From c193854a2410fc61765ba57be05049f7bfbcfb0a Mon Sep 17 00:00:00 2001 From: Violet Hansen Date: Sun, 16 Jun 2024 20:24:46 +0300 Subject: [PATCH] More info for the WDAC FAQ --- ...ol WDAC Frequently Asked Questions FAQs.md | 28 ++++++++++++++++--- 1 file changed, 24 insertions(+), 4 deletions(-) diff --git a/Wiki posts/Windows Defender Application Control (WDAC)/Application Control WDAC Frequently Asked Questions FAQs.md b/Wiki posts/Windows Defender Application Control (WDAC)/Application Control WDAC Frequently Asked Questions FAQs.md index 57652c77c..dcfeec82d 100644 --- a/Wiki posts/Windows Defender Application Control (WDAC)/Application Control WDAC Frequently Asked Questions FAQs.md +++ b/Wiki posts/Windows Defender Application Control (WDAC)/Application Control WDAC Frequently Asked Questions FAQs.md @@ -10,6 +10,16 @@ Application Control policies are based on whitelisting strategy, meaning everyth
+## How Does WDAC In The OS Compare To 3rd Party Solutions? + +How Does WDAC In The OS Compare To 3rd Party Solutions + +
+ +WDAC which is built deep inside of the OS kernel doesn’t need any “agents” to be installed, that means it can’t be killed using techniques used against 3rd party solutions, it also doesn’t increase the attack surface of the system. It’s native and exceedingly fast which makes it transparent to the user. + +
+ ## Can I Use Microsoft Defender For Endpoint (MDE) To Collect WDAC Logs? Can I Use Microsoft Defender For Endpoint (MDE) To Collect WDAC Logs @@ -82,20 +92,30 @@ ISG stands for [The Intelligent Security Graph](https://learn.microsoft.com/en-u ## What Is Smart App Control? -
- What Is Smart App Control +
+ Smart App Control is an automated AI-based Application Control mechanism that uses the same underlying components as WDAC (Windows Defender Application Control). It can be used in all Windows editions and provides great level of security by default for all systems it's enabled on.
## What Is The Most Secure Level To Use For Authorizing Files? -
- What Is The Most Secure Level To Use For Authorizing Files +
+ For signed files, you should always use `WHQLFilePublisher` as [main level](https://github.com/HotCakeX/Harden-Windows-Security/wiki/WDAC-Rule-Levels-Comparison-and-Guide) and `FilePublisher` as fallback. For unsigned files, use `Hash` level.
+ +## Is There A More Automated Way To Use Application Control At Scale? + +Is There A More Automated Way To Use Application Control At Scale + +
+ +Yes. [Microsoft Defender for Cloud's](https://learn.microsoft.com/en-us/azure/defender-for-cloud/enable-adaptive-application-controls) adaptive application controls enhance your security with this data-driven, intelligent automated solution that defines allowlists of known-safe applications for your machines. It uses Machine Learning models and is based on the collected telemetry data. + +