MacMusic  |  PcMusic  |  440 Software  |  440 Forums  |  440TV  |  Zicos
windows
Search

Use Windows Pro’s whitelist tools to keep unwanted apps off your PC

Monday February 24, 2025. 03:00 PM , from PC World
Use Windows Pro’s whitelist tools to keep unwanted apps off your PC
Most users are familiar with Windows Defender (the antivirus tool built into Windows Security), which continuously monitors the system for suspicious software activity and also identifies and blocks dangerous intruders based on a database of virus definitions.

However, no antivirus software can prevent users from installing programs that open up access to the PC like the Greek warriors with their Trojan horse.

To prevent this, it is advisable to whitelist the basic configuration of the computer. Whitelisting means that you, as administrator, create a list of all permitted programs.

Further reading: The best antivirus software

All applications that are added later are automatically blocked by Windows and prevented from running — unless, of course, you also add them to your whitelist.

In this way, you can prevent family members, school classes, or employees from secretly downloading virus-infected programs onto your PC.

At the same time, whitelisting also offers additional protection against previously unknown malware that is not covered by the virus definition lists.

A whitelist for programs




The Local Security Policy tool is included in both Windows Pro and Home. In the Home version, however, it must first be integrated via the command prompt.
Microsoft

To configure a whitelist, you need the Windows on-board tool Local Security Policy.

It is included in the Pro versions of Windows 10 and 11 as well as in the Enterprise versions. The Local Security Policy is also included in Windows 10 and 11 Home, but must first be integrated into the system.

You can read how to do this in the box “Enable Local Security Policy in Windows Home” at the end of the article.

You can use the Local Security Policy to configure the Windows Applocker feature, which has been included in all Windows versions since Windows 10 1809.

Applocker works with rules — known as policies — and is therefore comparable to the Windows firewall. You can use the function to create both a whitelist and a blacklist.

A blacklist allows all applications to run and only blocks a few explicitly named programs. However, as thousands of new malware programs with new names and files appear every day, it is more practical to configure a whitelist of existing, approved programs and block everything else.




Use the Local Security Policy tool to configure the Applocker application control, which has been available in the operating system since Windows 10 1809.
Foundry

Set up the Applocker whitelist

Type secpol in the taskbar search field and click on the hit of the same name to open Local Security Policy. Then go to Application Control Policies > AppLocker. There you will find four subfolders. The folder “Executable rules” is interesting, it deals with files with the extensions EXE and COM.

The rules can be adjusted individually for each program. However, this is time-consuming and complicated. Microsoft has therefore included an option to assign a standard rule to applications that is suitable for most purposes.

To assign a default rule, right-click on Executable rules and select “Create default rules;” and then right -click on Executable rules again and select “Automatically generate rules.”




Start by defining the rules for the whitelist. Applocker provides ready-made standard rules that you can simply adopt.Foundry

This starts a wizard, in the first window of which the folder C:Program Files is selected. After clicking on “Next,” you will be taken to the “Rule settings” window.

There you can choose between the options “File hash” and “Path.” This is about the way in which Applocker should identify programs: by the hash value of their EXE or COM file or by the path in which they are installed.

A file name such as Notepad.exe is not suitable for identifying an application, as many malware programs use the names of typical Windows tools to disguise themselves. Leave the default setting “File hash” and click “Next.”

Applocker now creates the rules for the applications under C:Program Files. Click on “Create” to confirm. Then repeat the process for the C:Program Files (x86) and C:Windows folders.




After defining the default rules, specify the folders to which these rules should be applied. The rule wizard suggests C:Program Files or C:Program Files as the first folder.Foundry

Activate application identity

For Applocker to work, the Windows service Application Identity must be active.

Type services into the search field in the taskbar and click on the hit with the same name. Double-click on the “Application Identity” entry in the list and press the “Start” button.

If you now try to call up a program outside the above-mentioned folders, you will receive the error message “This app has been blocked by the system administrator.”




Once the configuration is complete, Applocker will display a long list of applications that are permitted to run by the whitelist.
Foundry

Only applications located in the folders C:Program Files, C:Program Files (x86), and C:Windows can now be called up. Applocker has added these programs to the whitelist.

However, it is not possible for standard users to add further programs to these folders as they do not have write permissions in these folders. This is reserved for users with administrator rights.

This configuration provides you with effective protection against virus programs penetrating the system. In addition, users without administrator rights can no longer install their own software. Access to documents, image files, videos, music, etc. remains unaffected.

Try out whether you can work with Windows sealed in this way. Please note that all EXE and COM files installed under C:Users or in other folders not included in the whitelist are blocked.

If problems occur, you only need to restart Windows. As the start type of the Application Identity service is set to “Manual,” it is deactivated after the restart. This also deactivates Applocker.

If you want to activate Applocker permanently, call up the properties of the service again, change the “Startup type” to “Automatic,” and confirm with “OK.” The service will then be loaded every time Windows is started and Applocker will be activated.

If the change of the startup type fails with the message “Access denied,” call the registry editor Regedit.exe, go to the folder

HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesAppIDSvc folder

and enter a “2” for the “Start” key. The change is effective immediately and can no longer be undone via the properties of the service. To return to the manual startup type, open the registry editor and enter a “3” in the above-mentioned key.

If you have accidentally locked your Windows system so that you can no longer access the registry editor, right-click on the Start button in the taskbar and open “Terminal (Administrator)” in the following menu.

You can also open the editor from the command line by entering regedit. Then — as described above — set the manual startup type again and reboot Windows.

To switch off Applocker permanently, select the executable rules in Local Group Policy, then right-click on the list and click on “Delete.”

Cyberlock as an alternative to Applocker

Applocker offers many more options than we can describe in this article. The Cyberlock tool is even more comprehensive.

It was previously distributed as freeware under the name Voodooshield and now has to be licensed under the new name for $30. You can test the program free of charge for 15 days.

After installation, Cyberlock scans the Windows installation, takes a snapshot of the applications found, and creates a whitelist.

As soon as you then download, install, or uninstall an application or start an unsigned application, the software displays a notification window in the taskbar corner.

There you must select one of the three options “Block,” “Sandbox,” or “Install”/”Allow.” You have 20 seconds to do this. If you do not respond, Cyberlock cancels the installation process.

Other whitelisting tools

Applocker’s predecessor was the Software Restriction Policies (SRP) included in Windows since XP. However, Microsoft has deactivated this function with Windows 11 22H2.




Windows Smart App Control is only activated if you primarily work with digitally signed standard applications.
Foundry

Another whitelisting tool is at best suitable for preventing Windows newcomers from installing potentially dangerous software. In the Settings of Windows, you can select the option “Microsoft Store only (recommended)” under Apps > Advanced settings for apps.

Windows users will then only be able to install verified programs from the Store. However, this block can be easily bypassed, for example with the command line tool winget, which is pre-installed in the newer Windows versions.

You can also find “Smart App Control” in the Settings under Privacy & security > Windows Security > App & browser control. The function is initially inactive after a Windows installation and monitors your work on the PC in an evaluation mode.

If it detects that you mainly work with standard programs such as Word, Excel, Acrobat, common graphics applications, etc., it becomes active after a few weeks and then only allows the installation of software that either has a digital signature or passes the check by a cloud-based AI.

If, on the other hand, you often use rather unknown tools, Smart App Control remains deactivated. As a user, you have no influence over this.




In Kiosk mode, Windows only allows a single application to run. This mode is intended for presentations in store windows, at information events, or at marketing events.Foundry

Kiosk mode in Windows, on the other hand, offers configurable whitelisting. You can access it via Settings and there under Accounts > Other Users > Kiosk.

Click on “Let’s go” to start a wizard with which you can set up a new user account that is automatically selected and logged in when Windows starts.

This account can only be used to run a single, freely configurable application. Kiosk mode is intended, for example, for stores that always want to show the same presentation in their store window.

Enable local security policy in Windows Home

The Local Security Policy tool is part of Windows 10 and 11 Pro and the Enterprise versions of Windows. It is also included in Windows 10 and 11 Home, but is not integrated into the system there.

To change this, you need the command prompt. Type cmd in the search window of the Start menu and click on “Run as administrator” in the following window on the right-hand side. Enter the command

FOR %F IN (″%SystemRoot%servicingPackagesMicrosoft-Windows-GroupPolicy-ClientTools-Package~*.mum″) DO (DISM /Online /NoRestart /Add-Package:″%F″)

and press Enter. Once processing is complete, continue with the command

FOR %F IN (″%SystemRoot%servicingPackagesMicrosoft-Windows-GroupPolicy-ClientExtensions-Package~*.mum″) DO (DISM /Online /NoRestart /Add- Package:″%F″)

You can then search for and call up the Local Security Policy via the Start menu.
https://www.pcworld.com/article/2584017/whitelist-for-windows-install-only-permitted-programmes.html

Related News

News copyright owned by their original publishers | Copyright © 2004 - 2025 Zicos / 440Network
Current Date
Feb, Mon 24 - 19:14 CET