WDAC Wedesday: Audit mode advantage
Happy WDAC Wednesday! Application control solutions are very powerful, they are like a gate keeper, and determine what installed applications are allowed to run. Applying tighter controls on endpoints, using…
Happy WDAC Wednesday! Application control solutions are very powerful, they are like a gate keeper, and determine what installed applications are allowed to run. Applying tighter controls on endpoints, using…
Happy WDAC Wednesday! Welcome to a new series with the aim of detailing and demistifying Microsoft’s Application Control for Business (ACFB), a powerful solution used to allow or block applications…
Microsoft today published an update advisory for Windows Defender Application Control (WDAC) Advanced Hunting changes that could have an impact if you have any hunting rules or dashboards in place.…
The goal of this post is to step through the process of using the WDAC Wizard to create a sample WDAC policy and deploy it to a test Windows 10…
This blog post will be the first (of many) in a series relating to Microsoft WDAC and how to understand, implement and manage it. In the current cyber security landscape…
Windows Defender Application Control (WDAC) is a core component of Windows, since Windows 10 and Server 2016, which can be used as part of your security posture to secure workstations…
In implementing a Windows Defender Application Control (WDAC) audit policy we discovered an interesting quirk with the information logged in the Windows Event Logs on Server 2016, that can make…
The Microsoft WDAC Wizard is a great tool for building and modifying WDAC policies, but there are times where it is necessary to manually modify the policy XML file. If…
On a Windows Defender Application Control (WDAC) project one issue you may encounter is driver .dll or .sys files that are digitally signed, but the certificate has now expired. The…
Windows Defender Application Control (WDAC) is an application control system integrated into Windows 10/11 and is used within Enterprise to whitelist trusted applications, allowing them to run, and blocking either…