Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

WDACConfig v0.3.6 #218

Merged
merged 69 commits into from
Apr 16, 2024
Merged

WDACConfig v0.3.6 #218

merged 69 commits into from
Apr 16, 2024

Conversation

HotCakeX
Copy link
Owner

@HotCakeX HotCakeX commented Mar 21, 2024

What's New

Microsoft Defender for Endpoint - Advanced Hunting

You can now use the WDACConfig module to convert the Microsoft Defender for Endpoint (MDE) Advanced Hunting query results directly to Application Control policy (WDAC) policy in a matter of seconds with high precision and performance.

Demo Video

MDE AH Demo

The systematic approach to converting the query results to WDAC policy is as follows:

  • If a file is unsigned then a hash rule will be created for it.
  • If a file is signed then there are multiple possibilities:
    • If the file is signed and the MDE AH results contain the file's version as well as at least one of the following file attributes (Original Name, Internal Name, Description, Product Name), then a File Publisher rule will be created for it.
    • If the file is signed but the file attributes are not present in the results, Publisher level rule will be created for it.

These levels are selected based on their security. You can read more about the levels security comparison in this article.


Simple Yet Comprehensive

What WDACConfig requires for MDE Advanced Hunting

DeviceEvents
| where ActionType startswith "AppControlCodeIntegrity"
    or ActionType startswith "AppControlCIScriptBlocked"
    or ActionType startswith "AppControlCIScriptAudited"

As you can see, the WDACConfig module encapsulates all requisite logic, enabling the employment of heightened security levels for files, notably the FilePublisher. It assimilates comprehensive data, utilizing the maximum extent of available information to formulate the most precise and tailored rule for each individual file.


Comparison

Supported Features WDACConfig WDAC Wizard
Log types Code Integrity + AppLocker Code Integrity
Generated Rules File Publisher, Publisher, Leaf Certificate, Hash Publisher, Hash
Requires Custom CSV Formatting No - Accepts RAW data Yes
Required Query Size Small Large

Important

WDAC Wizard is a great tool, it offers a GUI and can be downloaded from here


Other Changes


The following functions are for parsing, generating, optimizing and finalizing WDAC policy from Microsoft Defender for Endpoint - Advanced Hunting exported results
@HotCakeX HotCakeX added the Enhancement 💯 New feature or request label Mar 21, 2024
@HotCakeX HotCakeX self-assigned this Mar 21, 2024
@HotCakeX HotCakeX marked this pull request as ready for review March 21, 2024 23:46
@HotCakeX HotCakeX linked an issue Apr 4, 2024 that may be closed by this pull request
Fixed this issue regarding inaccessible files during WDAC Simulation. They are not handled properly and no longer stopping the execution flow.

#225
@HotCakeX HotCakeX merged commit 5e32834 into main Apr 16, 2024
2 checks passed
@HotCakeX HotCakeX deleted the WDACConfig-v0.3.6 branch April 16, 2024 19:06
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Enhancement 💯 New feature or request
Projects
None yet
Development

Successfully merging this pull request may close these issues.

[WDACConfig] WDACSimulation should handle inaccessible files properly
1 participant