File tree Expand file tree Collapse file tree 1 file changed +13
-3
lines changed
reference/docs-conceptual/security/app-control Expand file tree Collapse file tree 1 file changed +13
-3
lines changed Original file line number Diff line number Diff line change @@ -16,9 +16,19 @@ based on unique properties of the files.
1616** WDAC** , introduced with Windows 10, allows you to control which drivers and applications are
1717allowed to run on Windows.
1818
19- PowerShell detects both AppLocker and WDAC system wide policies. AppLocker is deprecated. WDAC is
20- the preferred application control system for Windows. WDAC is designed as a security feature under
21- the servicing criteria defined by the Microsoft Security Response Center (MSRC).
19+ ## Lockdown policy detection
20+
21+ PowerShell detects both AppLocker and WDAC system wide policies. AppLocker doesn't have way to query
22+ the policy enforcement status. To detect if a system wide application control policy is being
23+ enforced by AppLocker, PowerShell creates two temporary files and tests if they can be executed. The
24+ files use the following name format:
25+
26+ - ` $env:TEMP/__PSAppLockerTest__<random-8dot3-name>.ps1 `
27+ - ` $env:TEMP/__PSAppLockerTest__<random-8dot3-name>.psm1 `
28+
29+ WDAC is the preferred application control system for Windows. WDAC provides APIs that allow you to
30+ discover the policy configuration. WDAC is designed as a security feature under the servicing
31+ criteria defined by the Microsoft Security Response Center (MSRC).
2232
2333For more information about AppLocker and WDAC, see [ Application Controls for Windows] [ 04 ] and
2434[ WDAC and AppLocker feature availability] [ 02 ] .
You can’t perform that action at this time.
0 commit comments