Recover computers from a deny execute everything policy
Issue
This document tells you how to recover computers that have been locked out due to an improper manually created deny execute policy.
Solution
1. Disable the policy
Disable the manually created deny execute policy that has resulted in locking out computers.
2. Update affected computers
You can update affected computers by running a task via the Arellia Security Manager Console, or by manually restarting the affected computer(s).
Run a task
If you're still able to log into the affected computer, then you can run a task from the Security Manager Console to update the computer by doing the following steps:
- Click the Tasks tab.
- In the file library in the left pane, navigate to Jobs and Tasks > Client Tasks.
- Click Update Applicable Policies.
- In the right pane under Task Status, click Run Now.
- In the Run Task Now dialog box under Input Parameters, next to ResourceIds target all computers or only the affected computers.
- Click Run Task.
Perform a configuration update on each of the affected endpoints by creating a new Update Client Configuration Task and schedule it to run immediately on all computers, or on the computers that are known to have been affected by the deny execute policy.
Manual Update
If you cannot log into the affected computer, then you have to update the computer manually by doing the following steps:
- Restart the affected computer(s) in safe mode. (For details about starting in safe mode, go to Start your computer in safe mode.)
- In the Control Panel open Administrator Tools > Services.
- Right-click Arellia Application Control and click Properties.
- Change the Startup Type to Disabled
- Click OK
Restart the computer.
- Go to the Control Panel again and open Administrator Tools > Services.
- Change the Arellia Application Control Startup Type to Automatic.
More information on how to configure blacklisting policies
Additional Info
A manually created blacklisting or deny execute policy that has no application targets will apply to all programs and services and prevent them from running on an end-user's machine. If a new deny execute policy is created and enabled with out limiting the application target scope of the policy or is not being used with a proper whitelist, the bad blacklist policy will get rolled out and begin denying execution of all applications. This includes userinit.exe which will prevent users from logging in after a reboot. Those computers will act as if they are frozen because no new processes can get created.