HotCakeX / Harden-Windows-Security

Harden Windows Safely, Securely using Official Supported Microsoft methods and proper explanation | Always up-to-date and works with the latest build of Windows | Provides tools and Guides for Personal, Enterprise, Government and Military security levels | Read The Rationale https://github.com/HotCakeX/Harden-Windows-Security/blob/main/Rationale.md
https://hotcakex.github.io
MIT License
1.37k stars 107 forks source link

WDACConfig v0.3.9 #250

Closed HotCakeX closed 1 month ago

HotCakeX commented 2 months ago

What's New

This is by far the biggest update to the WDACConfig module. It brings a lot of new features, improvements, and changes to the cmdlets. The main focus of this update is to make the workflow of the cmdlets more user-friendly, faster, and more efficient. There are some inevitable breaking changes along with new features and improvements that are all listed below.


Introducing Sandboxing-like Capability For The Installed Programs

The vast majority of programs incorporate Dynamic Link Libraries (DLLs) and additional dependencies such as .com, .rll, .ocx, .msp, .mst, .bin, .hxs, .mui, .lex, .mof etc., which are replicated into their designated installation directory throughout the setup phase. These critical files may harbor security flaws susceptible to exploitation by malware. To counteract this, the innovative feature establishes a sandbox-like perimeter encircling the application's dependencies. This ensures that solely the application's own executables have the privilege to interact with the DLLs and dependency files, effectively barring all other executables from accessing them.

This feature is available in the Edit-WDACConfig and Edit-SignedWDACConfig cmdlets. It can be activated using the -BoostedSecurity parameter.

This feature might be added to other cmdlets as well after further evaluations.


New Video Guides

Video Link Description
Sandboxing-like capabilities in the WDAC Policies Sandboxing-like capabilities in the WDAC Policies
Create, Deploy & Audit WDAC Policies Create, Deploy & Audit WDAC Policies
How To Set And Query Secure Settings in WDAC Policies How To Set And Query Secure Settings in WDAC Policies
How To Create And Deploy Signed WDAC Policies How To Create And Deploy Signed WDAC Policies


Cmdlet Changes

Edit-WDACConfig and Edit-SignedWDACConfig


Set-CiRuleOptions


New-WDACConfig

Complete Overhaul

All of this cmdlets's parameters have been replaced with more user-friendly and efficient ones. No functionality has been lost. The goal is to offer the end-user the ability to quickly and easily choose the desired settings with 0 ambiguity. As a result, the following changes have been made:


Get-CIPolicySetting

Gets the secure settings value from the deployed CI policies using the Windows APIs. Refer to the following documents for more info:


Confirm-WDACConfig


Assert-WDACConfigIntegrity


Other Changes