Home of the jammr Community
Jammr installs in windows under users\USERNAME\AppData\Local. This is a problem!
Ransomwares are rampant in the corporate world. There is no real way to stop a user from launching an executable in an email attachment which starts the spread. Preventatively; a current technique we utilize is to block executables from launching from the path “users\USERNAME\AppData” through a GPO.
Moving the Jammr folder to users\USERNAME\ works fine and the program still launches, but technically the application should not be launching from this location as 99.9% of legitimate problems do not do so.
Offline
housenet
Jammr installs in windows under users\USERNAME\AppData\Local. This is a problem!Ransomwares are rampant in the corporate world. There is no real way to stop a user from launching an executable in an email attachment which starts the spread. Preventatively; a current technique we utilize is to block executables from launching from the path “users\USERNAME\AppData” through a GPO. Moving the Jammr folder to users\USERNAME\ works fine and the program still launches, but technically the application should not be launching from this location as 99.9% of legitimate problems do not do so.
Offline