<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: GlobalProtect Always-On Being Blocked by WDAC (AppLocker) in GlobalProtect Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-always-on-being-blocked-by-wdac-applocker/m-p/1223826#M6576</link>
    <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/1089541003"&gt;@L.Dyson&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;Assuming that your AppLocker policy is configured to log attempts, you can view the logs of blocked activity by simply looking in the Event Viewer on one of the affected machines. That's where I would start since it'll tell you exactly what needs to be allowed. &lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Secondly are you for sure using path exceptions for your AppLocker exceptions? I would &lt;EM&gt;not&amp;nbsp;&lt;/EM&gt;recommend doing that unless absolutely necessary. Any user on the machine can read your AppLocker rules, and if I can access into your machine it's an extremely quick way of telling me exactly where I need to place files to run on the machine. If that's truly your exception, I could place a file called C:\Users\ImABadDude\Local\Palo Alto Networks\GlobalProtect\RIPYourComputer.exe and your AppLocker policy will happily run it.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;There's nothing in the AppData location that you need to exclude, I would have that location immediately removed from your policy. If you're limiting Program Files you'll need to setup a publisher exception for PAN but also one for OPSWAT for the wa_3rd_party_host_32 and wa_3rd_party_host_64 executable. I'd also see if you've got the default exceptions for the \Windows\ directory as that would certainly break things if not fully excluded. &lt;/P&gt;</description>
    <pubDate>Thu, 13 Mar 2025 22:14:53 GMT</pubDate>
    <dc:creator>BPry</dc:creator>
    <dc:date>2025-03-13T22:14:53Z</dc:date>
    <item>
      <title>GlobalProtect Always-On Being Blocked by WDAC (AppLocker)</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-always-on-being-blocked-by-wdac-applocker/m-p/1223449#M6566</link>
      <description>&lt;P&gt;We are using always-on VPN prelogon SAML and it works fine. However, after deploying a WDAC (Windows Defender Application Control) policy to lock down a device to select apps, Global Protect prelogon no longer works on that endpoint. It works if we remove the WDAC lockdown policy so it's definitely being blocked, but the following locations have been approved to run so I need to understand what other dependencies the always-on VPN relies on.&lt;/P&gt;
&lt;P&gt;C:\Program Files\Palo Alto Networks\GlobalProtect\*&lt;BR /&gt;C:\Users\*\AppData\Local\Palo Alto Networks\GlobalProtect\*&lt;/P&gt;
&lt;P&gt;What else does, especially .exe's does GlobalProtect Always-On rely on?&lt;/P&gt;
&lt;P&gt;Manually connecting the GlobalProtect VPN works, so it's not the PanGPA.exe or PanGPS.exe's. It's just not showing the prelogon icon on the lock screen under sign-in options. Any help would be much appreciated!&lt;/P&gt;</description>
      <pubDate>Tue, 11 Mar 2025 15:19:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-always-on-being-blocked-by-wdac-applocker/m-p/1223449#M6566</guid>
      <dc:creator>L.Dyson</dc:creator>
      <dc:date>2025-03-11T15:19:58Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect Always-On Being Blocked by WDAC (AppLocker)</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-always-on-being-blocked-by-wdac-applocker/m-p/1223826#M6576</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/1089541003"&gt;@L.Dyson&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;Assuming that your AppLocker policy is configured to log attempts, you can view the logs of blocked activity by simply looking in the Event Viewer on one of the affected machines. That's where I would start since it'll tell you exactly what needs to be allowed. &lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Secondly are you for sure using path exceptions for your AppLocker exceptions? I would &lt;EM&gt;not&amp;nbsp;&lt;/EM&gt;recommend doing that unless absolutely necessary. Any user on the machine can read your AppLocker rules, and if I can access into your machine it's an extremely quick way of telling me exactly where I need to place files to run on the machine. If that's truly your exception, I could place a file called C:\Users\ImABadDude\Local\Palo Alto Networks\GlobalProtect\RIPYourComputer.exe and your AppLocker policy will happily run it.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;There's nothing in the AppData location that you need to exclude, I would have that location immediately removed from your policy. If you're limiting Program Files you'll need to setup a publisher exception for PAN but also one for OPSWAT for the wa_3rd_party_host_32 and wa_3rd_party_host_64 executable. I'd also see if you've got the default exceptions for the \Windows\ directory as that would certainly break things if not fully excluded. &lt;/P&gt;</description>
      <pubDate>Thu, 13 Mar 2025 22:14:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-always-on-being-blocked-by-wdac-applocker/m-p/1223826#M6576</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2025-03-13T22:14:53Z</dc:date>
    </item>
  </channel>
</rss>

