Skip to main content

Here’s an example of a worklet we recently created in response to managing updates for the BlueKeep vulnerability:



Introducing the Automox Worklet



To enable your ability to configure and update systems using the Automox platform, we’ve created an endpoint hardening worklet that disables the remote desktop protocol connection.



An Automox worklet is an open extensible automation architecture that allows IT operations to create any custom task that they can imagine. Our tool consumes and contains these worklets within a policy that can be automated and maintained across all devices with the Automox sensor installed. These reusable units of work can be applied across any supported operating system (including Windows, Linux, and OSX) and are powered by PowerShell and Bash scripting.



How to Disable Remote Desktop Services Worklet



If a machine is unpatchable, security administrators can use this worklet as a mitigating control to protect impacted Windows systems from the BlueKeep vulnerability. This worklet also can act as a general security hardening on all Windows devices with newer operating systems not vulnerable to the specific threat.



To deploy this endpoint hardening worklet, do the following:







  1. Log in to your Automox Console.







  2. Browse to the System Management page and click Create Policy .







  3. Choose Windows under Worklet











  1. Insert the Evaluation and Remediation Code scripts. The evaluation code keeps you apprised of each device’s ongoing compliance, as well as flags the device for remediation. The remediation code enforces this setting on the schedule you define.




• Under Evaluation Code:



# Define Registry Key and sub-value to evaluate

#############################################

$regPath = "HKLM:\SYSTEM\CurrentControlSet\Control\Terminal Server"

$regProperty = "fDenyTSConnections"

$desiredValue = '1'

#############################################



# Retrieve current value for comparison

$currentValue = (Get-ItemProperty -Path $regPath -Name $regProperty).$regProperty



# Compare current with desired and exit accordingly.

# 0 for Compliant, 1 for Non-Compliant

if ($currentValue -eq $desiredValue) {

Exit 0

} else { Exit 1 }



• Under Remediation Code:



# Define Registry Key and sub-value to modify

#############################################

$regPath = "HKLM:\SYSTEM\CurrentControlSet\Control\Terminal Server"

$regProperty = "fDenyTSConnections"

$desiredValue = '1'

#############################################



try {

Set-ItemProperty -Path $regPath -Name $regProperty -Value $desiredValue

Exit 0

} catch {

Write-Output "Unable to update $regProperty"

Exit 1

}





Originally posted on the Automox blog here.

The evaluation code doesn’t work for me like it is on Windows Server 2012 R2. I had to adjust the $regpath variable like this because the script was always trying to access the file system:





$regPath = “Registry::HKLM:\SYSTEM\CurrentControlSet\Control\Terminal Server”





Found this in Example 3 on the documentation page of get-itemproperty:


https://docs.microsoft.com/en-us/powershell/module/microsoft.powershell.management/get-itemproperty?view=powershell-7



Hope this helps somebody.


Thanks for sharing that @AndreStarkloff!