Hit with Virus that executed via PowerShell Scripting. Can I disable Powershell on my network via Group Policy and what implications does that have for me.
our network hit virus unknown, o97m.crigent. nasty macro virus targets microsoft office documents & spreadsheets , uses combination of macros , scripts via powershell.
how i disable powershell scripting via group policy?
will raise issues such random application or network failures or other issues?
can apply entire domain or should selective , apply workstations?
network summary: windows 2008 active directoy server, 75% windows 7, 25% windows xp workstations.
douglasofsanmarcos
disabling windows powershell can done gpo: computer configuration | administrative templates | windows components | windows powershell
from gpo description: "this setting exists under both "computer configuration" , "user configuration" in group policy editor. "computer configuration" has precedence on "user configuration."
by default option restricted way on computers.
i selective when apply @ all:
workstations - apply test group of workstations first, see there no side effects before applying computers.
server - wouldn't apply @ all. have seen many issues when setting policy on exchange , other systems.
if using group policy define powershell logon, logoff or computer script, script disregard execution policy set locally or through gpo.
http://4sysops.com/archives/set-powershell-execution-policy-with-group-policy/
http://technet.microsoft.com/en-us/library/hh849812.aspx
please take moment vote helpful and/or mark answer applicable. thanks.
Windows Server > Group Policy
Comments
Post a Comment