Hit with Virus that executed via PowerShell Scripting. Can I disable Powershell on my network via Group Policy and what implications does that have for me.


our network hit virus unknown, o97m.crigent.  nasty macro virus targets microsoft office documents & spreadsheets , uses combination of macros , scripts via powershell. 

how i disable powershell scripting via group policy?

will raise issues such random application or network failures or other issues?

can apply entire domain or should selective , apply workstations?

network summary: windows 2008 active directoy server, 75% windows 7, 25% windows xp workstations.


douglasofsanmarcos

disabling windows powershell can done gpo: computer configuration | administrative templates | windows components | windows powershell

from gpo description: "this setting exists under both "computer configuration" , "user configuration" in group policy editor. "computer configuration" has precedence on "user configuration."

by default option restricted way on computers.

i selective when apply @ all:

workstations - apply test group of workstations first, see there no side effects before applying computers. 

server - wouldn't apply @ all. have seen many issues when setting policy on exchange , other systems.

 if using group policy define powershell logon, logoff or computer script, script disregard execution policy set locally or through gpo.

http://4sysops.com/archives/set-powershell-execution-policy-with-group-policy/

http://technet.microsoft.com/en-us/library/hh849812.aspx


please take moment vote helpful and/or mark answer applicable. thanks.



Windows Server  >  Group Policy



Comments

Popular posts from this blog

WIMMount (HSM) causing cluster storage to go redirected (2012r2 DC)

Failed to delete the test record dcdiag-test-record in zone test.com

Azure MFA with Azure AD and RDS