[wpkg-users] Applying software restriction policies via WPKG...
Peter Gough
pmgough at gmail.com
Wed Jan 7 11:42:18 CET 2015
I've implemented something pretty similar to this. So far I've only found a
couple of legitimate applications that have fallen foul of the restrictions
and I've been able to put in workrounds to mitigate the issues. I've been
doing this for domain joined workstations using group policy although the
basic principles should be the same regardless of how they're put in place.
On Wed Jan 07 2015 at 5:06:36 PM <heiko.helmle at horiba.com> wrote:
>
> >
> > Trying to at least limiting the ransomware flow, i've hitted:
> >
> >
> http://blog.windowsnt.lv/2011/06/01/preventing-malware-with-srp-english/
> >
>
> I've looked at that, but shyed away - there are quite a few legitimate
> installers that first extract to %TEMP% and then run from there. Some even
> run helper programs that fail silently if prevented, resulting in a borked
> install.
>
> What are your experiences with these settings?
> -------------------------------------------------------------------------
> SSLrack - get your cheap cheap SSL certificates (standard, wildcard, EV)
> http://www.sslrack.com/
> -------------------------------------------------------------------------
> wpkg-users mailing list archives >> http://lists.wpkg.org/
> pipermail/wpkg-users/
> _______________________________________________
> wpkg-users mailing list
> wpkg-users at lists.wpkg.org
> https://lists.wpkg.org/mailman/listinfo/wpkg-users
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.wpkg.org/pipermail/wpkg-users/attachments/20150107/c7546267/attachment-0003.html>
More information about the wpkg-users
mailing list