Software Restriction Policy Path Rules to enable scripts from one folder only, no code signing neede

G

Gordon Price

I have read the MSDN article 'Providing a Secure eXPerience' and I have a
question on implementation. The article describes creating a new Software
Restriction Policy Path Rule, to the effect of Disallowing *.VBS. Thus, no
VBS file will execute. Then it goes on to describe creating a Certificate
Rule to allow properly sighed files to run. We are a small architecture
office, and spending a few hundred bucks on a certificate for this seems
overkill, not to mention that I still haven't limited users from running
properly signed scripts, checked by Verisign, that I don't want run on my
network anyway. I could setup CertificateServer and sign all my own scripts,
but that too seems overkill.
So I tried this. I made the first rule as advertised, then I made a second
rule, Allowing C:\Scripts\*.vbs. The C:\Scripts folder is readonly for
everyone but administrators. The result is that a script in that scripts
folder will execute, and nothing else will. With this setup you would have a
situation where in house scripts are available, everything else, in e:mail,
on floppies, on the desktop, etc is blocked, and users can't add scripts to
the allowed folder even if they could figure out they needed to, and a non
WSH virus would have to be able to find that folder to place a virus script
and have the admin security rights, at which point I am toast anyway. Net
result, REAL security, Easily, without extra cost. Am I on to something? Am
I crazy? If this works like it seems to, I wonder why MS never even mentions
it. Then again, they don't mention any negatives? Can anyone see a flaw in
this?

Thanks,
Gordon
 
S

Steven L Umbach

Good for you Gordon. The article I read does show how to use path rules to allow
execution of software from only specific folders and that goes a long way in securing
a computer. The certificate rule just adds that extra margin of security and a lot of
networks have their own certificate authorities. Where a computer with no virus
protection is about 0 percent secure from a malicious .vbs script, your solution is
very secure. Users [administrators] can also create hash rules. For instance a rule
could be created that disallows all .vbs on a computer and then allowing only those
..vbs scripts that have an allowed hash rule. I think that Software Restriction
Policies are a major reason to upgrade to XP Pro. --- Steve

http://www.microsoft.com/technet/tr...et/prodtechnol/winxppro/maintain/rstrplcy.asp
 

Ask a Question

Want to reply to this thread or ask your own question?

You'll need to choose a username for the site, which only take a couple of moments. After that, you can post your question and our members will help you out.

Ask a Question

Top