DeviceGuard" valueName="Mandatory">
2334
<parentCategory ref="System" />

CHANGELOG.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -10,6 +10,7 @@ The format is based on [Keep a Changelog](https://keepachangelog.com/en/1.0.0/).
1010
- Policy to enable or disable detailed BSODs
1111
- Policies to control Attack Surface Reduction rules in Windows Defender
1212
- Credits to @MichaelGrafnetter and his project: https://github.com/MichaelGrafnetter/defender-asr-admx
13+
- Policy to enable or disable remote DCOM traffic
1314
### Changed
1415
- Updated translations, wording and descriptions for consistency in en-US and fr-FR
1516
- Fixed a typo in Microsoft's SecGuide template

en-US/AdditionalSystemHardening.adml

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -13,6 +13,10 @@
1313
<string id="Adobe">Additional Adobe Acrobat settings</string>
1414
<!-- POLICIES -->
1515
<!-- System policies -->
16+
<string id="RemoteDCOM">Block remote DCOM connections</string>
17+
<string id="RemoteDCOM_Explain">If you enable this policy, no remote clients may launch servers or connect to objects on this computer. Local clients cannot access remote DCOM servers; all DCOM traffic is blocked.
18+
19+
If you disable this policy, launching of servers and connecting to objects by remote clients is allowed on a per-class basis according to the value and access permissions of the class's LaunchPermission registry value and the global DefaultLaunchPermission registry value.</string>
1620
<string id="LSA_RunAsPPL">Enable additional LSA process hardening</string>
1721
<string id="LSA_RunAsPPL_Explain">Enable this option to allow the LSA process to run as a PPL (Protected Process Light), in order to disallow its debugging.</string>
1822
<string id="LSA_SamDisableListenOnTCP">Disable the SAM server TCP listener</string>

fr-FR/AdditionalSystemHardening.adml

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -13,6 +13,10 @@
1313
<string id="Adobe">Paramètres de durcissement pour Adobe Acrobat</string>
1414
<!-- POLICIES -->
1515
<!-- System policies -->
16+
<string id="RemoteDCOM">Bloquer les connexions DCOM distantes</string>
17+
<string id="RemoteDCOM_Explain">Si vous activez cette stratégie, aucun client distant ne peut lancer de serveurs ou se connecter à des objets sur cet ordinateur. Les clients locaux ne peuvent pas accéder aux serveurs DCOM distants; tout le trafic DCOM est bloqué.
18+
19+
Si vous désactivez cette stratégie, le lancement de serveurs et la connexion à des objets par des clients distants sont autorisés par classe en fonction de la valeur et des autorisations d'accès de la valeur de Registre LaunchPermission et de la valeur de Registre globale DefaultLaunchPermission.</string>
1620
<string id="LSA_RunAsPPL">Activer le durcissement additionnel du processus LSA</string>
1721
<string id="LSA_RunAsPPL_Explain">Activer cette stratégie pour permettre au processus LSA de se lancer en tant que PPL (Protected Process Light), interdisant son débogage.</string>
1822
<string id="LSA_SamDisableListenOnTCP">Désactiver l'écoute TCP du serveur SAM</string>

0 commit comments

Comments
 (0)