Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/simeononsecurity/Applocker-Hardening
Ultimate Applocker Hardening Configuration Script.
https://github.com/simeononsecurity/Applocker-Hardening
applocker applocker-rule hardening powershell powershell-script windows windows-10
Last synced: 3 months ago
JSON representation
Ultimate Applocker Hardening Configuration Script.
- Host: GitHub
- URL: https://github.com/simeononsecurity/Applocker-Hardening
- Owner: simeononsecurity
- License: mit
- Created: 2020-11-19T08:26:33.000Z (almost 4 years ago)
- Default Branch: main
- Last Pushed: 2024-07-26T23:05:48.000Z (4 months ago)
- Last Synced: 2024-07-27T00:23:29.235Z (4 months ago)
- Topics: applocker, applocker-rule, hardening, powershell, powershell-script, windows, windows-10
- Language: PowerShell
- Homepage: https://simeononsecurity.com/github/Applocker-Hardening
- Size: 45.9 KB
- Stars: 23
- Watchers: 4
- Forks: 1
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- Funding: .github/FUNDING.yml
- License: LICENSE
Awesome Lists containing this project
README
# Applocker-Hardening
[![Sponsor](https://img.shields.io/badge/Sponsor-Click%20Here-ff69b4)](https://github.com/sponsors/simeononsecurity) [![VirusTotal Scan](https://github.com/simeononsecurity/Applocker-Hardening/actions/workflows/virustotal.yml/badge.svg)](https://github.com/simeononsecurity/Applocker-Hardening/actions/workflows/virustotal.yml)
The following script is an automation process for installing AppLocker policies in a Windows environment using PowerShell. The script first sets the error handling preference to "silently continue" and elevates the privileges of the current process. It then sets the directory to the location of the script and installs the policies from the Files directory. The AppLocker service is then enabled and started, and the status of the service is checked. Finally, the active AppLocker rule categories are printed and the script tests the block rules for executables in the C:\Windows\System32 directory for the user "Everyone".
## What does this script do?
- Locks down system resources to bare minimum needed for basic OS functionality## Recommended reading:
- [api0cradle/UltimateAppLockerByPassList)](https://github.com/api0cradle/UltimateAppLockerByPassList)
- [Microsoft Recommended Block Rules](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-application-control/microsoft-recommended-block-rules)
- [MotiBa/AppLocker](https://github.com/MotiBa/AppLocker)
- [NSA Cyber Bitlocker Guidance](https://github.com/nsacyber/AppLocker-Guidance)## How to run the script:
### Manual Install:
If manually downloaded, the script must be launched from an administrative powershell in the directory containing all the files from the [GitHub Repository](https://github.com/simeononsecurity/Applocker-Hardening)
```powershell
Set-ExecutionPolicy -ExecutionPolicy RemoteSigned -Force
Get-ChildItem -Recurse *.ps1 | Unblock-File
.\sos-applockerhardening.ps1
```
### Automated Install:
The script may be launched from the extracted GitHub download like this:
```powershell
iex ((New-Object System.Net.WebClient).DownloadString('https://simeononsecurity.ch/scripts/sosapplocker.ps1'))
```
Explore the World of Cybersecurity
### Links:
- #### [github.com/simeononsecurity](https://github.com/simeononsecurity)
- #### [simeononsecurity.ch](https://simeononsecurity.ch)