You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: azure-local/concepts/security-features.md
+8-8Lines changed: 8 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ author: alkohli
5
5
ms.author: alkohli
6
6
ms.topic: conceptual
7
7
ms.service: azure-stack-hci
8
-
ms.date: 11/15/2024
8
+
ms.date: 12/11/2024
9
9
---
10
10
11
11
# Security features for Azure Local, version 23H2
@@ -16,7 +16,7 @@ ms.date: 11/15/2024
16
16
17
17
Azure Local is a secure-by-default product that has more than 300 security settings enabled right from the start. Default security settings provide a consistent security baseline to ensure that devices start in a known good state.
18
18
19
-
This article provides a brief conceptual overview of the various security features associated with your Azure Local instance. Features include security defaults, Windows Defender for Application Control (WDAC), volume encryption via BitLocker, secret rotation, local built-in user accounts, Microsoft Defender for Cloud, and more.
19
+
This article provides a brief conceptual overview of the various security features associated with your Azure Local instance. Features include security defaults, Application Control, volume encryption via BitLocker, secret rotation, local built-in user accounts, Microsoft Defender for Cloud, and more.
20
20
21
21
## Security defaults
22
22
@@ -34,16 +34,16 @@ Secure baseline on Azure Local:
34
34
35
35
For more information, see [Manage security defaults on Azure Local](../manage/manage-secure-baseline.md).
36
36
37
-
## Windows Defender Application Control
37
+
## Application Control
38
38
39
-
WDAC is a software-based security layer that reduces attack surface by enforcing an explicit list of software that is allowed to run. WDAC is enabled by default and limits the applications and code that you can run on the core platform. For more information, see [Manage Windows Defender Application Control for Azure Local, version 23H2](../manage/manage-wdac.md#manage-wdac-settings-with-powershell).
39
+
Application Control is a software-based security layer that reduces attack surface by enforcing an explicit list of software that is allowed to run. Application Control is enabled by default and limits the applications and code that you can run on the core platform. For more information, see [Manage Application Control for Azure Local, version 23H2](../manage/manage-wdac.md#manage-application-control-settings-with-powershell).
40
40
41
-
WDAC provides two main operation modes, Enforcement mode and Audit mode. In Enforcement mode, untrusted code is blocked and events are recorded. In Audit mode, untrusted code is allowed to run and events are recorded. To learn more about WDAC-related events, see [List of Events](/windows/security/application-security/application-control/windows-defender-application-control/operations/event-id-explanations).
41
+
Application Control provides two main operation modes, Enforcement mode and Audit mode. In Enforcement mode, untrusted code is blocked and events are recorded. In Audit mode, untrusted code is allowed to run and events are recorded. To learn more about Application Control-related events, see [List of Events](/windows/security/application-security/application-control/windows-defender-application-control/operations/event-id-explanations).
42
42
43
43
> [!IMPORTANT]
44
-
> To minimize security risk, always run WDAC in Enforcement mode.
44
+
> To minimize security risk, always run Application Control in Enforcement mode.
45
45
46
-
### About WDAC policy design
46
+
### About Application Control policy design
47
47
48
48
Microsoft provides base signed policies on Azure Local for both Enforcement mode and Audit mode. Additionally, policies include a predefined set of platform behavior rules and block rules to apply to the application control layer.
49
49
@@ -57,7 +57,7 @@ Azure Local base policies include the following sections:
57
57
58
58
#### Option rules
59
59
60
-
This section discussed the option rules enabled by the base policy.
60
+
This section discussed the option rules enabled by the base policy.
61
61
62
62
For the enforced policy, the following option rules are enabled by default:
Copy file name to clipboardExpand all lines: azure-local/manage/manage-security-post-upgrade.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ author: alkohli
5
5
ms.author: alkohli
6
6
ms.topic: how-to
7
7
ms.service: azure-stack-hci
8
-
ms.date: 11/18/2024
8
+
ms.date: 12/11/2024
9
9
---
10
10
11
11
# Manage security after upgrading Azure Local
@@ -112,15 +112,15 @@ After you've upgraded to version 23H2, consider enabling Application Control. Th
112
112
113
113
For new deployments, Application Control is enabled in *Enforced* mode (blocking nontrusted binaries), whereas for upgraded systems we recommend that you follow these steps:
114
114
115
-
1.[Enable Application Control in *Audit* mode (assuming unknown software might be present)](./manage-wdac.md#switch-wdac-policy-modes).
115
+
1.[Enable Application Control in *Audit* mode (assuming unknown software might be present)](./manage-wdac.md#switch-application-control-policy-modes).
116
116
1.[Monitor Application Control events](/windows/security/application-security/application-control/app-control-for-business/operations/event-id-explanations).
117
-
1.[Create the necessary supplemental policies](./manage-wdac.md#create-a-wdac-supplemental-policy).
117
+
1.[Create the necessary supplemental policies](./manage-wdac.md#create-an-application-control-supplemental-policy).
118
118
1. Repeat steps #2 and #3 as necessary until no further audit events are observed. Switch to *Enforced* mode.
119
119
120
120
> [!WARNING]
121
121
> Failure to create the necessary AppControl policies to enable additional third party software will prevent that software from running.
122
122
123
-
For instructions to enable in *Enforced* mode, see [Manage Windows Defender Application Control for Azure Local](./manage-wdac.md#switch-wdac-policy-modes).
123
+
For instructions to enable in *Enforced* mode, see [Manage Windows Defender Application Control for Azure Local](./manage-wdac.md#switch-application-control-policy-modes).
This article describes how to use Windows Defender Application Control (WDAC) to reduce the attack surface of Azure Local. For more information, see [Manage baseline security settings on Azure Local, version 23H2](../whats-new.md).
15
+
This article describes how to use Application Control to reduce the attack surface of Azure Local. For more information, see [Manage baseline security settings on Azure Local, version 23H2](../whats-new.md).
16
16
17
17
## Prerequisites
18
18
19
19
Before you begin, make sure that you have access to an Azure Local, version 23H2 instance that is deployed, registered, and connected to Azure.
20
20
21
-
## View WDAC settings via Azure portal
21
+
## View Application Control settings via Azure portal
22
22
23
-
To view the WDAC settings in the Azure portal, make sure that you have applied the MCSB initiative. For more information, see [Apply Microsoft Cloud Security Benchmark initiative](./manage-security-with-defender-for-cloud.md#apply-microsoft-cloud-security-benchmark-initiative).
23
+
To view the Application Control settings in the Azure portal, make sure that you have applied the MCSB initiative. For more information, see [Apply Microsoft Cloud Security Benchmark initiative](./manage-security-with-defender-for-cloud.md#apply-microsoft-cloud-security-benchmark-initiative).
24
24
25
-
You can use WDAC policies to control which drivers and apps are allowed to run on your system. You can only view the WDAC settings via Azure portal. To manage the settings, see [Manage WDAC settings with PowerShell](manage-wdac.md#manage-wdac-settings-with-powershell).
25
+
You can use Application Control policies to manage which drivers and apps are allowed to run on your system. You can only view Application Control settings via Azure portal. To manage the settings, see [Manage Application Control settings with PowerShell](manage-wdac.md#manage-application-control-settings-with-powershell).
26
26
27
-
:::image type="content" source="media/manage-wdac/manage-wdac.png" alt-text="Screenshot that shows the Application control (WDAC) page on Azure portal." lightbox="media/manage-wdac/manage-wdac.png":::
27
+
:::image type="content" source="media/manage-wdac/manage-wdac.png" alt-text="Screenshot that shows the Application Control page on Azure portal." lightbox="media/manage-wdac/manage-wdac.png":::
28
28
29
-
## Manage WDAC settings with PowerShell
29
+
## Manage Application Control settings with PowerShell
30
30
31
-
### Enable WDAC policy modes
31
+
### Enable Application Control policy modes
32
32
33
-
You can enable WDAC during or after deployment. Use PowerShell to enable or disable WDAC after deployment.
33
+
You can enable Application Control during or after deployment. Use PowerShell to enable or disable Application Control after deployment.
34
34
35
-
Connect to one of the machines and use the following cmdlets to enable the desired WDAC policy in "Audit" or "Enforced" mode.
35
+
Connect to one of the machines and use the following cmdlets to enable the desired Application Control policy in "Audit" or "Enforced" mode.
36
36
37
37
In this build release there are two cmdlets:
38
38
@@ -45,30 +45,30 @@ This is useful when:
45
45
46
46
- You started with default, recommended settings.
47
47
- You must install or run new third party software. You can switch your policy modes to create a supplemental policy.
48
-
- You started with WDAC disabled during deployment and now you want to enable WDAC to increase security protection or to validate that your software runs properly.
49
-
- Your software or scripts are blocked by WDAC. In this case you can use audit mode to understand and troubleshoot the issue.
48
+
- You started with Application Control disabled during deployment and now you want to enable Application Control to increase security protection or to validate that your software runs properly.
49
+
- Your software or scripts are blocked by Application Control. In this case you can use audit mode to understand and troubleshoot the issue.
50
50
51
51
> [!NOTE]
52
-
> When your application is blocked, WDAC creates a corresponding event. Review the Event log to understand details of the policy that's blocking your application. For more information, see the [Windows Defender Application Control operational guide](/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control-operational-guide).
52
+
> When your application is blocked, Application Control creates a corresponding event. Review the Event log to understand details of the policy that's blocking your application. For more information, see the [Application Control operational guide](/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control-operational-guide).
53
53
54
-
### Switch WDAC policy modes
54
+
### Switch Application Control policy modes
55
55
56
-
Follow these steps to switch between WDAC policy modes. These PowerShell commands interact with the Orchestrator to enable the selected modes.
56
+
Follow these steps to switch between Application Control policy modes. These PowerShell commands interact with the Orchestrator to enable the selected modes.
### Create a WDAC policy to enable third party software
62
+
### Create an Application Control policy to enable third party software
63
63
64
-
While using WDAC in enforcement mode, for your non-Microsoft signed software to run, build on the Microsoft-provided base policy by creating a WDAC supplemental policy. Additional information can be found in the [public WDAC documentation](/windows/security/threat-protection/windows-defender-application-control/deploy-multiple-windows-defender-application-control-policies#supplemental-policy-creation).
64
+
While using Application Control in enforcement mode, for your non-Microsoft signed software to run, build on the Microsoft-provided base policy by creating an Application Control supplemental policy. Additional information can be found in the [public Application Control documentation](/windows/security/threat-protection/windows-defender-application-control/deploy-multiple-windows-defender-application-control-policies#supplemental-policy-creation).
65
65
66
66
> [!NOTE]
67
-
> To run or install new software, you might need to switch WDAC to audit mode first (see steps above), install your software, test that it works correctly, create the new supplemental policy, and then switch WDAC back to enforced mode.
67
+
> To run or install new software, you might need to switch Application Control to audit mode first (see steps above), install your software, test that it works correctly, create the new supplemental policy, and then switch Application Control back to enforced mode.
68
68
69
69
Create a new policy in the Multiple Policy Format as shown below. Then use ```Add-ASWDACSupplementalPolicy -Path Policy.xml``` to convert it to a supplemental policy and deploy it across nodes in the cluster.
70
70
71
-
#### Create a WDAC supplemental policy
71
+
#### Create an Application Control supplemental policy
72
72
73
73
Use the following steps to create a supplemental policy:
0 commit comments