Windows users often install anti-virus programs to protect their systems. Despite their best efforts, they are unable to defend their systems from unexpected malware attacks and need to take more safety measures. The blocking of some folders that can be easily infected, such as Temp and App Data, will help secure our systems more effectively.
Despite our best efforts and precautions, it is still possible to get infected. Operating systems (OS) provide folders for installing and updating applications, unzipping, compressing archives, and installing software; some can be infected with malware.
“C:\Windows\Temp” works like a hub for malware threats and other viruses. Apart from that, other risky folders are the following:-
%MYPROFILE%/Data/Local/and all its associated folders.
%MYPROFILE%/Data/Roaming/ and all its related folders.
These folders can not be executed only to perform storage functions; .exe files are required to be protected by other layers of defense.
To safeguard against system malware threats, there are some procedures to block .exe files from Running in Windows 11 or 10 in Vulnerable Folders.
Block procedure of EXE Files from Running on Windows 11 or 10 in Vulnerable Folders
Following steps to be followed to block .exe files from running on Windows 11 or 10 in Vulnerable Folders:
Step 1. Browse local group policy editor (Windows 11/10 Home editors are required to enable gpedit. msc in their system).
Step 2. The local group policy editor window will be opened in the system; follow the path as shown below in the left side pane:-
Computer Configuration > Windows Settings > Security Settings > Software Restriction Policies
Step 3. Right-click in the Software Restriction Policies folder and select New Software Restriction Policies from the pop-up menu.
Step 4. After that selection, Windows will create some new associated/subfolders. Right-click on the Additional Rules and select New Path Rule.
Step 5. At the “New Path Rule” window that appears, enter the steps of the executable file as we want to stop from running. It is mandatory to enter file extensions, i.e., *.exe, at the end to block only executable files.
Step 6. Click Apply.
Step 7. Click OK.
We suggest you block the following:-
- C:/Windows/Temp/*.exe
- C:/Windows/Temp/*/*.exe
- %MYPROFILE%/Data/Local/*.exe
- %MYPROFILE%/Data/Local/*/*.exe
- %MYPROFILE%/Data/Roaming/*.exe
- %MYPROFILE%/AppData/Roaming/*/*.exe
These steps will block the executable files vulnerable to malware threats. It will also work on those threats that may come from archive files opened using Windows zip support.
In some instances, if we want to unblock some .exe files, we need to follow the following steps:
Step 1. Go to Security Level
Step 2. Select the Unrestricted option in the drop-down menu
Step 3. create a “New Path Rule.”
That’s all for the article.
You guys are amazing; Keep reading, learning, and growing.