Русские видео

Сейчас в тренде

Иностранные видео


Скачать с ютуб How to "Virus-Proof" Your Computer With Windows AppLocker (Ultimate Guide) в хорошем качестве

How to "Virus-Proof" Your Computer With Windows AppLocker (Ultimate Guide) 1 год назад


Если кнопки скачивания не загрузились НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием, пожалуйста напишите в поддержку по адресу внизу страницы.
Спасибо за использование сервиса savevideohd.ru



How to "Virus-Proof" Your Computer With Windows AppLocker (Ultimate Guide)

Well, at least as close to virus-proof as you can get... 🤔 ⇒ Become a channel member for special emojis, early videos, and more! Check it out here: https://www.youtube.com/ThioJoe/join • Download the policies and filters I mentioned here: https://drive.google.com/file/d/1RwZJ... (Current resource pack version = 6, Updated 2/14/2024) 📝Additional Notes: • To get AppLocker policies to actually work, you might have to enable the "Application Identity" service and set it to start automatically if it isn't already. This requires a special command because it is a protect process (as opposed to just opening the services menu). To do this, run the command in command prompt as admin: sc.exe config appidsvc start= auto • It turns out you CAN actually add the Group Policy settings for PowerShell core without having to install PowerShell Core. I've added instructions to the ReadMe file in the resource pack in the description, but basically you download the latest zip release from Microsoft's PowerShell GitHub, and copy the files "PowerShellCoreExecutionPolicy.admx" and "PowerShellCoreExecutionPolicy.adml" into the directories "C:\Windows\PolicyDefinitions" and "C:\Windows\PolicyDefinitions\en-US" respectively. • I figured this went without saying, but obviously if you download something malicious and add a rule to allow it, you will be infected. You still must ALWAYS be vigilant. And you should still also use an Antivirus, it’s not a replacement for that. ▼ Time Stamps: ▼ 0:00 - Intro 2:21 - Video Chapters Outline 3:37 - Creating a Shortcut to AppLocker 5:17 - AppLocker Initial Setup 6:17 - Creating AppLocker Log in Event Viewer 9:02 - AppLocker Default Rules 10:44 - File Types For Different Rule "Collections" 12:26 - Adding Rules & How They Work 26:10 - Deny Rules 27:22 - More Rules I Added 31:17 - Allowing Specific Signed Files 32:30 - Why Add Rules Blocking PowerShell? 35:27 - Importing the Policy 36:10 - Note About "Policy Test" Files 36:52 - Note If You Don't Have PowerShell 7 37:41 - AppLocker With Powershell (IMPORTANT) 40:33 - Disabling PowerShell 2.0 40:59 - Setting PowerShell Execution Policy 43:54 - Blocking Bypass of Execution Policy 46:05 - PowerShell Script Block Logging 46:57 - PowerShell 7 Has Separate Execution Policies 47:36 - Setting Up PowerShell 7 Execution Policies 49:46 - Which PowerShell MachinePolicy Should You Use? 50:30 - How to Determine if a File is Signed 51:38 - Wrapping Up Corrections: @ 47:52 - If you don't have PowerShell 7 installed, you actually still can add the settings to Group Policy Editor. See instructions in the 'ReadMe' file in the resource pack in the description. ▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬ Merch ⇨ https://teespring.com/stores/thiojoe ⇨   / thiojoe   ⇨   / thiojoe   ⇨   / thiojoetv   My Gear & Equipment ⇨ https://kit.co/ThioJoe ▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬

Comments