Hit with Virus that executed via PowerShell Scripting. Can I disable Powershell on my network via Group Policy and what implications does that have for me.


our network hit virus unknown, o97m.crigent.  nasty macro virus targets microsoft office documents & spreadsheets , uses combination of macros , scripts via powershell. 

how i disable powershell scripting via group policy?

will raise issues such random application or network failures or other issues?

can apply entire domain or should selective , apply workstations?

network summary: windows 2008 active directoy server, 75% windows 7, 25% windows xp workstations.


douglasofsanmarcos

disabling windows powershell can done gpo: computer configuration | administrative templates | windows components | windows powershell

from gpo description: "this setting exists under both "computer configuration" , "user configuration" in group policy editor. "computer configuration" has precedence on "user configuration."

by default option restricted way on computers.

i selective when apply @ all:

workstations - apply test group of workstations first, see there no side effects before applying computers. 

server - wouldn't apply @ all. have seen many issues when setting policy on exchange , other systems.

 if using group policy define powershell logon, logoff or computer script, script disregard execution policy set locally or through gpo.

http://4sysops.com/archives/set-powershell-execution-policy-with-group-policy/

http://technet.microsoft.com/en-us/library/hh849812.aspx


please take moment vote helpful and/or mark answer applicable. thanks.



Windows Server  >  Group Policy



Comments

Popular posts from this blog

Azure MFA with Azure AD and RDS

WIMMount (HSM) causing cluster storage to go redirected (2012r2 DC)

Failed to delete the test record dcdiag-test-record in zone test.com