Skip to content

Application Control (WDAC) Frequently Asked Questions (FAQs)

Violet Hansen edited this page Jun 16, 2024 · 4 revisions

Application Control (WDAC) Frequently Asked Questions (FAQs)

What's The Difference Between Application Control Policies And An Antivirus?

What's The Difference Between Application Control Policies And An Antivirus

Application Control policies are based on whitelisting strategy, meaning everything is blocked by default unless explicitly allowed. Antiviruses on the other hand are based on blacklisting strategy, meaning everything is allowed by default unless explicitly blocked.


Can I Use Microsoft Defender For Endpoint (MDE) To Collect WDAC Logs?

Can I Use Microsoft Defender For Endpoint (MDE) To Collect WDAC Logs

Yes. MDE Should definitely be used to manage your endpoints and collect Code Integrity logs used to create WDAC policies. They provide very detailed CI info at scale for your entire fleet of machines. Then Intune can be used for at scale deployment of the policies after creation.


Can Supplemental Policies Have Deny Rules?

Can Supplemental Policies Have Deny Rules

No, Supplemental policies are only used to expand a base policy by allowing more files.


How Can I Make My WDAC Policy Tamper Proof?

How Can I Make My WDAC Policy Tamper Proof

If you cryptographically sign and deploy your WDAC policy, it will be tamper-proof and even the system administrator won't be able to remove it without the certificate's private keys 🔑.


How Do Enterprises And Businesses Use Application Control (WDAC)?

How Do Enterprises And Businesses Use Application Control (WDAC)

Businesses and Enterprises have a variety of options. They can set Intune as Managed Installer so any application pushed by the administrator to the endpoints will be trusted and installed but the users won't be able to install new applications on their own.


How Many WDAC Policies Can Be Deployed On a System?

How Many WDAC Policies Can Be Deployed On a System

There is no limit on how many Application Control (WDAC) policies you can deploy on a system.


What Are The Tools I Need To Get Started With Application Control (WDAC) Policies?

What Are The Tools I Need To Get Started With Application Control (WDAC) Policies

WDACConfig PowerShell module and WDAC Wizard are all you need to begin your Application Control journey and create a robust security policy for your environment. They provide many advanced features that you can explore further when you're ready.


What Is ISG And How Can I Use It In An Application Control (WDAC) Policy?

What Is ISG And How Can I Use It In An Application Control (WDAC) Policy

ISG stands for The Intelligent Security Graph. It's a very powerful AI-based system that processes Trillions of signals from all kinds of data sources every day. You can utilize it as the arbiter in WDAC policies so it can help you allow trusted apps and block unknown or malicious apps automatically.


What Is Smart App Control?


What Is Smart App Control

Smart App Control is an automated AI-based Application Control mechanism that uses the same underlying components as WDAC (Windows Defender Application Control). It can be used in all Windows editions and provides great level of security by default for all systems it's enabled on.


What Is The Most Secure Level To Use For Authorizing Files?


What Is The Most Secure Level To Use For Authorizing Files

For signed files, you should always use WHQLFilePublisher as main level and FilePublisher as fallback. For unsigned files, use Hash level.










C#


Clone this wiki locally