Hi,
I am setting up application control with Sophos Central, and ran into a few problems that have clumsy workarounds, but one that I don't know how to workaround is this.
Sophos Application Control only looks at the currently logged on user to determine if an application can start. For example, I have Powershell blocked in the base policy, and then added exceptions for some users to allow Powershell.
Here are the results of testing:
- Logged onto windows as a standard user, idle: Sophos periodically blocks Powershell
- Logged onto windows as a standard user, run Powershell as standard user: Sophos blocks it
- Logged onto windows as a standard user, run Powershell as excepted user (using runas or run as administrator): Sophos blocks it
- Logged onto windows as an excepted user, idle: No notification of Sophos blocking Powershell
- Logged onto windows as an excepted user, run Powershell as excepted user: Sophos allows it
- Logged onto windows as an excepted user, run Powershell as standard user (using runas): Sophos allows it
Of these, only behaviors (2), (4), and (5) are expected.
(1) was concerning at first, but I believe that these are system processes trying to run Powershell. Still investigating this, but concerning if legit scheduled tasks aren't allowed.
(3) and (6) appear to indicate that Sophos is deciding to block applications not based upon the user actually calling the application and is only using the logged-on user to determine if the application should be blocked or not.
(3) is inconvenient, but (6) would appear to be a big security hole. If an endpoint is infected with malware that Sophos is blocking from using Powershell because the logged-on user is not on the exception list, but then if an excepted user logs on to do maintenance then Powershell would no longer be blocked.
Is this expected behavior?
If so, it sounds like because of (1) and (6) that Application control should not be used on system applications.
Thanks,
Ken
This thread was automatically locked due to age.