This is a spin-off from this more general thread. Since I plan to go into a lot of detail here that may need discussion, I did not want to pollute and side-track the original thread that's already growing.
This thread is specific to Win 10 Software Restriction Policies (SRP) Deny-all setup where some writable folders under C:\Windows are still writable by non-Admins and thus should be blacklisted explicitly.
Following instruction from the mechbgon article, I identified the following locations on my Win 10 Pro (1709) setup using accesscheck for Users, Everyone, Authenticated Users, and Interactive groups:
C:\Windows\tracing
C:\Windows\Registration\CRMLog
C:\Windows\System32\FxsTmp
C:\Windows\System32\com\dmp
C:\Windows\System32\spool\PRINTERS
C:\Windows\System32\spool\SERVERS
C:\Windows\System32\drivers\color
C:\Windows\System32\Tasks
C:\Windows\SysWOW64\FxsTmp
C:\Windows\SysWOW64\com\dmp
C:\Windows\SysWOW64\Tasks
C:\Windows\Tasks
C:\Windows\Temp
Here is the list of locations listed by @Andy Ful in the awesome Hard Configurator manual. For some reason, it does not match what I observe - perhaps because it's system specific? My comments are inline for each difference
c:\windows\servicing\Packages - not writable by Users, Everyone, Authenticated Users, and Interactive groups
c:\windows\servicing\Sessions - not writable by Users, Everyone, Authenticated Users, and Interactive groups
c:\windows\System32\Microsoft\Crypto\RSA\MachineKeys - did not find in my setup
c:\windows\System32\spool\drivers\color - matches one of mine
c:\windows\System32\Tasks - matches one of mine
c:\windows\SysWOW64\Tasks - matches one of mine
c:\windows\Tasks - matches one of mine
c:\windows\Temp - matches one of mine
c:\Windows\debug\WIA - did not find in my setup
c:\Windows\System32\Tasks_Migrated - did not find in my setup
Hard Configurator does not mention these 8 directories for Win 10 that I found have writable privs, (though I believe they might be included among the many other optional block-sponsor items due to being part of excubits.com list used by Hard Configurator):
C:\Windows\tracing
C:\Windows\Registration\CRMLog
C:\Windows\System32\FxsTmp
C:\Windows\System32\com\dmp
C:\Windows\System32\spool\PRINTERS
C:\Windows\System32\spool\SERVERS
C:\Windows\SysWOW64\FxsTmp
C:\Windows\SysWOW64\com\dmp
Questions for @Andy Ful (and anyone else who might know):
(1) Is the approach (from the mechbgon article) I am using for identifying directories to blacklist correct?
(2) Should c:\windows\servicing\Packages and c:\windows\servicing\Sessions still be blacklisted?
(3) Do you see issues with blacklisting additional directories I found? Aside from the time I install print drivers, do you foresee something I should watch out for when adding those additional 8 directories that are not on the Hard Configurator list.
(4) Hard Configurator indicates it blacklists using the registry key. Is there any downside to instead adding explicit rules under SRP policies (like described in the mechbgon article)? I am guessing not, but does not hurt to check...
Thanks!
This thread is specific to Win 10 Software Restriction Policies (SRP) Deny-all setup where some writable folders under C:\Windows are still writable by non-Admins and thus should be blacklisted explicitly.
Following instruction from the mechbgon article, I identified the following locations on my Win 10 Pro (1709) setup using accesscheck for Users, Everyone, Authenticated Users, and Interactive groups:
C:\Windows\tracing
C:\Windows\Registration\CRMLog
C:\Windows\System32\FxsTmp
C:\Windows\System32\com\dmp
C:\Windows\System32\spool\PRINTERS
C:\Windows\System32\spool\SERVERS
C:\Windows\System32\drivers\color
C:\Windows\System32\Tasks
C:\Windows\SysWOW64\FxsTmp
C:\Windows\SysWOW64\com\dmp
C:\Windows\SysWOW64\Tasks
C:\Windows\Tasks
C:\Windows\Temp
Here is the list of locations listed by @Andy Ful in the awesome Hard Configurator manual. For some reason, it does not match what I observe - perhaps because it's system specific? My comments are inline for each difference
c:\windows\servicing\Packages - not writable by Users, Everyone, Authenticated Users, and Interactive groups
c:\windows\servicing\Sessions - not writable by Users, Everyone, Authenticated Users, and Interactive groups
c:\windows\System32\Microsoft\Crypto\RSA\MachineKeys - did not find in my setup
c:\windows\System32\spool\drivers\color - matches one of mine
c:\windows\System32\Tasks - matches one of mine
c:\windows\SysWOW64\Tasks - matches one of mine
c:\windows\Tasks - matches one of mine
c:\windows\Temp - matches one of mine
c:\Windows\debug\WIA - did not find in my setup
c:\Windows\System32\Tasks_Migrated - did not find in my setup
Hard Configurator does not mention these 8 directories for Win 10 that I found have writable privs, (though I believe they might be included among the many other optional block-sponsor items due to being part of excubits.com list used by Hard Configurator):
C:\Windows\tracing
C:\Windows\Registration\CRMLog
C:\Windows\System32\FxsTmp
C:\Windows\System32\com\dmp
C:\Windows\System32\spool\PRINTERS
C:\Windows\System32\spool\SERVERS
C:\Windows\SysWOW64\FxsTmp
C:\Windows\SysWOW64\com\dmp
Questions for @Andy Ful (and anyone else who might know):
(1) Is the approach (from the mechbgon article) I am using for identifying directories to blacklist correct?
(2) Should c:\windows\servicing\Packages and c:\windows\servicing\Sessions still be blacklisted?
(3) Do you see issues with blacklisting additional directories I found? Aside from the time I install print drivers, do you foresee something I should watch out for when adding those additional 8 directories that are not on the Hard Configurator list.
(4) Hard Configurator indicates it blacklists using the registry key. Is there any downside to instead adding explicit rules under SRP policies (like described in the mechbgon article)? I am guessing not, but does not hurt to check...
Thanks!
Last edited: