One Windows management problem that has plagued companies for as long as PCs have been around is having unauthorized software on users' desktops. In Windows 7, though, Microsoft is hoping that AppLocker, an improvement on software restriction policies, will make this problem a thing of the past.
Unauthorized software issues present a number of problems. It may conflict with an existing application or it may deprive the PC of disk, CPU or memory resources. Another issue is the fact that an organization is responsible for having a license for every application installed on each computer in its network. If a user installs an unauthorized application, it is the organization that is ultimately responsible for licensing that application.
Software restriction policies
I could go on and on about the problems associated with unauthorized applications, but I would rather talk about how AppLocker helps admins deal with them instead.
Desktop management tips:
Sign up for our additional editions of SearchEnterpriseDesktop.com's Desktop Management Advisor to learn more about desktop management, security and virtualization.
Both Windows XP and Windows Vista allow organizations to control applications through software restriction policies -- the predecessor to AppLocker. Software restriction policies are Group Policy settings that let organizations specify which applications users are allowed to run.
So why aren't software restriction policies used more often? Well, the truth is that prior to the creation of AppLocker, software restriction policies were difficult to use effectively and were easy to circumvent. These days, most organizations don't even bother using them.
There are four different types of software restriction policy settings:
- A hash policy -- A fingerprint of a specific file.
- A certificate policy -- A policy based on a software publisher's digital signature.
- A path policy -- One that looks for certain file or registry paths.
- A zone policy -- A policy that checks to see which Internet zone a user is downloading an application from.
All of those policies are easy to circumvent. For example, a hash policy is only effective as long as a file remains in a consistent state. Today, applications are updated routinely, so hash policies can become obsolete in a matter of days as new versions of files are released.
Path policies are also easy to circumvent because it's easy to install an application into a nonstandard location. Registry path policies are more difficult to circumvent, but they are also harder to create because the administrator must have detailed knowledge of which registry keys a specific application creates.
Certificate policies are probably the most effective kind of software restriction policies, but even they have their limits. For starters, not all application publishers use certificates and even if the publisher does use certificates, you may not want to allow every application that the publisher makes to run in your network. For example, you might not have a problem with your users having Microsoft Office, but you probably don't want them installing Microsoft Flight Simulator.
Zone policies are probably the least effective type of policy because they are only effective if an application is run as it's downloaded. If an application has already been saved to disk, then a zone policy has no way of knowing the application's origin.
On top of all of these limitations, an administrator has to be very careful when creating software restriction policies because it's so easy to accidentally create contradictory policies or policies that interfere with the company's business needs.
Microsoft improves on software restriction policies with AppLocker
Fortunately, Microsoft has finally realized the frustration associated with using software restriction policies and is making significant improvements to them in Windows 7. The first change the company made was to the name. Software restriction policies have been rebranded as AppLocker.
Windows 7's AppLocker will be much more flexible than software restriction policies were. Perhaps the biggest improvement we will see in AppLocker is that software restriction policies will be version aware. I mentioned that hash rules quickly become invalidated as application updates are released. Depending on how a hash rule is applied, this means that a user could potentially install an unauthorized update or be prevented from installing a much needed update that he or she would normally be allowed to apply.
Version control allows an organization to specify a minimum version of an application for users to install or run. For example, companies can now create a rule that allows users to install versions 9.0 or above of Adobe Acrobat Reader. That way, users can apply updates at will, but they can't install legacy versions of Acrobat Reader unless they are specifically authorized to do so.
Keep in mind that there will be no such thing in Windows 7 as a "Version Control Rule." Versioning is achieved through publisher rules. Publisher rules are similar to the certificate rules that we have now, in that they are based on a publisher's digital signature. The difference is that a certificate rule only validates the publisher's identity. A publisher rule is able to determine the individual application and its version through information stored in the certificate.
There are some other nice new features as well. Software restriction policies were implemented through a set of obscure Group Policy settings. AppLocker is still based on Group Policy, but it also contains a rule generation wizard that makes the process of creating policies much easier. There is even an automatic rule-making tool that can scan a hard disk for applications and then build a whitelist for you.
Another feature of AppLocker is an import and export capability, which allows you to create a set of rules and then export them to a file that can be imported onto another computer. It's a handy feature if you have computers that are not domain members and therefore not subject to a centralized set of Group Policy rules.
Windows 7 is still in the very early stages of testing, so anything could potentially be changed by the time it is released. For now, though, it appears as though AppLocker may finally make software restriction policies practical.
ABOUT THE AUTHOR:
Brien M. Posey, MCSE, has received Microsoft's Most Valuable Professional Award five times for his work with Windows Server, IIS and Exchange Server. He has served as CIO for a nationwide chain of hospitals and healthcare facilities, and was once a network administrator for Fort Knox.