Application rules include: 1. Certificate rules, which can identify software through signature certificates; 2. Hash rules, used to uniquely identify a certain software program or file; 3. Internet zone rules, only applicable to " Windows Installer" package; 4. Path rules, identifying software based on its file path.
The operating environment of this tutorial: Windows 7 system, Dell G3 computer.
Using software restriction policies, you can protect your computing environment from untrusted software by identifying and specifying which software is allowed to run. You can define the default security level of a Group Policy object as Unrestricted or Not Allowed (GPO) so that software is allowed or not allowed to run by default. You can make exceptions to this default security level by creating software restriction policy rules for specific software. For example, when the default security level is set to "Don't allow," you can create rules that allow specific software to run. The types of rules are as follows:
1. Certificate rules
Software restriction policies can also identify software through signed certificates. You can create a certificate rule to identify software and then allow or disallow that software to run based on the security level. For example, you can use certificate rules to automatically trust software from trusted sources in your domain without prompting the user. You can also use certificate rules to run files in disallowed areas of the operating system. By default, certificate rules are not enabled.
When using Group Policy to create rules for a domain, you must have permission to create or modify Group Policy objects. If you want to create a rule for a local computer, you must have administrative credentials on that computer.
2. Hash rules
A hash is a series of bytes with a fixed length that is used to uniquely identify a software program or file. The hash is calculated by a hashing algorithm. After you create a hash rule for a software program, the software restriction policy calculates the program's hash. When a user attempts to open a software program, the program's hash is compared to the existing hash rules of the software restriction policy. No matter where a software program is located on your computer, the program's hash is always the same. However, if the software program is changed in any way, its hash changes and no longer matches the hash in the software restriction policy's hash rules.
For example, you can create a hash rule and set the security level to "Do Not Allow" to prevent users from running specific files. A file can be renamed or moved to another folder and the hash remains the same. However, if any changes are made to the file, it will also change its hash and allow it to bypass the restriction.
3. Internet zone rules
Internet zone rules only apply to Windows Installer packages. Zone rules identify software in a zone specified by Internet Explorer. These zones are Internet, Local Intranet, Restricted Sites, Trusted Sites, and My Computer. Internet zone rules are used to prevent users from downloading and installing software.
4. Path rules
Path rules identify software based on its file path. For example, if your computer's default security level is Not Allowed, you can still grant each user unrestricted access to a specific folder. You can create a path rule by using a file path and setting the path rule's security level to Unrestricted. Some common paths for this type of rules are %userprofile%, %windir%, %appdata%, %programfiles%, and %temp%. You can also create registry path rules that use the software's registry keys as its paths.
Because these rules are specified by path, if the software program is moved, the path rules will no longer apply.
For more computer-related knowledge, please visit the FAQ column!
The above is the detailed content of What are the application rules for software restriction policies?. For more information, please follow other related articles on the PHP Chinese website!

The domestic AI dark horse DeepSeek has risen strongly, shocking the global AI industry! This Chinese artificial intelligence company, which has only been established for a year and a half, has won wide praise from global users for its free and open source mockups, DeepSeek-V3 and DeepSeek-R1. DeepSeek-R1 is now fully launched, with performance comparable to the official version of OpenAIo1! You can experience its powerful functions on the web page, APP and API interface. Download method: Supports iOS and Android systems, users can download it through the app store; the web version has also been officially opened! DeepSeek web version official entrance: ht

At the beginning of 2025, domestic AI "deepseek" made a stunning debut! This free and open source AI model has a performance comparable to the official version of OpenAI's o1, and has been fully launched on the web side, APP and API, supporting multi-terminal use of iOS, Android and web versions. In-depth search of deepseek official website and usage guide: official website address: https://www.deepseek.com/Using steps for web version: Click the link above to enter deepseek official website. Click the "Start Conversation" button on the homepage. For the first use, you need to log in with your mobile phone verification code. After logging in, you can enter the dialogue interface. deepseek is powerful, can write code, read file, and create code

DeepSeek: How to deal with the popular AI that is congested with servers? As a hot AI in 2025, DeepSeek is free and open source and has a performance comparable to the official version of OpenAIo1, which shows its popularity. However, high concurrency also brings the problem of server busyness. This article will analyze the reasons and provide coping strategies. DeepSeek web version entrance: https://www.deepseek.com/DeepSeek server busy reason: High concurrent access: DeepSeek's free and powerful features attract a large number of users to use at the same time, resulting in excessive server load. Cyber Attack: It is reported that DeepSeek has an impact on the US financial industry.

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

SecLists
SecLists is the ultimate security tester's companion. It is a collection of various types of lists that are frequently used during security assessments, all in one place. SecLists helps make security testing more efficient and productive by conveniently providing all the lists a security tester might need. List types include usernames, passwords, URLs, fuzzing payloads, sensitive data patterns, web shells, and more. The tester can simply pull this repository onto a new test machine and he will have access to every type of list he needs.

MinGW - Minimalist GNU for Windows
This project is in the process of being migrated to osdn.net/projects/mingw, you can continue to follow us there. MinGW: A native Windows port of the GNU Compiler Collection (GCC), freely distributable import libraries and header files for building native Windows applications; includes extensions to the MSVC runtime to support C99 functionality. All MinGW software can run on 64-bit Windows platforms.

SublimeText3 Mac version
God-level code editing software (SublimeText3)

SAP NetWeaver Server Adapter for Eclipse
Integrate Eclipse with SAP NetWeaver application server.

Zend Studio 13.0.1
Powerful PHP integrated development environment
