Migrate script control macro exclusions to the new memory protection configuration (Windows only)
Follow the steps below if you want to migrate the existing script control exclusions using a PowerShell script that Arctic Wolf provides.
Note: The steps below apply to tenants managed using the Endpoint Defense console. If you manage tenants using the Multi-Tenant Console, see KB 42221231386907.
- Verify that PowerShell is installed on your computer and that PowerShell scripts are not blocked by security software, including Aurora Protect Desktop. If Aurora Protect Desktop is installed on your computer, in the device policy assigned to your device, verify that Script Control > Block PowerShell console usage is turned off.
- In the Endpoint Defense console, add an integration with the following API privileges and record the resulting application ID and secret:
- Policies: Read, Modify
- Users: Read
- In Settings > Integrations, record the Tenant ID.
- When you run the script, you will specify the email address of an Endpoint Defense console administrator account. Verify that the account that you want to use has the Administrator role.
- In the device policies where you want to migrate exclusions from script control to memory protection, verify that script control is enabled and that macro exclusions are present.
- The script will ignore policies with script control disabled and policies that do not have any script control exclusions.
- The script does not migrate exclusion lists with multibyte characters. You must add these exclusions manually.
- Download the PowerShell script.
Note: When you run the script in
-dryRun mode, you may encounter the following error in the output file: “Entering Modify 'policy_name' Policy... logError : The requested policy has not been converted to MemoryProtection v2.” This can occur if a device policy has not been edited for some time. To resolve this issue, in the management console, open and save the policy.
The PowerShell output will indicate if any script control exclusions could not be migrated. You must add these exclusions to the memory protection configuration manually.
Example: Run the script in -dryRun mode
CODE
.\sc2memdef_copy.ps1 -copySCExclusions -allPolicies -dryRun -tenantId '00000000-0000-0000-0000-000000000000' -apiKey '00000000-0000-0000-0000-000000000000' -apiSecret '00000000-0000-0000-0000-000000000000' -userEmail 'user@blackberry.com' -region 'na'
Example: Run the script for a specific device policy
CODE
.\sc2memdef_copy.ps1 -copySCExclusions -policy 'userPolicy' -tenantId '00000000-0000-0000-0000-000000000000' -apiKey '00000000-0000-0000-0000-000000000000' -apiSecret '00000000-0000-0000-0000-000000000000' -userEmail 'user@blackberry.com' -region 'na'
Example: Run the script for all device policies
CODE
.\sc2memdef_copy.ps1 -copySCExclusions -allPolicies -tenantId '00000000-0000-0000-0000-000000000000' -apiKey '00000000-0000-0000-0000-000000000000' -apiSecret '00000000-0000-0000-0000-000000000000' -userEmail 'user@blackberry.com' -region 'na'
- On the Memory Actions tab of the target device policies, check the migrated exclusions and delete any that do not apply to the new Dangerous VBA Macro violation type.
- Delete the PowerShell integration that you added to the management console.