AppLocker GPO: Allow only Auhorized user for PowerShell


in applocker gpo, how can create deny rule deny 'everyone' powershell & powershell ise (both x64 & x86) & allow authorized users?

my thought is:

create two deny rules (one x64, 1 x86) deny 'everyone':

1. deny

%system32%\windowspowershell\v1.0\powershell.exe

2. deny

%syswow64%\windowspowershell\v1.0\powershell.exe

but understanding, deny rule take precedent, how can go allow authorized users use powershell?

please shed lights.


best regards,

hi blueberries,

you try these actions below.

  1. create rule
  2. click allow in permission tab , click select to select group use powershell
  3. click publisher , click next on conditions tab
  4. click browse , select x64 powershell.exe on publisher , click next
  5. click next on exceptions
  6. click create on name tab

7. there prompt after click create , click yes

8.  if not want administrator run powershell.exe, need double-click action=allow user=administrator and add x64 powershell.exe exceptions. if allow administrator run powershell.exe, ignore step

9.  then double-click both acls action=allow user=everyone and add x64 powershell exceptions.

10. repeat these steps above x86 powershell.

best regards,

jay

be


please remember mark replies answers if , un-mark them if provide no help. if have feedback technet subscriber support, contact tnmff@microsoft.com.






Windows Server  >  Group Policy



Comments

Popular posts from this blog

WIMMount (HSM) causing cluster storage to go redirected (2012r2 DC)

Failed to delete the test record dcdiag-test-record in zone test.com

Azure MFA with Azure AD and RDS