An intentionally vulnerable AppLocker policy used to demonstrate several allowlisting misconfigurations.
- Open
Local Security Policyin a Windows VM - preferrably Server OS (Enterprise needed for workstation OS variants) - Import the
AppLockerPlayground.xmlinto the Application Control Policies section - Run
gpupdate /force - Run
net start appidsvcas an administrative user - Login as a user with standard privileges
The policy was built using AaronLocker, then lightly customised.
.\Create-Policies.ps1- Added
"C:\ProgramData\*"to.\CustomizationInputs\GetSafePathsToAllow.ps1 - Added the following to
.\CustomizationInputs\UnsafePathsToBuildRulesFor.ps1:
# Permit any signed files required by VMware
@{
label = "VMware Tools";
paths = "C:\Program Files\VMware";
pubruleGranularity = "pubOnly";
}
- Removed OneDrive path from
.\CustomizationInputs\UnsafePathsToBuildRulesFor.ps1 - Re-scanned with customised inputs
.\Create-Policies.ps1 -rescan - Imported the policy using Local Security Policy to a fresh VM
- Removed ~20 rules related to OneDrive
- Added a publisher rule permitting MSBuild
- Exported the policy to XML