For Windows Group Policy, perhaps everyone is using more of the features in the "Management Templates". For the "software restriction strategy" I believe that not many friends have used it.
If the software restriction strategy is good, I believe it can be compared with some HIPS software. If you combine NTFS permissions and registry permissions, you can fully implement the system's full security configuration. At the same time, because this is a built-in function of the system, it seamlessly integrates with the system, and does not occupy additional CPU and memory resources. The incompatibility phenomenon, because it is located at the bottom of the system, its interception capability is unmatched by other software. The downside is that its settings are not flexible and intelligent, and will not ask the user. Let's take a comprehensive look at the software restriction strategy.
This series of articles will focus on the following aspects:
·Overview
·Additional rules and security levels
·Priority of software restriction policy
· Rule Assignment and Inheritance
· How to Write a Rule
· Example Rule
Today we introduce an example of writing a software restriction policy rule in Windows Group Policy.
Root Directory Rules
If we want to restrict the running of programs in a directory, it is usually created such as:
C:\\Program Files\\*.* Not allowed < Br>
Such a rule seems to be no problem, but in special cases it can cause accidental injury, because the wildcard can match the file or match the folder. If there is a directory such as SiteMapBuilder.NET under this directory
(such as C:\\Program Files\\SiteMapBuilder.NET\\Site Map Builder.NET), it can also match the rules, resulting in accidental injury. The solution is to rule the rules. Modified:
C:\\Program Files Not allowed
C:\\Program Files\\*\\ Unrestricted
This eliminates subdirectories and thus does not cause accidental injury.
Rules for Internet Security
We are often poisoned when we browse the web. When we browse the web, the virus will be automatically downloaded to the web cache folder through the browser vulnerability. Then, copy your own
to a system sensitive location, such as windows system32 program files, etc., and then run. So simply limiting the browser cache folder is not enough. A more practical precaution is to prevent IE from creating files in sensitive locations. Based on this, we can create the following rules:
%ProgramFiles%\\Internet Explorer\\iexplore.exe Basic User
%UserProfile% \\Local Settings\\Temporary Internet Files\\** Not allowed
%UserProfile%\\Local Settings\\Temporary Internet Files\\* Not allowed
%UserProfile%\\Local Settings\\Temporary Internet Files\\ Not allowed
%UserProfile%\\Local Settings\\Temporary Internet Files Not Allowed
If you are using a different browser, set it to "Basic User" as well.
U disk rules
More practical:
U drive letter: \\* Unallowed distrust can be restricted
Set to a higher degree of security, and there is no limit to the normal operation of the USB flash drive.
CMD Restriction Policy
%Comspec% Basic User
It should be noted that the system handles CMD and batch files separately, even if CMD is not allowed. , you can still run batch processing
For some systems we rarely use it, but there are restrictions on programs that have potential threats. For example, ftp.exe, tftp.exe, telnet.exe, net.exe, net1.exe, debug.exe, at.exe, arp.exe, wscript.exe, cscript.exe, etc., can be set to be subject to Limited or directly set to not allowed.
System processes that prohibit camouflage
svchost.exe is not allowed
C:\\Windows\\System32\\Svchost.exe Unrestricted
If you are interested With a spirit, you can also make a white list of all the processes of the system, so the security may be higher.
Other rules are free to play.
Backup of Policies
Finally, mention the backup of the policy. Can't do this hard to finish the next redo system again, huh, huh, backup is very simple, we can back up by exporting the registry (not recommended, it will not be introduced).
You can also back up by directly backing up the file, open C:\\WINDOWS\\system32\\GroupPolicy\\Machine, there is a Registry.pol file in this directory, yes, it is. Back up it, redo the system and COPY directly, you can also share your strategy with more people. One thing to note here is that if the Machine folder is not available, it must not be created manually. Otherwise, it can be used. You can use the method of creating a policy that we introduced earlier. After creating it, this folder will be generated, or you can backup it. Back up this folder directly. Don't remember to build it manually. If you don't want to use these strategies, it's easy to rename or delete the Registry.pol file.
Some WinXP users reinstall the system and found that when the graphics card driver is installed, the
Some WinXP users have installed Windows XP and Windows Vista dual operating systems on their own com
Computers will always produce a variety of junk files when used for a long time. When the accumulati
First, the basic settings Windows XP can recognize many current brands of recorders, so the system
Simple commands make XP system run faster
Windows XP can't complete defragmentation
140 Windows XP Tips for Novice Beginners
Why can't I recover the DirectDraw video?
You are not mistaken XP common problems can also quickly resolve
XP network failure solution (1)
CMOS passwords must be used to remove
What should I do if the WinXP system is blacked out due to too high resolution setting?
What should I do if the XP system desktop shortcut cannot be deleted?
What should I do if the right mouse button does not respond?
Win2008 system log constantly appears to resolve the failure of the solution
How to set up Win7 computer fingerprint recognition?
Linux multi-command sequential execution
Win7 Open VideoStudio Tips Corel VideoStudio Pro has stopped working How to do
Win7 retrieved the "recently accessed location" method by mistake.
Winrar how to automatically add comments
WinXP power-on self-test cancellation skills five (wide range of applications)
Win10/Win8 install Windows classic game method
Easy to learn anti-word document printing
CentOS supports Chinese and ssh support for Chinese input modification