New Update Smart App Control - Windows 11 22H2 feature promises significant protection from malware

Shadowra

Level 34
Verified
Top Poster
Content Creator
Malware Tester
Well-known
Sep 2, 2021
2,303
Why would you test a feature that is basically still at the alpha stage of development?

Because I'm crazy! :D

On a more serious note, I've always loved Microsoft's new features. Of course, I'll give it a little time before, I don't have time to deal with SAC right now.
 

SeriousHoax

Level 47
Verified
Top Poster
Well-known
Mar 16, 2019
3,633
People jumped onto the SAC bandwagon without doing their due diligence first (which, for most things newly released by Microsoft via any channels is - don't install it).

It is a newly released feature still in the alpha\early beta stage. Why is everybody trying to use it as production?
Just to make it clear, I didn't reinstall Windows to get SAC. I always reinstall when a new feature update comes out.
 
F

ForgottenSeer 95367

Just to make it clear, I didn't reinstall Windows to get SAC. I always reinstall when a new feature update comes out.
You might not have, but it appears others went all-in on alpha SAC. Now they're disappointed.

Mr Makey's First Rule of New Windows Features, Especially Windows Security Features: "Do not install. Do not be the guinea pig. Let others do it. Save yourself a lot of pain. MKAY?"
 

Andy Ful

From Hard_Configurator Tools
Thread author
Verified
Honorary Member
Top Poster
Developer
Well-known
Dec 23, 2014
8,129
Because I'm crazy! :D

On a more serious note, I've always loved Microsoft's new features. Of course, I'll give it a little time before, I don't have time to deal with SAC right now.
Although I agree with @Furyo about SAC, the test would not be a bad idea. But, testing SAC with random malware cannot bring anything interesting. Even Defender on default settings can give a very good result.
When testing EXE or MSI samples, all unknown & unsigned samples are blocked by SAC. So the test should include signed malware (EXE, MSI) and scripting malware.(y)
It would be interesting to compare such results with @askalan's tests on SmartScreen for Explorer (Malware Hub samples). In his tests (no AV only SmartScreen), after a few months of testing (EXE and MSI malware with MOTW), only one sample bypassed SmartScreen and infected the system (another one did not infect the system).
 
Last edited:

ErzCrz

Level 21
Verified
Top Poster
Well-known
Aug 19, 2019
1,020
Good to see that MD is following suit with other default-deny unknowns. Something the likes of Comodo started many years ago and Avast/KIS etc followed that. Comodo takes a lot of tweaking if your wanting to set specific rules for applications/vendors but great at just blocking untrusted files which is why so many people go for the @cruelsister setup. Avast's is a little more user friendly but is a paid feature or at least it was years ago. Lets hope the development happens quickly.
 
F

ForgottenSeer 95367

Although I agree with @Furyo about SAC, the test would not be a bad idea. But, testing SAC with random malware cannot bring anything interesting. Even Defender on default settings can give a very good result.
When testing EXE or MSI samples, all unknown & unsigned samples are blocked by SAC. So the test should include signed malware (EXE, MSI) and scripting malware.(y)
The defining feature (and test) of SAC will be the AI-managed reputation allow\block list. That shall be the real test. To see if Microsoft gets it right and makes a true "hands-off" default-deny.

Of course SAC is nowhere near ready for such testing.
 

Andy Ful

From Hard_Configurator Tools
Thread author
Verified
Honorary Member
Top Poster
Developer
Well-known
Dec 23, 2014
8,129
As SAC is indeed not viable for most users, one could instead enable Defender for the Cloud lookup and install OSarmor which seems to parallel the basic "protections" afforded by SAC.

Another good (and free) option would be Defender with ASR rules + Comodo Firewall.:)
 
  • Like
Reactions: ErzCrz

Andy Ful

From Hard_Configurator Tools
Thread author
Verified
Honorary Member
Top Poster
Developer
Well-known
Dec 23, 2014
8,129
... Do not be the guinea pig.

I am afraid that it is kinda true.

SAC comes from WDAC (ISG enabled), and this setup is promoted by Microsoft in businesses for a few years.
Now, Microsoft wants probably to achieve some objectives.
  1. Microsoft says to the customers:
    Hey guys, we offer you modern and very strong protection, but it will work flawlessly with properly signed applications (including DLLs). Please use Microsoft Store and Microsoft software to be sure.
  2. Microsoft says to the software developers:
    Hey guys, please use code signing. If not then your applications will be blocked by SAC. If you are angry, then please submit the applications to Microsoft via the Smart App Control channel - we will check it, and then it can possibly be added to allow list.
A similar campaign was done (with partial success) after introducing SmartScreen for Explorer with Windows 8.
 
Last edited:
F

ForgottenSeer 95367

@Andy Ful , I wonder to what extent Intelligence Security Graph (ISG) for WDAC overlaps or is one-in-the-same as "Defender Reputation AI" to be used in Smart Application Control?

Microsoft is surely playing word games for marketing purposes as it normally does - calling the same thing by different names. Also, Microsoft is relabeling old tech (ML analytics) as something new (AI array). Same trickery as "Next Gen" this or that, when in fact, it's just the same thing that has been used for a long time.

After reading this very closely multiple times, I'm convinced of it:

1663889717538.png

NOTE how Microsoft might try to solve the DLL hell problem...

"If the file with good reputation is an application installer, the installer's reputation will pass along to any files that it writes to disk. This way, all the files needed to install and run an app inherit the positive reputation data from the installer."

It makes sense now that Microsoft would want a long period of SAC running in evaluation mode to collect the required telemetry and set policies for all files written to disk for known good application installers.
 

pxxb1

Level 9
Verified
Well-known
Jan 17, 2018
438
After the 22H2 update i get a bar at the bottom of the screen asking me to deny or allow some exe:s or programs i start that is not usuall, what is that all about?
SAC was not going to be active if a fresh install was not done, and it is not, so what is this bar coming from. This is something i have not read about.
 
  • Like
Reactions: Andy Ful
F

ForgottenSeer 95367

After the 22H2 update i get a bar at the bottom of the screen asking me to deny or allow some exe:s or programs i start that is not usuall, what is that all about?
SAC was not going to be active if a fresh install was not done, and it is not, so what is this bar coming from. This is something i have not read about.
You are not going read about a lot of things when it comes to SAC. It is an early release feature with a lot of bugs and unexpected behaviors.

The whole point of the current SAC release for people to alpha-beta test it in its current state for Microsoft; SAC was not released to be used for production.

When SAC blocks a file, a toaster (Windows 10\11 desktop notification) appears that some files were being blocked.

There is no way for the user to allow or deny files in SAC at this time. Microsoft has not implemented such a feature yet. So you are misinterpreting what you saw.
 

pxxb1

Level 9
Verified
Well-known
Jan 17, 2018
438
You are not going read about a lot of things when it comes to SAC. It is an early release feature with a lot of bugs and unexpected behaviors.

The whole point of the current SAC release for people to alpha-beta test it in its current state for Microsoft; SAC was not released to be used for production.

When SAC blocks a file, a toaster (Windows 10\11 desktop notification) appears that some files were being blocked.

There is no way for the user to allow or deny files in SAC at this time. Microsoft has not implemented such a feature yet. So you are misinterpreting what you saw.

It asks me if i want to deny or allow, not that it blocked anything. 1 exe did not start when i did not do anything with the bar, so i tried a second time. That time i allowed and all went through. So this is real!
 
F

ForgottenSeer 95367

It asks me if i want to deny or allow, not that it blocked anything. 1 exe did not start when i did not do anything with the bar, so i tried a second time. That time i allowed and all went through. So this is real!
Please provide an image of the notification that asks you to allow or deny files.

Microsoft has not yet implemented user-allow or deny of files in SAC yet. They clearly state this in their SAC release notes. Such a feature has been requested by users to the Windows Insiders' Program, but M$ said "No, for now."
 
Last edited by a moderator:

Andy Ful

From Hard_Configurator Tools
Thread author
Verified
Honorary Member
Top Poster
Developer
Well-known
Dec 23, 2014
8,129
@Andy Ful , I wonder to what extent Intelligence Security Graph (ISG) for WDAC overlaps or is one-in-the-same as "Defender Reputation AI" to be used in Smart Application Control?

Microsoft is surely playing word games for marketing purposes as it normally does - calling the same thing by different names. Also, Microsoft is relabeling old tech (ML analytics) as something new (AI array). Same trickery as "Next Gen" this or that, when in fact, it's just the same thing that has been used for a long time.

After reading this very closely multiple times, I'm convinced of it:

View attachment 269492
NOTE how Microsoft might try to solve the DLL hell problem...

"If the file with good reputation is an application installer, the installer's reputation will pass along to any files that it writes to disk. This way, all the files needed to install and run an app inherit the positive reputation data from the installer."

It makes sense now that Microsoft would want a long period of SAC running in evaluation mode to collect the required telemetry and set policies for all files written to disk for known good application installers.
In my tests, WDAC + ISG on Windows 10 worked slightly differently from SAC on Windows 11. I made my tests with SAC in Windows Insider. For example, Hard_Configurator was blocked by ISG but allowed by SAC and Defender ASR rules. SAC also allowed the installation of signed applications and then some of them were partially blocked on execution (DLL blocking).
When using WDAC + ISG on Windows 10 you can still see the SmartScreen alert. On Windows 11 with SAC set to ON, there is no SmartScreen alert, but files that would be blocked by SmartScreen on Windows 10 are now blocked by SAC.

I think that more tests must be done. It is also possible that WDAC on Windows 11 could get some new features.
 

pxxb1

Level 9
Verified
Well-known
Jan 17, 2018
438
Please provide an image of the notification that asks you to allow or deny files.

Microsoft has not yet implemented user-allow or deny of files in SAC yet. They clearly state this in their SAC release notes. Such a feature has been requested by users to the Windows Insiders' Program.

That is not to say that Microsoft says one thing in the release notes, but does another when releasing the code. That's why an image or GIF of the notification will resolve the matter.

False alarm! I installed DefenderUI Pro after 22H2 so it was it who made it`s presens known for the 1 time. SAC is set to OFF in W. Security
 
  • Like
Reactions: Digmor Crusher
F

ForgottenSeer 95367

In my tests, WDAC + ISG on Windows 10 worked slightly differently from SAC on Windows 11. I made my tests with SAC in Windows Insider. For example, Hard_Configurator was blocked by ISG but allowed by SAC and Defender ASR rules. SAC also allowed the installation of signed applications and then some of them were partially blocked on execution (DLL blocking).
When using WDAC + ISG on Windows 10 you can still see the SmartScreen alert. On Windows 11 with SAC set to ON, there is no SmartScreen alert, but files that would be blocked by SmartScreen on Windows 10 are now blocked by SAC.

I think that more tests must be done. It is also possible that WDAC on Windows 11 could get some new features.
WDAC and ISG progress at Microsoft have been disappointingly slow. A contact at Microsoft stated to me that it has to do with limitations of their internal teams (staff leaving) and coordination between work group problems.

WDAC is far too cumbersome to deploy at this time. Just getting it set up to test requires an admin to spend days of reading and prep work. Too much logistics involved and, therefore, not practical.
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top