Relevant area(s)
WinGet CLI
Description of the new feature / enhancement
A few software packages get flagged by various detection engines as PUA (Potentially Unwanted Application). In some cases, these packages are well known and when used responsibly pose no additional unknown risks to the user.
The first detection we encountered was RustDesk. The ESET detection engine reports a detection related to "RemoteAdmin".
The second was Malwarebytes. The K7 detection engine is reporting that a file is encrypted.
There will likely be other classes of PUA for software. This "parent" issue is intended to represent work in the WinGet Client to be able to block PUA by Group Policy, and if it's not blocked by Group Policy, the user can be informed.
Once we have a design for this, we can explore ways to modify our policies to allow specific classes of PUA into the WinGet Community Repository.
Related to:
Proposed technical implementation details
No response
Relevant area(s)
WinGet CLI
Description of the new feature / enhancement
A few software packages get flagged by various detection engines as PUA (Potentially Unwanted Application). In some cases, these packages are well known and when used responsibly pose no additional unknown risks to the user.
The first detection we encountered was RustDesk. The ESET detection engine reports a detection related to "RemoteAdmin".
The second was Malwarebytes. The K7 detection engine is reporting that a file is encrypted.
There will likely be other classes of PUA for software. This "parent" issue is intended to represent work in the WinGet Client to be able to block PUA by Group Policy, and if it's not blocked by Group Policy, the user can be informed.
Once we have a design for this, we can explore ways to modify our policies to allow specific classes of PUA into the WinGet Community Repository.
Related to:
Proposed technical implementation details
No response