Source | Azure Portal | |||||||||||||||||||||||||||||||||
Display name | [Preview]: Azure Stack HCI servers should have consistently enforced application control policies | |||||||||||||||||||||||||||||||||
Id | dad3a6b9-4451-492f-a95c-69efc6f3fada | |||||||||||||||||||||||||||||||||
Version | 1.0.0-preview Details on versioning |
|||||||||||||||||||||||||||||||||
Versioning |
Versions supported for Versioning: 1 1.0.0-preview Built-in Versioning [Preview] |
|||||||||||||||||||||||||||||||||
Category | Stack HCI Microsoft Learn |
|||||||||||||||||||||||||||||||||
Description | At a minimum, apply the Microsoft WDAC base policy in enforced mode on all Azure Stack HCI servers. Applied Windows Defender Application Control (WDAC) policies must be consistent across servers in the same cluster. | |||||||||||||||||||||||||||||||||
Cloud environments | AzureCloud = true AzureUSGovernment = unknown AzureChinaCloud = unknown |
|||||||||||||||||||||||||||||||||
Available in AzUSGov | Unknown, no evidence if Policy definition is/not available in AzureUSGovernment | |||||||||||||||||||||||||||||||||
Assessment(s) |
Assessments count: 1 Assessment Id: ce488796-a2d4-401f-a688-b3f4a1137921 DisplayName: Azure Local machines should have consistently enforced application control policies Description: At a minimum, apply the Microsoft WDAC base policy in enforced mode on all Azure Local machines. Applied Windows Defender Application Control (WDAC) policies must be consistent across machines in the same system. Remediation description: To enforce WDAC policies: 1. From the Azure Local instance page, go to Windows Admin Center and select Connect. 2. Go to the Security extension and select Windows Defender Application Control. 3. Select one or more policy and click Set to Enforced. Categories: Compute Severity: High User impact: High Threats: ElevationOfPrivilege preview: True |
|||||||||||||||||||||||||||||||||
Mode | Indexed | |||||||||||||||||||||||||||||||||
Type | BuiltIn | |||||||||||||||||||||||||||||||||
Preview | True | |||||||||||||||||||||||||||||||||
Deprecated | False | |||||||||||||||||||||||||||||||||
Effect | Default AuditIfNotExists Allowed Audit, Disabled, AuditIfNotExists |
|||||||||||||||||||||||||||||||||
RBAC role(s) | none | |||||||||||||||||||||||||||||||||
Rule aliases | IF (1)
|
|||||||||||||||||||||||||||||||||
Rule resource types | IF (1) |
|||||||||||||||||||||||||||||||||
Compliance |
The following 2 compliance controls are associated with this Policy definition '[Preview]: Azure Stack HCI servers should have consistently enforced application control policies' (dad3a6b9-4451-492f-a95c-69efc6f3fada)
| |||||||||||||||||||||||||||||||||
Initiatives usage |
|
|||||||||||||||||||||||||||||||||
History |
|
|||||||||||||||||||||||||||||||||
JSON compare | n/a | |||||||||||||||||||||||||||||||||
JSON |
|