Views:

There are two options we can use to protect endusers against Ransomware with Endpoint Application Control:

Option 1: Lockdown Policy

This policy "Locks" devices to allow only exisiting applications to run while denying anything that is not in the agent scan inventory database.

To deploy a Lockdown Policy, follow these steps:

  1. Logon to the Endpoint Application Control Web Management Console.
  2. Go to Management > Policies tab.
  3. Click the "+Add Policy" drop-down and select New.
  4. The Add Policy Screen appears. Provide the following:
    Name: (Specify a name for the policy)
    Users and Endpoints: (Select the target device or user that will apply the policy)
  5. Expand the "Rules' tab and click "+Assign Rule". Then select New Lockdown rule and provide the following:
    Name: (Type in the rule name)
    Log-only mode: (Enabled: Do NOT take any action | Disabled: Take action)
  6. Click Save & Assign to go back to Add Policy screen.
  7. Click Save to save and deploy the policy to the endpoints.
 
Everytime an endpoint applies a "Lockdown Policy", it triggers an Inventory Scan to create SHA-1 hashes of all present applications on the endpoint and can reduce system performance. To reduce the impact of the Inventory Scan, follow the Deployment Planning and Product Sizing Guide in EAC 2.0 Patch 1 Best Practice Guide.

Option 2: Default Deny Policy

This type of policy combines Block and Allow Rules into a single policy that works together to deny unknown applications from executing on a specified directory while authorizing some. EAC 2.0 Patch 1 Best Practice Guide discusses about commonly used folder paths by malwares, particularly Ransomwares to perform its payload such as encrypting important and sensitive data.

To deploy Default Deny Policy, follow these steps:

  1. Logon to the Endpoint Application Control Web Management Console.
  2. Go to Management > Policies tab.
  3. Click the "+Add Policy" drop-down and select New.
  4. The Add Policy screen appears. Provide the following:
    Name: (Specify a name for the policy)
    Users and Endpoints: (Select the target device or user that will apply the policy)
  5. Expand the "Rules" tab and click the "+Assign Rule". Then select the following rule-types:
    • "New Block" rule:
      1. Provide the following:
        Name: (Type in the rule name)
        Log-only mode: (Enabled: Do NOT take any action | Disabled: Take action)
      2. Expand "Blocked applications" and change the "Match Using" to "File paths". Then use the "Specify file paths to block:" to add folder locations:
        Location: Any local storage
        \users\*\appdata\local\*
        \users\*\appdata\roaming\*
        \documents and settings\*\application data\*
        Location: Any removable storage
        \*
        Location: Network Path
        \*
        For the complete list of Windows Common folder variables, click here.
      3. Click Save & Assign to go back to the Add Policy screen.
    • "New Allow" rule:
      1. Provide the following:
        Name: (Type in the rule name)
        Log-only mode: (Enabled: Do NOT take any action | Disabled: Take action)
      2. Expand "Allowed applications" and change the "Match Using" to "Known application dynamic search". Then change column to to “Tags” and select “Safe-match” and “Inventory”.
         
        It is recommended to start your allow rule by adding installed applications on the endpoint. You may get the list of currently installed applications in the Add/Remove or Programs and Features control panel window.

        allowed

      3. Expand the "Rule options" and select "Trusted Source" level to "Medium".
         
        Important: Do not give any level of trust on web browsers (IE, Mozilla Firefox, Google Chrome, etc.) This is because it grants execute rights to applications that are executed within the browser itself, bypassing any block rules. It is recommended to create a dedicated "Allow" rule for web browsers where the level of trust is set to "none".
      4. Click Save & Assign to go back to Add Policy screen.
  6. Click Save to save and deploy the policy to endpoints.