Skip to content

Commit 682393c

Browse files
committed
Add note about temp files created to detect AppLocker
1 parent 5c7c7b6 commit 682393c

File tree

1 file changed

+13
-3
lines changed

1 file changed

+13
-3
lines changed

reference/docs-conceptual/security/app-control/application-control.md

Lines changed: 13 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -16,9 +16,19 @@ based on unique properties of the files.
1616
**WDAC**, introduced with Windows 10, allows you to control which drivers and applications are
1717
allowed to run on Windows.
1818

19-
PowerShell detects both AppLocker and WDAC system wide policies. AppLocker is deprecated. WDAC is
20-
the preferred application control system for Windows. WDAC is designed as a security feature under
21-
the servicing criteria defined by the Microsoft Security Response Center (MSRC).
19+
## Lockdown policy detection
20+
21+
PowerShell detects both AppLocker and WDAC system wide policies. AppLocker doesn't have way to query
22+
the policy enforcement status. To detect if a system wide application control policy is being
23+
enforced by AppLocker, PowerShell creates two temporary files and tests if they can be executed. The
24+
files use the following name format:
25+
26+
- `$env:TEMP/__PSAppLockerTest__<random-8dot3-name>.ps1`
27+
- `$env:TEMP/__PSAppLockerTest__<random-8dot3-name>.psm1`
28+
29+
WDAC is the preferred application control system for Windows. WDAC provides APIs that allow you to
30+
discover the policy configuration. WDAC is designed as a security feature under the servicing
31+
criteria defined by the Microsoft Security Response Center (MSRC).
2232

2333
For more information about AppLocker and WDAC, see [Application Controls for Windows][04] and
2434
[WDAC and AppLocker feature availability][02].

0 commit comments

Comments
 (0)