Overview
The AppLocker command enumerates AppLocker configuration and policies on the system. AppLocker is a Windows application control feature that allows administrators to specify which applications and scripts are allowed to run. This command provides visibility into whitelist/blacklist rules that may impact code execution capabilities. Understanding AppLocker policies is crucial for both attackers planning execution strategies and defenders auditing application control effectiveness.Syntax
Remote Execution
Output
The command returns AppLocker configuration details including:- Rule collections (Executable, Script, MSI, DLL, Packaged apps)
- Rule types (Publisher, Path, Hash)
- Allow/Deny rules
- Enforcement mode (Not Configured, Enforce, Audit)
- Rule exceptions and conditions
Use Cases
- Red Team
- Blue Team
- Identify execution restrictions before payload deployment
- Find allowed paths for dropping executables
- Discover script execution policies
- Identify trusted publishers for code signing bypass
- Plan execution methods that bypass restrictions
- Locate writable directories in allow-listed paths
Example Output
Remote Execution
This command supports remote execution using the
-computername parameter.Detection Considerations
- Registry Queries: Accesses AppLocker configuration keys under
HKLM\SOFTWARE\Policies\Microsoft\Windows\SrpV2 - WMI Activity: Remote queries generate WMI events
- Event Logs: Registry access can be logged if auditing is enabled
- Policy Queries: May trigger alerts in EDR solutions monitoring security policy enumeration
Defensive Recommendations
- Monitor registry access to SrpV2 keys
- Enable auditing for AppLocker policy changes
- Alert on enumeration of multiple security settings
- Track remote WMI connections querying security policies
- Correlate with other reconnaissance activities
Related Commands
- UAC - User Account Control settings
- LocalGPOs - Local Group Policy settings
- AuditPolicies - System audit policies
- PowerShell - PowerShell execution policies
- SecurityPackages - Security package enumeration