
This lesson requires Loopus Pro access. Upgrade to unlock all courses, labs, and challenges.
Windows includes powerful security features beyond basic configuration. Application control, credential protection, and exploit mitigation provide defense in depth.
AppLocker controls which applications can run. Policy rules specify allowed executables, scripts, installers, and DLLs.
Rule types:
Windows Defender Application Control (WDAC) provides more comprehensive control than AppLocker, including kernel-mode enforcement. More complex to configure but more secure.
Credential Guard isolates credential material in a virtualized environment. Even with kernel access, attackers cannot extract credentials.
Remote Credential Guard protects credentials during RDP sessions. Credentials never leave the client machine.
Protected Users group adds protections: no NTLM authentication, no delegation, shorter Kerberos ticket lifetimes, no caching credentials.
Windows Defender Exploit Guard includes multiple protections:
Real-time protection scans files as they are accessed. Keep enabled except for documented exceptions.
Cloud-delivered protection enables fast response to new threats using cloud analysis.
Automatic sample submission sends suspicious files for analysis. Enable for best protection.
Tamper protection prevents attackers from disabling Defender—critical to enable.
Exclusions - Minimize exclusions. Every exclusion creates a potential hiding place for malware.
Verify security features are working:
What is AppLocker?
What is the extension for policy files?
What is WDAC?
What term describes the highest level of trust?
Found the flag? Submit it below to complete this lesson.
Format: LOOPUS{...}