Expected Behavior from MDE Advanced Hunting / When to Leave Audit Mode #907
-
|
Hey all, I have a policy created from AppControl Manager for "Default Windows Policy" in Audit mode and I let that run for about a day or so and then created a Supplemental policy from the Event Logs on my local system. This has been in place again for another 24 hours but when I run the Advanced Hunting query, I am seeing "AppControlCodeIntegrityOriginAudited" and "AppControlCodeIntegrityPolicyAudited" in the output from today. My understanding is that if these entries are showing in the log, that would be a process that would have been blocked, had the AppControl policy not been in Audit Mode. The InitiatingProcessFileName for some of these entries are default Windows services, things like svchost.exe and explorer.exe. Few questions: Firstly, do I somehow have my policy configured incorrectly in that, if this were not in Audit Mode, all of these processes would be being blocked? Is the expectation that if I have a correct policy in place, with a correct supplemental policy built from system logs and those processes are allowed, I shouldn't be seeing any new entries when I run the query for events in Advanced Hunting in MDE? Please let me know if you need more information, IE the policies or the query being run. Thanks |
Beta Was this translation helpful? Give feedback.
Replies: 1 comment 15 replies
-
|
Hello
You deployed the policy correctly if you used the AppControl Manager. As long as the audit mode policy is deployed it will continue to generate audit logs. If it was an enforced mode policy, all of the files mentioned in the logs would've been blocked. But
Yes, correct policy should be enforced mode in this scenario so it won't generate audit logs anymore, and the supplemental policy will be able to authorize all of the files found in the event logs. |
Beta Was this translation helpful? Give feedback.


At the moment, the Simulation feature only works for the local device. I recommend building more supplemental policies if you need to, you can safely merge them without having any duplication among the data.
As long as audit mode policy is deployed it will generate audit logs though, so at some point you have to remove audit mode and deploy enforced mode policy that has the same exact policyID as audit mode policy.
If you audit with one policy and deploy another a policy with different ID, the supplemental policies you created won't work with the new policy, unless you change the BasePolicyID in all of the supplemental policies. Also never mix the base policy type, for example never audit…