Skip to main content

How to think about allowlisting rules

In this case we are showing the end to end cycle of the rule where both allowlisting and EPM are enabled. You can enable EPM or allowlisting or both.
1

What is the application?

The first part of the rule is to catch or match the application you are trying to control. Before allowing something, we need to know what we are allowing. You can match the target application using file attributes (hash, name. path, etc.), publisher thumbprint (the hash of the certificate that is used to sign the executable, or certificate elements (when application is signed you can use certificate elements of the signing certificate to match the app).
2

Allow execution?

With allowlisting the default policy is to default deny everything. if you want to allow an application you need to allow execution, otherwise the application will not launch.
3

Control what app is doing?

With application fencing you can control child process execution or application interactions (i.e. notepad can not launch command prompt). You can allow all child processes if you trust the application, or define the custom set of processes that application can launch.
4

Allow elevation?

If an application requires admin privileges, and you maintain standard rights for all users, you can allow the application to automatically elevate.
5

Can users request?

When application or elevation is blocked, your users can request the permission to run or elevate the application.

Rule best practices

These are some of the best practices related to rule management:
  • Give rules descriptive names so that you know what the rule is doing
  • The best rules are the ones that leverage certificate elements. For instance you create a rule that allows everything that is signed by certificate belonging to Zoom Inc.
  • If you do not want to use certificate elements, use certificate thumbprint. This is second best. Allowing the whole organization might be too broad, but allowing a certain publisher certificate is a good balance. When the application is updated, rule will still work. But if the organization renews the certificate, you will need to update the rules.
  • If the application is not signed and you can not use certificates, then use file attributes. Bear in mind that hash based rules are the worst, because if the application is updated, the hash will change, and the rule will no longer work. For applications that launch from protected paths, you can leverage the path rules, for instance for Windows apps that launch from protected directory.

Allowlisting rules examples

Slack allowlisting rule

We match Slack application using the publisher certificate, allow application execution along with all child processes, and allow the application to automatically elevate as admin. Image9

Anydesk allowlisting rule

This is a catalog rule managed by idemeum. It matches the application that is legitimately signed by AnyDesk Software GmbH, we allow execution, and offer users the option to request elevation. Image10

Catalog rules

Idemeum comes pre-configured with allowlisting and elevation rules for most common applications. We constantly update applications to make sure the rules are current and do not create any disruptions. With a click of a button you can allow most used applications in your environment. Learn more about catalog rules.

Create allowlisting rule

If you want to create your own custom rules or allow applications that are not listed in idemeum catalog, you can simply do that from the event. Launch the application you want to allowlist (or trigger elevated launch), the event will be generated and sent to the cloud. Now you can create rule from the event.
  • Navigate to the admin portal of your idemeum tenant
  • Access Events section
  • Search for the application / event that you want to create a rule for
  • Click on ... and choose to create a rule
  • All metadata for the event will be pre-populated and you can choose how you would like to match the application and what execution policy to apply.
  • Save the rule
Image11

Regular expressions

Idemeum rule engine supports regular expressions when matching the applications using various attributes. We support regex for file name, file path, and certificate elements. We use case-insensitive match.
  • Match the exact file name for the edge browser
^msedge.exe$
  • Match any filename that contains video
.*video.*
  • Match the path that starts with C:\Program Files\WindowsApps\ and then contains linkedin in the path
C:\Program Files\WindowsApps\.*linkedin.*
  • Use this in O for certificate element to match anything that is signed by organization that contains Microsoft
Microsoft.*