Andy Ful
From Hard_Configurator Tools
Thread author
Verified
Honorary Member
Top Poster
Developer
Well-known
- Dec 23, 2014
- 8,488
Windows Default File System Permissions trigger UAC prompt, when the file is copied to 'C:\Windows', 'C:\Program Files', and 'C:\Program Files (x86)' folders. But, there are some well-known exceptions in earlier Windows versions. A few 'C:\Windows' subfolders are writable without UAC prompt, and the files can even be executed from there.
It is not good for the security software, based on file whitelisting. In Windows 10 some writable 'C:\Windows' subfolders are now protected, and deny execution. Anyway, it is not true that the problem is solved.
Below, I sum up tests with Sysinternals AccessEnum utility on Windows 10 Pro (1607):
R = read, W = write, X = execute, O = blocked
Not protected (writable, and allow execution):
RWX C:\Windows\servicing\Packages
RWX C:\WINDOWS\servicing\Sessions
RWX C:\Windows\System32\Microsoft\Crypto\RSA\MachineKeys
RWX C:\Windows\System32\spool\drivers\color
OWX C:\Windows\System32\Tasks
OWX C:\Windows\SysWOW64\Tasks
RWX C:\Windows\System32\Tasks\Microsoft\Windows\PLA\System
RWX C:\Windows\SysWOW64\Tasks\Microsoft\Windows\PLA\System
OWX C:\Windows\System32\Tasks\Microsoft\Windows\RemoteApp and Desktop Connections Update
OWX C:\Windows\SysWOW64\Tasks\Microsoft\Windows\RemoteApp and Desktop Connections Update
RWX C:\Windows\Tasks
OWX C:\Windows\Temp
Protected (if writable then deny execution):
OOO C:\Windows\PLA\Reports
OOO C:\Windows\PLA\Rules
OOO C:\Windows\PLA\Templates
RWO C:\Windows\Registration\CRMLog
ROX C:\windows\System32\catroot2\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}
OOO C:\Windows\System32\Com\dmp
OOO C:\Windows\SysWOW64\Com\dmp
RWO C:\Windows\System32\FxsTmp
RWO C:\Windows\SysWOW64\FxsTmp
OOO C:\Windows\System32\LogFiles\WMI
OOO C:\Windows\System32\spool\PRINTERS
OOO C:\Windows\System32\spool\SERVERS
ROO C:\Windows\System32\Tasks\Microsoft\Windows\PLA
ROO C:\Windows\SysWOW64\Tasks\Microsoft\Windows\PLA
RWO C:\Windows\tracing
There are many unprotected folders left.
I am curious if the execution from unprotected folders can be safely blocked with Software Restriction Policies?
It is not good for the security software, based on file whitelisting. In Windows 10 some writable 'C:\Windows' subfolders are now protected, and deny execution. Anyway, it is not true that the problem is solved.
Below, I sum up tests with Sysinternals AccessEnum utility on Windows 10 Pro (1607):
R = read, W = write, X = execute, O = blocked
Not protected (writable, and allow execution):
RWX C:\Windows\servicing\Packages
RWX C:\WINDOWS\servicing\Sessions
RWX C:\Windows\System32\Microsoft\Crypto\RSA\MachineKeys
RWX C:\Windows\System32\spool\drivers\color
OWX C:\Windows\System32\Tasks
OWX C:\Windows\SysWOW64\Tasks
RWX C:\Windows\System32\Tasks\Microsoft\Windows\PLA\System
RWX C:\Windows\SysWOW64\Tasks\Microsoft\Windows\PLA\System
OWX C:\Windows\System32\Tasks\Microsoft\Windows\RemoteApp and Desktop Connections Update
OWX C:\Windows\SysWOW64\Tasks\Microsoft\Windows\RemoteApp and Desktop Connections Update
RWX C:\Windows\Tasks
OWX C:\Windows\Temp
Protected (if writable then deny execution):
OOO C:\Windows\PLA\Reports
OOO C:\Windows\PLA\Rules
OOO C:\Windows\PLA\Templates
RWO C:\Windows\Registration\CRMLog
ROX C:\windows\System32\catroot2\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}
OOO C:\Windows\System32\Com\dmp
OOO C:\Windows\SysWOW64\Com\dmp
RWO C:\Windows\System32\FxsTmp
RWO C:\Windows\SysWOW64\FxsTmp
OOO C:\Windows\System32\LogFiles\WMI
OOO C:\Windows\System32\spool\PRINTERS
OOO C:\Windows\System32\spool\SERVERS
ROO C:\Windows\System32\Tasks\Microsoft\Windows\PLA
ROO C:\Windows\SysWOW64\Tasks\Microsoft\Windows\PLA
RWO C:\Windows\tracing
There are many unprotected folders left.
I am curious if the execution from unprotected folders can be safely blocked with Software Restriction Policies?
Last edited: