Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

WDACConfig v0.4.0 #269

Merged
merged 28 commits into from
Jun 7, 2024
Merged

WDACConfig v0.4.0 #269

merged 28 commits into from
Jun 7, 2024

Conversation

HotCakeX
Copy link
Owner

@HotCakeX HotCakeX commented Jun 5, 2024

What's New

  • Added new parameter to ConvertTo-WDACPolicy called -SuppPolicyName which allows the user to define a custom name for the supplemental policy. If not defined, the module will continue to automatically generate a name based on the source type and date + time.

  • In Edit-WDACConfig and Edit-SignedWDACConfig cmdlets for the -AllowNewApps parameter, the directory paths that the user selects are de-duplicated now so if you accidentally select the same directory multiple times using the GUI, the module only performs a single scan, saving time and reducing redundancy.

  • Again in Edit-WDACConfig and Edit-SignedWDACConfig cmdlets for the -AllowNewApps parameter, a new parallel task has been added to check for files signed with ECC algorithms, the module will create hash level rules for those files. This is because WDAC only supports files signed with RSA algorithm and even though ECC signed files have Signature based rules created for them in the XML policy, they are still not authorized to run and generate VerificationError 23 in the Code Integrity Operational event logs.

    • Since this new check runs in the background simultaneously, it doesn't prolong the execution flow.
  • Fixed AppLocker logs property alignments. Also the ConvertTo-WDACPolicy cmdlet now shows the source of the log in extreme visibility mode, so you can know whether a file was logged in AppLocker logs or Code Integrity operational logs.

  • Improved the accuracy of the boosted security modes, also known as dependency sandboxing. They are now processed faster and also created for files that were run during installing or audit phase but are no longer on the disk.

  • Improved the speed of Code Integrity and AppLocker logs parsing yet again.

@HotCakeX HotCakeX added the Enhancement 💯 New feature or request label Jun 5, 2024
@HotCakeX HotCakeX self-assigned this Jun 5, 2024
@HotCakeX HotCakeX merged commit c657ca1 into main Jun 7, 2024
2 checks passed
@HotCakeX HotCakeX deleted the WDACConfig-v0.4.0 branch June 7, 2024 21:33
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Enhancement 💯 New feature or request
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

1 participant