DP MMC Administration 5 1 95 0
DP MMC Administration 5 1 95 0
DP MMC Administration 5 1 95 0
Administration Guide
Software Version: 5.1.95.0 GA
Document Version: 1.0
Copyright in the whole and every part of this document belongs to Avecto Ltd (“the Owner”) and may not be used,
sold, transferred, copied or reproduced in whole or in part in any manner or form or in or on any media to any
person other than in accordance with the terms of the Owner’s Agreement or otherwise without the prior written
consent of the Owner.
Accessibility Notice
In the event that you are unable to read any of the pages or documents on this website, please contact us and we
will arrange to get an accessible version to you.
Actionable intelligence is provided by an enterprise class reporting solution with endpoint analysis, dashboards and
trend data for auditing and compliance.
The table below shows three typical user roles, but we recommend that you create roles that are tailored to your
environment.
Defendpoint can cater for all types of users, including the most demanding technical users such as system
administrators and developers.
You should also educate users on what they should expect from a least privilege experience, before transferring
them to standard user accounts. This ensures that they will report any problems they encounter during the process
of moving to least privilege.
Contact your solution provider or Avecto to gain access to templates to cater for more complex use case
scenarios.
1. Known Admin Applications – You already have a definitive list of applications that require admin rights to
run.
2. Unknown Admin Applications – You are not sure of the applications that require admin rights to run.
3. Flexible Elevation – The user will require flexibility and can’t be restricted to a list of applications.
Known Applications
For this category you should add the relevant applications to the Defendpoint application groups for the users,
which will automatically elevate these applications when they are launched. You can then remove admin rights
from these users. See Managing Applications detailed on page 39 for more information.
1. Set up Defendpoint workstyles to monitor privileged application behavior. The Defendpoint audit logs will
highlight all of the applications that require admin rights to run. See Privilege Monitoring detailed on
page 77 for more information.
2. Set up Defendpoint workstyles to give the user the “on-demand” elevation facility, and instruct the user to
use this facility for any applications that fail to run once you have taken the user’s admin rights away. The
Defendpoint audit logs will highlight all the applications that the user has launched with elevated rights. See
On-Demand Application Rules detailed on page 55 and Privilege Monitoring detailed on page 77 for
more information.
You can use the audit logs to determine the relevant set of applications that you want to give admin rights to for
these users. See Managing Applications detailed on page 39 for more information.
Flexible Elevation
For this category you should set up Defendpoint workstyles that give the user an “on-demand” elevation facility,
which allows the user to elevate any applications from a standard user account. All elevated applications can be
audited, to discourage users from making inappropriate use of this facility. See On-Demand Application Rules
detailed on page 55 for more information.
This guide assumes that you will be using Group Policy Management Console (GPMC), although
Defendpoint fully supports other methods of Group Policy deployment, such as the Local Group Policy
Editor. Ensure that you have the relevant Group Policy management tools installed on the desktop or server
where you will be installing the Defendpoint management console.
The Defendpoint installation is performed in two stages; first the Defendpoint Management Consoles, and then the
Defendpoint Client.
Defendpoint ePO Edition is a fully integrated edition of Defendpoint for use with McAfee ePO. It is
recommended that for evaluations with McAfee ePO, the Defendpoint ePO Edition is used, which is
available for download at Avecto.com.
In the following sections, all references to Defendpoint, by default also refer to Privilege Guard.
All Defendpoint MSI and EXE installers will automatically remove old versions of Avecto software when installed.
Therefore, it is not necessary to manually remove old versions prior to installation of new versions.
If you previously installed the Defendpoint client with a switch you must ensure that you upgrade the Defendpoint
client with the same switch. If you do not use the same switch the new installation parameters will apply and any
functionality relating to previous installation will be lost.
The Defendpoint Client guarantees backwards compatibility with previous versions of Defendpoint, but does not
guarantee forwards compatibility. Therefore it is recommended that all Defendpoint Clients are upgraded before
rolling out new versions of Defendpoint.
When upgrading Avecto software, it may be necessary for a reboot to occur in order to complete the
installation. When installing in silent mode, a reboot will occur automatically. Therefore it is recommended
that upgrades are performed out of core business hours, or during scheduled maintenance windows, to avoid
loss of productivity.
To upgrade the Defendpoint Client using a deployment mechanism, please see the steps in Installing the
Defendpoint Client detailed on page 104.
For larger deployments, Defendpoint Clients support mixed client environments as they are fully backwards
compatible with older versions of the Defendpoint settings. This allows for phased roll-outs of the
Defendpoint Client if this is preferred.
Once all Defendpoint Clients have been upgraded, the next step is to upgrade the Defendpoint Management
Console.
To upgrade the Defendpoint Management Console, please see the steps in Defendpoint Installation detailed on
page 10
Once the Defendpoint Management Console has been upgraded, the final step is to roll out new versions of the
Defendpoint Settings. Although Defendpoint Clients are fully backwards compatible with older versions of
Defendpoint Settings, this step is required if you wish to take advantage of any new features and enhancements in
Defendpoint.
Defendpoint Settings are automatically saved in the latest format each time a change is made. For details of
editing Defendpoint settings, please see to the steps in Group Policy Management detailed on page 86.
Once Defendpoint Settings have been upgraded, they cannot be downgraded. Therefore, it is recommended
that upgrading Defendpoint Settings is performed only after all Defendpoint Clients have been upgraded.
For silent installations and advanced installations (such as CERT_MODE and EPOMODE), the third party
deployment software must also support the use of command line options.
The executable version of the installation package includes all necessary prerequisites (excluding the Group
Policy Management Console), and will automatically install them as necessary.
The Defendpoint Client executable installer will automatically install Microsoft SQL Server Compact 3.5 SP
2. If you do want to use the Activity Viewer, and do not want for this prerequisite to be installed, it is
recommended that you install the Defendpoint Client MSI installation.
Where can I find the latest version of Defendpoint, or previous versions of Privilege
Guard?
All versions (including the latest version) of Avecto software can be downloaded from connect.avecto.com by
signing in and navigating to the Product Downloads section.
From your administrator account launch the Microsoft Management Console (MMC.exe). Type 'MMC' into the
Search Box from the Start Menu and press the Enter key.
1. Select File from the menu bar and select Add/Remove Snap-in.
2. Scroll down the list and select the Defendpoint Settings snap-in. Click Add and then click OK.
3. Optionally select File > Save as and save a shortcut for the snap-in to the desktop as Defendpoint.
3.2 - Licensing
The Defendpoint Client will not function unless it receives a valid license code, which needs to be added in the
Defendpoint Policy Editor.
If multiple Group Policy Objects (GPOs) are applicable for a computer or user then as long as a valid license code
appears in one of the GPOs then the Defendpoint Client will function. For instance, you may decide to add the
Defendpoint licenses to the computer configuration section of a GPO that is applied to the domain, which will
ensure that all computers in the domain will receive a valid license (for those computers that have the Defendpoint
Client installed).
If you are unsure then it is recommended that you always add a valid license when you are creating Defendpoint
settings for a GPO.
The folders beneath Defendpoint Settings in the tree pane are referred to as Nodes.
The middle pane, which displays content relevant to the selected node, is referred to as the Details pane.
If you expand Defendpoint Settings node you will see three nodes:
1. Windows – Create Defendpoint configuration for Windows endpoints.
2. OS X – Create Defendpoint configuration for Mac (OS X or macOS) endpoints.
3. Licensing – Manage Defendpoint licenses.
1. Workstyles – Assign privileges to applications.
2. Application Groups – Define logical groupings of applications.
3. Content Groups – Define specific file content.
4. Messages – Define end user messages.
5. Custom Tokens – Define custom access tokens.
Once a workstyle has been created and selected in the tree pane, the workstyle tabs will be displayed in the details
pane.
Automatic saving can be disabled, by deselecting the Auto Commit Settings menu option on the Defendpoint
Settings node, but this is not recommended unless you are having performance issues. If you deselect the Auto
Commit Settings option then you must select the Commit Settings menu option to manually save any changes
back to the GPO. The Auto Commit Settings option is persisted to your user profile, so it will be set for all future
editing of Defendpoint Settings.
4.1 - Users
Disconnected users are fully supported by Defendpoint. When receiving policies from McAfee ePO, Defendpoint
automatically caches all the information required to work offline, so the settings will still be applied if the client is
not connected to the corporate network. Of course, any changes made to the policy will not propagate to the
disconnected computer until the McAfee Agent re-establishes a connection to the ePO Server.
4.2 - Policies
Defendpoint policies are applied to one or more endpoints. The Policy Summary screen summaries for the
number of workstyles, application groups, target URL groups, target content groups, messages, tokens and
licenses in the policy. As this is a blank policy, all summaries will be ‘zero’.
Each item summary includes an Edit <Item> button, which allows you to jump to that section of the policy.
Defendpoint incorporates an autosave, autosave recovery and concurrent edit awareness feature to reduce the risk
or impact of data loss and prevent multiple users from overwriting individual polices.
A Defendpoint template is a configuration that is merged with your existing policy. A template also consists of
any number of Workstyles, Application Groups, Content Groups, Messages and Custom Tokens.
You can import templates using the Import Template functionality. This is available from the Welcome page or
the Action menu or the right-click context menu on the Defendpoint Settings node:
There are four templates that you can import into your existing policy:
l QuickStart detailed below
l Discovery detailed on page 22
l Server Roles detailed on page 23
l Trusted App Protection (TAP) detailed on page 24
4.4 - QuickStart
The QuickStart policy contains Workstyles, Application Groups, Messages and Custom Tokens configured with
Privilege Management and Application Control. The QuickStart policy has been designed from Avecto’s
experiences of implementing the solution across thousands of customers, and is intended to balance security with
Workstyles
l General Rules
l High Flexibility
l Medium Flexibility
l Low Flexibility
Application Groups
l Add Admin - General (Business Apps)
l Add Admin - General (Windows Functions)
l Add Admin - High Flexibility
l Add Admin - Medium Flexibility
l Allow - Approved Standard User Apps
l Allow - Whitelisted Functions & Apps
l Block - Blacklisted Apps
l Control - Restricted Functions
l Control - Restricted Functions (On-Demand)
Messages
l Allow Message (Authentication)
l Allow Message (Select Reason)
l Allow Message (Support Desk)
l Allow Message (Yes / No)
l Block Message
l Block Notification
l Notification (Trusted)
Custom Tokens
l Avecto Support Token
After the QuickStart policy has been deployed to groups within your organization, you can start to gather
information on your users' behavior. This will provide you with a better understanding of the applications being used
within your organization, and whether they require admin rights, need to be blocked, or need authorizing for specific
users.
This data can then be used to further refine the QuickStart policy to provide more a tailored Defendpoint solution for
your organization.
General Rules
This workstyle contains a set of default rules that apply to all standard users regardless of what level of flexibility
they need.
High Flexibility
This workstyle is designed for users that require a lot of flexibility such as developers.
Medium Flexibility
This workstyle is designed for users that require some flexibility such as sales engineers.
Low Flexibility
This workstyle is designed for users that don't require much flexibility such as helpdesk operators. The Low
Flexibility workstyle contains rules to:
l Prompt users to contact support if a trusted or untrusted application requests admin rights
l Prompt users to contact support if an unknown application tries to run
Application Groups
The application groups that are prefixed with "(Default)" or "(Recommended)" are hidden by default and do not need
to be altered.
Add Admin – General (Business Apps) – Contains applications that are approved for elevation for all users,
regardless of their flexibility level.
Add Admin – General (Windows Functions) – Contains operating system functions that are approved for
elevation for all users.
Add Admin – High Flexibility – Contains the applications that require admin rights that should only be provided
to the high flexibility users.
Add Admin – Medium Flexibility – Contains the applications that require admin rights that should only be
provided to the medium flexibility users.
Allow – Approved Standard User Apps – Contains applications that are approved for all users.
Block – Blacklisted Apps – This group contains applications that are blocked for all users.
(Default) Any Application – Contains all application types and is used as a catch-all for unknown applications.
(Default) Any Trusted UAC Prompt – Contains signed (trusted ownership) application types that request admin
rights.
(Default) Any UAC Prompt – This group contains applications types that request admin rights.
(Default) Avecto Tools – This group is used to provide access to an Avecto executable that collects Defendpoint
troubleshooting information.
(Default) Controlled OS Functions – Contains operating system applications and consoles that are used for
system administration.
(Default) Software Deployment Tool Installs – Contains applications that can be installed by deployment tools
such as SCCM (System Center Configuration Manager).
(Default) Whitelisted Functions & Apps – Contains trusted applications, tasks and scripts that should execute
as a standard user.
(Recommended) Restricted Functions - This group contains OS applications and consoles that are used for
system administration and trigger UAC when they are executed.
(Recommended) Restricted Functions (On Demand) - This group contains OS applications and consoles that
are used for system administration.
Allow Message (Authentication) – Asks the user to provide a reason and enter their password before the
application runs with admin rights.
Allow Message (Select Reason) – Asks the user to select a reason from a drop-down menu before the application
runs with admin rights.
Allow Message (Support Desk) – Presents the user with a challenge code and asks them to obtain authorization
from the support desk. Support can either provide a response code or a designated, authorized user can enter their
login details to approve the request.
Allow Message (Yes / No) – Asks the user to confirm that they want to proceed to run an application with admin
rights.
Block Message – Warns the user that an application has been blocked.
Block Notification – Notifies the user that an application has been blocked and submitted for analysis.
Notification (Trusted) – Notifies the user that an application has been trusted.
Custom Token
A custom token is created as part of the QuickStart policy. The custom token is called Avecto Support Token
and is only used to ensure that an authorized user can gain access to Defendpoint troubleshooting information.
We do not recommend using the Avecto Support Token for any other application rules in your workstyles.
4.5 - Discovery
The Discovery policy contains Workstyles, Application Groups and Messages to allow the discovery of
applications that need administrative privileges to execute. This must be applied to administrator users and
includes a pre-configured exclusion group (false positives) maintained by Avecto.
Workstyles
l Discovery Workstyle
Messages
Allow Message (Yes / No)
Workstyles
l Server Role - Active Directory - Template
l Server Role - DHCP - Template
l Server Role - DNS - Template
l Server Role - File Services - Template
l Server Role - Hyper V - Template
l Server Role - IIS - Template
l Server Role - Print Services - Template
l Server Role - Windows General - Template
Application Groups
l Server Role - Active Directory - Server 2008R2
l Server Role - DHCP - Server 2008R2
l Server Role - DNS - Server 2008R2
l Server Role - File Services - Server 2008R2
l Server Role - General Tasks - Server 2008R2
l Server Role - Hyper V - Server 2008R2
l Server Role - IIS - Server 2008R2
l Server Role - Print Services - Server 2008R2
Content Groups
l AD Management
l Hosts Management
l IIS Management
l Printer Management
l Public Desktop
The TAP policies apply greater protection to key business applications including Microsoft Office, Adobe Reader
and web browsers, which are often exploited by malicious content. It works by preventing these applications from
launching unknown payloads and potentially risky applications such as PowerShell. It also offers protection by
preventing untrusted DLLs being loaded by these applications, another common malware technique.
In our research we discovered that malware attack chains commonly seek to drop and launch an executable or
abuse a native Windows application such as PowerShell. Using a TAP policy prevents these attacks and
compliments existing anti-malware technologies by preventing an attack from launching without relying on
detection or reputation.
The Trusted Application Protection policy you have chosen is inserted at the top of the workstyles so it is, by
default, the first workstyle to be evaluated. Once a workstyle action has been triggered, subsequent workstyles
aren't evaluated for that process.
Workstyles
l Trusted Application Protection - High Flexibility (depends on the TAP policy you have chosen)
l Trusted Application Protection - High Security (depends on the TAP policy you have chosen)
Application Groups
l Browsers
l Browsers - Trusted Exploitables
l Browsers - Untrusted child processes
l Content Handlers
l Content Handlers - Trusted Exploitables
l Content Handlers - Untrusted child processes
Messages
l Block Message
Trusted Publisher
l A trusted publisher must be signed. In addition, the publisher certificate must be valid, in date and not
revoked.
Trusted Owner
l A trusted owner is any owner that is in the default Windows groups 'Administrators', 'SystemUser' or
'TrustedInstaller'.
SourceURL
l The source URL must be present. This is specific to browsers.
TAP Applications and their child processes must match all the criteria within the definitions provided in the
Application Groups of the policy for the TAP policy to apply.
You can configure TAP process control by importing the TAP template. TAP also has Enterprise Reporting, see
Trusted Application Protection Reporting detailed on page 28.
1Installers that spawn additional child processes are blocked by the TAP (High Security) policy if those child processes
are using applications that are on the TAP blacklist, see Trusted Application Protection Blacklist detailed on page 132,
but would be allowed to run using the TAP (High Flexibility) policy.
The Trusted Application Protection workstyle is the first to be evaluated by default. Once a workstyle action has
been triggered, subsequent workstyles aren't evaluated for that process.
The TAP (High Security) policy is, by design, more secure and less flexible as it blocks all child processes of a
Trusted Application that do not have a trusted owner, trusted publisher, source URL or Avecto Zone Identifier so it
is therefore more likely to require modification.
The TAP policy that you choose should be based on your business requirements and existing policy. If using a TAP
policy causes a legitimate use case to be blocked, there are some actions you can take to resolve this.
Changing the TAP policy to 'Allow Execution' effectively disables it. You will not get any protection from a
TAP policy if you make this change.
The event details include information on the Application Group and TAP application. This allows you to gather
details to understand if it's a legitimate use case. You can perform some actions to incorporate the legitimate use
case into the TAP (High Security) policy.
Both the TAP policies offer additional protection against a wide range of attack vectors. If you are using the TAP
(High Security) policy you can change to the TAP (High Flexibility) policy. This is useful if you have a use case
where additional child processes of TAP applications are being blocked by the TAP (High Security) policy.
If your legitimate use case is running a specific command that is detailed in the event you can add this to the
matching criteria of the Application that's being blocked. You can use the standard Defendpoint matching criteria
such as 'Exact Match' or 'Regular Expressions'.
Example
Webex uses an extension from Google Chrome. Avecto have catered for this in the policy using matching criteria.
If your legitimate use case is using an application that is listed on either the 'Browsers - Trusted Exploitables' or the
'Content Handlers - Trusted Exploitables' list, you can remove it.
If you remove it from either list, any browsers or content that use that trusted exploitable to run malicious content
won't be stopped by the TAP (High Security) policy.
You can remove the application that is listed in the Trusted Browsers or Trusted Content Handlers groups from the
list. This will mean that application no longer benefits from the protection offered by either of the TAP policies.
You can also add a Defendpoint Allow Rule and place it higher in the precedence order than the TAP (High
Security) policy. This will allow your use case to run but, it also overrides any subsequent rules that apply to that
application so it should be used with caution.
Workstyle type
The first choice to make is the type of workstyle you want to create. There are two types of workstyle that can be
created in Defendpoint:
l Controlling workstyle – allows you to apply rules for access to privileges and applications.
l Blank workstyle – allows you to create an empty workstyle without any predefined elements.
Filtering
The next choice only applies to a controlling workstyle. Choose which users the workstyle will be
applied to:
l Standard users only
l Everyone, including administrators
The default choice is Standard users only. Additional Account Filters can be added to the workstyle after it has
been created. For more information on filtering, see Filtering Workstyles detailed on page 34.
5. Click Next.
6. Select a filter for the new workstyle. The default choice is Standard users only. If you want to apply the
new workstyle to all users (including administrators), select Everyone, including Administrators.
7. Select one or both Defendpoint capabilities and click Next.
8. The workstyle wizard will display pages appropriate to the Defendpoint capabilities you selected in Step 7.
Complete the pages relevant to the workstyle type and any capabilities you have selected.
9. On the final page of the workstyle wizard provide a Name and a Description for the workstyle. If the
workstyle has been configured to use a Challenge - Response message you will be asked to enter a
shared key. See Challenge / Response Authorization detailed on page 68.
10. Select whether you would like to activate the workstyle now.
11. Click Finish to create the workstyle and exit the wizard.
Depending on the type of workstyle you created, Defendpoint will auto-generate certain groups and rules,
messages and filters. These auto-generated elements are appropriate to the options that are selected in the
workstyle wizard.
To disable a workstyle:
Unless a DLL has a trusted publisher and a trusted owner, it is not allowed to run within the TAP application.
Trusted Publisher
l A trusted publisher must be signed. In addition, the publisher certificate must be valid, in date and not
revoked.
Trusted Owner
l A trusted owner is any owner that is in the default Windows groups 'Administrators', 'SystemUser' or
'TrustedInstaller'.
You can also exclude folder locations and environment variables in the Configure Exclusions dialog.
3. Click OK on the Configure Exclusions dialog if you configured any otherwise click OK to finish setting up
DLL control for TAP applications in your workstyle.
By default, a workstyle will apply to all users/computers who receive it. However, you can add one or more filters
that will restrict the application of the workstyle:
l Account Filter – This filter restricts the workstyle to specific users or groups of users.
l Computer Filter – This filter will restrict the workstyle to specific computers (names or IP addresses), or
Remote Desktop clients.
l Time Filter – This filter will restrict the workstyle to being applied at particular days of the week and times of
the day.
l Expiry Filter – This filter will expire a workstyle at a set date and time.
l WMI Filter – This filter will restrict the workstyle based on the success or failure of a WMI query.
If you want the workstyle to apply only if all filters match, select the option ALL filters must match from the drop-
down menu. If you want the workstyle to apply when any filter matches, select the option ANY filter can match
from the drop-down menu.
Filters can also be configured to apply if there are no matches. This is referred to as an ‘exclude’ filter. To set an
exclude filter, right-click the filter and check the option Apply this filter if it does NOT match. (This does not
apply to Time and Expiry filters.)
Time filters and Expiry filters can only be used once in a workstyle.
When a new workstyle is created, a default account filter will be added to target either Standard users only,
or Everyone (including administrators), depending on your selection in the workstyle wizard.
By default, an account filter will apply if any of the user or group accounts in the list match the user. If you have
specified multiple user and group accounts within one account filter, and want to apply the workstyle only if all
entries in the account filter match, then check the option All items below should match.
You can add more than one account filter if you want the user to be a member of more than one group of accounts
for the workstyle to be applied.
If an account filter is added, but no user or group accounts are specified, a warning will be displayed advising No
accounts added, and the account filter will be ignored.
If All items below should match is enabled, and you have more than one user account listed, the
workstyle will never apply as the user cannot match two different user accounts.
You can also use the wildcard * in any octet to include all addresses in that octet range, for example
192.168.*.*. Alternatively, you can specify a particular range for any octet, for example 192.168.0.0-254.
Wildcards and ranges can be used in the same IP Address, but not in the same octet.
The time filter is applied based on the user’s timezone by default. Clear the Use timezone of user for time
restrictions (otherwise use UTC) check box to use UTC for the timezone.
The expiry time is applied based on the user’s timezone by default. Clear the Use timezone of user for workstyle
expiry (otherwise use UTC) check box to use UTC for the timezone.
Long running WMI queries will result in delayed application launches. Therefore it is recommended that a
timeout is specified to ensure that queries are terminated in a timely manner.
When a WMI query is executed, the client will check if any rows of data are returned. If any data is returned, then
the WMI query will be successful. If no data is returned or an error is detected in the execution, the WMI query will
be unsuccessful.
It is possible for many rows of data to be returned from a WMI query, in which case you can create more complex
WQL statements using WHERE clauses. The more clauses you add to your statement, the fewer rows are likely to
return, and the more specific your WMI query will be.
The WMI filter includes several default templates for common WMI queries. To add a new WMI query from a
template, click Add a WMI template and use the instant search box to quickly find a template.
WQL statements can include parameterized values which allow you to execute queries including select user,
computer and Defendpoint properties. To use parameters, see Workstyle Parameters detailed on page 123.
WMI queries are always run as SYSTEM, and cannot be executed against remote computers or network
resources. WMI filters do not support impersonation levels, and can only be used with SELECT queries.
If a WMI filter is added, but no WMI queries are specified, a warning will be displayed advising No queries added,
and the WMI filter will be ignored.
Application groups are assigned to workstyles, so you must define application groups for all of the applications you
want to assign to a workstyle.
You can set a description for an application group by accessing the application group properties:
For executable and control panel applets the description will automatically be extracted from the file (if it has a
description). You can change the description.
The Insert Application wizard provides various target application definitions. The Defendpoint Client must match
every definition you configure before it will trigger a match (the rules are combined with a logical AND). The
following definitions are available:
l AppID
l Application Requires Elevation (UAC)
l Drive
l File or Folder Name
l File Hash
l File Version
l Parent Process
l Product Code
l Product Description
l Product Name
l Product Version
l Publisher
l Service Action
l Service Name
l Service Display Name
l Source URL
l Trusted Ownership
l Upgrade Code
l ActiveX Codebase
l ActiveX Version
l CLSID
The publisher property of an MSx file may sometimes differ to the publisher property once installed in
Programs and Features. It is recommended that applications targeted using the Match Publisher validation
rule and tested prior to deployment using the Defendpoint Activity Viewer.
Installer packages typically create child processes as part of the overall installation process. Therefore it is
recommended that when elevating MSI, MSU or MSP packages, that the advanced option Allow child processes
will match this application definition is enabled.
When the Any Uninstaller application type is added to an application group and assigned to an application rule in
the Defendpoint policy, the end user can uninstall applications using Programs and Features or, in Windows 10,
Apps and Features.
The Uninstaller Application Type allows you to uninstall any EXE or MSI when it is associated with an Application
Rule. As the process of uninstalling a file requires admin rights you need to ensure that when you target the
Application Group in the Application Rules you set the Access Token to 'Add Admin Rights'.
The Uninstaller type must be associated with an Application Rule. It does not apply to On-Demand
Application Rules.
You cannot use the 'Uninstaller' Application Type to uninstall the Avecto Defendpoint Client or the Avecto iC3
Adapter using Defendpoint irrespective of your user rights. Defendpoint's anti-tamper mechanism prevents users
from uninstalling Defendpoint, and the uninstall will fail with an error message.
If you want to allow users to uninstall either the Avecto Defendpoint Client or the Avecto iC3 Adapter
you can do this by either:
l Logging in as a full administrator
l Elevating the Programs and Features control panel (or other controlling application) using a 'Custom'
Access Token that has anti-tamper disabled, see Anti-Tamper Protection detailed on page 74 for more
information.
Normally, when a user clicks on a COM task in Explorer it will trigger a UAC prompt that requires access to an
administrator account to proceed.
Defendpoint allows you to target specific COM CLSIDs and assign privileges to the task without granting full
admin rights to the user. COM based UAC prompts can also be targeted and replaced with custom messaging,
where COM classes can be whitelisted and/or audited.
COM classes are hosted by a COM server DLL or EXE, so COM classes can be validated from properties of the
hosting COM server. The following validation options can be used to validate the COM server:
Match if Application Requires Elevation (User Account Control) is always enabled, as COM classes require
UAC to elevate
To insert an application:
To insert a service:
1. Select the relevant application group.
2. Right-click the applications list in the details pane to access the context menu.
3. Select Insert Application and then select Windows Service from the sub-menu. The Insert Service
wizard appears.
4. Enter a Service Name for the Windows service, or use the Browse Service button to browse the services
present on the local computer. Click Next.
5. Enter a description for the Windows service (a description will automatically be added based on how the
service was added in the previous step).
6. Configure the definitions (detailed below) for the Windows service.
7. Click Finish.
If you want to exclude specific processes from matching this rule, then click ‘…match…’ to toggle the rule to
‘…does not match…’.
Child processes are evaluated in the context that the parent was executed. For example, if the parent was
executed through on-demand shell elevation, then the Defendpoint Client will first attempt to match on-
demand application rules for any children of the executed application.
l Force standard user rights on File Open/Save common dialogs – If the application allows a user to
open or save files using the common Windows open/save dialog box then selecting this option will ensure
that the user does not have admin privileges within these dialog boxes. These dialog boxes have Explorer
like features, and allow a user to rename, delete or overwrite files. If an application is running with elevated
rights then the open/save dialog boxes would allow a user to replace protected system files. By default,
Defendpoint will force these dialog boxes to run with the user’s standard rights, which will prevent the user
from tampering with protected system files.
l Event Source –Where the event has been collected (Local or remote Eventlog, Forwarded Eventlog, or
Enterprise reporting Pack database).
l Event Type – The type of event you are interested in. Choose either: Any application, or choose from one
of the following:
l Applications that performed privileged operations
l Applications that triggered UAC
l Applications that were blocked
l Applications that were launched via the Shell Menu
l Timeframe –The period of time to search for applications. Choose from one of the following:
l From – Pick a range starting from a predefined time period. From here you can also choose
Anytime, to include all events.
l Specific period – Pick an optional From and To date to include events collected during that period
of time.
Once the search criteria has been entered, the wizard will return a list of unique applications that were audited,
matching the criteria you specified. From here you can browse the list (which is grouped by Publisher), or to find a
particular application you can type into the Search publisher \ Description field to instantly filter the list based on the
text you enter.
Applications that are already members of the application group will be highlighted and displayed with a ü.
Once you have found an application or applications, select (or multi-select by holding down the Control or Shift
key while selecting) and then click OK to create new application definitions from your selection.
Once the definitions have been created, you can edit the definition and modify the matching criteria. All matching
criteria will be pre-populated with values collected from the application.
A unique application is based on the product description of the application. So if two or more audited
applications share the same product description, they will be displayed as a single application.
The Event Import wizard supports the import of events from exported EventLog files (.evtx). To import from
a file, choose Remote Computer and then enter the full path to the file in the computer name field.
The Event Import wizard supports importing events from a McAfee ePolicy Orchestrator database. To
import from McAfee ePO, enter the SQL Server details of a McAfee ePO database.
PowerShell scripts and commands can be whitelisted to block the use of unauthorized scripts, commands and
cmdlets. Granular auditing of all remote PowerShell activity provides an accurate audit trail of remote activity.
PowerShell definitions for scripts and commands are treated as separate application types, which allows you to
differentiate between pre-defined scripts authorized by IT, and session based ad hoc commands.
In order to allow standard users to connect to a remote computer via Windows Remote Management, or WinRM (a
privilege normally reserved for local administrator accounts), it is necessary to enable the General rule Enable
Windows Remote Management Connections. This rule grants standard users who match the Defendpoint
workstyle the ability to connect via WinRM, and can be targeted to specific users, groups of users, or computers
using workstyle filters.
Defendpoint allows you to target specific PowerShell scripts and assign privileges to the script without granting
local admin rights to the user. Scripts can also be blocked if they are not authorized or whitelisted. All remote
PowerShell scripts executed are fully audited for visibility.
When running a remote PowerShell script you must use the Invoke-Command cmdlet. Defendpoint will not
be able to target PowerShell scripts that are executed from within a remote PowerShell session. Remote
PowerShell scripts must be matched by either a SHA-1 File Hash, or a Publisher (if the script has been
digitally signed).
PowerShell scripts that contain only a single line will be interpreted and matched as a command, and will fail
to match a PowerShell script definition. It is therefore recommended that PowerShell scripts contain at least
two lines of commands to ensure they are correctly matched as a script. This cannot be achieved by adding
a comment to the script.
Defendpoint allows you to target specific command strings and assign privileges to the command without granting
local admin rights to the user. Commands can also be blocked if they are not authorized or whitelisted. All remote
PowerShell commands are fully audited for visibility.
PowerShell removes double quotes from command strings prior to them being transmitted to the target.
Therefore it is not recommended that Command Line definitions include double quotes, as they will fail to
match the command.
The Application Rules tab can be used to enforce rules for whitelisting, monitoring and assigning privileges to
groups of applications.
Rule
l Application Group – The application group that the rule is associated with.
l Action – The action that is taken once the rule has been matched.
l End User Message – The message or notification that is displayed to the user when this rule is matched.
l Access Token – Dictates the permissions that are applied to the targeted application. See
https://msdn.microsoft.com/en-gb/library/windows/desktop/aa374909(v=vs.85).aspx
Auditing
l Raise an Event – An event will be logged to the client’s local event log file.
l Run a Script – Allows the creation of script based reports. See Auditing with Custom Scripts detailed on
page 98.
l Privilege Monitoring – Used to monitor and identify which processes are using or require privilege rights.
The drop-down menu displays a list of groups available. The top of the list displays Built-in and Generated
groups. Groups created by the user are displayed below. See Built-in Groups detailed on page 111 for more
information.
Apply Access Token can be set to one of the following options (or you can define any number of custom
access tokens, which appear at the end of the list of standard options):
l Passive (No Change) – This option allows you to audit the applications in the application group
without modifying the access token.
l Enforce User’s Default Rights – This option will ensure that the applications in the application
group are assigned the user’s default rights.
l Drop Admin Rights – This option will remove local admin rights from the access token for
applications in the application group.
l Add Admin Rights – This option will add local admin rights to the access token for applications in
the application group.
8. If you wish to audit the application rule being matched then select On or On (Anonymous) (does not log the
username) for Raise an Event. This will log events to the local Application Event Log.
9. If you wish to run a custom script when the application rule has been matched, then select On for Run a
Script. See Auditing with Custom Scripts detailed on page 98 for more information.
10. If you wish to audit any privileged activity performed by the executed application then select On for
Privilege Monitoring. See Privilege Monitoring detailed on page 77 for more information.
11. If you have enabled the McAfee ePolicy Orchestrator Integration, then select On for Forward events to ePO.
This option is not available when ePO integration is disabled.
Auditing
If you select On or On (Anonymous) (does not log the username) for Raise an Event then an event will be logged
to the local application event log every time the application rule is matched.
If you select On or On (Anonymous) (does not log the username) for Privilege Monitoring then an event will be
logged to the application event log the first time a process performs a privileged operation (an operation that would
fail under a standard user account) for the selected application group. All privileged activity will also be logged to an
XML file that can later be viewed with the Defendpoint Reporting Console (an MMC snap-in). You can modify
the behavior of privilege monitoring on the Privilege Monitoring tab of the workstyle.
Windows Modern UI
If an On-Demand application rule is triggered, Defendpoint references the check box labeled Apply the on-
demand application rules to the “Run as administrator”. If the check box is selected, Defendpoint intercepts
the Run as administrator option in the right-click context menu and overrides it. The labeling of the option
doesn’t change in this instance. If the check box is cleared, Defendpoint does not intercept the option to Run as
Administrator.
Defendpoint also references the check box labeled Hide “Run as” and “Run as administrator” commands in
the Classic Shell context menu. If it is selected, these options, where present, are hidden from the right-click
context menu. Defendpoint does not continue process additional application rules.
Unlike Application rules, the On-Demand rules list will only receive the assigned privileges if the user
launches a relevant application using the context menu.
1. In the Custom Classic Shell menu option, click ‘…’ on the right-hand side.
2. The Configure Languages dialog box appears.
3. To add a new language, click Add Language.
4. In the Insert Language dialog box, select the correct language and region and click OK.
5. A new entry for the selected language will be added to the list.
6. Double-click the Text to display string to enter your own translation for the selected language.
7. Click OK to finish.
If a language cannot be matched for the region of the end user, then the default language will be displayed. To
change the default language, select the desired language and click Set Default.
There are two main use cases for applying content control:
To allow standard users to modify privileged content, without having to assign admin rights to either the
user, or the application used to modify the content.
l Content groups can be added to content rules where the content can be assigned admin rights. When this is
done, any user who receives the workstyle can modify matching content without requiring an administrator
account.
Content rules define the actions Defendpoint will take when content (a file) is opened (double-clicked) by the user.
For more information about content groups, see Creating Content Groups detailed on the previous page.
If you have selected the action Block Access, the Apply Access Token option will be disabled.
7. If you want to prompt the user before the content is modified or blocked then select a message or
notification from the Show End User Message drop-down menu.
Apply Access Token can be set to one of the following options (or you can define any number of custom
access tokens, which will appear at the end of the list of standard options):
l Passive (No Change) – This option allows you to audit the file types in the content group without
modifying the access token.
l Enforce User’s Default Rights – This option ensures that the file types in the content group are
assigned the user’s default rights.
l Drop Admin Rights – This option removes local admin rights from the access token for file types in
the content group.
l Add Admin Rights – This option adds local admin rights to the access token for file types in the
content group.
10. If you want to audit the content rule being matched then select On for Raise an Event. This logs events to
the local Event Log.
11. If you want to run a custom script when the content rule has been matched, then select On for Run a
Script. For more information on auditing and reporting, see Auditing and Reporting detailed on page 95.
If you select On or On (Anonymous) (does not log the username) for Raise an Event then an event will be logged
to the event log every time a process launches for the selected content group.
The Summary View and Detail View can be used to show information about your content group entries in either
graphical form or in table form.
These rules can be enabled or disabled, after a workstyle has been created, from the General Rules tab.
The list of local privileged groups that are prohibited from modification when this rule is enabled is:
l Built-in administrators
l Power users
l Account operators
l Server operators
l Printer operators
l Backup operators
l RAS servers group
l Network configuration operators
l Logon Time – The date and time the user logged on.
l Is Administrator – The client will check whether the user account has been granted local administrator
rights either directly or through group membership.
l Session Type – The type of logon session, for example, console, RDP, ICA.
l Session Locale – The regional settings of the user session / profile
l Logon Client Session Hostname – The hostname of the client the user is logging on from. This will either
be the local computer (for Console sessions) or the remote device name (for remote sessions).
l Logon Client Session IP Address – The IP address of the client the user is logging on from. This will
either be the local computer (for console sessions) or the remote device name (for remote sessions).
For more information on user information reporting, refer to the AvectoDefendpoint Reporting guides.
This option is only available in policies set under the Computer Configuration Group policy.
For more information on computer information reporting, refer to the Avecto Defendpoint Reporting guides.
See Remote PowerShell Management detailed on page 50 for more information on configuring remote
PowerShell.
In order to allow remote network connections, you may be required to enable the Windows Group Policy
setting access this computer from the network. For more information, see: http://technet.microsoft.com/en-
us/library/cc740196(v=WS.10).aspx
Messages provide an effective way of alerting the user before an action is performed. For example, before
elevating an application or allowing content to be modified, or advising that an application launch or content
modification has been blocked.
Messages give the user information about the application or content, the action taken, and can be used to request
information from the user. Messages also allow authorization and authentication controls to be enforced before
access to an application is granted.
Messages are customizable with visual styles, corporate branding and display text, so you are offered a familiar
and contextual experience. Messages are assigned to application rules and content rules. A message will display
different properties depending on which of these targets it is assigned to. To view the differences a Preview option
allows you to toggle between the Application Preview and the Content Preview. This is available from the
Preview drop-down menu located in the top-right corner of the details pane.
Once defined, a message may be assigned to an individual rule in the Application Rules tab by editing the rule.
Depending on the type of workstyle you’ve created, Defendpoint may auto-generate certain messages for you to
use.
Messages can be interactive (the user may be asked to input information before an action occurs).
Notifications are descriptive (displaying information about an action that has occurred).
5. Click Next.
6. Customize the message (more advanced message configuration can be performed after the message has
been created).
7. Click Finish.
A new message will be created under the Messages node. You can rename the message by double-clicking on the
message name.
You may now further refine the message by selecting it and editing the properties which are displayed in the right-
hand pane under the Message Design and the Message Text tabs.
As you change the various message options the preview message will automatically be updated. To test the
message box, use the preview facility (program and content information will contain appropriate placeholders).
Once you have configured the message options you should configure the Message Text for the message, which
includes full multi-lingual support.
Miscellaneous Settings
l Show message on secure desktop – Select this option to show the message on the secure desktop. This
is recommended if the message is being used to confirm the elevation of a process, for enhanced security.
l Show reference Hyperlink – This option determines whether to show a hyperlink in the message below the
body settings (the hyperlink is configured on the Message Text tab).
l User Reason Type – Select between Text box and Drop-down list. Text box allows users to write a
reason or request. The Drop-down allows users to select a pre-defined reason or request from a drop-down
menu. The pre-defined drop-down entries can be configured on the Message Text tab.
l Remember User Reasons (per-application) – Reasons are stored per-user in the registry.
User Authorization
l Authorization Type – Set this option to User must authorize to force the user to re-authenticate before
proceeding. If you want to use this option for over the shoulder administration, then set this option to
Designated user must authorize.
l Authentication Method – Set this option to Any to allow authentication using any method available to the
user. If you want to enforce a specific authentication method, then set to either Password only or Smart
card only.
If you select a method that is not available to the user, then the user will be unable to authorize the
message.
l Designated Users – If the Authorization Type has been set to Designated user must authorize then
click the “…” button to add one more user accounts or groups of users that will be allowed to authorize the
message.
l Run application as Authorizing User – If the Authorization Type has been set to Designated user
must authorize then this option determines whether the application runs in the context of the logged on
user or in the context of the authorizing user. The default is to run in the context of the logged on user as
opposed to the authorizing user.
When Run application as Authorizing User is set to Yes, then Defendpoint will attempt to match a
workstyle of the same type (application rule or on-demand rule) for the authorizing user. If no workstyle is
matched, then Defendpoint will fall back to the original user workstyle.
After the third failure to enter a valid response code, the message will be canceled and the challenge code
will be rejected. The next time the user attempts to run the application, they will be presented with a new
challenge code. Failed attempts are accumulated even if the user clicks Cancel between attempts.
Authorization Settings
If Authorization Type has been set to Designated user must authorize this field becomes active. It allows you
to choose between either:
l Yes – Both required – Both the challenge / response and the designated user credentials are required.
l No – Either one sufficient – Either the challenge / response or the designated user credentials are
required.
l Allow user to email an application request – Select this option to allow the user to email a request to run
an application (only available for the Block Execution message type).
l Mail To – Email address to send the request to (separate multiple email addresses with semicolons).
l Subject – Subject line for the email request.
The Mail To and Subject fields can include parameterized values, which can be used with email based automated
helpdesk systems. For help with using parameters, see Workstyle Parameters detailed on page 123.
As you change the message text the preview message will automatically be updated, based on the selected
language. To test the message box, click the preview message (any program or content information will contain
placeholders).
To set the message text strings, select the relevant language in the languages list and edit the text values in the
text property grid.
The text in any text string can include parameterized values which provide more personalized messages for users.
For help with using parameters, see Workstyle Parameters detailed on page 123.
l For a prompt the message box will have OK and Cancel buttons.
l For a blocking message with Allow user to email an application request enabled the message box will
have OK and Cancel buttons. It is highly recommended you change the OK button text to be “Email”,
unless you make it clear in the message text that the OK button will send an email request.
l For a blocking message with Allow user to email an application request disabled the message box will
only have an OK button.
You can change the OK Button and Cancel Button text. For instance, you can change it to “Yes” and “No” if you
are asking the end user a question.
If you delete a language that has been set to the default language then the language at the top of the language
list is set to the default language. You must always have at least one language defined.
All images are stored inside the workstyles as compressed and encoded images.
It is strongly recommended that you delete any unused images to minimize the size of the policies, as Defendpoint
does not automatically delete unreferenced images.
The Image Manager is only accessible when the Background Type field on the Message Design tab is set to
Custom Image. The Custom Image field is enabled. Click the ‘…’ button to the right. The Manage Images dialog
box appears.
To export an image:
1. Select the image in the list and click Export.
2. Browse to a folder and click Save.
To delete an image:
1. Select the image in the list and click Delete.
2. When prompted, click Yes to delete the image.
If an image is referenced by any messages then you will not be allowed to delete it.
Challenge / Response authorization is configured as part of an end user message, and can be used in combination
with any other authorization and authentication features of Defendpoint messaging.
Authorization is applied per user, per application, meaning that each user will be presented with challenge codes
which, when authorized, will only apply to them. Likewise, each unique application requiring challenge / response
authorization will present the user with a different, unique challenge code.
Challenge and response codes are presented as an 8 digit number, which is ideal for verbal communication with a
telephone helpdesk, and minimizes the chance of incorrect or accidental entry.
When a user is presented with a challenge code, the message may be canceled without invalidating the code. If the
user runs the same application, they will be presented with the same challenge code. This allows users to request
a response code from IT helpdesks, which may not be immediately available to provide a response.
For more information on configuring challenge / response authorization enabled end user messages, see Message
Design detailed on page 63.
l Authorization Period (per-application) – For each application, challenge codes can be optionally
presented to a user for One Use Only, Entire Session, Forever or As defined by helpdesk, depending
on the level of control and flexibility you want to apply to the user and application.
l Maximum Attempts – This option determines how many attempts the user has to enter a successful
response code for each new challenge. There are two options available, Unlimited which will allow the user
to try entering the response code an unlimited number of times, or Three Attempts which will only allow a
maximum of three attempts to enter a correct response code before the message is cancelled and the
challenge code is invalidated.
If a challenge code is invalidated due to excessive failed attempts, the user will be presented with a new
challenge code the next time they attempt to run the application. Failed attempts are remembered even if the
user clicks Cancel between attempts
It is recommended that Three Attempts is enabled to prevent the user from attempting to guess response
codes through brute force retries.
For more information on configuring challenge / response authorization enabled end user messages, see Message
Design detailed on page 63.
Shared Key
The first time you create a Defendpoint end user message with a challenge you are asked to create a shared key.
The shared key is used by the Defendpoint Client to generate challenge codes at the end point. The shared key is
also required to generate the response code to match a challenge code created with the same key.
Once you have entered a shared key, it will be applied to all end user messages that have challenge / response
authorization enabled in the same Defendpoint Settings.
We recommend that your shared key is at least 15 characters and includes a combination of alphanumeric,
symbolic, upper, and lowercase characters. As a best practice, the shared key should be changed
periodically.
PGChallengeResponseUI.exe is a standalone utility and can be distributed separately from the Defendpoint
Policy Editor.
Response codes can also be generated from the command line using the PGChallengeResponse.exe command
line utility, which is installed as part of the Defendpoint Policy Editor installation, and is located in the following
directory:
PGChallengeResponseUI.exe is a standalone utility and can be distributed separately from the Defendpoint
Policy Editor.
The PGChallengeResponse.exe utility supports full command line use, allowing it to be easily integrated into
any third party workflow that supports the execution of command line executables. The command line is as
follows:
Where <challenge code> is the code presented to the user and <shared key> is the key that was configured
within the Defendpoint Settings which presented the end user message.
The utility will return the response code as an exit code, so it can be captured from within a custom script or
wrapper application. Below is an example VBScript:
An extra aspect of this feature is Designated User authorization. When this option is enabled a designated user
such as a system administrator can authorize the elevation in place of (or in addition to) a Challenge Response
code.
For more information on Designated User settings see the Authorization Settings section of Challenge Response
Designated User Option detailed above.
Message notification text is fully customizable, so that users are given concise, yet relevant information about the
action performed. As you change the text properties the preview notification will automatically be updated.
Message notifications are displayed either as a systray bubble (Windows 7 and older operating systems), or as a
Toast notification (Windows 8).
To set the notification text strings, select the relevant language in the languages list and edit the text values in the
text property grid.
If language settings for the region of the end user have not been configured, then the default language text
will be displayed. To change the default language, select the desired language and click Set Default.
Access tokens are assigned to applications or content through rules within a workstyle. For more advanced
configurations, custom tokens can be created where group memberships, privileges, permissions and integrity can
be manually specified. You can optionally define any number of custom tokens.
You may now define the Groups, Privileges, Integrity Level and Process Access Rights for the custom token.
You may set a description for a custom token by accessing the properties:
1. Select the Custom Token in the tree pane.
2. Right-click the Custom Token and then click Properties.
3. Set the Description in the Properties dialog box.
4. Click OK.
To insert a group:
1. Select the relevant custom token.
2. Right-click in the groups list and click Add a new account.
If you want the user to be the owner, regardless of the presence of the administrators group, then select the Ensure
the User is always the Token Owner check box.
Anti-Tamper Protection
By default, Defendpoint prevents elevated processes from tampering with the files, registry and service that make
up the client installation. It also prevents any elevated process from reading or writing to the local Defendpoint
policy cache.
If you want to disable anti-tamper protection, then clear the Enable anti-tamper protection check box.
Under normal circumstances, this option should remain enabled, except in certain scenarios where elevated
tasks require access to protected areas. For instance, if you are using an elevated logon script to update the
local Defendpoint policy.
If you want to add a privilege to the custom token then select the Add check box for the relevant privilege.
If you want to remove a privilege from the custom token then select the Remove check box for the relevant
privilege.
To clear, add or remove multiple privileges, select the relevant privileges and then right-click to access the context
menu. Select Reset Privilege, Add Privilege or Remove Privilege respectively.
To add or remove the privileges associated with an administrator, select Add Admin Privileges or Remove
Admin Privileges respectively.
To clear all of the privileges in the custom token before applying privileges, select the Remove all existing
privileges in access token before applying privileges check box. If this check box is left cleared then the
privileges are added or removed from the user’s default custom token.
Tokens that include the administrators group have a secure set of access rights applied by default, which will
prevent code injection attacks on elevated processes initiated by processes running with standard user rights in the
same session.
If you want to remove an access right from the custom token, clear the checkbox for the relevant access right .
To add or remove multiple access rights, select the relevant access rights and then right-click to access the
context menu. Select Add Right or Remove Right respectively.
To reset all access rights to the most secure setting, select Reset all to default.
The application must be running under a privileged account, such as an administrator or power user. Alternatively
an application could be running with elevated privileges because you have added it to the Application Rules or
On-Demand Application Rules section of the workstyle and assigned it to run with admin rights.
Privilege monitoring logs are recorded on each endpoint, and the logs can be accessed using the Defendpoint
Reporting MMC snap-in. The configuration of privilege monitoring logs is applied to each workstyle.
For more information about privilege monitoring contact your Avecto consultant.
14.1.2 - Events
l Log Monitoring Event to Application Event Log – This option will log an event to the application event
log, the first time an application performs a privileged operation.
l Log Cancel Events (when user cancels message) – This option will raise an event when a user cancels
an end user message , either by clicking the Cancel button, Email button, or a hyperlink. The action
performed by the user is available as a policy parameter [PG_ACTION], which can be used by the script to
perform different audit actions based on the user interaction.
l Log Application Activity to Log Files – This option will enable logging of privileged activity to log files.
The activity level can be set with the activity slider:
l Application Summary – This option only logs information about the application.
l Application Summary and Activity – This option logs information about the application and unique
privileged activity (default option).
l Application Summary and Detailed Activity – This options logs information about the application
and all privileged activity.
l Maximum Activity Records Per Process – This option determines the maximum number of records that
will be recorded per process (default 100).
l Keep Application Activity Logs for – This option determines how long activity logs are kept before they
will be purged (default 14 days).
If Log Application Activity to Log Files is enabled then privilege activity is logged to XML files that can later be
viewed with the Defendpoint Reporting Console (an MMC snap-in). See Defendpoint Reporting Console
detailed on page 100 for more information.
For settings to be correctly signed, the certificate must have an OID that is specific to Avecto Defendpoint.
The chain of trust and revocation status is also checked by the client. If the settings have been tampered
with since signing then the settings will also fail the signing check.
For more information about creating certificates suitable for use with Defendpoint , please refer to Signing
Defendpoint Settings with Certificates detailed on page 118.
To modify the signed settings, you must enter a valid password for the PFX. Alternatively, you can select to
remove the certificate from the settings, or open the settings in Read Only mode. Canceling this prompt
automatically opens the settings in Read Only mode.
l Checking that the contents of the settings have not been altered.
l Establishing a chain of trust.
l Checking that the certificate used to sign the settings contained the Defendpoint configuration Signing OID
in its Enhanced Key Usage extension.
l Checking for revocation where network connectivity allows.
Should the signature verification process fail for any reason, the course of action that is taken will depend upon the
mode of operation. There are three modes of operation within the Defendpoint Client. The mode is set via a
command line option during installation:
l 0 – Standard Mode
The loading of unsigned settings will be audited as information events (event 200). Signed settings will be audited
as information events (event 200) if they are correctly signed and as warning events (event 201) if they are
incorrectly signed.
Parameter Description
CERT_MODE=0 Standard Mode
CERT_MODE=1 Certificate Warning Mode
CERT_MODE=2 Certificate Enforcement Mode
For example, to install the client MSI package silently in Certificate Warning Mode, use the following command line
(the syntax must be copied exactly):
To install the client executable silently in Certificate Warning Mode, use the following command line (the syntax
must be copied exactly):
By default the Defendpoint Client will allow certificates whose revocation may not be confirmed via Microsoft
Crypto APIs from either cached information, or directly from the CRL source.
The following registry configuration may be used to change the default behavior:
Failure to retrieve CRL is deemed an error and policy will not be loaded
DWORD “CRLNetworkErrorFailOpen” = 1
Failure to retrieve CRL is deemed a warning and policy will still be loaded. This is the default behavior if this registry
setting has not been configured.
The CRL is cached when downloaded and honored until its Time To Live (TTL) has expired (standard Microsoft
CryptoAPI behavior). The Certificate Authority may be configured according to requirements, Microsoft Group
Policy provides centralized configuration in this area. Security and usability need to be balanced according to your
organization's risk tolerance.
Prior settings from the same source type (GPO, HTTP, etc) will be deleted before the newly acquired
settings are verified. This could lead to no policy in effect on the endpoint in the case that invalid settings are
delivered, and no valid settings from other sources are in place.
Each advanced agent setting adheres to Group Policy precedence rules. If advanced agent settings are
configured in multiple Group Policies, then the Group Policy with the highest precedence will be applied
(except for multi-string settings, which will be merged and consolidated by the Defendpoint Client).
Advanced Agent Settings should only be used when instructed to do so by Avecto Support.
This may be used to back up Defendpoint Settings or to distribute them using an XML file, as opposed to using
Group Policy.
1. Select the Defendpoint Settings node for either the Computer Configuration or User Configuration
section, as appropriate.
2. On the Group Policy Management Editor Action menu, click Delete Defendpoint Settings.
3. When prompted for confirmation, click Yes to delete the Defendpoint Settings.
When an item is deleted, the Defendpoint Policy Editor will check for any conflicts which may need to be resolved.
If the item being deleted is already in use elsewhere in your settings, then a conflict will be reported which will need
to be resolved.
You can review each detected conflict and observe the automatic resolution which will take place if you proceed. If
more than one conflict is reported, use the Next conflict and Previous conflict links to move between conflicts.
If you want to proceed, click Resolve All to remove the item from the areas of your Defendpoint Settings where it
is currently in use.
Defendpoint uses the same style as the GPMC for its HTML reports. You can expand and collapse the various
sections of the HTML report to show or hide more detailed information.
When displaying RSoP (Resultant Set of Policy) results the Defendpoint Settings Policy Editor will default to
HTML view, but a read-only Workstyles Editor view may also be displayed.
GPOs (Group Policy Objects ) are usually managed through the GPMC (Group Policy Management Console ).
GPMC is a scriptable MMC (Microsoft Management Console) snap-in, providing a single administrative tool for
managing Group Policy across the enterprise. GPMC is the standard tool for managing Group Policy.
Defendpoint also supports Local Computer Policy, which can be edited in the Group Policy Editor, but this is only
recommended for small environments or for test purposes.
You may add Defendpoint Settings to existing GPOs or create new GPOs for this purpose.
The Group Policy Management Editor appears. Defendpoint Settings are available in both the Computer
Configuration and User Configuration nodes, which allow you to set either computer or user settings
respectively. Computer settings are updated when a computer starts up, whereas user settings are updated when
a user logs on. In addition, a background refresh occurs every 90 minutes by default, which will update settings
while the user is logged on.
Once a client has updated its Defendpoint Settings through Group Policy then the settings are applied dynamically.
Any logged on users do not need to log off for the changes to take effect.
Defendpoint Settings will either appear directly under the Computer Configuration and User
Configuration nodes, or under the Policies sub-node, if it exists.
When you create a new Defendpoint workstyle you are given the option of applying a filter that will either target
Standard users only or Everyone, including administrators.
Subsequently, you can further refine a sub-set of users that the workstyle will target by adding account filters.
These are defined on the Filters tab of a workstyle where you add groups and users (either domain or local) to the
filter. Do not leave the account filters empty or the workstyle will still apply to everyone.
Multiple account filters can be added to a workstyle, if you need add ‘AND’ logic to your filtering. For example, if
you want to target a user who is a member of ‘GroupA’ AND ‘GroupB’, then add two account filters to an account
filter, and select the box All items below must match.
You can also use computer filters to apply the workstyle to specific computers and connecting client devices.
These can be used in combination with account filters to provide more specific targeting of user / computer
combinations if required.
1. Local Group Policy Object – Each computer has exactly one GPO that is stored locally. This applies to
both computer and user Group Policy processing.
2. Site – Any GPOs that have been linked to the site that the computer belongs to are processed next.
Processing is in the order that is specified by the administrator, on the Linked Group Policy Objects tab
for the site in GPMC. The GPO with the lowest link order is processed last, and therefore has the highest
precedence.
3. Domain – Processing of multiple domain-linked GPOs is in the order specified by the administrator, on the
Linked Group Policy Objects tab for the domain in GPMC. The GPO with the lowest link order is
processed last, and therefore has the highest precedence.
4. Organizational Units – GPOs that are linked to the organizational unit that is highest in the Active
Directory hierarchy are processed first, then GPOs that are linked to its child organizational unit, and so on.
Finally, the GPOs that are linked to the organizational unit that contains the user or computer are processed.
At the level of each organizational unit in the Active Directory hierarchy, one, many, or no GPOs can be linked. If
several GPOs are linked to an organizational unit, their processing is in the order that is specified by the
administrator, on the Linked Group Policy Objects tab for the organizational unit in GPMC. The GPO with the
lowest link order is processed last, and therefore has the highest precedence.
Defendpoint merges settings so that settings with a higher precedence will be processed first. Once an application
matches a Defendpoint workstyle, no further workstyles will be processed for that application, so it is important to
keep this in mind when multiple GPOs are applied.
l A GPO link may be enforced, or disabled, or both. By default, a GPO link is neither enforced nor disabled.
l A GPO may have its user settings disabled, its computer settings disabled, or all settings disabled. By
default, neither user settings nor computer settings are disabled on a GPO.
l An organizational unit or a domain may have a Block Inheritance set. By default, Block Inheritance is not
set.
For information about the above modifications to default behavior, see Managing inheritance of Group Policy.
1. Defendpoint Settings files will be backed up as part of a standard ‘System State’ backup, which
organizations should be performing as part of their standard backup routines.
2. Perform a manual backup of a GPO from with the GPMC, which will back up the GPO settings and
Defendpoint’s XML files.
3. In addition, Defendpoint Settings may be manually exported and saved to a location of your choice. For
more information on how to perform an export/import of policies see Exporting and Importing
Defendpoint Settings detailed on page 83.
Defendpoint also supports a completely standalone configuration mode, where the settings are configured via a
Local Group Policy for that machine, or deployed in a standalone XML configuration file. Again, these settings
contain all of the information required to apply these policies offline.
Standalone mode allows you to deploy the Defendpoint Settings with an XML file. You will need to employ a
suitable deployment mechanism to distribute the XML file to your client computers.
1. Launch mmc.exe.
2. Select Add/Remove Snap-in from the File menu.
3. Select Defendpoint Settings from the available snap-ins and click Add.
4. Click OK.
The Defendpoint Policy Editor is now running in standalone mode and is not connected to a Group Policy Object
(GPO).
On Windows 7 onwards, the Defendpoint Settings will be saved to the following local XML file:
%ALLUSERSPROFILE%\Avecto\Privilege Guard\PrivilegeGuardConfig.xml
If you installed the Defendpoint Client when you installed the Defendpoint Policy Editor then the client will
automatically apply the policies in this XML file. For this reason, it is strongly recommended that you do not install
the client if you will be using the policy editor in standalone mode, unless you want the settings to be applied to your
management computer. This may be case if you are evaluating Defendpoint .
The Defendpoint settings are edited in the same way as when editing GPO based policies. To distribute the XML
file to multiple clients you will need to export the policies to an XML file and then deploy it to the location specified
above. The Defendpoint Client monitors this directory and will automatically load the XML file.
You must name the settings file PrivilegeGuardConfig.xml once it is deployed, otherwise the Defendpoint Client
will not load the settings. If you make changes to the Defendpoint settings, redeploy the modified XML file and the
Defendpoint Client will automatically reload the settings.
Through the PowerShell API, you can create and modify any Defendpoint configuration within Domain Group
Policy, Local Group Policy, or any local configuration. The PowerShell API is available on any computer where the
Defendpoint Policy Editor or Defendpoint Client is installed.
For information on scripting Defendpoint configurations, refer to the Avecto Defendpoint PowerShell API
document and the accompanying help file PowerShell API.chm. Both of these documents are installed with the
Defendpoint Policy Editor, under C:\Program Files\Avecto\Privilege Guard Management Consoles\PowerShell\.
The default PowerShell execution policy is Restricted which stops any scripts running. Setting the execution
policy to AllSigned enables scripts to be run as long as they are signed, as Defendpoint scripts are.
l AllSigned – Requires that all scripts and configuration files be signed by a trusted publisher, including
scripts that you write on the local computer.
Set-ExecutionPolicy AllSigned
This article shows how to configure the setting using Group Policy: http://technet.microsoft.com/en-
us/library/hh849812.aspx
Configurations created and edited via PowerShell are not backwards compatible with older Defendpoint /
Privilege Guard Clients, so we recommend that only configurations targeting version 4.0 Clients are
managed through PowerShell scripting.
To create an XML configuration for deployment from a webserver, see Exporting and Importing Defendpoint
Settings detailed on page 83. Defendpoint Clients may be configured to pull an XML configuration from a
webserver during the installation of the Client MSI or EXE, or for existing installations, can be configured via the
Windows Registry.
Argument Description
WEBSERVERMODE= Enables webserver functionality (Required, 1 = Enabled)
WSP_URL= Specifies the full URL (including XML filename) to the webserver
configuration (required)
WSP_INTERVAL= Refresh interval for new configuration check in minutes (optional,
default 90 minutes)
WSP_LOGON= Check for new configuration at user logon (optional, default 1 =
Enabled)
WSP_CERT= The Common Name for a webserver certificate. When added, restricts
webserver downloads only if the common name matches the
webserver certificate, and the certificate is valid.
DOWNLOADAUDITMODE= Specifies the level of auditing for attempts to download webserver
configurations; 0 = No auditing, 1 = Failures only, 2 = Successes only,
3 = audit both (default)
POLICYENABLED= Specifies the policy deployment methods which are enabled. Add this
value to allow a webserver policy to be used by the Defendpoint Client:
WEBSERVER. See Deployment Methods detailed on page 94 for
more information.
Example:
l Group Policy – Configurations that are stored in Group Policy Objects, configured via GPMC (Active
Directory Group Policy) and GPEdit (Local Group Policy). Group Policy based configurations are evaluated
according to GPO precedence rules.
l Local Policy – A standalone configuration, which is stored locally, configured via MMC.
l Webserver Policy – A configuration located on a web server, accessible via HTTP(s) or FTP.
l McAfee ePO Policy – A configuration that is stored within McAfee ePO, configured via the ePO policy
catalog.
Defendpoint uses a logical precedence to evaluate each configuration for matching rules. By default the client will
apply the following precedence:
ePO Policy > Webserver Policy > Group Policy > Local Policy
Configuration precedence settings can be configured either as part of the client installation, or via the Windows
Registry once the client has been installed.
To modify configuration precedence via the Registry, run Regedit.exe with elevated privileges (ensuring you are
using a Defendpoint token with anti-tamper disabled) and navigate to the following key:
Registry settings may be deployed via the Advanced Agent Settings feature. For more information, see
Advanced Configuration Settings detailed on page 77. In order to apply a configuration deployment
method via Advanced Agent Settings, the setting must be applied to a type of configuration that is already
part of the configuration precedence order. For more information, see Configuration Precedence detailed
on the previous page.
Each process event also contains product properties, where applicable, but these can only be viewed in the
Defendpoint Reporting Console.
6. Select a Timeout for how long the script will be allowed to execute, before it is terminated. By default, this
will be set to Infinite.
7. Select whether the script should be executed in the System context or the current User context from the
Script Context drop-down menu.
8. Click OK to finish.
The new script will automatically be selected in the Run a Script setting.
If you have any existing scripts, these can be selected in the drop-down menu.
strUserName = PGScript.GetParameter(“[PG_USER_NAME]”)
strCommandLine = PGScript.GetParameter(“[PG_PROG_CMD_LINE]”)
strAgentVersion = PGScript.GetParameter(“[PG_AGENT_VERSION]”)
For a list of available parameters, see the Workstyle Parameters detailed on page 123.
Scripts created in the script editor can be reused in multiple application rules and on-demand application
rules. Any modification to an existing script will affect all workstyle rules that have been configured to
execute that script.
Before the snap-in is added you will be prompted to select a computer to manage. The local computer will be
selected by default. To connect to a remote computer select the Another computer option button and enter
the name of the remote computer or click the Browse button to browse for a computer. Defendpoint
supports connection to a central event collector if you are using event forwarding to centralize events to a
server.
You may also select an alternative location for the privilege monitoring logs, if you have a scripted solution in
place to centralize the privilege monitoring logs to a server. Enter the network location or click the Browse
button to browse to the location.
4. Click Finish.
5. Click OK.
The application view shows a list of all applications that have been monitored. Applications are identified by their
file hash.
By default, the report will show all the monitored applications, but you may filter the report on date, username and
computer name. Click Update Report to reload the report.
Process View
The process view shows a list of the individual processes that have been monitored for an application.
The activity view shows a list of all the privileged activity that has been carried out by a process. Privileged activity
is any activity that would have failed under a standard user account.
l Date
l Operation
l Object
l Parameters
To go back to the process view double-click the “back up” entry in the list or select Back Up from the context
menu. The Process View appears.
If the Reporting Console fails to connect or fails to retrieve data then the most common causes are:
1. The Remote Registry service needs to be started on the remote machine. On Windows 7 this service is not
set to start automatically, so you should ensure that it has been started.
2. The Windows Firewall may be blocking the incoming requests. Enabling the File and Printer Sharing
exception in the Windows Firewall Settings should resolve this problem.
The Activity Viewer will collect a complete audit of every application that was run on the desktop, and provide a
detailed summary of how the Defendpoint Client interacted with those applications, what actions it applied, and the
rules that it used to determine that action.
The activity is displayed in a rich, detailed, yet simple to use interface that provides every snippet of information
required to better understand the workstyles deployed to endpoints, how they affect the applications being run, and
rapidly identify unexpected outcomes.
For more information and help with using the Defendpoint Activity Viewer, refer to the Activity Viewer Help from
within the Activity Viewer Management Console.
The Defendpoint Client requires that short file name creation is enabled. For more information, refer to:
http://technet.microsoft.com/en-us/library/cc778996(v=ws.10).aspx
The client may be installed manually, but for larger installations it is recommended you use a suitable third party
software deployment system.
There is no license to add during the client installation, as this is deployed with the Defendpoint workstyles,
so the client may be installed silently.
To install the client executable silently, without a reboot, use the following command line (the double quotes are
required and the syntax must be copied exactly):
To install the client MSI package silently, without a reboot, use the following command line (double quotes are not
required but the syntax must be copied exactly):
Defendpoint will not be fully operationally until a reboot is performed. To perform an unattended deployment
with a reboot omit the ‘/norestart’ switch.
For information on working with Signed Defendpoint Settings, please see Signing Defendpoint Settings with
Certificates detailed on page 118.
From this utility a user can modify the properties of a network adapter, rename an adapter or disable an adapter.
In order to make the network adapter manager available to a user you must perform the following steps:
1. Add the Avecto Network Adapter Utility to the Defendpoint Settings and assign Admin Rights to this
application for the relevant users (the utility is included in the Application Templates).
2. Create a shortcut on the users’ desktop to the network adapter manager, PGNetworkAdapterUtil.exe,
which can be found in the Defendpoint Client installation directory (usually C:\Program
Files\Avecto\Privilege Guard Client).
From this utility a user can add and delete printers, set their default printer, access printer properties and
preferences, view the printer queue, access print server properties, and print a test page.
In order to make the printer manager available to a user you must perform the following steps:
1. Add the Avecto Printer Management Utility to the Defendpoint Settings and assign Admin Rights to
this application for the relevant users (the utility is included in the Application Templates).
2. Create a shortcut on the user’s desktop to the printer manager, PGPrinterUtil.exe, which can be found in
the Privilege Guard client installation directory (usually C:\Program Files\Avecto\Privilege
Guard Client).
From this utility a user can uninstall, change, and repair software that is installed on their computer.
In order to make the programs and features manager available to a user you must perform the following steps:
1. Add the Avecto Programs and Features Manager to the Defendpoint Settings and assign Admin
Rights to this application for the relevant users (the utility is included in the Application Templates).
2. Create a shortcut on the users desktop to the programs and features manager, PGProgramsUtil.exe,
which can be found in the Defendpoint Client installation directory (usually C:\Program
Files\Avecto\Privilege Guard Client).
By default, the PGProgramsUtil will not display Windows Updates. To enable the option to show updates (via a
toggle button), use the following command line switch:
PGProgramsUtil.exe /showupdates
1. Double-click the forest in which you want to create a Group Policy Modelling query.
2. Right-click Group Policy Modelling and click Group Policy Modelling wizard.
3. In the Group Policy Modelling wizard click Next and enter the appropriate information.
4. After completing the wizard, click Finish.
5. Right-click the node for the completed query in the console tree, and click Advanced View to launch the
Resultant Set of Policy window.
6. Select the Defendpoint Settings node under the Computer Configuration or User Configuration node
to view the RSoP HTML report for Defendpoint.
Defendpoint also appears in the Summary tab of the Group Policy Modeling node. Expand the Component
Status section of the HTML report to find out whether RSoP data has been collected for Defendpoint.
Defendpoint does not appear in the Settings tab of the Group Policy Modeling node, as third-party Group Policy
extensions are not detailed in this HTML report. You must use the Advanced View, as outlined above, to view
Defendpoint workstyles for an RSoP query.
1. Double-click the forest in which you want to create a Group Policy Results query.
2. Right-click Group Policy Results and click Group Policy Results wizard.
3. In the Group Policy Results wizard click Next and enter the appropriate information.
4. After completing the wizard, click Finish.
5. Right-click the node for the completed query in the console tree, and click Advanced View to launch the
Resultant Set of Policy window.
6. Select the Defendpoint Settings node under the Computer Configuration or User Configuration node to
view the RSoP HTML report for Defendpoint .
Defendpoint does not appear in the Settings tab of the Group Policy Results node, as third-party Group Policy
extensions are not detailed in this HTML report. You must use the Advanced View, as outlined above, to view
Defendpoint workstyles for an RSoP query.
The easiest way to determine that the client is installed and functioning is to check for the existence of the Avecto
Defendpoint Service in the Services Management Console. Ensure that this service is both present and started.
The Defendpoint service is installed by the Defendpoint Client and should start automatically.
The Defendpoint service requires MSXML6 in order to load the Defendpoint settings, but the service will still
run even if MSXML6 is not present.
You can use RSoP logging mode to determine whether the computer has received settings. Assuming the RSoP
query shows that Defendpoint Settings have been applied, you should check the contents of the settings (including
licensing and workstyle precedence).
Once an application matches an application group entry in the application rules or the on-demand application
rules, then processing will not continue for that application. Therefore, it is vital that you order your entries
correctly:
l If you create multiple workstyles then workstyles higher in the list have a higher precedence.
l If you have multiple rules in the application rules and the on-demand application rules sections of a
workstyle then entries higher in the list have a higher precedence.
If you have multiple GPOs applying to a user and/or computer then you should ensure that GPO precedence rules
are not causing the problem. If multiple GPOs are applied to a computer or user then the Defendpoint Client will
merge the computer GPOs and user GPOs by following Group Policy precedence rules. Once merged the user
workstyles will take precedence over the computer workstyles. In other words the computer workstyles will only be
processed if an application does not match an entry in the user workstyles.
For this reason, it is highly recommended that you do not created over-complex rules that rely on the merging of
many GPOs, as this can become difficult to troubleshoot. If, however, it makes sense to split rules over multiple
GPOs, you should make use of RSoP to ensure that workstyles are being combined correctly. You must also
remember that computer and user workstyles are processed separately, with user workstyles always being
processed ahead of computer workstyles, if both exist.
Target definitions are used to define exactly what constitutes a valid target. It is these definitions that a target rule
will match against. The Defendpoint Client must match every definition you configure before it will trigger a match
(the rules are combined with a logical AND).
l Exact Match
l Starts With
l Ends With
l Contains
l Regular Expressions
Although you can enter a relative codebase name, it is strongly recommended that you enter the full URL to the
codebase, as it is more secure.
A.2.3 - AppId
This option allows you to match the App ID of the COM class, which is a GUID used by Windows to set properties
for a CLSID. AppIds can be used by 1 or more CLSIDs.
The available operators are identical to the File or Folder Name definition.
If you want to reverse the outcome of this definition, to target applications which do not match the definition, then
click the definition to toggle between matches and does NOT match.
A.2.7 - CLSID
This option allows you to match the class ID of the ActiveX control or COM class, which is a unique GUID stored
in the registry.
If you want to reverse the outcome of this definition, to target applications which do not match the definition, then
click the definition to toggle between matches and does NOT match.
PowerShell removes double quotes from command strings prior to them being transmitted to the target.
Therefore it is not recommended that Command Line definitions include double quotes, as they will fail to
match the command.
A.2.11 - Drive
This option can be used to check the type of disk drive that where the file is located. Choose from one of the
following options:
l Fixed disk – Any drive that is identified as being an internal hard disk.
l Network – Any drive that is identified as a network share.
l RAM disk – Any drive that is identified as a RAM drive.
l Any Removable Drive or Media – If you want to target any removable drive or media, but are unsure of the
specific drive type, choose this option which will match any of the removable media types below.
Alternatively, if you want to target a specific type, choose from one of the following removable media types:
l Removable Media – Any drive that is identified as removable media.
l USB – Any drive that is identified as a disk connected via USB.
l CD/DVD – Any drive that is identified as a CD or DVD drive.
l eSATA Drive – Any drive that is identified as a disk connected via eSATA.
If you want to reverse the outcome of this definition, to target applications which do not match the definition, then
click the definition to toggle between matches and does NOT match.
l Exact Match
l Starts With
l Ends With
l Contains
l Regular Expressions
Although you can enter relative filenames, it is strongly recommended that you enter the full path to a file or the
COM server. Environment variables are also supported.
If you want to reverse the outcome of this definition, to target applications which do not match the definition, then
click the definition to toggle between matches and does NOT match.
It is not recommended that the definition File or Folder Name does NOT Match is used in isolation for
executable types, as it will result in matching every application, including hosted types such as Installer
packages, scripts, batch files, registry files, management consoles and Control Panel applets.
When creating blocking rules for applications or content, and the File or Folder Name is used as matching
criteria against paths which exist on network shares, this should be done using the UNC network path and
not by the mapped drive letter.
If you want to reverse the outcome of this definition, to target applications which do not match the definition, then
click the definition to toggle between matches and does NOT match.
If you want to reverse the outcome of this definition, to target applications which do not match the definition, then
click the definition to toggle between matches and does NOT match.
If you want to reverse the outcome of this definition, to target applications which do not match the definition, then
click the definition to toggle between matches and does NOT match.
If you want to reverse the outcome of this definition, to target applications which do not match the definition, then
click the definition to toggle between matches and does NOT match.
A.2.20 - Publisher
This option can be used to check for the existence of a valid publisher. If you have browsed for an application, then
the certificate subject name will automatically be retrieved, if the application has been signed. For Windows
system files the Windows security catalog is searched, and if a match is found then the certificate for the security
catalog is retrieved. Publisher checks are supported on Executables, Control Panel Applets, Installer Packages,
Windows Scripts and PowerShell Scripts. By default a substring match is attempted (Contains). Alternatively, you
may choose to pattern match based on either a wildcard match (? and *) or a Regular Expression. The available
operators are identical to the File or Folder Name definition.
If you want to reverse the outcome of this definition, to target applications which do not match the definition, then
click the definition to toggle between matches and does NOT match.
l Exact Match
l Starts With
l Ends With
l Contains
l Regular Expressions
If you want to reverse the outcome of this definition, to target applications which do not match the definition, then
click the definition to toggle between matches and does NOT match.
l Exact Match
l Starts With
l Ends With
l Contains
l Regular Expressions
If you want to reverse the outcome of this definition, to target applications which do not match the definition, then
click the definition to toggle between matches and does NOT match.
If you want to reverse the outcome of this definition, to target applications which do not match the definition, then
click the definition to toggle between matches and does NOT match.
If you want to reverse the outcome of this definition, to target applications which do not match the definition, then
click the definition to toggle between matches and does NOT match.
If you want to reverse the outcome of this definition, to target applications which do not match the definition, then
click the definition to toggle between matches and does NOT match.
l Exact Match
l Starts With
l Ends With
l Contains
l Regular Expressions
If you want to reverse the outcome of this definition, to target applications which do not match the definition, then
click the definition to toggle between matches and does NOT match.
l Exact Match
l Starts With
l Ends With
l Contains
l Regular Expressions
If you want to reverse the outcome of this definition, to target applications which do not match the definition, then
click the definition to toggle between matches and does NOT match.
The Browse File and Browse Apps options can only be used if configuring Defendpoint Settings from a
Windows 8 client.
This approach provides another means of ensuring that configuration cannot be created and signed by rogue users
with access to a digital signature certificate intended for a different purpose.
Avecto has defined the following OID that should be added to the Enhanced Key Usage extension:
The Defendpoint Settings console does not check for the existence of this key usage. The checks are
performed when verifying digital signatures in the Defendpoint service. A configuration that is signed with a
key that does not contain the specified Enhanced Key Usage extension, will always fail signature verification
checks.
The following sections provide details of two methods that can be used to generate a suitable PFX file, but it should
be possible to use any Certification Authority to produce certificates with the appropriate Enhanced Key Usage
extension.
Makecert is a certificate generation tool available from Microsoft that can be used to generate certificates for
testing purposes.
The parameters can be changed as required. The example will generate a self-signed certificate with an exportable
private key, and adds it to the calling user’s local certificate store. The certificate must then be exported to a PFX
file along with the private key in the usual way.
The important parameter in the example is the addition of the Defendpoint Configuration Signing OID to the
Enhanced Key Usage extension (-eku 1.2.826.0.1.6538381.1.1.1)
If a self-signed certificate is used to sign the Defendpoint Settings, the certificate must be distributed to all clients
in order for a chain of trust to be established and for signature verification to be successful. See Distributing
Public Keys detailed on page 122 for more information.
Microsoft Certificate Services is a useful way for organizations to run their own Certification Authority. In its
enterprise editions, Certificate Services integrates with Active Directory to publish certificates and Certificate
Revocation Lists to a location that is accessible to all computers in the Active Directory domain.
Custom certificate templates can only be managed using enterprise CAs, therefore the following procedure
is only possible on Enterprise Editions of Windows 2008 R2.
In order to create a new certificate template an existing template must be duplicated and then modified.
Alternatively, public keys can be distributed via Group Policy, as discussed in the following TechNet article: Use
Policy to Distribute Certificates.
If you rely on third party providers for certificates, for example, not internal PKI, you will succeed by asking
for a "key signing ceremony" that will allow you to specify the certificate parameters such as custom
"extended key usage" values as described in this appendix.
A.4.1 - Prerequisites
The McAfee ePO Agent must be installed on the same machine as the Defendpoint Client.
To install the client MSI package silently in ePO Mode, use the following command line:
To install the client executable silently in ePO Mode, use the following command line:
If you are deploying Defendpoint using McAfee ePO, then ePO Mode is automatically enabled.
DWORD “EPOMode”=0
Parameters are identified as any string surrounded by [square parentheses], and if detected, the agent will attempt
to expand the parameter. If successful, the parameter will be replaced with the expanded property. If unsuccessful,
the parameter will remain part of the string. The table below shows a summary of all available parameters and
where they are supported.
Parameter Description
[PG_ACTION] The action which the user performed from an end user message
[PG_AGENT_VERSION] The version of the Privilege Guard Client
[PG_APP_DEF] The name of the application rule that matched the application
[PG_APP_GROUP] The name of the application group that contained a matching application rule
[PG_AUTH_USER_DOMAIN] The domain of the designated user who authorized the application
[PG_AUTH_USER_NAME] The account name of the designated user who authorized the application
[PG_COM_APPID] The APPID of the COM component being run
[PG_COM_CLSID] The CLSID of the COM component being run
[PG_COM_NAME] The name of the COM component being run
[PG_COMPUTER_DOMAIN] The name of the domain that the host computer is a member of
[PG_COMPUTER_NAME] The NetBIOS name of the host computer
[PG_CONTENT_DEF] The definition name of the matching content
[PG_CONTENT_FILE_DRIVE_ The drive type of a matching content
TYPE]
[PG_CONTENT_FILE_HASH] The SHA-1 hash of a matching content
[PG_CONTENT_FILE_IE_ The Internet Zone of a matching content
ZONE]
[PG_CONTENT_FILE_NAME] The file name of a matching content
[PG_CONTENT_FILE_OWNER] The owner of a matching content
[PG_CONTENT_FILE_PATH] The full path of a matching content
[PG_CONTENT_GROUP] The group name of a matching content definition
[PG_DOWNLOAD_URL] The full URL from which an application was downloaded
[PG_DOWNLOAD_URL_ The domain from which an application was downloaded
DOMAIN]
[PG_EVENT_TIME] The date / time that the policy matched
[PG_EXEC_TYPE] The type of execution method: application rule or shell rule
[PG_GPO_DISPLAY_NAME] The display name of the GPO (Group Policy Object)
[PG_GPO_NAME] The name of the GPO that contained the matching policy
Where:
Where:
System Variables
l %ALLUSERSPROFILE%
l %COMMONPROGRAMFILES(x86)%
l %COMMONPROGRAMFILES%
l %PROGRAMDATA%
l %PROGRAMFILES(x86)%
l %PROGRAMFILES%
l %SYSTEMROOT%
l %SYSTEMDRIVE%
User Variables
l Avecto Utilities
l Browsers
l COM Classes for 3rd Party Software
l Com Classes for file, folder and drive operations
l COM Classes for general Windows operations
The standard application templates are stored in a single file named WindowsTasks.xml, and it is highly
recommended that you do not change these templates.
Instead, you should create your own XML template files. Application templates are a set of application groups that
have been exported from the Defendpoint Policy Editor as an XML file.
It is recommended that you create templates on a computer that is not running the Defendpoint Client, as you will
rely on Defendpoint’s standalone Policy Editor to create the application templates.
1. Launch mmc.exe.
2. Select Add/Remove Snap-in from the File menu.
3. Select Defendpoint Settings from the available snap-ins and click Add.
4. Click OK.
The Defendpoint Policy Editor is now running in standalone mode and is not connected to a GPO (Group Policy
Object). However, it will be saving any settings locally, and these would be picked up by the client, if it was
installed.
To create a set of application templates, create some application groups and populate the application groups with
applications. The application groups will become the categories, and the applications in each application group will
be the list of applications for that category. Once you have defined your application templates, export the settings
to an XML file:
The XML file that you export must be saved with a prefix of Windows e.g. Windows*.xml.
To import an application template file back into the Policy Editor for editing:
The final step is to copy your application templates to the application templates directory on any machines where
the Policy Editor is being used to create Defendpoint Settings. The Policy Editor automatically loads all of the
application templates in the application templates directory and merges them to create a single list of categories.
The Summary View and Detail View can be used to show information about your rules in either graphical form or
in table form.