PolicyPak CSE and MMC 26.05 Release

PolicyPak Version 26.05 Released

Overview

PolicyPak version 26.05 introduces major new DLL Hijack Protection capabilities, significant Least Privilege Manager enhancements, Admin Approval accountability improvements, licensing dialog upgrades, and a refreshed purple branding across all tools.

Note: Starting with this build, you are now able to get PolicyPak downloads in https://netwrix.com/my_products.html (suggest you bookmark it). Annnnnd…

Note: Ending with this build, this will be the LAST / FINAL PolicyPak build you will be able to get in portal.policypak.com. We’re not FULLY retiring the PolicyPak Portal, because the Bootcamp, payment for PP Cloud and XML Examples are still there. But DOWNLOADING the “bits” from portal.PolicyPak.com… this will be the FINAL BITS posted there. Therefore…

Suggest: You try to see if you can actually get the PolicyPak bits (today) from https://netwrix.com/my_products.html so you’re not opening up support tickets trying to get into https://netwrix.com/my_products.html the next build cycle. :slight_smile:

Netwrix Endpoint Policy Manager version 2601 introduces new Client Side Extension (CSE) updates and a new automatic rules generation tool for Netwrix Endpoint Privilege Manager (PPLPM).

Endpoint Privilege Manager Updates (CSE Updates)

Want the full details? Click the link below!


:input_latin_letters: Rebranding

  • Endpoint Policy Manager has been renamed back to PolicyPak
  • Endpoint Privilege Manager has been renamed back to Least Privilege Manager

These name changes are reflected throughout the UI, tools, ADMX policies, and documentation.


:shield: DLL Hijack Protection — Major New Feature

Version 26.05 introduces a new DLL Hijack Protection policy type in Least Privilege Manager. This is the flagship feature of this release. Overview in Docs for reference: DLL Hijack Protection | Netwrix Product Documentation

Global Policy — Three Protection Modes

The global policy enables DLL Hijack Protection and defines how the feature behaves. It operates in one of three modes:

Mode Behavior
Audit All events are logged, but nothing is blocked. Use this to assess potential issues before enforcing protection.
Safe Elevated Risky DLL loading is blocked only for elevated processes.
Anti-Hijack Protection is extended further — DLL loading is blocked for regular processes running from protected locations such as Program Files.

** Note there are no “In-Cloud” DLL Hijack editors YET; but you should be able to upload to PPLPM XML to PP Cloud to try it out.

Exclusion Policies

Exclusion policies allow specific exceptions to global DLL Hijack rules. Administrators can define exclusions for selected EXEs or DLLs based on:

  • File path
  • Digital signature
  • File hash

Video anchors in docs starts DLL Hijack Protection Basics: Get to know the system with a simple example | Netwrix Product Documentation

Scenario 1: Unsigned DLL Launched via rundll32.exe

When a command like rundll32.exe c:\temp\DLL-Notsigned.dll,EntryPointW is attempted, PolicyPak blocks it by default. If the DLL is legitimate, administrators have two ways to authorize it:

  • Way #1: Authorize by identity
  • Way #2: Authorize by creating a matching DLL rule

:video_camera: Watch the demo


Scenario 2: EXE Attempting DLL Hijack via Unqualified Path

When an executable attempts to load a DLL by name only (without a full path), a malicious DLL can be injected. With DLL Hijack Protection enabled, the hijack is blocked and logged. If the blocked DLL is a false positive, an administrator can create a DLL Hijack exclusion rule to allow it.

:video_camera: Watch the demo


Scenario 3: Internet-Downloaded Installer Blocked in Safe Elevated Mode

When a user downloads an installer from the internet (e.g., VLC) that requires admin rights, DLL Hijack Protection blocks it in Safe Elevated mode. Two rule options are available to allow legitimate installs:

  • Rule #1: Allow the application directly
  • Rule #2: Allow a specific DOMAIN\USER to pass through the protection so that a UAC prompt allows an admin with credentials to install

:video_camera: Watch the demo


Scenario 4: Reducing Noise from Legitimate Software (e.g., OneDrive)

When DLL Hijack Protection is enabled, legitimate applications like OneDrive may trigger block prompts due to behavior that resembles suspicious DLL loading. This scenario demonstrates how to:

  1. Take a real blocked event
  2. Convert it into a Publisher-based Allow rule
  3. Stop the noise immediately while keeping protection intact

The goal: fix the friction without weakening security.

:video_camera: Watch the demo


:bust_in_silhouette: Admin Approval — Accountability Improvement

The Admin Approval response code now includes the DOMAIN\USERNAME (or Windows USERNAME) of the person who ran the Admin Approval tool and generated the response code. This identity is recorded in the Event Log on the endpoint.

Compatibility Notes:

  • You should update both MMC and CSE to show ‘Approved by: User’.
  • If CSE is older and MMC / Admin Approval Tool is new (24.6) then ‘Approved by: User’ won’t show up, but AA codes will work.
  • If CSE is new (24.6) and MMC / Admin Approval Tool is old (pre-24.6), the AA tool won’t accept the 24.6 request code.

Works with Least Privilege Manager …

Works with Device Manager…

Result: When logs are collected centrally, administrators can audit a complete accountability chain — who approved what, and when — across all Admin Approval activity on endpoints.


Note: A previous announcement expressed Grace Period Dialog improvements. That is coming in a future release.

:scissors: Whitespace Trimming in Policies

Policy fields — including process paths, certificate names, file info, and other rule criteria — now automatically trim leading and trailing whitespace. This resolves rule-matching failures caused by accidental extra spaces, as well as executables that embed excessive whitespace in their own file metadata.

Community request: Trim Whitespace in Policies and device processes


:artist_palette: Updated Branding Across All Tools

All tools have been updated to reflect the new purple PolicyPak branding, including:

  • MMC snap-in and CSE UI
  • Standalone Policy Editor
  • PolicyPak Application Manager (PPAM) Design Studio
  • Other related utility tools


:wrench: Resolved Support Tickets

ID Title
377659 Elevate UWP elevates, but still produces UAC
390696 CSE: Some dialogs require .NET 4.8 (CSE installation issues when .NET 4.8 or later is missing)
401323 AA simple approval — no elevate option
402201 Admin Approval not catching some elevations
407436 NSM Rules are not applying as expected
402268 Secure Run randomly blocking WorkSpace 1 Process
410309 Unable to use variables in Parent Process Filter
418131 PolicyPak Windows Event Log errors APPCRASH
398898 Majority of Local Policies/Security Options do not merge into GPO using Merge tool
385623 PPLOGS V2 feedback/improvements

:bug: Bug Fixes

ID Title
145751 SecureCopy out-reach — installers downloaded from the internet
145823 It is possible to install more than one CSE to the PC
289658 PPLPM: SecureRun wins over Run as Admin
300575 PPLPM: Custom block message is displayed for CMD when ‘Block UWP’ policy is applied
305145 PPC: License expiration alert is shown for non-expired LPM product
365519 PPLPM Global policy for DLL doesn’t block DLL
411584 LPM: ActiveX — Failed to download when using “Validate and Add” button
425637 DLL Hijack: Event 1031 does not occur when relaunching the application
432107 Rebranding: Changes needed in DLL Hijack ADMX policy
409985 The bottom border line is missing in the “Higher or Equals” drop down
417960 LPM: Policy Scope section is absent in ADM report
410305 RWDM: Process sequentially option exists in ADM report when collection is absent
416092 Collection with ILT is not showing as yellow

:red_question_mark: Need Help with This Update?

Situation Action
Product not working as intended Contact Support
Question for other experts Post in PolicyPak > Discussions & Questions
Feature request Submit via PolicyPak > Ideas
Something cool to share Post in PolicyPak > Show & Tell

We are always happy to hear from our users — share your thoughts below!

I went to https://netwrix.com/my_products.html but there is no download link. I then logged into https://portal.policypak.com/ and the latest bits are for 26.01. Am I too early trying to download?

1 Like

Something went a little wonky this AM… Seeing as its our first shipment to my_products, it didn’t happen on time..

we’re working on it.. Sorry man.. Here’s the update of the moment:

As of 9.30 AM EST, this release is not yet available in either MY_PRODUCTS or PORTAL. Hang tight, it should be there during the day, just check in a little later.

Thanks, Jeremy. I was able to download the latest release from the portal now.

I’m happy to hear this is rebranded back to PolicyPak. I’ve been using the product for many years, and I still referred to the product as PolicyPak after it was renamed to EPM.

1 Like