[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248268

 
 

909

 
 

195051

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

AppLocker: Executable Rules: (Default Rule) All files located in the Program Files folder

ID: oval:org.secpod.oval:def:40343Date: (C)2017-04-25   (M)2023-05-09
Class: COMPLIANCEFamily: windows




Allow all users to run executable files in the Program Files folder This setting is configured by using an XML blob that is store in the registry setting for this setting. You can obtain the XML blob by configuring the desired setting in the Local Group Policy console and then retrieving the blob from the registry setting. Vulnerability: A malicious agent could run unauthorized programs and software. Counter Measure: Configure this policy to allow all users to run all files located in the Program Files folder. Potential Impact: Depending on configuration, users may be unable to run specific applications. Fix: (1) GPO: Computer Configuration\Windows Settings\Security Settings\Application Control Policies\AppLocker\Executable Rules\AppLocker: Executable Rules: (Default Rule) All files located in the Program Files folder (2) REG: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\SrpV2\Exe\921cc481-6e17-4653-8f75-050b80acca20!Value

Platform:
Microsoft Windows Server 2016
Reference:
CCE-45489-2
CPE    1
cpe:/o:microsoft:windows_server_2016:::x64
CCE    1
CCE-45489-2
XCCDF    1
xccdf_org.secpod_benchmark_general_Windows_Server_2016

© SecPod Technologies