Ringfencing Application Interaction

5 min. readlast update: 01.13.2024
Note: This article contains directions for both the ThreatLocker Portal and the ThreatLocker Legacy Portal. If you are using the Legacy Portal, you can find the appropriate directions by scrolling down in the article.  

Ringfencing enables you to decide what Applications a program can or cannot interact with. This will help eliminate the possibility that a threat actor can use a good Application in a malicious way. It is a good idea to block interaction with the powerful built-in Windows tools that you know an Application doesn't need access to.   

The following screenshot is from the ThreatLocker default Microsoft Office Policy. You can see it is denying Office access to many high-risk applications including PowerShell, Command Prompt, CScript, RegSVR32, Scheduled Tasks, and others. 

undefined

Fileless malware is malware that runs strictly in memory. It is often a PowerShell script that has been hidden in a legitimate-looking file, like a Word document for example. If you were to receive a Word document that tried to call on PowerShell to carry out malicious activity, it would not be able to access PowerShell because this Ringfencing Policy blocks Microsoft Office from interacting with PowerShell.

ThreatLocker recommends implementing our suggested Ringfencing Policies for any Application you use that we provide suggested Ringfencing Policies for.

Navigate to Modules > Application Control > Policies. Select the 'Import Policies' button from the hamburger menu at the top of the page.  

undefined

Choose the "ThreatLocker Suggested" tab to open our suggested policies. Select the checkbox next to any Application you are currently using and then click the 'Add # Suggested Policies' button at the top of the page.

undefined

If there is no suggested Policy and you are unsure of what your Application may need to interact with, we suggest setting your Ringfencing policy in a 'monitor' status for a week to allow you the opportunity to observe the Application's behavior and add in any exclusions you will need to this Policy without causing work blocks for you users.

undefined

Monitor the activity in the Unified Audit for a week or so to see what exclusions you need to add to your Ringfenced Policy before you switch it to 'Secured' status. Set the start and end date for your specified time period. Then, input the name of the Policy you are observing the Ringfencing on in the 'Policy Name' text box, and select 'Ringfenced' in the 'Action' dropdown before clicking the 'Search' button. This will quickly show you all the Ringfenced activity for that specific Policy.  

When you are applying Ringfencing to an Application that has previously not had Ringfencing applied, it is very important to place that specific Policy into a Monitor Only Status for about a week.  

Failure to place a new Ringfencing Policy into a Monitor Only Status for a week may possibly impact your day-to-day business operations. 

Ringfencing - File Access

Ringfencing - Internet Access

Ringfencing -Registry Activity

Ringfencing a New Application 

Ringfencing Application Interaction in the Legacy Portal

View in Browser

Ringfencing enables you to decide what Applications a program can or cannot interact with. This will help eliminate the possibility that a threat actor can use a good Application in a malicious way. It is a good idea to block interaction with the powerful built-in Windows tools that you know an Application doesn't need access to.   

The following screenshot is from the ThreatLocker default Microsoft Office Policy. You can see it is denying Office access to PowerShell, Command Prompt, CScript, RegSVR32, Forfiles, and Scheduled Tasks. 

undefined

Fileless malware is malware that runs strictly in memory. It is often a PowerShell script that has been hidden in a legitimate-looking file, like a Word document for example. If you were to receive a Word document that tried to call on PowerShell to carry out malicious activity, it would not be able to access PowerShell because this Ringfencing Policy blocks Microsoft Office from interacting with PowerShell.

ThreatLocker recommends implementing our suggested Ringfencing Policies for any Application you use that we provide suggested Ringfencing Policies for.

Navigate to Application Control > Policies. Select the 'Add Suggested Policies' button at the top of the page.  

undefined

Select the checkbox next to any Application you are currently using and then click the 'Add Suggested Policies' button at the top of the page.

undefined

If there is no suggested Policy and you are unsure of what your Application may need to interact with, we suggest setting your Ringfencing policy in a 'monitor' status for a week to allow you the opportunity to observe the Application's behavior and add in any exclusions you will need to this Policy without causing work blocks for you users.

undefined

Monitor the activity in the Unified Audit for a week or so to see what exclusions you need to add to your Ringfenced Policy before you switch it to 'Secured' status. Set the start and end date for your specified time period. Then, input the name of the Policy you are observing the Ringfencing on in the 'Policy Name' text box, and select 'Ringfenced' in the 'Action' dropdown before clicking the 'Search' button. This will quickly show you all the Ringfenced activity for that specific Policy.  

When you are applying Ringfencing to an Application that has previously not had Ringfencing applied, it is very important to place that specific Policy into a Monitor Only Status for about a week.  

Failure to place a new Ringfencing Policy into a Monitor Only Status for a week may possibly impact your day-to-day business operations. 

Ringfencing - File Access

Ringfencing - Internet Access

Ringfencing -Registry Activity

Ringfencing a New Application

Was this article helpful?