Trying to block the launching of powershell using AppLocker GPO
I've created an AppLocker policy under the user container and then under Computer Config, Policies, Windows Settings, Security Settings, Application Control Policies, AppLocker, I have set the default rules for Executable Rules, then made an exception to system32\windowspowershell\v1.0\powershell.exe and powershell_ise.exe
Thing is, users still seem to be able to open Powershell, although nothing runs (script wise), it can still behave like CMD (browse directories, etc).
I don't even want it to run....Any ideas on it's behaviour or why it might not be working?
Thanks
I've created an AppLocker policy under the user container and then under Computer Config, Policies, Windows Settings, Security Settings, Application Control Policies, AppLocker, I have set the default rules for Executable Rules, then made an exception to system32\windowspowershell\v1.0\powershell.exe and powershell_ise.exe
Thing is, users still seem to be able to open Powershell, although nothing runs (script wise), it can still behave like CMD (browse directories, etc).
I don't even want it to run....Any ideas on it's behaviour or why it might not be working?
Thanks