diff --git a/AppControl Manager/CustomUIElements/SigningDetailsDialog.xaml b/AppControl Manager/CustomUIElements/SigningDetailsDialog.xaml
index a2c3ba8af..436a536e4 100644
--- a/AppControl Manager/CustomUIElements/SigningDetailsDialog.xaml
+++ b/AppControl Manager/CustomUIElements/SigningDetailsDialog.xaml
@@ -68,7 +68,7 @@
-
+
@@ -105,7 +105,7 @@
-
+
diff --git a/AppControl Manager/CustomUIElements/SigningDetailsDialogForRemoval.xaml b/AppControl Manager/CustomUIElements/SigningDetailsDialogForRemoval.xaml
index e6abacaf0..c29288d61 100644
--- a/AppControl Manager/CustomUIElements/SigningDetailsDialogForRemoval.xaml
+++ b/AppControl Manager/CustomUIElements/SigningDetailsDialogForRemoval.xaml
@@ -68,7 +68,7 @@
-
+
@@ -105,7 +105,7 @@
-
+
@@ -121,7 +121,7 @@
-
+
diff --git a/AppControl Manager/IntelGathering/FileIdentityTimeBasedHashSet.cs b/AppControl Manager/IntelGathering/FileIdentityTimeBasedHashSet.cs
index 027f2e2be..8f81d8270 100644
--- a/AppControl Manager/IntelGathering/FileIdentityTimeBasedHashSet.cs
+++ b/AppControl Manager/IntelGathering/FileIdentityTimeBasedHashSet.cs
@@ -49,7 +49,7 @@ public bool Add(FileIdentity item)
if (existingItem.TimeCreated.HasValue && item.TimeCreated.HasValue &&
existingItem.TimeCreated < item.TimeCreated)
{
- Logger.Write($"Replacing an older FileIdentity item with a newer one in MDE Advanced Hunting Logs " +
+ Logger.Write($"Replacing an older FileIdentity item with a newer one in the Logs " +
$"for the file with name {existingItem.FileName} and SHA256 hash {existingItem.SHA256Hash}.");
// Remove the existing older item and add the newer one
diff --git a/AppControl Manager/MainWindow.xaml b/AppControl Manager/MainWindow.xaml
index bc975a693..94b63132e 100644
--- a/AppControl Manager/MainWindow.xaml
+++ b/AppControl Manager/MainWindow.xaml
@@ -102,8 +102,8 @@
+ Width="16" Height="16"
+ Margin="8,0,4,0"/>
+ x:Uid="MainSearchAutoSuggestBox" Margin="0"/>
diff --git a/AppControl Manager/Pages/AllowNewApps/AllowNewAppsLocalFilesDataGrid.xaml b/AppControl Manager/Pages/AllowNewApps/AllowNewAppsLocalFilesDataGrid.xaml
index 8eea4d90c..e266b0810 100644
--- a/AppControl Manager/Pages/AllowNewApps/AllowNewAppsLocalFilesDataGrid.xaml
+++ b/AppControl Manager/Pages/AllowNewApps/AllowNewAppsLocalFilesDataGrid.xaml
@@ -24,24 +24,24 @@
-
+
-
+
-
+
-
+
@@ -58,7 +58,7 @@
VerticalAlignment="Center"
VerticalContentAlignment="Center" ToolTipService.ToolTip="The total number of the files"/>
-
+
diff --git a/AppControl Manager/Pages/AllowNewApps/AllowNewAppsStart.xaml b/AppControl Manager/Pages/AllowNewApps/AllowNewAppsStart.xaml
index 299352155..e7ac915da 100644
--- a/AppControl Manager/Pages/AllowNewApps/AllowNewAppsStart.xaml
+++ b/AppControl Manager/Pages/AllowNewApps/AllowNewAppsStart.xaml
@@ -30,14 +30,13 @@
-
Use this page to Allow
new or already installed apps or files to run on the system.
-
+
@@ -79,9 +78,9 @@
-
+
-
+
-
+
-
+
-
Build Code Signing Certificates that are suitable for signing App Control Policies.
-
+
diff --git a/AppControl Manager/Pages/ConfigurePolicyRuleOptions.xaml b/AppControl Manager/Pages/ConfigurePolicyRuleOptions.xaml
index edd2d2c84..3e1dd6a61 100644
--- a/AppControl Manager/Pages/ConfigurePolicyRuleOptions.xaml
+++ b/AppControl Manager/Pages/ConfigurePolicyRuleOptions.xaml
@@ -22,15 +22,14 @@
-
-
- Configure App Control for Business
+
+ Configure App Control for Businesspolicies'rule options.
-
+
@@ -44,7 +43,7 @@
-
+
diff --git a/AppControl Manager/Pages/CreateDenyPolicy.xaml b/AppControl Manager/Pages/CreateDenyPolicy.xaml
index 057906f82..e1ea536a6 100644
--- a/AppControl Manager/Pages/CreateDenyPolicy.xaml
+++ b/AppControl Manager/Pages/CreateDenyPolicy.xaml
@@ -26,9 +26,7 @@
-
-
@@ -69,20 +67,17 @@
-
-
-
Create a Denybase policy that will explicitly deny files or applications. Keep in mind that Application Control is fundamentally based on allow-listing, which means anything that is not allowed by a policy is already automatically denied.
-
+
@@ -96,10 +91,8 @@
-
@@ -117,33 +110,33 @@
-
+
-
+
+ Target="{x:Bind CreateFilesAndFoldersDenyPolicyButton}" />
-
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
-
+
-
-
-
-
+
@@ -280,26 +266,21 @@ Header="Policy Name" IsClickEnabled="False" IsActionIconVisible="False">
-
+
-
+
-
+
-
-
+
-
-
@@ -310,10 +291,10 @@ Style="{StaticResource AccentButtonStyle}" Margin="0,0,15,0" ToolTipService.Tool
-
-
-
-
+
+
+
+
diff --git a/AppControl Manager/Pages/CreateDenyPolicyFilesAndFoldersScanResults.xaml b/AppControl Manager/Pages/CreateDenyPolicyFilesAndFoldersScanResults.xaml
index b3e91d112..b2600aeb7 100644
--- a/AppControl Manager/Pages/CreateDenyPolicyFilesAndFoldersScanResults.xaml
+++ b/AppControl Manager/Pages/CreateDenyPolicyFilesAndFoldersScanResults.xaml
@@ -22,7 +22,6 @@
-
View the detected files that were used to create the Deny policy.
@@ -36,24 +35,24 @@
-
+
-
+
-
+
-
+
@@ -64,13 +63,13 @@
-
+ VerticalContentAlignment="Center"/>
-
+
diff --git a/AppControl Manager/Pages/CreatePolicy.xaml b/AppControl Manager/Pages/CreatePolicy.xaml
index 73f39824b..bc577082f 100644
--- a/AppControl Manager/Pages/CreatePolicy.xaml
+++ b/AppControl Manager/Pages/CreatePolicy.xaml
@@ -21,7 +21,6 @@
-
Create App Control for Businesspolicies
@@ -31,7 +30,7 @@
-
+
@@ -55,16 +54,14 @@
-
+
-
+
-
@@ -86,22 +83,18 @@
-
+
-
+
-
+
-
@@ -120,17 +113,14 @@
-
+
-
-
+
-
@@ -152,18 +142,15 @@
-
+
-
+
-
+
@@ -185,20 +172,17 @@
-
+
-
-
+
-
-
@@ -217,24 +201,18 @@
-
-
-
+
-
+
-
+
-
@@ -263,7 +241,7 @@
-
+
@@ -294,7 +272,7 @@
-
+
@@ -325,7 +303,7 @@
-
+
diff --git a/AppControl Manager/Pages/CreateSupplementalPolicy.xaml b/AppControl Manager/Pages/CreateSupplementalPolicy.xaml
index fdc0d0dfb..5b6b60efa 100644
--- a/AppControl Manager/Pages/CreateSupplementalPolicy.xaml
+++ b/AppControl Manager/Pages/CreateSupplementalPolicy.xaml
@@ -27,7 +27,6 @@
-
@@ -42,13 +41,11 @@
-
-
-
-
Create a Supplemental policy that will expand the scope of a base policy. Supplemental policies can only allow files, they cannot have deny rules in them.
-
+
@@ -95,11 +90,10 @@
-
+
@@ -117,10 +111,10 @@
-
-
+
@@ -132,16 +126,16 @@
Header="Browse For Files"
IsClickEnabled="True" IsActionIconVisible="False" Click="FilesAndFoldersBrowseForFilesSettingsCard_Click" Holding="FilesAndFoldersBrowseForFilesSettingsCard_Holding" RightTapped="FilesAndFoldersBrowseForFilesSettingsCard_RightTapped">
-
+
-
+
-
+
-
+
-
+
-
+
-
-
-
-
+
+
-
+
-
+
-
-
-
-
+
@@ -335,16 +324,13 @@
Header="Browse For Certificates" Click="CertificatesBrowseForCertsSettingsCard_Click"
IsClickEnabled="True" IsActionIconVisible="False">
-
+
-
-
-
-
+
+
-
+
-
+
-
-
-
-
+
@@ -437,11 +421,8 @@
-
-
-
-
+
+
-
+
-
+
-
-
-
-
+
@@ -560,9 +539,9 @@
-
+
-
+
-
-
-
-
+
+
@@ -615,9 +591,7 @@
-
-
-
+
-
-
+
@@ -648,11 +622,8 @@
-
-
-
-
+
+
-
+
-
+
-
-
-
-
+
+
+
+
diff --git a/AppControl Manager/Pages/CreateSupplementalPolicyFilesAndFoldersScanResults.xaml b/AppControl Manager/Pages/CreateSupplementalPolicyFilesAndFoldersScanResults.xaml
index fc2853b1b..ac7758eae 100644
--- a/AppControl Manager/Pages/CreateSupplementalPolicyFilesAndFoldersScanResults.xaml
+++ b/AppControl Manager/Pages/CreateSupplementalPolicyFilesAndFoldersScanResults.xaml
@@ -22,7 +22,6 @@
-
View the detected files that were used to create the Supplemental policy.
@@ -36,24 +35,24 @@
-
+
-
+
-
+
-
+
@@ -64,13 +63,13 @@
-
+ VerticalContentAlignment="Center"/>
-
+
diff --git a/AppControl Manager/Pages/Deployment.xaml b/AppControl Manager/Pages/Deployment.xaml
index 258512dd5..94b058aae 100644
--- a/AppControl Manager/Pages/Deployment.xaml
+++ b/AppControl Manager/Pages/Deployment.xaml
@@ -29,7 +29,7 @@
-
+
@@ -126,7 +126,7 @@
-
+
@@ -194,7 +194,7 @@
-
+
@@ -240,7 +240,7 @@
-
@@ -248,7 +248,7 @@
-
+
diff --git a/AppControl Manager/Pages/EventLogsPolicyCreation.xaml b/AppControl Manager/Pages/EventLogsPolicyCreation.xaml
index 3c3380f23..132f870c1 100644
--- a/AppControl Manager/Pages/EventLogsPolicyCreation.xaml
+++ b/AppControl Manager/Pages/EventLogsPolicyCreation.xaml
@@ -34,7 +34,7 @@
-
+
@@ -50,7 +50,7 @@ MinWidth="400" IsReadOnly="True" />
-
+
@@ -79,7 +79,7 @@ MinWidth="400" IsReadOnly="True" />
-
+
@@ -150,9 +150,7 @@ MinWidth="400" IsReadOnly="True" />
Style="{StaticResource PanelStyle}">
-
- Browse for a XML policy file to add the logs to
-
+ Browse for a XML policy file to add the logs to
@@ -222,24 +220,24 @@ MinWidth="400" IsReadOnly="True" />
-
+
-
+
-
+
-
+
@@ -247,7 +245,7 @@ MinWidth="400" IsReadOnly="True" />
-
+
@@ -262,13 +260,13 @@ MinWidth="400" IsReadOnly="True" />
-
+ VerticalContentAlignment="Center"/>
-
+
diff --git a/AppControl Manager/Pages/GetCIHashes.xaml b/AppControl Manager/Pages/GetCIHashes.xaml
index 1ed7d5c1a..b6653f170 100644
--- a/AppControl Manager/Pages/GetCIHashes.xaml
+++ b/AppControl Manager/Pages/GetCIHashes.xaml
@@ -20,14 +20,13 @@
-
Calculate the Code Integrityhashes
of files.
-
+
diff --git a/AppControl Manager/Pages/GetSecurePolicySettings.xaml b/AppControl Manager/Pages/GetSecurePolicySettings.xaml
index 64e8dc8da..ea105da30 100644
--- a/AppControl Manager/Pages/GetSecurePolicySettings.xaml
+++ b/AppControl Manager/Pages/GetSecurePolicySettings.xaml
@@ -22,12 +22,11 @@
-
Retreive and query the Secure Settings
on the system.
-
+
diff --git a/AppControl Manager/Pages/Logs.xaml b/AppControl Manager/Pages/Logs.xaml
index 263e459a9..8beb84385 100644
--- a/AppControl Manager/Pages/Logs.xaml
+++ b/AppControl Manager/Pages/Logs.xaml
@@ -31,19 +31,18 @@
-
+
+ PlaceholderText="Search in the logs..."
+ MinWidth="300" TextChanged="SearchTextBox_TextChanged"/>
@@ -53,8 +52,8 @@
-
+
diff --git a/AppControl Manager/Pages/MDEAHPolicyCreation.xaml b/AppControl Manager/Pages/MDEAHPolicyCreation.xaml
index 07d03163c..05c1d8266 100644
--- a/AppControl Manager/Pages/MDEAHPolicyCreation.xaml
+++ b/AppControl Manager/Pages/MDEAHPolicyCreation.xaml
@@ -36,14 +36,12 @@
-
+
-
-
@@ -54,14 +52,14 @@
-
+ VerticalContentAlignment="Center"/>
-
+
@@ -94,7 +92,7 @@
-
+
@@ -259,9 +257,7 @@ Spacing="8">
Style="{StaticResource PanelStyle}">
-
- Browse for a XML policy file to add the logs to
-
+ Browse for a XML policy file to add the logs to
@@ -275,10 +271,8 @@ Spacing="8">
-
Browse for a base
- policy XML file that this Supplemental policy will belong to
-
+ policy XML file that this Supplemental policy will belong to
@@ -306,24 +300,24 @@ Spacing="8">
-
+
-
+
-
+
-
+
@@ -331,15 +325,12 @@ Spacing="8">
-
+
-
-
-
@@ -368,12 +359,10 @@ Spacing="8">
Hash
-
-
-
+
@@ -87,7 +87,7 @@
-
+
@@ -115,7 +115,7 @@
-
+
diff --git a/AppControl Manager/Pages/Simulation.xaml b/AppControl Manager/Pages/Simulation.xaml
index abb3fcf86..8e57e96d6 100644
--- a/AppControl Manager/Pages/Simulation.xaml
+++ b/AppControl Manager/Pages/Simulation.xaml
@@ -23,17 +23,16 @@
-
-
- Perform App Control for Business
- Simulation
- by selecting files or folders, and a XML policy file, then use the
- Begin Simulation button to populate the data grid.
- The results will show you whether the selected files would be allowed or blocked by your App Control policy if it was actually deployed on a system and those files were run.
-
+
+ Perform App Control for Business
+ Simulation
+ by selecting files or folders, and a XML policy file, then use the
+ Begin Simulation button to populate the data grid.
+ The results will show you whether the selected files would be allowed or blocked by your App Control policy if it was actually deployed on a system and those files were run.
+
-
+
@@ -60,7 +59,7 @@
-
+
@@ -89,9 +88,9 @@
-
+
-
+
-
+
-
+
-
+
diff --git a/AppControl Manager/Pages/StrictKernelPolicyScanResults.xaml b/AppControl Manager/Pages/StrictKernelPolicyScanResults.xaml
index 5fd4bcdc8..4353b9356 100644
--- a/AppControl Manager/Pages/StrictKernelPolicyScanResults.xaml
+++ b/AppControl Manager/Pages/StrictKernelPolicyScanResults.xaml
@@ -22,7 +22,6 @@
-
View the detected Kernel-mode files that will be used to create the enforced mode policy. Remove items you don't want to be included in the final Strict Kernel-mode policy from the list.
@@ -36,24 +35,24 @@
-
+
-
+
-
+
-
+
@@ -64,13 +63,13 @@
-
+
-
+
diff --git a/AppControl Manager/Pages/SystemInformation/SystemInformation.xaml b/AppControl Manager/Pages/SystemInformation/SystemInformation.xaml
index 7f5225809..8fb57b1c5 100644
--- a/AppControl Manager/Pages/SystemInformation/SystemInformation.xaml
+++ b/AppControl Manager/Pages/SystemInformation/SystemInformation.xaml
@@ -20,16 +20,15 @@
-
-
- View detailed information about
- the Deployed policies
- and Code Integrity on the system.
-
-
+
+ View detailed information about
+ the Deployed policies
+ and Code Integrity on the system.
+
+
-
+
diff --git a/AppControl Manager/Pages/Update.xaml b/AppControl Manager/Pages/Update.xaml
index af9535b2a..bc567f6f9 100644
--- a/AppControl Manager/Pages/Update.xaml
+++ b/AppControl Manager/Pages/Update.xaml
@@ -23,13 +23,12 @@
-
-
- Check for updates in this page. You can also enable automatic update check which will happen once at startup and you will be notified whenever a new version is available.
-
+
+ Check for updates in this page. You can also enable automatic update check which will happen once at startup and you will be notified whenever a new version is available.
+
-
+
diff --git a/AppControl Manager/Pages/ValidatePolicy.xaml b/AppControl Manager/Pages/ValidatePolicy.xaml
index ce20c24b3..ce4ac510d 100644
--- a/AppControl Manager/Pages/ValidatePolicy.xaml
+++ b/AppControl Manager/Pages/ValidatePolicy.xaml
@@ -22,14 +22,13 @@
-
Validate App Control Policies to ensure they are compliant with the official schema.
If you manually modified XML policy files and want to ensure your modifications are correct, use this feature to validate them.
-
+
diff --git a/AppControl Manager/Pages/ViewFileCertificates.xaml b/AppControl Manager/Pages/ViewFileCertificates.xaml
index b00edc199..8173e14b9 100644
--- a/AppControl Manager/Pages/ViewFileCertificates.xaml
+++ b/AppControl Manager/Pages/ViewFileCertificates.xaml
@@ -23,14 +23,13 @@
-
View Comprehensive information about the certificates used to sign files.
Details that are typically unavailable in File Explorer properties or PowerShell cmdlets are presented here in full.
-
+
@@ -43,11 +42,10 @@
-
+
-
+
diff --git a/AppControl Manager/Resources/StrictKernelMode_NoFlightRoots.xml b/AppControl Manager/Resources/StrictKernelMode_NoFlightRoots.xml
index 866010394..fa27ba9c5 100644
--- a/AppControl Manager/Resources/StrictKernelMode_NoFlightRoots.xml
+++ b/AppControl Manager/Resources/StrictKernelMode_NoFlightRoots.xml
@@ -24,7 +24,7 @@
-
+
diff --git a/AppControl Manager/Strings/en-US/Resources.resw b/AppControl Manager/Strings/en-US/Resources.resw
index 2eb2227b0..9f6ee7b44 100644
--- a/AppControl Manager/Strings/en-US/Resources.resw
+++ b/AppControl Manager/Strings/en-US/Resources.resw
@@ -1,16 +1,16 @@
-
@@ -238,4 +238,274 @@
Update
+
+ Browse for a file to see all of its available certificates
+
+
+ Select File
+
+
+ Guide
+
+
+ Click/Tap to visit the full Guide for this page on GitHub
+
+
+ Deploy after Creation
+
+
+ Toggling this button means the policy will be deployed on the system after it's been created
+
+
+ Create Supplemental Policy
+
+
+ Create the Supplemental policy based on the configurations you selected
+
+
+ Create Deny Policy
+
+
+ Create the Deny policy based on the configurations you selected
+
+
+ Create Deny policy by scanning files and folders
+
+
+ Files and Folders
+
+
+ Create Deny policy by scanning files and folders
+
+
+ Create a Deny policy based on an app's Package Family Name (PFN)
+
+
+ Package Family Name
+
+
+ Create a Deny policy based on an app's Package Family Name (PFN)
+
+
+ Indicates that the created/deployed policy will have (Enabled:Audit Mode) policy rule option and will generate audit logs instead of blocking files.
+
+
+ Audit
+
+
+ Indicates that the created/deployed policy will have (Enabled:Audit Mode) policy rule option and will generate audit logs instead of blocking files.
+
+
+ Indicates that the created/deployed policy will have (Require EV Signers) policy rule option which will only allow kernel-mode drivers signed with an EV certificate to run.
+
+
+ Require EVSigners
+
+
+ Indicates that the created/deployed policy will have (Require EV Signers) policy rule option which will only allow kernel-mode drivers signed with an EV certificate to run.
+
+
+ Enables script enforcement for the policy which will severely limit the attack surface of PowerShell by requiring only scripts/modules signed and allowed in the Code Integrity policy to run.
+
+
+ Enable Script Enforcement
+
+
+ Enables script enforcement for the policy which will severely limit the attack surface of PowerShell by requiring only scripts/modules signed and allowed in the Code Integrity policy to run.
+
+
+ Indicates that the created/deployed policy will have (Enabled:Boot Audit on Failure) and (Enabled:Advanced Boot Options Menu) policy rule options. Useful for testing the policy and having recovery options available when something goes wrong. Not recommended to be used in the final production-ready policy due to security reasons.
+
+
+ Test Mode
+
+
+ Indicates that the created/deployed policy will have (Enabled:Boot Audit on Failure) and (Enabled:Advanced Boot Options Menu) policy rule options. Useful for testing the policy and having recovery options available when something goes wrong. Not recommended to be used in the final production-ready policy due to security reasons.
+
+
+ Browse
+
+
+ Opens the File picker dialog allowing you select file(s)
+
+
+ Browse
+
+
+ Opens the Folder picker dialog allowing you select folder(s)
+
+
+ Supplemental Policy Name
+
+
+ Enter a name for the Supplemental policy that will be created.
+
+
+ The name of the Supplemental policy that is going to be created.
+
+
+ The name of the Supplemental policy that is going to be created.
+
+
+ Policy Name
+
+
+ Files and Folders
+
+
+ Create Supplemental policy by scanning files and folders
+
+
+ Create Supplemental policy by scanning files and folders
+
+
+ Clear
+
+
+ Clear
+
+
+ Review the Event Logs that were collected during the Audit mode phase
+
+
+ Review the Event Logs
+
+
+ Review the Local Files
+
+
+ Review the Local Files. These are the files that were found in the directories you browsed for.
+
+
+ Start allowing apps or files
+
+
+ Start allowing apps or files by either running them or browsing for their directories during the Audit mode phase.
+
+
+ Actions
+
+
+ Offers multiple different actions to take on the displayed data
+
+
+ Clear Data
+
+
+ Clear all of the displayed data
+
+
+ Deploy after Creation
+
+
+ Toggling this button means the policy will be deployed on the system after it's been created
+
+
+ Search the data...
+
+
+ Search among the displayed data
+
+
+ De-Select All
+
+
+ De-select any selected data
+
+
+ Select All
+
+
+ Select all of the displayed data
+
+
+ Select all
+
+
+ Select all
+
+
+ Refresh
+
+
+ Refresh
+
+
+ Remove Selections
+
+
+ Remove Selections
+
+
+ Selected Apps: 0
+
+
+ The total number of the selected Apps
+
+
+ Browse for Folder paths to scan and include in the Deny policy. The folders will be scanned recursively.
+
+
+ Browse For Folders
+
+
+ Browse for Folder paths to scan and include in the Deny policy. The folders will be scanned recursively.
+
+
+ Browse for file paths to scan and include in the Deny policy.
+
+
+ Browse For Files
+
+
+ Browse for file paths to scan and include in the Deny policy.
+
+
+ The name of the Deny policy that is going to be created.
+
+
+ Policy Name
+
+
+ The name of the Deny policy that is going to be created.
+
+
+ View the Base policy path you selected.
+
+
+ View the files you selected.
+
+
+ View the folders you selected.
+
+
+ Total logs: 0
+
+
+ The total number of the logs
+
+
+ Refresh The Logs
+
+
+ Retrieve the latest logs for the current session by reading them from the log file in the user configurations directory
+
+
+ Search menu items...
+
+
+ Enter menu item names to find them quickly
+
+
+ Check for updates
+
+
+ Update
+
+
+ Open the directory where user configurations and user generated files are stored
+
+
+ Open User Config Directory
+
\ No newline at end of file