Application whitelisting is one of Information Assurance top 10 mitigation strategies. This project contains scripts and configuration files for aiding administrators in implementing Microsoft AppLocker as outlined in the Application Whitelisting using Microsoft AppLocker paper. This repository provides a starter policy for Windows 7 and Windows 10, and a Group Policy Object (GPO) for Windows 10 can be found in the AppLocker folder in the Windows Secure Host Baseline repository. Guidance NSA Information Assurance has a security guide for AppLocker called Application Whitelisting Using Microsoft AppLocker.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
Enables code injection into Mac OS X processes with detailed version history and contributing guidelines.
Comprehensive endpoint protection solution providing advanced threat detection, proactive defense, and efficient management.
Xcitium's unified zero-trust platform secures endpoints to cloud workloads using patented Zero Dwell technology, providing complete protection from ransomware and malware infections.
A software tool that enhances visibility and control over application activities on a user's computer, helping to identify and prevent potential security threats.
CrowdStrike Falcon is a unified cybersecurity platform providing complete protection through its AI-native XDR platform.
Endpoint security solution for businesses with advanced threat protection and management
Comprehensive endpoint security solution for enterprise networks and SMBs
AhnLab PLUS is a unified security platform providing comprehensive cybersecurity solutions for businesses.
Cloud-based virus scan APIs for securing files, URLs, and content uploads with advanced anti-virus and malware scanning capabilities.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.