implementing-anti-ransomware-group-policy
Configures Windows Group Policy Objects (GPO) to prevent ransomware execution and limit its spread. Implements AppLocker rules, Software Restriction Policies, Controlled Folder Access, attack surface reduction rules, and network protection settings. Activates for requests involving Windows GPO hardening against ransomware, AppLocker configuration, Controlled Folder Access setup, or endpoint protection via Group Policy.
Best use case
implementing-anti-ransomware-group-policy is best used when you need a repeatable AI agent workflow instead of a one-off prompt.
Configures Windows Group Policy Objects (GPO) to prevent ransomware execution and limit its spread. Implements AppLocker rules, Software Restriction Policies, Controlled Folder Access, attack surface reduction rules, and network protection settings. Activates for requests involving Windows GPO hardening against ransomware, AppLocker configuration, Controlled Folder Access setup, or endpoint protection via Group Policy.
Teams using implementing-anti-ransomware-group-policy should expect a more consistent output, faster repeated execution, less prompt rewriting.
When to use this skill
- You want a reusable workflow that can be run more than once with consistent structure.
When not to use this skill
- You only need a quick one-off answer and do not need a reusable workflow.
- You cannot install or maintain the underlying files, dependencies, or repository context.
Installation
Claude Code / Cursor / Codex
Manual Installation
- Download SKILL.md from GitHub
- Place it in
.claude/skills/implementing-anti-ransomware-group-policy/SKILL.mdinside your project - Restart your AI agent — it will auto-discover the skill
How implementing-anti-ransomware-group-policy Compares
| Feature / Agent | implementing-anti-ransomware-group-policy | Standard Approach |
|---|---|---|
| Platform Support | Not specified | Limited / Varies |
| Context Awareness | High | Baseline |
| Installation Complexity | Unknown | N/A |
Frequently Asked Questions
What does this skill do?
Configures Windows Group Policy Objects (GPO) to prevent ransomware execution and limit its spread. Implements AppLocker rules, Software Restriction Policies, Controlled Folder Access, attack surface reduction rules, and network protection settings. Activates for requests involving Windows GPO hardening against ransomware, AppLocker configuration, Controlled Folder Access setup, or endpoint protection via Group Policy.
Where can I find the source code?
You can find the source code on GitHub using the link provided at the top of the page.
SKILL.md Source
# Implementing Anti-Ransomware Group Policy ## When to Use - Hardening a Windows Active Directory environment against ransomware execution and propagation - Implementing defense-in-depth by blocking ransomware execution paths via Group Policy - Configuring AppLocker or WDAC rules to prevent unauthorized executables from running in user-writable directories - Enabling Controlled Folder Access to protect critical directories from unauthorized file modifications - Restricting lateral movement vectors (RDP, SMB, WMI) that ransomware uses to spread across the domain **Do not use** as a standalone ransomware defense. GPO settings complement but do not replace endpoint detection, backups, network segmentation, and user awareness training. ## Prerequisites - Windows Server 2016+ Active Directory environment with Group Policy Management Console (GPMC) - Domain Admin or Group Policy Creator Owners privileges - Windows 10/11 Enterprise or Education (required for AppLocker and WDAC) - Microsoft Defender Antivirus enabled (required for Controlled Folder Access and ASR rules) - Python 3.8+ for audit script that validates GPO compliance - Test OU for validating GPO settings before domain-wide deployment ## Workflow ### Step 1: Block Ransomware Execution Paths with AppLocker Configure AppLocker to prevent executables from running in common ransomware staging locations: ``` AppLocker GPO Path: Computer Configuration → Policies → Windows Settings → Security Settings → Application Control Policies → AppLocker Key Rules: ━━━━━━━━━ 1. DENY executable rules for user-writable paths: - %USERPROFILE%\AppData\Local\Temp\* (email attachment extraction) - %USERPROFILE%\AppData\Roaming\* (CryptoLocker staging) - %USERPROFILE%\Downloads\* (web downloads) - %TEMP%\* (temporary extraction) - %USERPROFILE%\Desktop\* (social engineering drops) 2. ALLOW default rules: - C:\Windows\* (signed by Microsoft) - C:\Program Files\* and C:\Program Files (x86)\* - Administrator group: all paths 3. Enable Application Identity service: Computer Configuration → Policies → Windows Settings → Security Settings → System Services → Application Identity → Automatic ``` ### Step 2: Enable Controlled Folder Access Protect critical directories from unauthorized modification: ``` Controlled Folder Access GPO Path: Computer Configuration → Administrative Templates → Windows Components → Microsoft Defender Antivirus → Microsoft Defender Exploit Guard → Controlled Folder Access Settings: ━━━━━━━━━ 1. Configure Controlled folder access: Enabled → Block mode 2. Configure protected folders: Add custom paths - \\fileserver\shares\finance - \\fileserver\shares\hr - C:\Users\*\Documents - C:\Users\*\Desktop 3. Configure allowed applications: Whitelist trusted apps - C:\Program Files\Microsoft Office\* - C:\Program Files\Adobe\* - Line-of-business applications Default protected folders (automatic): Documents, Pictures, Videos, Music, Desktop, Favorites ``` ### Step 3: Configure Attack Surface Reduction (ASR) Rules Enable ASR rules that target ransomware delivery mechanisms: ``` ASR Rules GPO Path: Computer Configuration → Administrative Templates → Windows Components → Microsoft Defender Antivirus → Microsoft Defender Exploit Guard → Attack Surface Reduction Critical ASR Rules for Ransomware Prevention: ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ GUID Rule BE9BA2D9-53EA-4CDC-84E5-9B1EEEE46550 Block executable content from email D4F940AB-401B-4EFC-AADC-AD5F3C50688A Block Office apps from creating child processes 3B576869-A4EC-4529-8536-B80A7769E899 Block Office apps from creating executable content 75668C1F-73B5-4CF0-BB93-3ECF5CB7CC84 Block Office apps from injecting into processes D3E037E1-3EB8-44C8-A917-57927947596D Block JavaScript/VBScript from launching downloads 5BEB7EFE-FD9A-4556-801D-275E5FFC04CC Block execution of obfuscated scripts 92E97FA1-2EDF-4476-BDD6-9DD0B4DDDC7B Block Win32 API calls from Office macros 01443614-CD74-433A-B99E-2ECDC07BFC25 Block executable files unless they meet prevalence criteria Set each rule to: Block (1) or Audit (2) for initial testing ``` ### Step 4: Restrict Lateral Movement Vectors Lock down SMB, RDP, and WMI to limit ransomware propagation: ``` Network Restrictions: ━━━━━━━━━━━━━━━━━━━━ 1. Disable SMBv1: Computer Configuration → Administrative Templates → Network → Lanman Workstation → Enable insecure guest logons: Disabled Computer Configuration → Administrative Templates → MS Security Guide → Configure SMBv1 server: Disabled 2. Restrict Remote Desktop: Computer Configuration → Administrative Templates → Windows Components → Remote Desktop Services → Remote Desktop Session Host → Connections → Allow users to connect remotely: Disabled (or restricted to specific groups) 3. Disable remote WMI: Windows Firewall → Inbound Rules → Block Windows Management Instrumentation (WMI) inbound 4. Disable AutoPlay/AutoRun: Computer Configuration → Administrative Templates → Windows Components → AutoPlay Policies → Turn off AutoPlay: Enabled (All drives) 5. Disable PowerShell remoting for non-admin users: Computer Configuration → Administrative Templates → Windows Components → Windows PowerShell → Turn on Script Execution: Allow only signed scripts ``` ### Step 5: Audit and Validate GPO Compliance Verify that GPO settings are applied correctly across the domain: ```powershell # Check GPO application on endpoint gpresult /r /scope:computer # Verify AppLocker rules Get-AppLockerPolicy -Effective | Select-Object -ExpandProperty RuleCollections # Check Controlled Folder Access status Get-MpPreference | Select-Object EnableControlledFolderAccess # List protected folders Get-MpPreference | Select-Object -ExpandProperty ControlledFolderAccessProtectedFolders # Check ASR rules Get-MpPreference | Select-Object -ExpandProperty AttackSurfaceReductionRules_Ids Get-MpPreference | Select-Object -ExpandProperty AttackSurfaceReductionRules_Actions ``` ## Verification - Run `gpresult /r` on test endpoints to confirm GPO application - Attempt to run an executable from `%AppData%\Temp` to verify AppLocker blocks it - Modify a file in a protected folder from an unlisted application to confirm CFA blocks it - Test ASR rules by opening a macro-enabled document and verifying child process blocking - Validate that legitimate applications in the allowlist still function correctly - Check Windows Event Log for AppLocker events (Event IDs 8003, 8004) and CFA events (1123, 1124) ## Key Concepts | Term | Definition | |------|------------| | **AppLocker** | Windows application control feature that restricts which executables, scripts, and DLLs users can run based on publisher, path, or hash rules | | **Controlled Folder Access** | Microsoft Defender feature that prevents untrusted applications from modifying files in protected directories | | **Attack Surface Reduction (ASR)** | Set of rules in Microsoft Defender Exploit Guard that block specific attack behaviors like Office macro child processes | | **Software Restriction Policies (SRP)** | Legacy Windows feature (deprecated in Win 11) for restricting executables; replaced by AppLocker and WDAC | | **WDAC** | Windows Defender Application Control; the successor to AppLocker with stronger enforcement using code integrity policies | ## Tools & Systems - **Group Policy Management Console (GPMC)**: Primary tool for creating and managing GPOs in Active Directory - **AppLocker**: Built-in Windows application whitelisting and blacklisting engine - **Microsoft Defender Exploit Guard**: Suite including CFA, ASR rules, and Network Protection - **GPResult**: Command-line tool for verifying GPO application status on endpoints - **PowerShell Get-MpPreference**: Cmdlet for querying Microsoft Defender configuration including ASR and CFA status
Related Skills
testing-ransomware-recovery-procedures
Test and validate ransomware recovery procedures including backup restore operations, RTO/RPO target verification, recovery sequencing, and clean restore validation to ensure organizational resilience against destructive ransomware attacks.
smack-policy-generator
Generates SMACK policy files from app requirements. Creates mandatory access control rules for process isolation and resource access.
smack-policy-auditor
Analyzes SMACK policy files for correctness, label conflicts, and access control issues. Verifies mandatory access control rules.
reverse-engineering-ransomware-encryption-routine
Reverse engineer ransomware encryption routines to identify cryptographic algorithms, key generation flaws, and potential decryption opportunities using static and dynamic analysis.
recovering-from-ransomware-attack
Executes structured recovery from a ransomware incident following NIST and CISA frameworks, including environment isolation, forensic evidence preservation, clean infrastructure rebuild, prioritized system restoration from verified backups, credential reset, and validation against re-infection. Covers Active Directory recovery, database restoration, and application stack rebuild in dependency order. Activates for requests involving ransomware recovery, post-encryption restoration, or disaster recovery from ransomware.
profiling-threat-actor-groups
Develops comprehensive threat actor profiles for APT groups, criminal organizations, and hacktivist collectives by aggregating TTP documentation, historical campaign data, tooling fingerprints, and attribution indicators from multiple intelligence sources. Use when briefing executives on sector-specific threats, updating threat model assumptions, or prioritizing defensive controls against specific adversaries. Activates for requests involving MITRE ATT&CK Groups, Mandiant APT profiles, CrowdStrike adversary naming, or sector-specific threat briefings.
performing-ransomware-tabletop-exercise
Plans and facilitates tabletop exercises simulating ransomware incidents to test organizational readiness, decision-making, and communication procedures. Designs realistic scenarios based on current ransomware threat actors (LockBit, ALPHV/BlackCat, Cl0p), injects covering double extortion, backup destruction, and regulatory notification requirements. Evaluates participant responses against NIST CSF and CISA guidelines. Activates for requests involving ransomware tabletop, incident response exercise, or ransomware readiness drill.
performing-ransomware-response
Executes a structured ransomware incident response from initial detection through containment, forensic analysis, decryption assessment, recovery, and post-incident hardening. Addresses ransom negotiation considerations, backup integrity verification, and regulatory notification requirements. Activates for requests involving ransomware response, ransomware recovery, crypto-ransomware, data encryption attack, ransom payment decision, or ransomware containment.
performing-dmarc-policy-enforcement-rollout
Execute a phased DMARC rollout from p=none monitoring through p=quarantine to p=reject enforcement, ensuring all legitimate email sources are authenticated before blocking unauthorized senders.
performing-content-security-policy-bypass
Analyze and bypass Content Security Policy implementations to achieve cross-site scripting by exploiting misconfigurations, JSONP endpoints, unsafe directives, and policy injection techniques.
investigating-ransomware-attack-artifacts
Identify, collect, and analyze ransomware attack artifacts to determine the variant, initial access vector, encryption scope, and recovery options.
implementing-zero-trust-with-hashicorp-boundary
Implement HashiCorp Boundary for identity-aware zero trust infrastructure access management with dynamic credential brokering, session recording, and Vault integration.