Application Whitelisting Procedure
Purpose
This document outlines the procedures to whitelist applications on enrolled devices. The CAAS model employs a zero-trust model with AppLocker policies, meaning all applications are restricted on workstations unless explicitly granted by application name and/or publisher signature.
Authorized Roles
Reminder: Always review the roles of OSC users to ensure they align with the Authorized Roles. No action should be taken without a request from or approval by a user assigned the appropriate authorized role.
- Authorized Managers
- Intune Administrator
Request Form Requirements
Requests can be made directly to support@nimbus-logic.us and should include all of the following information. This request must come from a member of the OSC’s Authorized Managers group.
App Information:
- Application Name
- Full Publisher Signature
-
File Hash (If Publisher Signature not available)
This information can be gathered by taking the following steps:
Required information for application whitelisting- Run powershell with administrative privileges
-
Run the following command on each EXE / DLL / file that needs to be added to the AppLocker whitelist by PUBLISHER:
Get-AppLockerFileInformation -Path "C:\path\to\file\file.exe" | export-csv "C:\whitelist_info.csv" -Append -NoTypeInformation
Alternatively, this command can be run on all files in a directory by using:
Get-AppLockerFileInformation -Directory C:\Windows\system32\ -Recurse -FileType exe, script, dll | export-csv "c:\whitelist_info.csv" -Append -NoTypeInformation
If you are whitelisting by FILE HASH, source length is needed which is not included in the original output. To get the file hash info you need to run:
$appLockerFile = Get-AppLockerFileInformation -Directory "<path to file needing whitelisting> " | where Path -match "<filename>"
$appLockerFile.hash
Provide the output of the $appLockerFile variable.
- Every file/folder that this command is run on will be appended to c:\whitelist_info.csv. Once the Get-AppLockerFileInformation command has been run on all files, please send an email with the CSV file attached to it to: support@nimbus-logic.us with the subject “AppLocker info for yourdomain.com.”
Procedure
Nimbus Logic admin to perform the following:
- Format the AppLocker rule in the required XML format.
- Append the AppLocker rule to the end of the EXE/DLL/Script Policy.
- Apply the Applocker Policy to Intune & Deploy.