You need to prevent all standard user accounts fromrunning programs that are signed by a specific publisher

All client computers in your network run Windows 7 Enterprise.
You need to prevent all standard user accounts fromrunning programs that are signed by a specific publisher.
What should you do?

All client computers in your network run Windows 7 Enterprise.
You need to prevent all standard user accounts fromrunning programs that are signed by a specific publisher.
What should you do?

A.
Use AppLocker application control policies. Create an Executable rule.

B.
Use software restriction policies. Create a hash rule.

C.
Use AppLocker application control policies. Create a Windows Installer rule.

D.
Use software restriction policies. Create a path rule.

Explanation:
The AppLocker Microsoft Management Console (MMC) snap-in is organized into four areas called rule
collections.
The four rule collections are executable files, scripts, Windows Installer files, and DLL files.
These collections give the administrator an easy way to differentiate the rules for different types ofapplications.
Rule conditions are criteria that the AppLocker rule is based on.
Primary conditions are required to create an AppLocker rule.
The three primary rule conditions are publisher, path, and file hash.
Publisher
This condition identifies an application based on its digital signature and extended attributes. The digital
signature contains information about the company that created the application (the publisher). The extended
attributes, which are obtained from the binary resource, contain the name of the product that the application is
part of and the version number of the application. The publisher may be a software development company,
such as Microsoft, or the information technology department of your organization.
PathThis condition identifies an application by its location in the file system of the computer or on the network.
AppLocker uses path variables for directories in Windows.
File hash
When the file hash condition is chosen, the system computes a cryptographic hash of the identified file.
http://technet.microsoft.com/en-us/library/dd759068.aspx



Leave a Reply 0

Your email address will not be published. Required fields are marked *