-
Notifications
You must be signed in to change notification settings - Fork 173
Home
Violet Hansen edited this page Aug 10, 2024
·
99 revisions
-
New-WDACConfig -
New-SupplementalWDACConfig -
Remove-WDACConfig -
Edit-WDACConfig -
Edit-SignedWDACConfig -
Deploy-SignedWDACConfig -
Confirm-WDACConfig -
New-DenyWDACConfig -
Set-CommonWDACConfig -
New-KernelModeWDACConfig -
Get-CommonWDACConfig -
Invoke-WDACSimulation -
Remove-CommonWDACConfig -
Assert-WDACConfigIntegrity -
Build-WDACCertificate -
Test-CiPolicy -
Get-CiFileHashes -
ConvertTo-WDACPolicy -
Set-CiRuleOptions -
Get-CIPolicySetting
-
Introduction -
WDAC for Lightly Managed Devices -
WDAC for Fully managed device - Variant 1 -
WDAC for Fully managed device - Variant 2 -
WDAC for Fully managed device - Variant 3 -
WDAC for Fully managed device - Variant 4 -
WDAC Notes -
How to Create and Deploy a Signed WDAC Policy -
Fast and Automatic Microsoft Recommended Driver Block Rules updates -
WDAC policy for BYOVD Kernel mode only protection -
EKUs in WDAC, App Control for Business, Policies -
WDAC Rule Levels Comparison and Guide -
Script Enforcement and PowerShell Constrained Language Mode in WDAC App Control Policies -
How to Use Microsoft Defender for Endpoint Advanced Hunting With WDAC App Control -
Application Control (WDAC) Frequently Asked Questions (FAQs)
-
Create Bootable USB flash drive with no 3rd party tools -
Event Viewer -
Group Policy -
How to compact your OS and free up extra space -
Hyper V -
Overrides for Microsoft Security Baseline -
Git GitHub Desktop and Mandatory ASLR -
Signed and Verified commits with GitHub desktop -
About TLS, DNS, Encryption and OPSEC concepts -
Things to do when clean installing Windows -
Comparison of security benchmarks -
BitLocker, TPM and Pluton | What Are They and How Do They Work -
How to Detect Changes in User and Local Machine Certificate Stores in Real Time Using PowerShell -
Cloning Personal and Enterprise Repositories Using GitHub Desktop -
Device Guard and Virtualization Based Security in Windows -
Only a Small Portion of The Windows OS Security Apparatus
-
Clean Source principle, Azure and Privileged Access Workstations -
How to Securely Connect to Azure VMs and Use RDP
-
Basic PowerShell tricks and notes -
Basic PowerShell tricks and notes Part 2 -
Basic PowerShell tricks and notes Part 3 -
Basic PowerShell tricks and notes Part 4 -
Basic PowerShell tricks and notes Part 5 -
How To Access All Stream Outputs From Thread Jobs In PowerShell In Real Time -
PowerShell Best Practices To Follow When Coding -
How To Asynchronously Access All Stream Outputs From Background Jobs In PowerShell -
Powershell Dynamic Parameters and How to Add Them to the Get‐Help Syntax -
RunSpaces In PowerShell
- Create AppControl Policy
- Create Supplemental Policy
- System Information
- Configure Policy Rule Options
- Simulation
- Allow New Apps
- Build New Certificate
- Create Policy From Event Logs
- Create Policy From MDE Advanced Hunting
- Create Deny Policy
- Merge App Control Policies
- Deploy App Control Policy
- Get Code Integrity Hashes
- Get Secure Policy Settings
- Update
- Sidebar
- Validate Policies
- View File Certificates
- Introduction
- How To Generate Audit Logs via App Control Policies
- How To Create an App Control Supplemental Policy
- The Strength of Signed App Control Policies
- How To Upload App Control Policies To Intune Using AppControl Manager
- How To Create and Maintain Strict Kernel‐Mode App Control Policy
- How to Create an App Control Deny Policy
- App Control Notes
- How to use Windows Server to Create App Control Code Signing Certificate
- Fast and Automatic Microsoft Recommended Driver Block Rules updates
- App Control policy for BYOVD Kernel mode only protection
- EKUs in App Control for Business Policies
- App Control Rule Levels Comparison and Guide
- Script Enforcement and PowerShell Constrained Language Mode in App Control Policies
- How to Use Microsoft Defender for Endpoint Advanced Hunting With App Control
- App Control Frequently Asked Questions (FAQs)
- Create Bootable USB flash drive with no 3rd party tools
- Event Viewer
- Group Policy
- How to compact your OS and free up extra space
- Hyper V
- Overrides for Microsoft Security Baseline
- Git GitHub Desktop and Mandatory ASLR
- Signed and Verified commits with GitHub desktop
- About TLS, DNS, Encryption and OPSEC concepts
- Things to do when clean installing Windows
- Comparison of security benchmarks
- BitLocker, TPM and Pluton | What Are They and How Do They Work
- How to Detect Changes in User and Local Machine Certificate Stores in Real Time Using PowerShell
- Cloning Personal and Enterprise Repositories Using GitHub Desktop
- Only a Small Portion of The Windows OS Security Apparatus
- Rethinking Trust: Advanced Security Measures for High‐Stakes Systems
- Clean Source principle, Azure and Privileged Access Workstations
- How to Securely Connect to Azure VMs and Use RDP
- Basic PowerShell tricks and notes
- Basic PowerShell tricks and notes Part 2
- Basic PowerShell tricks and notes Part 3
- Basic PowerShell tricks and notes Part 4
- Basic PowerShell tricks and notes Part 5
- How To Access All Stream Outputs From Thread Jobs In PowerShell In Real Time
- PowerShell Best Practices To Follow When Coding
- How To Asynchronously Access All Stream Outputs From Background Jobs In PowerShell
- Powershell Dynamic Parameters and How to Add Them to the Get‐Help Syntax
- RunSpaces In PowerShell
- How To Use Reflection And Prevent Using Internal & Private C# Methods in PowerShell