New-AppLockerPolicy not respecting third party publishers #3884
Labels
issue-doc-bug
Something is out of date, unclear, confusing, or broken in the article. Blocks customer success.
needs-triage
Waiting - Needs triage
Prerequisites
Get-Foo
cmdlet" instead of "Typo."Links
Summary
When attempting to whitelist a third party binary using a command like the following, the publisher data is not being included.
Most notably,
New-AppLockerPolicy -RuleType Publisher
fails withNew-AppLockerPolicy : The rules cannot be created. Required file information is missing from the following file
, even when the data exists.This makes the resulting policies much more fragile and prone to breaking between versions. This appears to only have an impact on third party tools.
Details
The following commands allow reproduction of the behavior. I have tested this on Server 2019, Server 2022, and Windows 11.
I tried three general cases, one from another vendor entirely (BeyondTrust), one from SysInternals (MS but not a default) and the Intune Management Extension (documented well for WDAC and similar). Only Intune will show the Publisher data as a condition.
BeyondTrust
Sysmon
Intune
For anything except the Intune extension I get "New-AppLockerPolicy : The rules cannot be created. Required file information is missing from the following file". However the results of
Get-AppLockerFileInformation $fileName
consistently show this is not accurate.Additionally, I used the exact same process (passing Get-AppLockerFileInformation via pipe to New-AppLockerPolicy) in the past successfully. A few years ago (roughly 2021 / early 2022 based on my git repo commits) I did the same thing for GoogleUpdate.exe and merged it to an applocker config file.
Suggested Fix
I believe there is something forcing only a preapproved list of certificate vendors to be supported.
The text was updated successfully, but these errors were encountered: