[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248268

 
 

909

 
 

195051

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

Enable enforcement of Executable Rules

ID: oval:org.secpod.oval:def:40340Date: (C)2017-04-25   (M)2023-05-09
Class: COMPLIANCEFamily: windows




AppLocker defines executable rules as any files with the .exe and .com extensions that are associated with an application. Because all of the default rules for the executable rule collection are based on folder paths, all files under those paths will be allowed. The following are the default rules that are available for the executable rule collection: -Allow members of the local Administrators group access to run all executable files -Allow all users to run executable files in the Windows folder -Allow all users to run executable files in the Program Files folder Vulnerability: A malicious agent could run unauthorized programs and software. Counter Measure: Configure this policy based on the security requirements for your organization. Potential Impact: Depending on configuration, users may be unable to run specific applications. Fix: (1) GPO: Computer Configuration\Windows Settings\Security Settings\Application Control Policies\AppLocker\Executable Rules\Executable rules (2) REG: NO INFO

Platform:
Microsoft Windows Server 2016
Reference:
CCE-45495-9
CPE    1
cpe:/o:microsoft:windows_server_2016:::x64
CCE    1
CCE-45495-9
XCCDF    1
xccdf_org.secpod_benchmark_general_Windows_Server_2016

© SecPod Technologies