You mean, if does not contain PowerShell CmdLine, WDAC would allow to run?
Yes.
You mean, if does not contain PowerShell CmdLine, WDAC would allow to run?
WDAC blocked media palyer classic - black edition installer from runing in user space.The CMD or BAT script that contains the PowerShell CmdLines blocked by WDAC (SRP/AppLocker) can still run after some script modifications. Simply, the PowerShell content must be moved to PS1 scripts, while invoking those PS1 scripts from CMD or BAT script (instead of PowerShell CmdLines). Next, all those scripts must be stored in the whitelisted location.
Can you post the blocked event?WDAC blocked media palyer classic - black edition installer from runing in user space.
When transferred to whitelisted Program files folder, it is still blocked!
Can you post the blocked event?
This is the last one in event viewer, but this concens when tried to run in user space.
Please post the events from WHHLight (use Event button).This is the last one in event viewer, but this concens when tried to run in user space.
Event view has no mention about trial to run from the whitelisted Program files or Windows folders.
I think I was also blocked in the whitelisted Program files because it tried to load something in user temp fileThis is the last one in event viewer, but this concens when tried to run in user space.
Event view has no mention about trial to run from the whitelisted Program files or Windows folders.
I think I was also blocked in the whitelisted Program files because it tried to load something in user temp fileView attachment 288446
Highly doubtful, unless there's some new tweak, otherwise SAC will be disabled after restart, as you can see from above posts.
You can reset while keeping files and some settings, and then you can enable it. That's what I did and it's the easiest way I know. So no need to do a clean install or a reset that wipes everything unless you really want to.
I have just re-tested the extended reg tweak I posted a few years ago, and it works on my fresh updated Windows 24H2. I am not sure if it will work on all machines.
One has to use the CMD from the recovery environment to modify the offline registry. It is easy for people who already know it (takes about one minute), but caution is required because:
I assume that the offline system is visible in the recovery environment as C: (if not, then another letter must be used like D:, E:, F:, etc.).
- The recovery environment has its own Windows system (usually placed on disk X: ).
- Regedit in the Recovery environment shows the Registry related to the Windows Recovery system (usually placed on disk X: ) and not the Registry related to the "normal" Windows system.
- Recovery environment CMD is totally different from Safe Mode CMD (different Windows systems are used).
- If the "normal" Windows system is installed on disk C:, it can be seen in the recovery environment as C:, D:, E:, etc.. For example, on my computer, it is E:.
- A mistake can brick your system.
It is necessary to load the offline System Registry Hive from "C:\Windows\System32\config" to "HKEY_LOCAL_MACHINE\xxxxx" (I used xxxxx as the name of the new key where the offline System Hive is loaded) and set the following keys:
HKEY_LOCAL_MACHINE\xxxxx\SYSTEM\CurrentControlSet001\Control\CI\Policy
VerifiedAndReputablePolicyState = 2
HKEY_LOCAL_MACHINE\xxxxx\SYSTEM\CurrentControlSet001\Control\CI\Protected
VerifiedAndReputablePolicyStateMinValueSeen = 2
After unloading the "xxxxx" Hive and restarting Windows, the SAC is set in Security Center to Evaluation mode and can be changed to ON.
Edit 1.
This tip is only for advanced (and careful) users. Please use it in the virtual machine until you are certain that it is applied as intended. A mistake can spoil your system.
Edit 2.
Post updated (added some more information about Windows Recovery Environment).
Windows Hybrid Hardening Light is better; it is Simple Windows Hardening plus Windows Defender Application Control module.@Andy Ful How different is Windows Hybrid Hardening Light from Simple Windows Hardening? Which offers better protection?
Thanks! For the information @Parkinsond is that I'm using Windows Hybrid Hardening and I liked it for its simplicityWindows Hybrid Hardening Light is better; it is Simple Windows Hardening plus Windows Defender Application Control module.
I was using Windows Defender Application Control, sometimes through Windows Hybrid Hardening Light, sometimes through Windows Defender Application Control wizard, but I found application control is annoying for me; it stops unsigned executables and portable apps and I have to add to exclusions.Thanks! For the information @Parkinsond is that I'm using Windows Hybrid Hardening and I liked it for its simplicity
In short, WDAC extends WHHL's protection. I chose H_C after initially considering WHHL. H_C's neat interface, complete with protections and external tool access, ensures smooth navigation. H_C, CD, and FH's simple, universal designs work for me, unlike the flat designs of WHHL or the tools. WHHL's cloud protection, WDAC, occasionally slowed my app starts and installations. I gave H_C a shot, and in no time, I was completely smitten with her, which led to a spontaneous round of H_C!@Andy Ful How different is Windows Hybrid Hardening Light from Simple Windows Hardening? Which offers better protection?
Personally, I prefer the simplicity of WHHL to HC; I find WDAC feasible only if using MD, as it can limit the malicious process for threats escaping MD detection, which can occur from time to time. For robust AV such as K, only using script rules by AppLocker will be sufficient.In short, WDAC extends WHHL's protection. I chose H_C after initially considering WHHL. H_C's neat interface, complete with protections and external tool access, ensures smooth navigation. H_C, CD, and FH's simple, universal designs work for me, unlike the flat designs of WHHL or the tools. WHHL's cloud protection, WDAC, occasionally slowed my app starts and installations. I gave H_C a shot, and in no time, I was completely smitten with her, which led to a spontaneous round of H_C!Talk about Hooked_Completely!
![]()
... I found application control is annoying for me; it stops unsigned executables and portable apps and I have to add to exclusions.
I would not consider it accidental; AMSI-related DLL was blocked for more than one AV, Avast-AVG, K, and I am not sure for SEP also or not.It is a common issue related to the default-deny setup. That is why I encourage users to keep the default settings for a few months. It is hard to find a stronger and more usable solution. If default settings are OK in practice, some additional hardening may be applied. Users can always return to the usable setup.
The problem with unsigned and non-prevalent portable apps can be solved easily by keeping them in one already whitelisted folder (for example "C:/Program Data\Portable Apps").
There are no problems with the unsigned (and not popular) software when using the default WDAC Whitelist and Run By SmartScreen.
Rarely, some executables can be blocked by Microsoft recommendations related to vulnerable executables (like some LOLBins). I noticed the blocks of Avast's AMSI-related DLL.. For now, I am unsure if it is considered vulnerable by Microsoft or if the block is accidental.