- Some applications, especially ones that are geographically based, are not digitally signed (yet) by their manufacturers and they are executed from %APPDATA% (C:\Users\*\AppData\Local\ or C:\Users\*\AppData\LocalLow\). While creating a simple wildcard passive Path Rule allows them to execute, it also can allow ransomware like TeslaCrypt to execute as well. The best recommendation is to identify each of the applications that need to execute from these locations and create Hash Rules. Hopefully, your environment only has a couple of applications that fall into this category, and we strongly recommend contacting each of these vendors and request they begin digitally signing their applications. Then, a simple Publisher can properly solve the execution issue with whatever privileges are needed.
- To ensure everything is working correctly, the Deny Rule should always be the last in the rule list. All passive and privilege rules should process first and then anything that has not matched will be denied.
- If there is a desire to block / deny applications before the last Deny Rule, consider applying rules to specific applications, paths, and temporary directories (i.e. c:\ or C:\windows\temp\).
- To ensure the best user experience, keep the rule base small, around 50 rules maximum. This will keep the performance optimized with minimal or no impact to the end user.
- All acceptable applications should have passive rules by Publisher (preferred and best practice) or a global path and subdirectory. Remember to include child applications when necessary. For example, “C:\Program Files\Custom Applications\*” as a passive rule with all children.
- If multiple applications that are unsigned and in various directories are installed, rules will be needed for each. Standardizing on a trusted directory structure would help minimize the number of rules and places malware can be deposited and executed on the system.
Morey J. Haber, Chief Security Officer, BeyondTrust
Morey J. Haber is the Chief Security Officer at BeyondTrust. He has more than 25 years of IT industry experience and has authored four books: Privileged Attack Vectors, Asset Attack Vectors, Identity Attack Vectors, and Cloud Attack Vectors. He is a founding member of the industry group Transparency in Cyber, and in 2020 was elected to the Identity Defined Security Alliance (IDSA) Executive Advisory Board. Morey currently oversees BeyondTrust security and governance for corporate and cloud based solutions and regularly consults for global periodicals and media. He originally joined BeyondTrust in 2012 as a part of the eEye Digital Security acquisition where he served as a Product Owner and Solutions Engineer since 2004. Prior to eEye, he was Beta Development Manager for Computer Associates, Inc. He began his career as Reliability and Maintainability Engineer for a government contractor building flight and training simulators. He earned a Bachelor of Science degree in Electrical Engineering from the State University of New York at Stony Brook.