You're replying to a comment by Paul Cobbaut.

December 12, 2010, 08:45

Hello, in some dark past I was a Windows 2000/2003 administrator. I remember playing with these security restrictions... and breaking them.

At that time you had several options on how to 'restrict' usage of programs with that GPO setting. The 'path rule' (which is easily cracked by copying exe's to an allowed path), the 'internet rule' (which didn't work), the 'hash rule'(doable) or the 'certificate rule' (which required playing with 'authenticode' command line tools, and was pretty cumbersome to maintain).
Which rule did you use ? Or does it work different now (I have not seen the GPO interface in years.)

Reply To This Comment

(why do I need your e-mail?)

(Your twitter name, if you have one. (I'm @pkrumins, btw.))

Type the first letter of your name: (just to make sure you're a human)

Please preview the comment before submitting to make sure it's OK.