The founders of AppControl.AI are strong believers in the need for an application allow listing solution to keep Windows security manageable. They’re quite vocal about this belief in online communities and have build extensive knowledge implementing these types of projects. External feedback and their own experience has often laid bare the absence of supporting tooling for one of Microsoft’s application allow listing technologies, Windows Defender Application Control.
AppControl.AI will resolve the absence of tooling and aims to make implementing application allow listing on Windows substantially more feasible. Our first step on this path is to offer customers an engine that can help make their managed software trusted by automating the creation of Windows Defender Application Control policies. In this regard, the term managed software refers to applications that are deployed using a customer’s systems management solution.
When registering your Configuration Manager environment with AppControl.AI you can bulk select the applications you want to have processed by our backend engine. This will create jobs in our environment to process these applications in batch and generate the policies and security catalog objects for you. 2 type of objects that are necessary pieces of your application allow listing implementation. Once done, AppControl.AI will equally allow you to make sure that any new or updated applications in your environment are dispatched to AppControl.AI for processing so that you can be assured that every application you deploy can be easily made trusted.
As a customer you’ll be able to see the information that was gleaned from you application on your dedicated portal. This is the place where you’ll be able to download the policies and security catalogs. It’s equally the place where we’ll tell you more about the resources that make up your applications.
Information about the files,
certificates that were used to sign the files
whether there are files that make up your application that are copied to folders other than c:\program files or c:\program files (x86)
Whether there are folders where non-admin users can write files
And so on.
All information that can help you decide what you need to do as an application allow list admin to make applications trusted.
Items currently on our roadmap are the ability to tell you whether an application is considered trusted by Microsoft’s Intelligent Security Graph and whether your application is compatible with Windows Defender Application Control’s Dynamic Code Security feature.
The current functionality is just our initial step in building tooling to assist you during your application allow listing projects. Behind the scenes we are already hard at work to bring you the next set of functionality. We have our own ideas as to what our next steps should be, but we’re open to suggestions as well. If there’s things you consider that would make your application allow list efforts easier, then by all means, reach out to us.
If this sounds of interest to you feel free to contact us to have a chat about this or signup and test the functionality yourself.