PowerShell virus control (no file blackmail)

1. Create AppLocker Rule

  1. Select Computer Configuration -> Windows Configuration -> Security Settings -> Application Control Strategy -> AppLocker
    PowerShell virus control (no file blackmail)

  2. Right-click the account "executable rule", choose "create a new rule."
    PowerShell virus control (no file blackmail)
  3. After you click "Create new rule" to open the following window, click "Next":
    PowerShell virus control (no file blackmail)
  4. Operation selection Select "reject", and select the appropriate user or user group for this rule, where the EveryOne configuration, and click into the next step.
    PowerShell virus control (no file blackmail)
  5. Here select the "path", and then click Next:
    PowerShell virus control (no file blackmail)
  6. Select the PowerShell program path (default address: c: \ Windows \ System32 \ WindowsPowerShell \ v1.0 \), then the next step:
    PowerShell virus control (no file blackmail)
  7. Specify a name for the new rule, and then click "Create":
    PowerShell virus control (no file blackmail)
  8. The following prompt box appears select "Yes":
    PowerShell virus control (no file blackmail)
  9. Right-click and select Properties AppLocker, and then under "executable rule", select "mandatory rules" check "has been configured."
    PowerShell virus control (no file blackmail)
    Note:
    1, to ensure that Application Identify service started and set to boot from the start. If the service does not start the normal Applocker Rule can not run correctly.
    PowerShell virus control (no file blackmail)
    2, add a good strategy, execution Gpupdate Group Policy can be updated.

Guess you like

Origin blog.51cto.com/9421172/2449340