
The provider uses powershell.exe to enforce the resource and will fail after AppLocker is started (i.e. AppLocker may restrict access to powershell.exe. Please note that this AppLocker custom provider will fail without access to powershell.exe.
#New applocker policy mod#
Modify the Puppet Master's Puppetfile by adding the following line: mod 'autostructure-applocker', '1.0.0' PowerShell Rule It is enabled by default, so no action should be required.
#New applocker policy download#
Note: pluginsync is necessary to download the powershell.rb provider file to the agent.

The module enforces the AppLocker rules using a Puppet type provider that makes calls to the Windows-native powershell.exe executable. Development - Guide for contributing to the moduleĬreate, modify, or delete AppLocker rules using the applocker_rule resource.Reference - An under-the-hood peek at what the module is doing and how.Usage - Configuration options and additional functionality.Setup - The basics of getting started with applocker.Examine the codebase on GitHub at the GitHub AppLocker Project. For more information about AppLocker, please see Microsoft's AppLocker Overview. Simply include this module in your Puppetfile and utilize the applocker_rule resource to help manage Windows® application security policies.

It contains a custom type provider that uses powershell.exe commands to create, modify, or delete AppLocker rules. Manage Windows® AppLocker rules using this module.
