<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>security policies Archives - Linux Windows and android Tutorials</title>
	<atom:link href="https://www.osradar.com/tag/security-policies/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.osradar.com</link>
	<description>tutorials and news and Seurity</description>
	<lastBuildDate>Mon, 04 Jan 2021 12:29:33 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=5.8.12</generator>
	<item>
		<title>How to master Linux Server Securities</title>
		<link>https://www.osradar.com/how-to-master-linux-server-securities/</link>
					<comments>https://www.osradar.com/how-to-master-linux-server-securities/#respond</comments>
		
		<dc:creator><![CDATA[rajneesh]]></dc:creator>
		<pubDate>Mon, 04 Jan 2021 07:39:26 +0000</pubDate>
				<category><![CDATA[Linux]]></category>
		<category><![CDATA[firewall]]></category>
		<category><![CDATA[security policies]]></category>
		<category><![CDATA[servers]]></category>
		<category><![CDATA[ubuntu]]></category>
		<guid isPermaLink="false">https://www.osradar.com/?p=27422</guid>

					<description><![CDATA[<p>Today, in this article we will discuss how to master Linux server securities. Default securities are good in Linux but, require some extra care. Hackers can sniff your system easily if not taken care of properly. This is going to be a detailed topic I will try to cover it up in 02 to 03 [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/how-to-master-linux-server-securities/">How to master Linux Server Securities</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Today, in this article we will discuss how to master Linux server securities. <mark>Default securities are good in Linux but, require some extra care.</mark> Hackers can sniff your system easily if not taken care of properly. This is going to be a detailed topic I will try to cover it up in 02 to 03 writeups. </p>



<p>Key factors. </p>



<ul><li>Open Ports.</li><li>Insecure or non-updated software.</li><li>Weak passwords policy.     </li><li>Attacks on administrator accounts.</li><li>Lack of physical securities.</li></ul>



<h3>Open Ports.</h3>



<figure class="wp-block-image size-large"><img loading="lazy" width="1024" height="409" src="//1081754738.rsc.cdn77.org/wp-content/uploads/2021/01/Untitled-design-3-1024x409.png" alt="Open ports can be attacked easily. " class="wp-image-27442" srcset="https://www.osradar.com/wp-content/uploads/2021/01/Untitled-design-3-1024x409.png 1024w, https://www.osradar.com/wp-content/uploads/2021/01/Untitled-design-3-300x120.png 300w, https://www.osradar.com/wp-content/uploads/2021/01/Untitled-design-3-768x307.png 768w, https://www.osradar.com/wp-content/uploads/2021/01/Untitled-design-3-696x278.png 696w, https://www.osradar.com/wp-content/uploads/2021/01/Untitled-design-3-1068x427.png 1068w, https://www.osradar.com/wp-content/uploads/2021/01/Untitled-design-3.png 1181w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure>



<p></p>



<p>Ports scanning is the first thing that any Attacker would do before attacking your servers. They could get an idea of which service can be compromised based upon open ports. There are multiple methods to scan and identify open ports <a href="https://nmap.org/">Nmap</a> is one of them. </p>



<pre class="wp-block-preformatted"># apt install nmap
# yum install nmap</pre>



<p></p>



<figure class="wp-block-image size-large"><img loading="lazy" width="728" height="402" src="//1081754738.rsc.cdn77.org/wp-content/uploads/2021/01/image-23.png" alt="use nmap to scan open ports." class="wp-image-27429" srcset="https://www.osradar.com/wp-content/uploads/2021/01/image-23.png 728w, https://www.osradar.com/wp-content/uploads/2021/01/image-23-300x166.png 300w, https://www.osradar.com/wp-content/uploads/2021/01/image-23-696x384.png 696w" sizes="(max-width: 728px) 100vw, 728px" /></figure>



<h3>Insecure or non-updated software</h3>



<figure class="wp-block-image size-large is-resized"><img loading="lazy" src="//1081754738.rsc.cdn77.org/wp-content/uploads/2021/01/Untitled-design-1-1024x409.png" alt="Insecure or non-updated software can cause security issues." class="wp-image-27435" width="682" height="270"/></figure>



<p>If you are not updating the server regularly, attackers can gain access via using exploits. Misconfigures services can be harmful too. Always make sure to keep Operating System updated. Multiple tools are available to test vulnerabilities. OpenVAS is one of the famous tool that can be installed on the server to scan vulnurabitiels.  </p>



<p>Install <a href="http://www.openvas.com/">OpenVAS</a></p>



<pre class="wp-block-preformatted">#apt install openvas
#yum install openvas</pre>



<p>Start Service.</p>



<pre class="wp-block-preformatted"># openvas-start &amp;&amp; openvas-setup</pre>



<p>Login to get reports.</p>



<figure class="wp-block-image size-large"><img loading="lazy" width="770" height="578" src="//1081754738.rsc.cdn77.org/wp-content/uploads/2021/01/image-28.png" alt="" class="wp-image-27455" srcset="https://www.osradar.com/wp-content/uploads/2021/01/image-28.png 770w, https://www.osradar.com/wp-content/uploads/2021/01/image-28-300x225.png 300w, https://www.osradar.com/wp-content/uploads/2021/01/image-28-768x576.png 768w, https://www.osradar.com/wp-content/uploads/2021/01/image-28-696x522.png 696w" sizes="(max-width: 770px) 100vw, 770px" /></figure>



<h3>Weak passwords policy</h3>



<figure class="wp-block-image size-large is-resized"><img loading="lazy" src="//1081754738.rsc.cdn77.org/wp-content/uploads/2021/01/Untitled-design-2-1024x409.png" alt="Loose password can harm server securities. " class="wp-image-27436" width="679" height="267"/></figure>



<p>Using a tool like hydra attackers can gain access if your system is set up with weak passwords and have unwanted ports open. Always use complicated passwords and keeping them changing from time to time can reduce the chances of attacks. Let&#8217;s take a look at how hydra can be used to target servers with weak passwords. create a list of usernames and passwords with all possible combinations (userlist.txt &amp; passwd.txt are created in my scenario).</p>



<pre class="wp-block-preformatted"># apt install hydra</pre>



<p> Run command. </p>



<pre class="wp-block-preformatted"># hydra -L /root/userlist.txt -p /root/passwd.txt -u 127.0.0.1 ssh</pre>



<figure class="wp-block-image size-large"><img loading="lazy" width="758" height="325" src="//1081754738.rsc.cdn77.org/wp-content/uploads/2021/01/image-27.png" alt="Run hydra command to gain access." class="wp-image-27446" srcset="https://www.osradar.com/wp-content/uploads/2021/01/image-27.png 758w, https://www.osradar.com/wp-content/uploads/2021/01/image-27-300x129.png 300w, https://www.osradar.com/wp-content/uploads/2021/01/image-27-696x298.png 696w" sizes="(max-width: 758px) 100vw, 758px" /></figure>



<h3>Attacks on administrator accounts</h3>



<figure class="wp-block-image size-large is-resized"><img loading="lazy" src="//1081754738.rsc.cdn77.org/wp-content/uploads/2021/01/Untitled-design-1024x409.png" alt="Attacked on administrator accounts" class="wp-image-27433" width="709" height="282" srcset="https://www.osradar.com/wp-content/uploads/2021/01/Untitled-design-1024x409.png 1024w, https://www.osradar.com/wp-content/uploads/2021/01/Untitled-design-300x120.png 300w, https://www.osradar.com/wp-content/uploads/2021/01/Untitled-design-768x307.png 768w, https://www.osradar.com/wp-content/uploads/2021/01/Untitled-design-696x278.png 696w, https://www.osradar.com/wp-content/uploads/2021/01/Untitled-design-1068x427.png 1068w, https://www.osradar.com/wp-content/uploads/2021/01/Untitled-design.png 1181w" sizes="(max-width: 709px) 100vw, 709px" /></figure>



<p>Remember, if an attacker can gain access to an administrator account. An attacker can gain access to other servers as well. Even after having to have good securities, the hackers were able to gain access. Always make sure not to share passwords with unauthorized persons.</p>



<h3>Lack of physical securities</h3>



<figure class="wp-block-image size-large is-resized"><img loading="lazy" src="//1081754738.rsc.cdn77.org/wp-content/uploads/2021/01/Untitled-design-4-1024x409.png" alt="" class="wp-image-27452" width="704" height="278"/></figure>



<p></p>



<p>Proving multi-factor authentications, providing physical locks can save servers from unwanted access. Do not provide any direct physical access like monitors or keyboards. Block all USB or other serial ports that can be attached directly to servers.  No media file sharing has to be with critical operational servers.  </p>



<h3>Conclusion.</h3>



<p>Today, we have learned how an attacker can gain easy access to servers &amp; how to avoid it. Scanning ports with Nmap, system&#8217;s health check with OpenVAS are part of security assessment.  <strong> In the next article, we will understand other aspects of security. </strong></p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/how-to-master-linux-server-securities/">How to master Linux Server Securities</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.osradar.com/how-to-master-linux-server-securities/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How to program the expiration of accounts on Windows 10</title>
		<link>https://www.osradar.com/how-to-program-the-expiration-of-accounts-on-windows-10/</link>
					<comments>https://www.osradar.com/how-to-program-the-expiration-of-accounts-on-windows-10/#respond</comments>
		
		<dc:creator><![CDATA[Roger Polanco]]></dc:creator>
		<pubDate>Mon, 02 Sep 2019 00:46:16 +0000</pubDate>
				<category><![CDATA[Applications]]></category>
		<category><![CDATA[Desktop]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[account]]></category>
		<category><![CDATA[security policies]]></category>
		<category><![CDATA[Windows]]></category>
		<category><![CDATA[Windows 10]]></category>
		<guid isPermaLink="false">http://www.googez.com/?p=946</guid>

					<description><![CDATA[<p>Hello, how are you today? When we install windows 10, we usually use only one user account. Normally, this account also has administrator privileges. Of course, if our equipment is for personal use only, this is not a problem. However, sometimes the computer is used by more than one user. In that case, using a [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/how-to-program-the-expiration-of-accounts-on-windows-10/">How to program the expiration of accounts on Windows 10</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Hello, how are you today? When we install windows 10, we usually use only one user account. Normally, this account also has administrator privileges. Of course, if our equipment is for personal use only, this is not a problem. However, sometimes the computer is used by more than one user. In that case, using a single account may cause privacy and security issues as well. It is also likely that a user will end up erasing other people&#8217;s data, which can cause problems. In that case, windows offer the possibility of assigning accounts to users who run a computer.However, sometimes these accounts remain unused, resulting in the use of hard disk space.. For that reason, in this post, I will show you how to program the expiration of user accounts.</p>



<h2>Programming the user&#8217;s account expiration.</h2>



<p>Please note, this feature only works on Windows 10 Pro or Windows 10 Enterprise. First, we need to log in from an account with administrator privileges. Them, please type <em>edit group policy </em> in the search bar.</p>



<figure class="wp-block-image"><img src="http://www.googez.com/wp-content/uploads/2019/08/account-1.jpg" alt="Opening group policy editor" class="wp-image-950"/><figcaption>Opening group policy editor</figcaption></figure>



<p>Once there, we will follow the following route: <em>Local Computer Policy&gt;Administrative Templates&gt;System. </em>Next, we locate in the right window: <em>user profiles</em></p>



<figure class="wp-block-image"><img src="http://www.googez.com/wp-content/uploads/2019/08/account2-1024x728.jpg" alt="Editing Local Group Policy Editor" class="wp-image-952"/><figcaption>Editing Local Group Policy Editor</figcaption></figure>



<p>Now, we have to double-click on <em>Delete user profiles older than a specified number of days on system restart. </em>Plainly,  this feature is not configured by default, so we have to enable it to enjoy the characteristic. </p>



<figure class="wp-block-image"><img src="http://www.googez.com/wp-content/uploads/2019/08/account3.jpg" alt="" class="wp-image-953"/></figure>



<p>In this window, we will see all the configurations related to the time of the accounts. The default time is 30 days, but it will depend on the administrator which amount of time will be assigned. Finally, we only have to press <em>accept</em> to execute the changes.</p>



<p>As<strong> </strong>can be seen, how to program the expiration of user accounts is a very interesting feature to control privacy on PCs. By controlling the expiration time of user accounts, we will be able to take care of the use of the hard disk. In addition to protecting our personal files from possible intrusions. All right, that&#8217;s it for the moment, please visit our <a rel="noreferrer noopener" aria-label="Visual Studio (opens in a new tab)" href="http://www.googez.com/how-to-install-and-configure-visual-studio-code-in-windows-10/" target="_blank">Visual Studio</a> article on Windows 10. Please join our channel in <a rel="noreferrer noopener" aria-label="telegram (opens in a new tab)" href="https://t.me/googez" target="_blank">telegram</a></p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/how-to-program-the-expiration-of-accounts-on-windows-10/">How to program the expiration of accounts on Windows 10</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.osradar.com/how-to-program-the-expiration-of-accounts-on-windows-10/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How to change the password policies for  local and domain passwords on Windows Server 2019</title>
		<link>https://www.osradar.com/how-to-change-the-password-policies-for-local-and-domain-passwords-on-windows-server-2019/</link>
					<comments>https://www.osradar.com/how-to-change-the-password-policies-for-local-and-domain-passwords-on-windows-server-2019/#respond</comments>
		
		<dc:creator><![CDATA[Roger Polanco]]></dc:creator>
		<pubDate>Fri, 16 Aug 2019 22:05:57 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Servers]]></category>
		<category><![CDATA[Tools]]></category>
		<category><![CDATA[password]]></category>
		<category><![CDATA[security policies]]></category>
		<category><![CDATA[Windows 10]]></category>
		<category><![CDATA[Windows server 2019]]></category>
		<guid isPermaLink="false">http://www.googez.com/?p=754</guid>

					<description><![CDATA[<p>Hello, how are you doing? In this opportunity, we will talk about password policies on Windows Server 2019. Once we have managed users through Active Directory, we need to set the valid date of the passwords. Indeed, sometimes we need to restrict access to certain users due to the security policies of the organization. Please [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/how-to-change-the-password-policies-for-local-and-domain-passwords-on-windows-server-2019/">How to change the password policies for  local and domain passwords on Windows Server 2019</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Hello, how are you doing? In this opportunity, we will talk about password policies on <a href="https://www.microsoft.com/es-es/cloud-platform/windows-server" target="_blank" rel="noreferrer noopener" aria-label="Windows Server 2019 (opens in a new tab)">Windows Server 2019</a>. Once we have managed users through <a rel="noreferrer noopener" aria-label="Active Directory (opens in a new tab)" href="http://www.osradar.com/step-by-step-setup-active-directory-domain-service-on-windows-server-2019/" target="_blank">Active Directory</a>, we need to set the valid date of the passwords. Indeed, sometimes we need to restrict access to certain users due to the security policies of the organization.</p>



<p>Please keep in mind that when working with servers, security is a fundamental aspect. For this reason, there are several reasons for modifying the duration of passwords. For this reason, there are several reasons for modifying the duration of passwords. According to the type of use, it is convenient to establish passwords with security time. For example, to temporary users, test users or those who are practicing in the company.</p>



<p>Now, we have two options for modifying password expiration policies on Windows Server 2019. <strong>Group Policy</strong>: Apply for when the computer is included in a corporate domain with Windows Server Domain Controller. <strong>Local Security Policy</strong>: Applies when our group is not in a domain, but is in a workgroup or is managed locally. Here&#8217;s how to change a password or change the expiration date of a password within Windows Server 2019 step by step.</p>



<h2>Changing password expiration through Local Security Policy on Windows Server 2019</h2>



<p>Below we will detail the process for entering the password policy configuration.</p>



<h2>Step 1. Open Local Group Policy Editor</h2>



<p>First, we need to enter Group Policy Management by clicking Windows+R and typing <em>gpedit.msc</em></p>



<figure class="wp-block-image"><img src="http://www.osradar.com/wp-content/uploads/2019/08/pass.jpg" alt="running gpedit.msc" class="wp-image-758"/><figcaption>running gpedit.msc</figcaption></figure>



<p>Once there, we must follow the next route: <em>Local Computer Policy&gt;Computer Configuration&gt;Windows Settings&gt;Security Settings&gt;Password Policy</em></p>



<figure class="wp-block-image"><img src="http://www.osradar.com/wp-content/uploads/2019/08/pass2-1024x728.jpg" alt="Local Group Policy Editor " class="wp-image-786"/><figcaption>Local Group Policy Editor </figcaption></figure>



<h2>Step 2. Editing password policies</h2>



<p>The editor allows you to configure different aspects of the password:</p>



<p><strong>Enforce password history.</strong> This security setting determines the number of unique new passwords that have to be associated with a user account before an old password can be reused. The value must be between 0 and 24 passwords.</p>



<p><strong>Maximum password age.</strong> This security setting determines the period of time (in days) that a password can be used before the system requires the user to change it. You can set passwords to expire after a number of days between 1 and 999, or you can specify that passwords never expire by setting the number of days to 0.</p>



<p><strong>Minimum password age.</strong> This security setting determines the period of time (in days) that a password must be used before the user can change it. You can set a value between 1 and 998 days, or you can allow changes immediately by setting the number of days to 0.</p>



<p><strong>Minimum password length</strong>. This security setting determines the least number of characters that a password for a user account may contain. It can set a value of between 1 and 20 characters, or you can establish that no password is required by setting the number of characters to 0.</p>



<p><strong>Password must meet complexity requirements</strong>. This security setting determines whether passwords must meet complexity requirements. </p>



<h2>Password Requirements</h2>



<p>

If it enabled, the password must  meet the following minimum requirements:

</p>



<p>Not contain the user&#8217;s account name or parts of the user&#8217;s full name that exceed two consecutive characters<br>Be at least six characters in length<br>Contain characters from three of the following four categories:<br>English uppercase characters (A through Z)<br>English lowercase characters (a through z)<br>Base 10 digits (0 through 9)<br>Non-alphabetic characters (for example, !, $, #, %)</p>



<p><strong>Store passwords using reversible encryption. </strong>This security setting determines whether the operating system stores passwords using reversible encryption. This policy provides support for applications that use protocols that require knowledge of the user&#8217;s password for authentication purposes.</p>



<h2>Changing password expiration through Local Active Directory on Windows Server 2019 </h2>



<p>To access the domain password policy editor, we need to open the Server Manager. Next, click on the Active Directory Administrative Center tool.</p>



<figure class="wp-block-image"><img src="http://www.osradar.com/wp-content/uploads/2019/08/pass3-1-1024x730.jpg" alt="Opening group policy management" class="wp-image-789"/><figcaption>Opening group policy management</figcaption></figure>



<p>In the next window, select the forest and then follow the following path: <em>Domains&gt;nameofdomain&gt;Default Domain Policy</em>. Where <em>nameofdomain</em> is the name of our domain, in my case telematic.local. Next, double click on <em>Default Domain Policy</em> to edit the values.</p>



<figure class="wp-block-image"><img src="http://www.osradar.com/wp-content/uploads/2019/08/pass4-1.jpg" alt="Opening Default Domain editor" class="wp-image-791"/><figcaption>Opening Default Domain editor</figcaption></figure>



<p>Once the window opens, follow this path: <em>Default Domain Policy&gt;Compuer Configuration&gt;Policies&gt;Windows Settings&gt;Security Settings&gt;Password policy</em></p>



<figure class="wp-block-image"><img src="http://www.osradar.com/wp-content/uploads/2019/08/pass5-1024x728.jpg" alt="" class="wp-image-793"/><figcaption>Group Policy Management Editor</figcaption></figure>



<p>As we see we have the same options as in the local directives, the only difference is that if we open the local policies with our computer in a domain we cannot make any change in the directives. On the other hand,  from a computer in a domain using this option if we will be able to make adjustments in the policies.</p>



<h2>Changing or unlocking administrator password on Windows Server 2019</h2>



<p>Sometimes it happens that we want to change the administrator password, or the account has been blocked. Sometimes it happens that we want to change the administrator password, or the account has been blocked. To do this, we must enter the Server Manager and select <em>Active Directory Administrative Center</em>.</p>



<figure class="wp-block-image"><img src="http://www.osradar.com/wp-content/uploads/2019/08/pass6-1024x768.jpg" alt="Entering on Active Directory Administrative Center" class="wp-image-796"/><figcaption>Entering on Active Directory Administrative Center</figcaption></figure>



<p>Once there, all you have to do is select Reset Password, and enter the new password or unblock the account if it is locked.</p>



<figure class="wp-block-image"><img src="http://www.osradar.com/wp-content/uploads/2019/08/pass7-1-1024x728.jpg" alt="Changing the administrator Password. Unlocking account" class="wp-image-798"/><figcaption>Changing the Administrator Password. Unlocking account</figcaption></figure>



<p>As has been noted, the process for changing password policies is not that complicated. However, we must be careful when modifying these values, as it will affect the entry of users.  In conclusion, Windows Server 2019 is a very friendly system and has wizards that facilitate the changes desired by the server administrator. </p>



<p>Well,  this is all for now, before saying goodbye I would like to invite you to review our tutorial on installing <a href="http://www.osradar.com/installing-apache-on-windows-server-2019/" target="_blank" rel="noreferrer noopener" aria-label="Apache  (opens in a new tab)">Apache </a>on Windows Server 2019.</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/how-to-change-the-password-policies-for-local-and-domain-passwords-on-windows-server-2019/">How to change the password policies for  local and domain passwords on Windows Server 2019</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.osradar.com/how-to-change-the-password-policies-for-local-and-domain-passwords-on-windows-server-2019/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Using AppLocker to block unwanted apps in Windows 10</title>
		<link>https://www.osradar.com/using-applocker-to-block-unwanted-apps-in-windows-10/</link>
					<comments>https://www.osradar.com/using-applocker-to-block-unwanted-apps-in-windows-10/#respond</comments>
		
		<dc:creator><![CDATA[Roger Polanco]]></dc:creator>
		<pubDate>Fri, 16 Aug 2019 01:52:29 +0000</pubDate>
				<category><![CDATA[Applications]]></category>
		<category><![CDATA[Desktop]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[applications]]></category>
		<category><![CDATA[rules]]></category>
		<category><![CDATA[security policies]]></category>
		<category><![CDATA[Windows 10]]></category>
		<guid isPermaLink="false">http://www.googez.com/?p=696</guid>

					<description><![CDATA[<p>Hello, how are you? Welcome back! This time I want to talk to you about security in Windows 10. This has been an aspect of constant debate in the community. Because it is considered that the system leaves gaps that allow unwanted applications to make changes to the system. Microsoft has not remained oblivious to [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/using-applocker-to-block-unwanted-apps-in-windows-10/">Using AppLocker to block unwanted apps in Windows 10</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Hello, how are you? Welcome back! This time I want to talk to you about security in Windows 10. This has been an aspect of constant debate in the community. Because it is considered that the system leaves gaps that allow unwanted applications to make changes to the system. Microsoft has not remained oblivious to this problem and continues to implement measures to improve the security of its operating system. With this in mind, we&#8217;re going to enable and configure <a href="https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-overview" target="_blank" rel="noreferrer noopener" aria-label="AppLocker  (opens in a new tab)">AppLocker </a>to block unwanted applications in Windows 10.</p>



<p>Basically, what this tool does is configure rules that can be for all users or a particular group. These rules can be imported or exported, applications can be locked according to the type of files, their scripts, and extensions. As we can see, it will give us total control over what can and cannot be installed. So let&#8217;s get on with it.</p>



<h2>Configuring security rules in AppLocker</h2>



<p>The first thing we have to do is enter in the Local Security Policy editor. With this intention, we need to press the key Windows + R, and in the run box, enter the term <em>secpol.msc</em>.</p>



<figure class="wp-block-image"><img src="http://www.googez.com/wp-content/uploads/2019/08/app2-1.jpg" alt="Run secpol.msc to enter into Local Security Policy editor." class="wp-image-701"/><figcaption>Run secpol.msc to enter into Local Security Policy editor.</figcaption></figure>



<figure class="wp-block-image"><img src="http://www.googez.com/wp-content/uploads/2019/08/app-1.jpg" alt="" class="wp-image-702"/><figcaption> <em>Run secpol.msc to enter into Local Security Policy editor.</em> </figcaption></figure>



<p>Once inside the window, follow this path: <em>Security Settings&gt;Application Control Policies&gt;AppLocker</em></p>



<figure class="wp-block-image"><img src="http://www.googez.com/wp-content/uploads/2019/08/app3.jpg" alt="Opening AppLocker" class="wp-image-703"/><figcaption>Opening AppLocker</figcaption></figure>



<p>Click on AppLocker, to display the side menu, select <em>Configure rule enforcement</em></p>



<figure class="wp-block-image"><img src="http://www.googez.com/wp-content/uploads/2019/08/app4.jpg" alt="Configuring rule enforcement" class="wp-image-705"/><figcaption>Configuring rule enforcement</figcaption></figure>



<p>This will open the properties box with the types of rules that can be configured. In this particular case we will select <em>executables rules</em>, but please note that you can choose the ones you want.</p>



<figure class="wp-block-image"><img src="http://www.googez.com/wp-content/uploads/2019/08/app5.jpg" alt="Configuring AppLocker properties" class="wp-image-708"/><figcaption>Configuring AppLocker properties</figcaption></figure>



<p>Then deploy AppLocker, right-click on E<em>xecutable Rules</em> and select the option Generate rules automatically.</p>



<figure class="wp-block-image"><img src="http://www.googez.com/wp-content/uploads/2019/08/app6.jpg" alt="Selecting Automatically Generate Rules" class="wp-image-709"/><figcaption>Selecting Automatically Generate Rules</figcaption></figure>



<p>A configurator will open and we will choose the users to whom the rule will be applied, the folder to analyze and the name of the rules.</p>



<figure class="wp-block-image"><img src="http://www.googez.com/wp-content/uploads/2019/08/app8.jpg" alt="Setting users, folder and Permissions" class="wp-image-711"/><figcaption>Setting users, folder and Permissions</figcaption></figure>



<p>In the next window choose the file filtering criteria: by type or by the path.</p>



<figure class="wp-block-image"><img src="http://www.googez.com/wp-content/uploads/2019/08/app10.jpg" alt="Setting Rules Preferences" class="wp-image-712"/><figcaption>Setting Rules Preferences</figcaption></figure>



<p>By pressing next, the rule creation process will start.</p>



<figure class="wp-block-image"><img src="http://www.googez.com/wp-content/uploads/2019/08/app9.jpg" alt="Generating rules" class="wp-image-713"/><figcaption>Generating rules</figcaption></figure>



<p>Finally, we will see a summary of the rules. Click on <em>create</em> to generate them. Moreover, a warning box will appear, just say <em>yes</em> and the procedure will be ready.</p>



<figure class="wp-block-image"><img src="http://www.googez.com/wp-content/uploads/2019/08/app11.jpg" alt="Review Rules" class="wp-image-715"/><figcaption>Reviewing Rules</figcaption></figure>



<p>The following table will show the rules created.</p>



<figure class="wp-block-image"><img src="http://www.googez.com/wp-content/uploads/2019/08/app12.jpg" alt="New rules created" class="wp-image-716"/><figcaption>New rules created</figcaption></figure>



<p>Since the rules have been created, we can still edit them by double-clicking and selecting properties.</p>



<figure class="wp-block-image"><img src="http://www.googez.com/wp-content/uploads/2019/08/app13.jpg" alt="Editing Allow properties" class="wp-image-717"/><figcaption>Editing Allow properties</figcaption></figure>



<h2> Configure the Application Identity service </h2>



<p>Finally, the rules have been generated, now you only have to configure the Application Identity service. To the end that, just type <em>PowerShell</em> into the search bar to invoke  a Windows PowerShell, double click on it to run as administrator and write next command:</p>



<pre class="wp-block-preformatted"> sc config appidsvc start=auto </pre>



<figure class="wp-block-image"><img src="http://www.googez.com/wp-content/uploads/2019/08/app15.jpg" alt="PowerShell configuring Application Identity service " class="wp-image-718"/><figcaption>PowerShell configuring  Application Identity service  </figcaption></figure>



<p>This is it! As you can see enable this tool, it is not very complicated to do, however, it is a great help for the security of our system. So this is it, for now, please don&#8217;t miss our <a href="http://www.googez.com/installing-owncloud-server-on-windows-10-step-by-step/" target="_blank" rel="noreferrer noopener" aria-label="Onwcloud Server (opens in a new tab)">Onwcloud Server</a> tutorial on Windows 10</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/using-applocker-to-block-unwanted-apps-in-windows-10/">Using AppLocker to block unwanted apps in Windows 10</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.osradar.com/using-applocker-to-block-unwanted-apps-in-windows-10/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
