Microsoft Windows: User Account Control: Detect application installations and prompt for elevation
2018-06-12T00:00:00
ID OPENVAS:1361412562310109245 Type openvas Reporter Copyright (C) 2018 Greenbone Networks GmbH Modified 2019-12-13T00:00:00
Description
This policy setting determines the behavior of application
installation detection for the entire system. Some software might attempt to install itself after
being given permission to run. The user may give permission for the program to run because the
program is trusted. Then the user is prompted to install an unknown component. This security policy
provides another way to identify and stop these attempted software installations before they can do
damage.
(C) Microsoft Corporation 2017.
# Copyright (C) 2018 Greenbone Networks GmbH
#
# Text descriptions excerpted from a referenced source are
# Copyright (C) of the respective author(s)
#
# SPDX-License-Identifier: GPL-2.0-or-later
#
# This program is free software; you can redistribute it and/or
# modify it under the terms of the GNU General Public License
# as published by the Free Software Foundation; either version 2
# of the License, or (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.0.109245");
script_version("2019-12-13T11:11:18+0000");
script_tag(name:"last_modification", value:"2019-12-13 11:11:18 +0000 (Fri, 13 Dec 2019)");
script_tag(name:"creation_date", value:"2018-06-12 14:47:04 +0200 (Tue, 12 Jun 2018)");
script_tag(name:"cvss_base", value:"0.0");
script_tag(name:"cvss_base_vector", value:"AV:L/AC:H/Au:S/C:N/I:N/A:N");
script_tag(name:"qod", value:"97");
script_name("Microsoft Windows: User Account Control: Detect application installations and prompt for elevation");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2018 Greenbone Networks GmbH");
script_family("Policy");
script_dependencies("smb_reg_service_pack.nasl");
script_mandatory_keys("Compliance/Launch");
script_add_preference(name:"Value", type:"radio", value:"1;0");
script_xref(name:"URL", value:"https://docs.microsoft.com/en-us/windows/security/threat-protection/security-policy-settings/user-account-control-detect-application-installations-and-prompt-for-elevation");
script_tag(name:"summary", value:"This policy setting determines the behavior of application
installation detection for the entire system. Some software might attempt to install itself after
being given permission to run. The user may give permission for the program to run because the
program is trusted. Then the user is prompted to install an unknown component. This security policy
provides another way to identify and stop these attempted software installations before they can do
damage.
(C) Microsoft Corporation 2017.");
exit(0);
}
include("smb_nt.inc");
include("policy_functions.inc");
include("version_func.inc");
target_os = "Microsoft Windows 7 or later";
win_min_ver = "6.1";
title = "User Account Control: Detect application installations and prompt for elevation";
solution = "Set following UI path accordingly:
Computer Configuration/Windows Settings/Security Settings/Local Policies/Security Options/" + title;
test_type = "RegKey";
type = "HKLM";
key = "Software\Microsoft\Windows\CurrentVersion\Policies\System";
item = "EnableInstallerDetection";
reg_path = type + "\" + key + "!" + item;
default = script_get_preference("Value");
if(!policy_verify_win_ver(min_ver:win_min_ver)){
results = policy_report_wrong_os(target_os:target_os);
}else{
results = policy_match_exact_reg_dword(key:key, item:item, type:type, default:default);
}
value = results["value"];
comment = results["comment"];
compliant = results["compliant"];
policy_reporting(result:value, default:default, compliant:compliant, fixtext:solution,
type:test_type, test:reg_path, info:comment);
policy_set_kbs(type:test_type, cmd:reg_path, default:default, solution:solution, title:title,
value:value, compliant:compliant);
exit(0);
{"id": "OPENVAS:1361412562310109245", "type": "openvas", "bulletinFamily": "scanner", "title": "Microsoft Windows: User Account Control: Detect application installations and prompt for elevation", "description": "This policy setting determines the behavior of application\ninstallation detection for the entire system. Some software might attempt to install itself after\nbeing given permission to run. The user may give permission for the program to run because the\nprogram is trusted. Then the user is prompted to install an unknown component. This security policy\nprovides another way to identify and stop these attempted software installations before they can do\ndamage.\n\n(C) Microsoft Corporation 2017.", "published": "2018-06-12T00:00:00", "modified": "2019-12-13T00:00:00", "cvss": {"score": 0.0, "vector": "NONE"}, "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310109245", "reporter": "Copyright (C) 2018 Greenbone Networks GmbH", "references": ["https://docs.microsoft.com/en-us/windows/security/threat-protection/security-policy-settings/user-account-control-detect-application-installations-and-prompt-for-elevation"], "cvelist": [], "lastseen": "2019-12-13T20:20:44", "viewCount": 20, "enchantments": {"dependencies": {"references": [], "modified": "2019-12-13T20:20:44", "rev": 2}, "score": {"value": -0.2, "vector": "NONE", "modified": "2019-12-13T20:20:44", "rev": 2}, "vulnersScore": -0.2}, "pluginID": "1361412562310109245", "sourceData": "# Copyright (C) 2018 Greenbone Networks GmbH\n#\n# Text descriptions excerpted from a referenced source are\n# Copyright (C) of the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.109245\");\n script_version(\"2019-12-13T11:11:18+0000\");\n script_tag(name:\"last_modification\", value:\"2019-12-13 11:11:18 +0000 (Fri, 13 Dec 2019)\");\n script_tag(name:\"creation_date\", value:\"2018-06-12 14:47:04 +0200 (Tue, 12 Jun 2018)\");\n script_tag(name:\"cvss_base\", value:\"0.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:H/Au:S/C:N/I:N/A:N\");\n script_tag(name:\"qod\", value:\"97\");\n\n script_name(\"Microsoft Windows: User Account Control: Detect application installations and prompt for elevation\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2018 Greenbone Networks GmbH\");\n script_family(\"Policy\");\n script_dependencies(\"smb_reg_service_pack.nasl\");\n script_mandatory_keys(\"Compliance/Launch\");\n\n script_add_preference(name:\"Value\", type:\"radio\", value:\"1;0\");\n\n script_xref(name:\"URL\", value:\"https://docs.microsoft.com/en-us/windows/security/threat-protection/security-policy-settings/user-account-control-detect-application-installations-and-prompt-for-elevation\");\n\n script_tag(name:\"summary\", value:\"This policy setting determines the behavior of application\ninstallation detection for the entire system. Some software might attempt to install itself after\nbeing given permission to run. The user may give permission for the program to run because the\nprogram is trusted. Then the user is prompted to install an unknown component. This security policy\nprovides another way to identify and stop these attempted software installations before they can do\ndamage.\n\n(C) Microsoft Corporation 2017.\");\n\n exit(0);\n}\n\ninclude(\"smb_nt.inc\");\ninclude(\"policy_functions.inc\");\ninclude(\"version_func.inc\");\n\ntarget_os = \"Microsoft Windows 7 or later\";\nwin_min_ver = \"6.1\";\ntitle = \"User Account Control: Detect application installations and prompt for elevation\";\nsolution = \"Set following UI path accordingly:\nComputer Configuration/Windows Settings/Security Settings/Local Policies/Security Options/\" + title;\ntest_type = \"RegKey\";\ntype = \"HKLM\";\nkey = \"Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\System\";\nitem = \"EnableInstallerDetection\";\nreg_path = type + \"\\\" + key + \"!\" + item;\ndefault = script_get_preference(\"Value\");\n\nif(!policy_verify_win_ver(min_ver:win_min_ver)){\n results = policy_report_wrong_os(target_os:target_os);\n}else{\n results = policy_match_exact_reg_dword(key:key, item:item, type:type, default:default);\n}\n\nvalue = results[\"value\"];\ncomment = results[\"comment\"];\ncompliant = results[\"compliant\"];\n\npolicy_reporting(result:value, default:default, compliant:compliant, fixtext:solution,\n type:test_type, test:reg_path, info:comment);\npolicy_set_kbs(type:test_type, cmd:reg_path, default:default, solution:solution, title:title,\n value:value, compliant:compliant);\n\nexit(0);", "naslFamily": "Policy", "immutableFields": []}