Windows Defender Application Control (WDAC) Resources

Why Use WDAC?

Configuration/Baselining/Deployment

Policy Maintenance

Auditing

Bypasses and Research Methodology

Code Signing

Miscellaneous

Conclusion

--

--

--

Threat Researcher

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

5 STEPS TO GDPR COMPLIANCE FOR MOBILE APPS

Loopring DPR Lottery Mechanism

{UPDATE} Toy Bomb: Pop Cube Blast Mania Hack Free Resources Generator

Here’s What’s Woofing!

RSA Encryption: How Sites Stay Secure

Real-life threat hunting stories

[Notice] DUCATO Announcement: About the decision to end transaction support from Coinone

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Matt Graeber

Matt Graeber

Threat Researcher

More from Medium

Setup multiple gits accounts with ssh from a single system

Building your command line interface (CLR) tool with vlang on Windows

UML class diagrams

Several GitHub accounts on the same computer