(This rule locks down the application by placing restrictions on file operations. If an application becomes compromised (buffer-overrun attack), this rule limits what types of files can be accessed by the application.)
My question is ...this rule DENIES aspnet_wp.exe, w3wp.exe, inetinfo.exe applications from writing to ALL files.
How can we ALLOW legitimate file operations but still block malicious activity.
This one is tough because there are many different web files that aspnet_wp.exe,w3wp.exe, inetinfo.exe etc... call upon making tuning difficult.
Everyone's thoughts are appreciated as we tune CSA.