Windows restricted software access by the Software Restriction Policies

This rule is part of a beta feature. To learn more, contact Support.
이 페이지는 아직 영어로 제공되지 않습니다. 번역 작업 중입니다.
현재 번역 프로젝트에 대한 질문이나 피드백이 있으신 경우 언제든지 연락주시기 바랍니다.

Goal

Detects instances where a user or process attempted to execute software that is restricted by Windows Software Restriction Policies (SRP).

Strategy

This detection monitors Windows event logs with the provider “Microsoft-Windows-SoftwareRestrictionPolicies” and Event IDs 865, 866, 867, 868, or 882. These events indicate that SRP blocked the execution of a program based on path rules, hash rules, certificate rules, network zone rules, or AppLocker policy.

Software Restriction Policies are security controls that help administrators define which applications can run on workstations.

Triage & Response

  • Identify the {{host}} system where Software Restriction Policy blocked application execution.
  • Examine the blocked application details, including file path, name, and hash values from the event.
  • Determine which user account attempted to run the restricted application.
  • Review process creation events to understand how the application was executed and its parent process.
  • Investigate if the execution attempt originated from a remote machine by correlating with logon events.
  • Check if the blocked application was being run with administrative privileges.
  • Research the blocked application to determine if it’s legitimate software needed for business or potentially malicious.
  • Ensure the blocked file is quarantined or deleted if confirmed malware or unauthorized tool.
  • Review the user’s recent activities for evidence of potential compromise or policy violations.