Using octoplant in combination with an already existing Windows AppLocker strategy¶
Warning
The documentation below does not serve as a guide of how to properly set up Windows AppLocker. It only serves to show how an admin who already has Windows AppLocker properly set up and in use could potentially use the tool in combination with octoplant.
Warning
We strongly urge that you only use octoplant in combination with Windows AppLocker, if you already have Windows AppLocker set up and you are not able to run octoplant on the client. Should you decide to make use of Windows AppLocker, it is imperative that only experts with prior training and proven experience handle the setup and operation of this tool.
octoplant can be used in combination with the defense-in-depth security feature, Windows AppLocker. The Windows AppLocker is a tool that allows admins to blacklist/whitelist applications. Admins can use it to exert control over which apps and files users can run, and where they can/can't be run from.
Info
Ensure that the Application Identity service is running in Services. As this service determines and verifies the identity of an application, disabling it will prevent AppLocker rules from being enforced.
Configuring settings for using Windows AppLocker¶
To configure settings for using Windows AppLocker with octoplant, proceed as follows:
- In Local Security Policy, go to Application Control Policies and select AppLocker.
- Right-click on AppLocker and select Properties.
- Ensure that the Configured checkbox is activated for Executable rules, Windows Installer rules, Script rules, and Packaged app Rules.
- Use the dropdown menu to set each rule collection to Enforce rules. This will ensure that rules are enforced for each rule collection.
- Select OK.
- Settings for using Windows AppLocker with octoplant have now been configured.
Creating Default Rules for Windows AppLocker¶
To create Default Rules for using Windows AppLocker with octoplant, proceed as follows:
Info
Ensure that you have default rules properly created and set up, before you create any others.
- Right-click on Executable Rules and select Create Default Rules. This will ensure that:
- All programs in Program files and Windows folders are able to run.
- Administrators are allowed to run all files (therefore, there are no limitations on them.)
- The Default Rules will be automatically generated and will be visible in Executable Rules.
Automatically Generating Rules¶
You can use the Automatically Generate Rules... function, to ensure that everyone in the Users group can access files located in the octoplant installation directory.
To automatically generate rules for the purpose of using octoplant with Windows AppLocker, proceed as follows:
- Right-click again on Executable Rules and select Automatically Generate Rules....
- Next to User or security group that the rules will apply to, select Select....
- Select Advanced.
- Next to From this location, select Locations.... Set the location to the PC you're working on.
- Select Find now and, in the Search results, scroll down and select Users.
- Select OK.
- You should now see BUILTIN\Users in User or security group that the rules will apply to.
- Next to Folder that contains the files to be analyzed, select Browse....
- In the Browse For Folder window, go to Program Files (x86) and select vdogClient.
- Select OK.
- Set Name to identify this set of rules to octoClient.
- Select Next.
- In Rule Preferences, select Create file hash rules for all files.
- Rules will be generated and can be reviewed in Review files that were analyzed and View rules that will be automatically created.
- Select Create to close the wizard and create the rules.
- The rules you configured in Automatically Generate Rules... will now appear in Executable rules.
Creating a new rule to define user access to DRIVE SNAPSHOT FOR WINDOWSNT¶
To define user access to DRIVE SNAPSHOT FOR WINDOWSNT product from O=TOM EHLERT SOFTWARE E.K, L=AACHEN, S=NORDRHEIN-WESTFALEN,C=DE publisher, proceed as follows:
- Right-click on Executable Rules and select Create New Rule....
- The Executable Rules wizard will open.
- In Permissions, set the Action to Allow.
- Next to User or group select Select....
- Select Advanced.
- Next to From this location, select Locations.... Set the location to the PC you're working on.
- Select Find now and, in the Search results, scroll down and select Users.
- Select OK.
- You should now see BUILTIN\Users in Enter the object name to select.
- Select OK.
- Select Next.
- In Conditions, select Publisher.
- In Publisher, go to Reference file and select Browse..., then go to
C:\Program Files (x86)\vdogServer\auvesy_services
and select snapshot. - Select Open.
- Set bar to rest on File name.
- Select Next.
- In Exceptions, if there are no exceptions to be configured, select Next.
- Enter a name to identify this rule.
- Select Create.
- The new rule defining user access to DRIVE SNAPSHOT FOR WINDOWSNT will now appear in Executable rules.