Forum Discussion

jfdoyon's avatar
jfdoyon
Copper Contributor
Aug 31, 2022
Solved

WDAC Policies not applying!

Hello,

 

Trying out WDAC for the first time.

 

I have:

 

- Downloaded the WDAC Wizard

- Created a base "Windows Works" policy

- Created a supplemantal policy that allows the 2 Program Files folders

- All of this in Audit Mode Only

- I have created a custom profile in MEM and used 2 OMA-URIs, one fo each policy, using the ApplicationControl CSP, as per the docs.

- I have verified that these 2 policies appear on the workstation, looking in C:\Windows\System32\CodeIntegrity\CiPolicies\Active, where they appear.

- The MEM reports for the device show that the profile is applied correctly.

 

And yet, when I look at the CodeIntegrity event log, all the events I see refer to the default audit policy that comes with windows. I see (Policy ID:{a244370e-44c9-4c06-b551-f6016e563076}) instead of *my* policy IDs, no matter what I do. I've rebooted a couple of times for good measure.

 

I left the endpoint control profile setting for WDAC to "Not Configured", since https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-application-control/deployment/deploy-windows-defender-application-control-policies-using-intune says the built-in policies use the AppLocker CSP and pre-1903 settings. (I did have it set to Audit Only" previously though).

 

Any one have any idea what might be going on here? What am I missing?

 

Thanks,

J.F.

  • Figured it out.

    I used wbemtest to browse the WMI Bridge to see whether I could find instances of the CI policies.

    I found 4, two of which were mine. A third was related to driver integrity, and the 4th was the policy that was getting my way.

    I deleted the offtending instance direclty from wbemtest, and now everything works as expected, or at least the CI event log is showing things I expected.

    This is somewhat documented here: https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-application-control/deployment/deploy-windows-defender-application-control-policies-using-intune

    Where it mentions that pre-1903 policies must be deleted by script or overridden. Because I had used the intune builtin policy, I fell under this category, even though I was using a 21H2 machine.

1 Reply

  • jfdoyon's avatar
    jfdoyon
    Copper Contributor

    Figured it out.

    I used wbemtest to browse the WMI Bridge to see whether I could find instances of the CI policies.

    I found 4, two of which were mine. A third was related to driver integrity, and the 4th was the policy that was getting my way.

    I deleted the offtending instance direclty from wbemtest, and now everything works as expected, or at least the CI event log is showing things I expected.

    This is somewhat documented here: https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-application-control/deployment/deploy-windows-defender-application-control-policies-using-intune

    Where it mentions that pre-1903 policies must be deleted by script or overridden. Because I had used the intune builtin policy, I fell under this category, even though I was using a 21H2 machine.

Resources