DESKTOP

Windows Server 2003 : Implementing Software Restriction Policies (part 4) - Implementing Software Restriction Policies - Creating a Path Rule, Designating File Types

12/2/2013 2:42:38 AM
6.5 Creating a Path Rule

Create a path rule to prevent users from executing applications in a path you specify. If you create a path rule for an application and intend to prevent the program from running by setting the security level to Disallowed, note that a user can still run the software by copying it to another location. Environment variables, such as %Programfiles% or %Systemroot%, can be used in your path rule. You can also create a registry path rule for files that are not always installed in specific file folders. The wildcard characters * and ? are supported in path rules. To prevent users from executing e-mail attachments, create a path rule for your e-mail program’s attachment directory that prevents users from running e-mail attachments.

To create a path rule, complete the following steps:

1.
Access the Group Policy Object Editor console for a GPO.

2.
In the Group Policy Object Editor console, click Computer Configuration, double-click Windows Settings, double-click Security Settings, and then double-click Software Restriction Policies.

3.
Right-click Additional Rules, and then click New Path Rule.

4.
In the New Path Rule dialog box, shown in Figure 4, type a path in the Path box or browse to a file or folder.

Figure 4. The New Path Rule dialog box


5.
In the Security Level list, select one of the following:

  • Disallowed, which does not allow the software to run, regardless of the access rights of the user who is logged on to the computer

  • Unrestricted, which allows software to run with the full rights of the user who is logged on to the computer

6.
Type a description for this rule, and then click OK.

Important

For certain folders, such as the Windows folder, setting the security level to Disallowed can adversely affect the operation of your operating system. Make sure that you do not disallow a crucial component of the operating system or one of its dependent programs.


To create a registry path rule, complete the following steps:

Note

You must be an administrator to create a registry path rule.


1.
Click Start, point to Run, type regedit, and then click OK.

2.
Right-click the registry key for which you want to create a rule, and click Copy Key Name. Make a note of the Value name located in the details pane.

3.
Access the Group Policy Object Editor console for a GPO.

4.
In the Group Policy Object Editor console, click Computer Configuration, double-click Windows Settings, double-click Security Settings, and then double-click Software Restriction Policies.

5.
Right-click Additional rules, and then click New Path Rule.

6.
In the New Path Rule dialog box, paste the registry path in the Path box. The registry path should be formatted as follows: %[Registry Hivel]\[Registry Key Name]\Value Name]%. Notice that the registry path is enclosed in percent (%) signs. The registry path rule can contain a suffix after the closing percent sign, for example, %HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders\Cache%OLK* is valid. This registry path rule identifies the folder that Microsoft Outlook XP uses to store attachments before launching them.

Note

The registry hive must not be abbreviated. For example, HKCU cannot be substituted for HKEY_CURRENT_USER.

7.
In the Security Level list, select one of the following:

  • Disallowed, which does not allow the software to run, regardless of the access rights of the user who is logged on to the computer

  • Unrestricted, which allows software to run with the full rights of the user who is logged on to the computer

8.
Type a description for this rule, and then click OK.

6.6 Designating File Types

File types that are affected by hash, certificate, path, and Internet zone rules must be listed in the Designated File Types setting in the Software Restriction Policies extension. The list of file types in the Designated File Types setting is shared by all rules. However, you can specify different designated files lists for computer policies and for user policies.

To designate or delete a file type, complete the following steps:

1.
Access the Group Policy Object Editor console for a GPO.

2.
In the Group Policy Object Editor console, click Computer Configuration, double-click Windows Settings, double-click Security Settings, and then double-click Software Restriction Policies.

3.
In the details pane, double-click the Designated File Types setting.

4.
In the Designated File Types Properties dialog box, shown in Figure 5, do one of the following:

  • To add a file type, type the filename extension in the File Extension box and click Add. Click OK.

  • To delete a file type, select the file type in the Designated File Types list and click Remove. Click OK.

Figure 5. The Designated File Types Properties dialog box

Other  
  •  Windows Server 2003 : Troubleshooting Software Deployed with Group Policy - Software Deployment Troubleshooting Scenarios
  •  Windows Server 2003 : Maintaining Software Deployed with Group Policy (part 2) - Removing Applications Deployed with Group Policy
  •  Windows Server 2003 : Maintaining Software Deployed with Group Policy (part 1) - Upgrading Applications Deployed with Group Policy
  •  Windows 7 : Using WDS for Multicast Deployments (part 2) - Creating a Multicast Deployment
  •  Windows 7 : Using WDS for Multicast Deployments (part 1) - How WDS Multicast Works
  •  Windows 7 : Tweaking Your WDS Server - Manage Domain Membership Using WDS
  •  Windows Server 2003 : Distributing Software with Group Policy (part 3) - Deploying Software with Group Policy
  •  Windows Server 2003 : Distributing Software with Group Policy (part 2) - Setting Windows Installer Package Properties
  •  Windows Server 2003 : Distributing Software with Group Policy (part 1) - Specifying Software Deployment Properties for the GPO
  •  Windows 7 : Tweaking Your WDS Server - Using WDS to Name Machines
  •  
    Most View
    Lenovo ThinkPad Twist - The Old Form Factor Starting A New Life With Windows 8 (Part 1)
    Windows 8 : Managing User Access and Security - Managing Remote Access to Workstations (part 2)
    ASRock Z77 Extreme11 Mainboard - An LGA 1155 Mainboard For Users That Use Multiple Drives (Part 5)
    The Review Of Three Seasonic Power Supply Suits (Part 4)
    Windows Phone 7 : Drawing with Vertices and Matrices - Tinting Objects
    Asus PadFone 2 - The Attraction Of The Phone-In-Tablet Combination (Part 6)
    Two Is Better Than One - WD My Cloud Mirror
    Disgo 9104 - An Android Tablet That Runs On Ice Cream Sandwich
    Sharepoint 2010 : Putting Your Site on the Web - Web Content Management (part 1)
    MSI GT70 Dragon Edition Gaming Laptop Review (Part 2)
    REVIEW
    - First look: Apple Watch

    - 3 Tips for Maintaining Your Cell Phone Battery (part 1)

    - 3 Tips for Maintaining Your Cell Phone Battery (part 2)
    VIDEO TUTORIAL
    - How to create your first Swimlane Diagram or Cross-Functional Flowchart Diagram by using Microsoft Visio 2010 (Part 1)

    - How to create your first Swimlane Diagram or Cross-Functional Flowchart Diagram by using Microsoft Visio 2010 (Part 2)

    - How to create your first Swimlane Diagram or Cross-Functional Flowchart Diagram by using Microsoft Visio 2010 (Part 3)
    Popular Tags
    Microsoft Access Microsoft Excel Microsoft OneNote Microsoft PowerPoint Microsoft Project Microsoft Visio Microsoft Word Active Directory Biztalk Exchange Server Microsoft LynC Server Microsoft Dynamic Sharepoint Sql Server Windows Server 2008 Windows Server 2012 Windows 7 Windows 8 Adobe Indesign Adobe Flash Professional Dreamweaver Adobe Illustrator Adobe After Effects Adobe Photoshop Adobe Fireworks Adobe Flash Catalyst Corel Painter X CorelDRAW X5 CorelDraw 10 QuarkXPress 8 windows Phone 7 windows Phone 8 BlackBerry Android Ipad Iphone iOS
    Top 10
    3 Tips for Maintaining Your Cell Phone Battery (part 2) - Discharge Smart, Use Smart
    3 Tips for Maintaining Your Cell Phone Battery (part 1) - Charge Smart
    OPEL MERIVA : Making a grand entrance
    FORD MONDEO 2.0 ECOBOOST : Modern Mondeo
    BMW 650i COUPE : Sexy retooling of BMW's 6-series
    BMW 120d; M135i - Finely tuned
    PHP Tutorials : Storing Images in MySQL with PHP (part 2) - Creating the HTML, Inserting the Image into MySQL
    PHP Tutorials : Storing Images in MySQL with PHP (part 1) - Why store binary files in MySQL using PHP?
    Java Tutorials : Nested For Loop (part 2) - Program to create a Two-Dimensional Array
    Java Tutorials : Nested For Loop (part 1)