Users are getting virus on their computers.
Server is 2003.
One way I'm preventing this is by setting up a group policy:
Path: %AppData%\*.exe
Security Level: Disallowed
Description: Don't allow executables to run from %AppData%.
I have setup the gp and the group is link to the GP.
I ran gpupdate, rsop and it shows the gp. I attached the screenshot.
Also attached is the gp management screen.
I have test the gp by executing a standalone exec in C:\user\me\appdata
and I'm still able to open it.
Am I missing something? rsop.JPG group-policy-management.JPG
Microsoft Legacy OSActive DirectoryWindows Server 2003
Last Comment
uscost
8/22/2022 - Mon
Member_2_6515809
Try just putting %appdata% in as the path?
uscost
ASKER
but i want to limit executables from running there though.
Dontmilkthis
A couple of levels higher in the hierarchy is the "Enforcement" policy.
If you're performing this test as a local admin, make sure this policy is set to "All Users" and not "All users except local administrators"
Software restriction policy rules apply automatically to some types of executable files, regardless of their extension type. This includes the following types of files:
Windows operating system executable files (.exe, .com, .dll)
Windows scripting files (when processed by Windows Script Host, such as .vbs, and .wsh files)
Command batch files (when processed by Windows CMD, such as .bat, .cmd)
Installation packages when processed by Windows Installer (.msi)
So the /*.exe is redundant
uscost
ASKER
ok i'll try that, but the policy is set to all authenticated users.
edit:
after editing the policy to remove .exe, ran gpupdate on my machine.
Test it again and was still able to open the .exe.
Dontmilkthis
So what's the setting(s) in the Enforcement policy?
It's at the "Software Restriction Policies" level
In mine I see three options:
1) "Apply software restriction policies to the following:"
a) All software files except libraries
b) All software files
2) Apply software restriction policies to the following users:
a) All users
b) All users except local admins
3) When applying software restriction policies:
a) Enforce certificate rules
b) Ignore certificate rules
So my initial suggestion was to ensure that option 2a) was selected if you're testing as a local admin.
(just to be clear, i'm not talking about the security filtering on the group policy itself)
I guess they increase the security on win7, but had the feature in xp.
But thanks man for the help. You help me fix it.
Dontmilkthis
No worries. glad to help.
good luck with the virus issues.
I guess it would be good to just mention this now, i'd be cautious of leaving this block in place for too long... I'm not 100% sure, but this might impact the ability for some application to update themselves.
yeah i thought about it, but i had users getting viruses that have wipe out all their work files, losing months of work.
I think this will benefit more. But you're still able to run the application manually from the shortcuts on desktop and start menu fine.