Appendix B – AppLocker
- Last UpdatedFeb 13, 2023
- 2 minute read
Asset Strategy Optimization product runs on .NET framework 4.8 context. However, some parts of the legacy code use .NET Framework 2.0, which could result in a vulnerability. Applying Microsoft’s AppLocker will mitigate the risk of this vulnerability.
This applies to:
-
Windows 10
-
Windows 11
-
Windows Server 2016 and above
AppLocker can help you:
-
Define rules based on file attributes that persist across app updates, such as the publisher’s name (derived from the digital signature), product name, file name, and file version. You can also create rules based on the file path and hash.
-
Assign a rule to a security group or an individual user.
-
Create exceptions to rules.
To configure AppLocker in Windows
-
Enter cmd "secpol.msc" on the Run window. (Windows + R Keys together)
-
Then expand "Application control Policies"
-
Right-click on "Executable Rules"

-
Using the wizard, create policies to allow/deny access on the Folder level of the "Asset strategy optimization" folder.
-
Configure the following set of policies:

-
Open the cmd prompt in admin mode and type: sc config appidsvc start=auto
-
Restart the system.
References:
Note: Read the message and click Yes in case you see this dialog.

Unauthorized users will be getting the following message on trying to access the system:
