88#include < StringConstants.au3>
99#EndRegion
1010
11- #include " includes\ExtMsgBox.au3"
1211#include " includes\XML.au3"
1312
1413#NoTrayIcon
1817#AutoIt3Wrapper_UseX64= y
1918#AutoIt3Wrapper_Res_Description= App Control Tray Helper
2019#AutoIt3Wrapper_res_requestedExecutionLevel= requireAdministrator
21- #AutoIt3Wrapper_Res_Fileversion= 6.0.0.0
22- #AutoIt3Wrapper_Res_ProductVersion= 6.0.0
20+ #AutoIt3Wrapper_Res_Fileversion= 6.0.3
21+ #AutoIt3Wrapper_Res_ProductVersion= 6.0.3
2322#AutoIt3Wrapper_Res_ProductName= AppControlTrayHelper
2423#AutoIt3Wrapper_Outfile_x64= AppControlHelper.exe
2524#AutoIt3Wrapper_Res_LegalCopyright= @ 2025 WildByDesign
2625#AutoIt3Wrapper_Res_Language= 1033
2726#AutoIt3Wrapper_Res_HiDpi= P
2827#AutoIt3Wrapper_Res_Icon_Add= AppControl.ico
28+ #AutoIt3Wrapper_UseUpx= N
29+ #AutoIt3Wrapper_Compression= 0
2930#EndRegion ;**** Directives created by AutoIt3Wrapper_GUI ****
3031$sTitle = " AppControlTrayHelper"
3132
3839
3940Global $isDarkMode = is_app_dark_theme()
4041
41- If $isDarkMode = True Then
42- _ExtMsgBoxSet(Default )
43- ; _ExtMsgBoxSet(1, 5, -1, -1, -1, "Consolas", 800, 800)
44- _ExtMsgBoxSet(1 , 4 , 0x202020 , 0xFFFFFF , 10 , " Cascadia Mono" , 1200 )
45- Else
46- _ExtMsgBoxSet(Default )
47- ; _ExtMsgBoxSet(1, 5, -1, -1, -1, "Consolas", 800, 800)
48- _ExtMsgBoxSet(1 , 4 , - 1 , - 1 , 10 , " Cascadia Mono" , 1200 )
49- EndIf
50-
5142#cs ----------------------------------------------------------------------------
5243 Function : is_app_dark_theme()
5344 Description : returns if the user has enabled the dark theme for applications in the Windows settings (0 on / 1 off)
@@ -61,75 +52,7 @@ If $CmdLine[0] = 0 Then Exit MsgBox(16, $sTitle, "No parameters passed!")
6152If $CmdLine [1 ] = " /CiTool" Then
6253Run (' C:\Windows\System32\CiTool.exe --list-policies' , " " )
6354EndIf
64- If $CmdLine [1 ] = " /status" Then
65- Local $iFileExists = FileExists (@ProgramFilesDir & ' \PowerShell\7\pwsh.exe' )
66- If $iFileExists Then
67- Local $o_CmdString1 = " Get-CimInstance -ClassName Win32_DeviceGuard -Namespace root\Microsoft\Windows\DeviceGuard | FL *codeintegrity*; Write-Output ''; Write-Output 'Active Base Policies:'; (CiTool -lp -json | ConvertFrom-Json).Policies | Where-Object {$_.IsEnforced -eq 'True' -and $_.PolicyID -eq $_.BasePolicyID} | Select-Object -Property FriendlyName,PolicyID,VersionString | Sort-Object -Property FriendlyName | FT; Write-Output ''; Write-Output 'Active Supplemental Policies:'; (CiTool -lp -json | ConvertFrom-Json).Policies | Where-Object {$_.IsEnforced -eq 'True' -and $_.PolicyID -ne $_.BasePolicyID} | Select-Object -Property FriendlyName,PolicyID,VersionString | Sort-Object -Property FriendlyName | FT; Write-Output ''; Write-Output 'Inactive Policies:'; (CiTool -lp -json | ConvertFrom-Json).Policies | Where-Object {$_.IsEnforced -ne 'True'} | Select-Object -Property FriendlyName,PolicyID,VersionString | Sort-Object -Property FriendlyName | FT"
68- Local $o_powershell = @ProgramFilesDir & ' \PowerShell\7\pwsh.exe -NoProfile -Command'
69- Local $o_Pid = Run ($o_powershell & $o_CmdString1 , " " , @SW_Hide , $STDOUT_CHILD )
70- ProcessWaitClose ($o_Pid )
71- $out = StdoutRead ($o_Pid )
72- $test = stringsplit ($out , @CR , 0 )
73- ; ReDim $test[$test[0] - 1]
74- Local $topstatus = _ArrayToString($test , " " , 2 , 3 )
75- Local $topstatus1 = StringReplace ($topstatus , " [32;1m" , " " )
76- Local $topstatus2 = StringReplace ($topstatus1 , " [0m" , " " )
77- Local $topstatus3 = StringReplace ($topstatus2 , " UsermodeCodeIntegrityPolicyEnforcementStatus : 0" , " App Control user mode policy : Not Configured" )
78- Local $topstatus4 = StringReplace ($topstatus3 , " UsermodeCodeIntegrityPolicyEnforcementStatus : 1" , " App Control user mode policy : Audit Mode" )
79- Local $topstatus5 = StringReplace ($topstatus4 , " UsermodeCodeIntegrityPolicyEnforcementStatus : 2" , " App Control user mode policy : Enforced Mode" )
80- Local $topstatus6 = StringReplace ($topstatus5 , " CodeIntegrityPolicyEnforcementStatus : 0" , " App Control policy : Not Configured" )
81- Local $topstatus7 = StringReplace ($topstatus6 , " CodeIntegrityPolicyEnforcementStatus : 1" , " App Control policy : Audit Mode" )
82- Local $topstatus8 = StringReplace ($topstatus7 , " CodeIntegrityPolicyEnforcementStatus : 2" , " App Control policy : Enforced Mode" )
83- Local $topstatus9 = StringStripWS ($topstatus8 , $STR_STRIPLEADING + $STR_STRIPTRAILING )
84-
85- Local $rangetest = " 0-5"
86- _ArrayDelete($test , $rangetest )
87- Local $test2 = _ArrayToString($test , " " )
88- Local $test3 = StringStripWS ($test2 , $STR_STRIPLEADING + $STR_STRIPTRAILING )
89- Local $test4 = StringReplace ($test3 , " [32;1m" , " " )
90- Local $test5 = StringReplace ($test4 , " [0m" , " " )
91- Local $test6 = StringReplace ($test5 , " FriendlyName" , " Policy Name" )
92- Local $test7 = StringReplace ($test6 , " VersionString" , " Version" )
93- Local $test8 = StringReplace ($test7 , " PolicyID" , " Policy ID" )
94- Local $test9 = StringReplace ($test8 , " -------- " , " ---------" )
95- Local $test10 = StringReplace ($test9 , " ------------ " , " -----------" )
96- Local $test11 = StringReplace ($test10 , " -------------" , " -------" )
97- _ExtMsgBox (0 & " ;" & @ScriptDir & " \AppControlHelper.exe" , 0 , " App Control Policy List" , $test11 & @CRLF )
98- Else
99- Local $o_CmdString1 = " Get-CimInstance -ClassName Win32_DeviceGuard -Namespace root\Microsoft\Windows\DeviceGuard | FL *codeintegrity*; Write-Output 'Active Base Policies:'; (CiTool -lp -json | ConvertFrom-Json).Policies | Where-Object {$_.IsEnforced -eq 'True' -and $_.PolicyID -eq $_.BasePolicyID} | Select-Object -Property FriendlyName,PolicyID,VersionString | Sort-Object -Property FriendlyName | FT; Write-Output 'Active Supplemental Policies:'; (CiTool -lp -json | ConvertFrom-Json).Policies | Where-Object {$_.IsEnforced -eq 'True' -and $_.PolicyID -ne $_.BasePolicyID} | Select-Object -Property FriendlyName,PolicyID,VersionString | Sort-Object -Property FriendlyName | FT; Write-Output 'Inactive Policies:'; (CiTool -lp -json | ConvertFrom-Json).Policies | Where-Object {$_.IsEnforced -ne 'True'} | Select-Object -Property FriendlyName,PolicyID,VersionString | Sort-Object -Property FriendlyName | FT"
100- Local $o_powershell = " C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -NoProfile -Command"
101- Local $o_Pid = Run ($o_powershell & $o_CmdString1 , " " , @SW_Hide , $STDOUT_CHILD )
102- ProcessWaitClose ($o_Pid )
103- $out = StdoutRead ($o_Pid )
104- $test = stringsplit ($out , @CR , 0 )
105-
106- Local $topstatus = _ArrayToString($test , " " , 3 , 4 )
107- Local $topstatus1 = StringReplace ($topstatus , " [32;1m" , " " )
108- Local $topstatus2 = StringReplace ($topstatus1 , " [0m" , " " )
109- Local $topstatus3 = StringReplace ($topstatus2 , " UsermodeCodeIntegrityPolicyEnforcementStatus : 0" , " App Control user mode policy : Not Configured" )
110- Local $topstatus4 = StringReplace ($topstatus3 , " UsermodeCodeIntegrityPolicyEnforcementStatus : 1" , " App Control user mode policy : Audit Mode" )
111- Local $topstatus5 = StringReplace ($topstatus4 , " UsermodeCodeIntegrityPolicyEnforcementStatus : 2" , " App Control user mode policy : Enforced Mode" )
112- Local $topstatus6 = StringReplace ($topstatus5 , " CodeIntegrityPolicyEnforcementStatus : 0" , " App Control policy : Not Configured" )
113- Local $topstatus7 = StringReplace ($topstatus6 , " CodeIntegrityPolicyEnforcementStatus : 1" , " App Control policy : Audit Mode" )
114- Local $topstatus8 = StringReplace ($topstatus7 , " CodeIntegrityPolicyEnforcementStatus : 2" , " App Control policy : Enforced Mode" )
115- Local $topstatus9 = StringStripWS ($topstatus8 , $STR_STRIPLEADING + $STR_STRIPTRAILING )
116-
117- Local $rangetest = " 0-5"
118- _ArrayDelete($test , $rangetest )
119- Local $test2 = _ArrayToString($test , " " )
120- Local $test3 = StringStripWS ($test2 , $STR_STRIPLEADING + $STR_STRIPTRAILING )
121- Local $test4 = StringReplace ($test3 , " [32;1m" , " " )
122- Local $test5 = StringReplace ($test4 , " [0m" , " " )
123- Local $test6 = StringReplace ($test5 , " FriendlyName" , " Policy Name" )
124- Local $test7 = StringReplace ($test6 , " VersionString" , " Version" )
125- Local $test8 = StringReplace ($test7 , " PolicyID" , " Policy ID" )
126- Local $test9 = StringReplace ($test8 , " -------- " , " ---------" )
127- Local $test10 = StringReplace ($test9 , " ------------ " , " -----------" )
128- Local $test11 = StringReplace ($test10 , " -------------" , " -------" )
129-
130- _ExtMsgBox (0 & " ;" & @ScriptDir & " \AppControlHelper.exe" , 0 , " App Control Policy List" , $test11 & @CRLF )
131- EndIf
132- EndIf
55+
13356If $CmdLine [1 ] = " /LogsCI" Then
13457 $oXML = ObjCreate (" Microsoft.XMLDOM" )
13558 $stest = FileRead (@AppDataDir & " \Microsoft\MMC\eventvwr" )
0 commit comments