Use Application and Device Control to block registry changes that are associated with the threat.
Note: In SEP 11.x, Application and Device Control Policies do not work with 64-bit client computers. In SEP 12.1, Application and Device Control is fully supported across 32-bit and 64-bit architecture.
Create the Application and Device Control policy
- Log on to the Symantec Endpoint Protection Manager.
- Click Policies, then click Application and Device Control.
- Click Add an Application and Device Control Policy.
Create the Application Control Rule Set
- Click Application Control.
- Click Add.
On the properties tab:
- Change the Rule name field to Allow Symantec processes and applications.
- Define the rule by adding the following values to the Apply this rule to the following processes box:
#HKEY_LOCAL_MACHINE\SOFTWARE\Symantec\Symantec Endpoint Protection\SMC\smc_install_path#*.exe
#HKEY_LOCAL_MACHINE\SOFTWARE\Symantec\Symantec Endpoint Protection\SMC\smc_install_path#*\*.exe
%ProgramFiles%\Symantec\LiveUpdate\LU*.exe
%ProgramFiles%\Symantec\LiveUpdate\setup.exe
%ProgramFiles%\Common Files\Symantec Shared\*.exe
%ProgramFiles%\Common Files\Symantec Shared\*\*.exe
Define the rule conditions
- Still in the Application and Device Control policy, under the Rules tree click the Add... button, then click Add Condition > Registry Access Attempts.
On the Properties tab:
- Define the condition by adding the following value to the Apply to the following registry keys box:
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Svchost
On the Actions tab:
- Click Allow access under Read Attempt.
- Click Continue processing other rules under Create, Delete, or Write Attempt.
- Define any other settings you would like, for example if events are logged or if clients will be notified by a pop-up.
Create the rule to block registry access
- Under the Rules tree, click the Add... button, then click Add Rule.
On the properties tab of the newly created rule:
- Change the Rule name field to block all other processes and applications from accessing the registry.
- Define the rule by adding the following value to the Apply this rule to the following processes box:
*
- Under the Rules tree, click the Add... button, then click Add condition > Registry Access Attempts.
On the properties tab of the newly created condition:
- Change the Name field to reflect the purpose of the condition, for example "Block Trojan.Clampi."
- Define the condition by adding registry values you would like to limit access to. As an example the following registry entries are commonly changed by Trojan.Clampi:
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Settings\"GID"
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Settings\"GatesList"
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Settings\"KeyM"
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Settings\"KeyE"
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Settings\"PID"
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Settings\"M*"
To define the registry values:
- Click Add.
- In the Add Registry Key Definition box, add a value to the Registry Key field, for example: HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Settings\
- Add the value for one key to the Value box without quotations, for example GID.
- Perform these steps for each value.
On the Actions tab:
- Click Allow access under Read Attempt.
- Click Block access under Create, Delete, or Write Attempt.
- Define any other settings you would like, for example if events are logged or if clients will be notified by a pop-up.
- When all values have been defined click OK then click OK again.
Assign the policy
- Right-click the new Application and Device control value, then click Assign... to assign the policy to the desired groups.
- Click Yes when prompted to Assign Application and Device Control Policy changes?
Example
For an example of this type of policy please download and Import the following example policy:
