# Remove the hardened device from the Command itself # Execute the Command to harden the device # Apply AppLocker via JumpCloud CommandĪdd-JCCommandTarget -CommandID $AppLockerCommandID -SystemID $agentconf.systemKey It's the same approach: We will add a t rigger to the JumpCloud Command and make it consumable within the PowerShell Module.
Configure executable rules enforcement for applocker windows#
Just like in my previous article about Windows Hardening, you can apply this policy during the deployment before issuing the device to a user. In our example here, we will deny the execution of MS Teams ( because I prefer Slack) and MS Paint. Stop there and in a next step you can simply cleanup the XML-file by removing unnecessary lines ( "NotConfigured") which would lead to a failed application of the rules. You can follow the instructions in the article until " Creating the Policy". Generating the XML FileĪs this is well documented here, I won't repeat the whole content.
You can also create rules based on the file path and hash. In the right pane, select Configure rule enforcement.
Important: Before you enforce DLL rules, make sure that there are allow rules for each DLL that is used by any of the allowed apps. Click the Advanced tab, select the Enable the DLL rule collection check box, and then click OK. Define rules based on file attributes that persist across app updates, such as the publisher name (derived from the digital signature), product name, file name, and file version. In the console tree, double-click Application Control Policies, right-click AppLocker, and then click Properties.