148: WDAC / App Control
Overview
Windows Defender Application Control (WDAC) and Windows App Control are powerful tools for managing and securing applications on Windows devices. Here's a detailed overview:
Benefits
- Enhanced Security: WDAC helps prevent unauthorized applications from running, reducing the risk of malware and other security threats.
- Compliance: Helps meet regulatory and organizational security requirements by enforcing strict application control policies.
- Centralized Management: Intune allows you to manage WDAC policies from a single console, simplifying administration.
- Flexibility: Supports multiple policy formats and configurations, allowing you to tailor policies to your organization's needs.
Drawbacks
- Initial Setup Complexity: Configuring WDAC policies can be complex and time-consuming, especially for large organizations.
- Potential for Application Blockage: Legitimate applications might be blocked if not properly whitelisted, requiring careful planning and testing.
- Maintenance: Ongoing maintenance is required to update policies and ensure they remain effective.
Impact on End Users
- Improved Security: Users benefit from enhanced security without needing to take additional actions.
- Potential Disruption: Users might experience disruption if legitimate applications are blocked, requiring support intervention.
- User Training: Some users might need training to understand the new application control policies.
Steps to Deploy WDAC
- Plan Your Deployment: Identify the devices you'll manage with WDAC and split them into deployment rings to control the speed and scale of the deployment.
- Create a Policy: In Intune, create a new WDAC policy. Navigate to Device configuration > Profiles > Create profile. Choose Windows 10 and later as the platform, and select Endpoint Protection from the profile type drop-down.
- Configure Settings: Define the applications and scripts that are allowed to run. You can use built-in policies or create custom policies using OMA-URI settings.
- Convert Policy to Binary: Convert your WDAC policy XML to binary using PowerShell, as WDAC policies must be in binary format for deployment.
- Deploy the Policy: Assign the policy to the appropriate groups of devices or users. Ensure to test the policy in audit mode before enforcing it to monitor and adjust as needed².
- Monitor and Adjust: Continuously monitor the deployment and make adjustments based on feedback and observed behavior.
Tying to Zero Trust
Zero Trust is a security model that assumes no implicit trust and continuously verifies every request. Deploying WDAC through Intune aligns with Zero Trust principles by:
- Ensuring Secure Access: WDAC enforces strict application control, ensuring only trusted applications can run.
- Continuous Verification: Regularly updated policies help maintain secure access, aligning with the continuous verification aspect of Zero Trust.
- Reducing Attack Surface: By controlling which applications can run, WDAC reduces the potential attack surface.
Reference
- Deploy WDAC policies using Mobile Device Management (MDM) - Windows .... https://learn.microsoft.com/en-us/windows/security/application-security/application-control/windows-defender-application-control/deployment/deploy-wdac-policies-using-intune
- Deploying Windows Defender Application Control (WDAC) policies. https://learn.microsoft.com/en-us/windows/security/application-security/application-control/windows-defender-application-control/deployment/wdac-deployment-guide
- External Blog: Windows Defender Application Control with ConfigMgr & Intune - Adaptiva. https://adaptiva.com/blog/windows-defender-application-control-configmgr-intune