DESKTOP

Windows Server 2003 : Implementing Software Restriction Policies (part 2) - Implementing Software Restriction Policies - Creating a Hash Rule

12/2/2013 2:39:36 AM

6. Implementing Software Restriction Policies

To implement software restriction policies, you must complete the following tasks:

1.
Set the default security level.

2.
Create rules.

3.
Designate file types.

Changing the default security level affects all files on the computers that have software restriction policies applied to them. In the details pane of a GPO console, the current default security level is indicated by a black circle with a check mark in it. Upon installation, the default security level of software restriction policies on all files on your system is set to Unrestricted.

To set the default security level of software restriction policies, complete the following steps:

1.
Access the Group Policy Object Editor console for a GPO.

2.
In the Group Policy Object Editor console, click Computer Configuration, double-click Windows Settings, double-click Security Settings, and then double-click Software Restriction Policies.

3.
In the details pane, double-click Security Levels.

Note

If you don’t see Security Levels and the details pane displays the message, “No Software Restriction Policies Defined,” you will need to define new software restriction policies. Right-click the Software Restriction Policies node, and select New Software Restriction Policies.

4.
Right-click one of the following:

  • Disallowed, which does not allow the software to run, regardless of the access rights of the user who is logged on to the computer

  • Unrestricted, which allows software to run with the full rights of the user who is logged on to the computer

5.
Click Properties.

6.
In the Disallowed or Unrestricted Properties dialog box (depending on your choice), click Set As Default.

6.1 Creating Rules

Rules identify and control the running of software and override the default security level. As mentioned previously, you can create four types of rules: hash rules, certificate rules, path rules, and Internet zone rules.

6.2 Creating a Hash Rule

Create a hash rule to prevent a virus, Trojan horse, or other file from running on your computer. If you want others in your organization to use a hash rule to prevent a virus from running, calculate the hash of the virus using software restriction policies and e-mail the hash value to others. Do not e-mail the virus. You can also prevent a virus from running on your computer by creating a path rule to prevent execution of e-mail attachments.

To create a hash rule, complete the following steps:

1.
Access the Group Policy Object Editor console for a GPO.

2.
In the Group Policy Object Editor console, click Computer Configuration, double-click Windows Settings, double-click Security Settings, and then double-click Software Restriction Policies.

3.
Right-click Additional Rules, and then click New Hash Rule.

4.
In the New Hash Rule dialog box, shown in Figure 1, browse to a file or paste a precalculated hash in the File Hash box.

Figure 1. The New Hash Rule dialog box


5.
In the Security Level list, select one of the following:

  • Disallowed, which does not allow the software to run, regardless of the access rights of the user who is logged on to the computer

  • Unrestricted, which allows software to run with the full rights of the user who is logged on to the computer

6.
Type a description for this rule in the Description box, and then click OK.

Other  
  •  Windows Server 2003 : Troubleshooting Software Deployed with Group Policy - Software Deployment Troubleshooting Scenarios
  •  Windows Server 2003 : Maintaining Software Deployed with Group Policy (part 2) - Removing Applications Deployed with Group Policy
  •  Windows Server 2003 : Maintaining Software Deployed with Group Policy (part 1) - Upgrading Applications Deployed with Group Policy
  •  Windows 7 : Using WDS for Multicast Deployments (part 2) - Creating a Multicast Deployment
  •  Windows 7 : Using WDS for Multicast Deployments (part 1) - How WDS Multicast Works
  •  Windows 7 : Tweaking Your WDS Server - Manage Domain Membership Using WDS
  •  Windows Server 2003 : Distributing Software with Group Policy (part 3) - Deploying Software with Group Policy
  •  Windows Server 2003 : Distributing Software with Group Policy (part 2) - Setting Windows Installer Package Properties
  •  Windows Server 2003 : Distributing Software with Group Policy (part 1) - Specifying Software Deployment Properties for the GPO
  •  Windows 7 : Tweaking Your WDS Server - Using WDS to Name Machines
  •  
    Top 10
    Extending LINQ to Objects : Writing a Single Element Operator (part 2) - Building the RandomElement Operator
    Extending LINQ to Objects : Writing a Single Element Operator (part 1) - Building Our Own Last Operator
    3 Tips for Maintaining Your Cell Phone Battery (part 2) - Discharge Smart, Use Smart
    3 Tips for Maintaining Your Cell Phone Battery (part 1) - Charge Smart
    OPEL MERIVA : Making a grand entrance
    FORD MONDEO 2.0 ECOBOOST : Modern Mondeo
    BMW 650i COUPE : Sexy retooling of BMW's 6-series
    BMW 120d; M135i - Finely tuned
    PHP Tutorials : Storing Images in MySQL with PHP (part 2) - Creating the HTML, Inserting the Image into MySQL
    PHP Tutorials : Storing Images in MySQL with PHP (part 1) - Why store binary files in MySQL using PHP?
    REVIEW
    - First look: Apple Watch

    - 3 Tips for Maintaining Your Cell Phone Battery (part 1)

    - 3 Tips for Maintaining Your Cell Phone Battery (part 2)
    VIDEO TUTORIAL
    - How to create your first Swimlane Diagram or Cross-Functional Flowchart Diagram by using Microsoft Visio 2010 (Part 1)

    - How to create your first Swimlane Diagram or Cross-Functional Flowchart Diagram by using Microsoft Visio 2010 (Part 2)

    - How to create your first Swimlane Diagram or Cross-Functional Flowchart Diagram by using Microsoft Visio 2010 (Part 3)
    Popular Tags
    Microsoft Access Microsoft Excel Microsoft OneNote Microsoft PowerPoint Microsoft Project Microsoft Visio Microsoft Word Active Directory Biztalk Exchange Server Microsoft LynC Server Microsoft Dynamic Sharepoint Sql Server Windows Server 2008 Windows Server 2012 Windows 7 Windows 8 Adobe Indesign Adobe Flash Professional Dreamweaver Adobe Illustrator Adobe After Effects Adobe Photoshop Adobe Fireworks Adobe Flash Catalyst Corel Painter X CorelDRAW X5 CorelDraw 10 QuarkXPress 8 windows Phone 7 windows Phone 8 BlackBerry Android Ipad Iphone iOS