{"id":208353,"date":"2023-09-27T14:43:55","date_gmt":"2023-09-27T14:43:55","guid":{"rendered":"https:\/\/www.ninjaone.com\/script-hub\/comment-bloquer-les-executables-dans-appdata-et-dossiers\/"},"modified":"2024-03-04T20:32:08","modified_gmt":"2024-03-04T20:32:08","slug":"comment-bloquer-les-executables-dans-appdata-et-dossiers","status":"publish","type":"script_hub","link":"https:\/\/www.ninjaone.com\/fr\/script-hub\/comment-bloquer-les-executables-dans-appdata-et-dossiers\/","title":{"rendered":"Comment cr\u00e9er une strat\u00e9gie de restriction logicielle pour bloquer les ex\u00e9cutables dans AppData et le dossier T\u00e9l\u00e9chargements des utilisateurs ?"},"content":{"rendered":"<p><span class=\"TextRun SCXW104765542 BCX0\" lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW104765542 BCX0\">De nos jours, dans les environnements informatiques complexes, il est primordial de <\/span><span class=\"NormalTextRun SCXW104765542 BCX0\">maintenir<\/span><span class=\"NormalTextRun SCXW104765542 BCX0\"> la s\u00e9curit\u00e9 des environnements des utilisateurs. Pour les professionnels de l&rsquo;informatique et les fournisseurs de services g\u00e9r\u00e9s (MSP), l&rsquo;un des d\u00e9fis consiste \u00e0 limiter l&rsquo;ex\u00e9cution d&rsquo;ex\u00e9cutables potentiellement dangereux qui <\/span><span class=\"NormalTextRun SCXW104765542 BCX0\">se trouvent<\/span><span class=\"NormalTextRun SCXW104765542 BCX0\"> dans des emplacements tels que<\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW104765542 BCX0\">AppData<\/span><span class=\"NormalTextRun SCXW104765542 BCX0\"> ou le dossier T\u00e9l\u00e9chargements d&rsquo;un utilisateur. Comprenant ce challenge, <\/span><span class=\"NormalTextRun SCXW104765542 BCX0\">explorons<\/span><span class=\"NormalTextRun SCXW104765542 BCX0\"> une solution de script puissante pour <strong>bloquer les ex\u00e9cutables \u00e0 partir de <\/strong><\/span><strong><span class=\"NormalTextRun SpellingErrorV2Themed SCXW104765542 BCX0\">AppData<\/span><\/strong><span class=\"NormalTextRun SCXW104765542 BCX0\"><strong> et d&rsquo;autres emplacements d\u00e9sign\u00e9s<\/strong>.<\/span><\/span><span class=\"EOP SCXW104765542 BCX0\" data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:360,&quot;335559739&quot;:360,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h2><span class=\"TextRun SCXW80673540 BCX0\" lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW80673540 BCX0\" data-ccp-parastyle=\"heading 2\">Comprendre les strat\u00e9gies de restriction des logiciels<\/span><\/span><span class=\"EOP SCXW80673540 BCX0\" data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:40,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"none\">Les strat\u00e9gies de restriction logicielle (SRP) sont une fonctionnalit\u00e9 de Windows qui permet aux administrateurs de contr\u00f4ler les logiciels qui peuvent \u00eatre ex\u00e9cut\u00e9s sur leurs ordinateurs. Les SRP peuvent \u00eatre utilis\u00e9es pour bloquer des fichiers ex\u00e9cutables sp\u00e9cifiques, des extensions de fichiers ou m\u00eame des r\u00e9pertoires entiers.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:360,&quot;335559739&quot;:360,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Lorsqu&rsquo;un fichier ex\u00e9cutable est ex\u00e9cut\u00e9, Windows v\u00e9rifie les param\u00e8tres SRP pour voir si le fichier est autoris\u00e9 \u00e0 s&rsquo;ex\u00e9cuter. Si le fichier n&rsquo;est pas autoris\u00e9 \u00e0 \u00eatre ex\u00e9cut\u00e9, un message d&rsquo;erreur s&rsquo;affiche.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:360,&quot;335559739&quot;:360,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">L&rsquo;ASR est un outil puissant qui peut \u00eatre utilis\u00e9 pour prot\u00e9ger les ordinateurs contre les logiciels malveillants et autres menaces de s\u00e9curit\u00e9. Toutefois, il est important d&rsquo;utiliser les SRP avec pr\u00e9caution, car il peuvent \u00e9galement emp\u00eacher l&rsquo;ex\u00e9cution de logiciels l\u00e9gitimes.<\/span><\/p>\n<h2><span class=\"TextRun SCXW173705665 BCX0\" lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW173705665 BCX0\" data-ccp-parastyle=\"heading 2\">Le script Disable-AppDataExe.ps1<\/span><\/span><span class=\"EOP SCXW173705665 BCX0\" data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:40,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h2>\n<p><span class=\"TextRun SCXW89056949 BCX0\" lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW89056949 BCX0\">Le script Disable-AppDataExe.ps1 est un script PowerShell qui peut \u00eatre utilis\u00e9 pour emp\u00eacher l&rsquo;ex\u00e9cution de fichiers ex\u00e9cutables dans les r\u00e9pertoires %<\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW89056949 BCX0\">AppData<\/span><span class=\"NormalTextRun SCXW89056949 BCX0\">% et%<\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW89056949 BCX0\">UserProfile<\/span><span class=\"NormalTextRun SCXW89056949 BCX0\">%Downloads. Le script est personnalisable, ce qui vous permet de choisir les extensions de fichiers \u00e0 bloquer et les r\u00e9pertoires \u00e0 restreindre.<\/span><\/span><span class=\"EOP SCXW89056949 BCX0\" data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:360,&quot;335559739&quot;:360,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<pre class=\"EnlighterJSRAW\" data-enlighter-language=\"powershell\">#Requires -Version 5.1\r\n\r\n&lt;#\r\n.SYNOPSIS\r\n    Creates a Software Restriction Policy to block executables from AppData and a user's Downloads folder.\r\n.DESCRIPTION\r\n    Creates a Software Restriction Policy to block executables from AppData and a user's Downloads folder.\r\n.EXAMPLE\r\n     -RestrictedDirectory \"%APPDATA%\", \"%UserProfile%Downloads\"\r\n    Creates a Software Restriction Policy to block executables from AppData and a user's Downloads folder. This is the default.\r\n.EXAMPLE\r\n    PS C:&gt; Disable-AppDataExe.ps1 -RestrictedDirectory \"%APPDATA%\", \"%UserProfile%Downloads\"\r\n    Creates a Software Restriction Policy to block executables from AppData and a user's Downloads folder. This is the default.\r\n.OUTPUTS\r\n    None\r\n.NOTES\r\n    Minimum OS Architecture Supported: Windows 10, Windows Server 2016 - DOES NOT SUPPORT WINDOWS 11\r\n    Release Notes:\r\n    Initial Release\r\n    (c) 2023 NinjaOne\r\n    By using this script, you indicate your acceptance of the following legal terms as well as our Terms of Use at https:\/\/www.ninjaone.com\/terms-of-use.\r\n    Ownership Rights: NinjaOne owns and will continue to own all right, title, and interest in and to the script (including the copyright). NinjaOne is giving you a limited license to use the script in accordance with these legal terms. \r\n    Use Limitation: You may only use the script for your legitimate personal or internal business purposes, and you may not share the script with another party. \r\n    Republication Prohibition: Under no circumstances are you permitted to re-publish the script in any script library or website belonging to or under the control of any other software provider. \r\n    Warranty Disclaimer: The script is provided \u201cas is\u201d and \u201cas available\u201d, without warranty of any kind. NinjaOne makes no promise or guarantee that the script will be free from defects or that it will meet your specific needs or expectations. \r\n    Assumption of Risk: Your use of the script is at your own risk. You acknowledge that there are certain inherent risks in using the script, and you understand and assume each of those risks. \r\n    Waiver and Release: You will not hold NinjaOne responsible for any adverse or unintended consequences resulting from your use of the script, and you waive any legal or equitable rights or remedies you may have against NinjaOne relating to your use of the script. \r\n    EULA: If you are a NinjaOne customer, your use of the script is subject to the End User License Agreement applicable to you (EULA).\r\n#&gt;\r\n\r\n[CmdletBinding()]\r\nparam (\r\n    # Paths to block executions\r\n    [Parameter()]\r\n    [String[]]\r\n    $RestrictedDirectory = @(\"%APPDATA%\", \"%UserProfile%Downloads\"),\r\n    # Executables\r\n    [Parameter()]\r\n    [String[]]\r\n    $ExecutableTypes = @(\"ADE\", \"ADP\", \"BAS\", \"BAT\", \"CHM\", \"CMD\", \"COM\", \"CPL\", \"CRT\", \"EXE\", \"HLP\", \"HTA\", \"INF\", \"INS\", \"ISP\", \"LNK\", \"MDB\", \"MDE\", \"MSC\", \"MSI\", \"MSP\", \"MST\", \"OCX\", \"PCD\", \"PIF\", \"REG\", \"SCR\", \"SHS\", \"URL\", \"VB\", \"WSC\")\r\n)\r\n\r\nbegin {\r\n    function Test-IsElevated {\r\n        $id = [System.Security.Principal.WindowsIdentity]::GetCurrent()\r\n        $p = New-Object System.Security.Principal.WindowsPrincipal($id)\r\n        if ($p.IsInRole([System.Security.Principal.WindowsBuiltInRole]::Administrator))\r\n        { Write-Output $true }\r\n        else\r\n        { Write-Output $false }\r\n    }\r\n}\r\nprocess {\r\n    if (-not (Test-IsElevated)) {\r\n        Write-Error -Message \"Access Denied. Please run with Administrator privileges.\"\r\n        exit 1\r\n    }\r\n    # Clear existing rules\r\n    $BaseRegPath = 'HKLM:\\SOFTWARE\\Policies\\Microsoft\\Windows\\safer'\r\n    if (Test-Path \"$BaseRegPath\") { Remove-Item \"$BaseRegPath\" -Recurse }\r\n    # Create our rule settings\r\n    New-Item \"$BaseRegPath\"\r\n    New-Item \"$($BaseRegPath)\\codeidentifiers\"\r\n    New-Item \"$($BaseRegPath)\\codeidentifiers\\0\"\r\n    New-Item \"$($BaseRegPath)\\codeidentifiers\\0\\Paths\"\r\n    New-ItemProperty \"$($BaseRegPath)\\codeidentifiers\" -Name 'authenticodeenabled' -Value 0 -PropertyType DWord\r\n    New-ItemProperty \"$($BaseRegPath)\\codeidentifiers\" -Name 'DefaultLevel' -Value 262144 -PropertyType DWord\r\n    New-ItemProperty \"$($BaseRegPath)\\codeidentifiers\" -Name 'TransparentEnabled' -Value 1 -PropertyType DWord\r\n    New-ItemProperty \"$($BaseRegPath)\\codeidentifiers\" -Name 'PolicyScope' -Value 0 -PropertyType DWord\r\n    New-ItemProperty \"$($BaseRegPath)\\codeidentifiers\" -Name 'ExecutableTypes' -Value $ExecutableTypes -PropertyType MultiString\r\n\r\n    foreach ($Directory in $RestrictedDirectory) {\r\n        $pathguid = [guid]::newguid()\r\n        $newpathkey = \"$($BaseRegPath)\\codeidentifiers\\0\\Paths{\" + $pathguid + \"}\"\r\n        if ((Test-Path -LiteralPath $newpathkey) -ne $true) { New-Item $newpathkey }\r\n        New-ItemProperty -LiteralPath $newpathkey -Name 'SaferFlags' -Value 0 -PropertyType DWord\r\n        New-ItemProperty -LiteralPath $newpathkey -Name 'ItemData' -Value $Directory -PropertyType ExpandString\r\n    }\r\n    gpupdate.exe \/force\r\n}<\/pre>\n<p>&nbsp;<\/p>\n\n\n<h2><span class=\"TextRun SCXW172428728 BCX0\" lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW172428728 BCX0\" data-ccp-parastyle=\"heading 2\">Comment utiliser le script<\/span><\/span><span class=\"EOP SCXW172428728 BCX0\" data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:40,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"none\">Pour utiliser le script Disable-AppDataExe.ps1, vous devez avoir install\u00e9 PowerShell et l&rsquo;ex\u00e9cuter avec des privil\u00e8ges administratifs. Une fois que vous avez le script, vous pouvez l&rsquo;ex\u00e9cuter en tapant la commande suivante \u00e0 l&rsquo;invite de PowerShell :<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:360,&quot;335559739&quot;:360,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">.NDisable-AppDataExe.ps1<\/span><\/p>\n<p><span data-contrast=\"none\">Le script emp\u00eachera alors les fichiers ex\u00e9cutables sp\u00e9cifi\u00e9s de s&rsquo;ex\u00e9cuter dans les r\u00e9pertoires indiqu\u00e9s.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:360,&quot;335559739&quot;:360,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h2>Conclusions<\/h2>\n<p><span data-contrast=\"none\">Le script Disable-AppDataExe.ps1 est un outil utile pour bloquer l&rsquo;ex\u00e9cution de fichiers ex\u00e9cutables dans des r\u00e9pertoires sp\u00e9cifiques. Cependant, il est important d&rsquo;\u00eatre conscient de ses limites. En comprenant comment fonctionne les SRP et comment utiliser le script, vous pouvez contribuer \u00e0 prot\u00e9ger vos ordinateurs contre les logiciels malveillants et les autres menaces de s\u00e9curit\u00e9.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:360,&quot;335559739&quot;:360,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Voici quelques \u00e9l\u00e9ments suppl\u00e9mentaires \u00e0 prendre en compte lors de l&rsquo;utilisation du script Disable-AppDataExe.ps1 :<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:360,&quot;335559739&quot;:360,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"none\">Le script ne bloquera que les fichiers ex\u00e9cutables qui se trouvent dans les r\u00e9pertoires sp\u00e9cifi\u00e9s. Il ne bloque pas les fichiers ex\u00e9cutables qui se trouvent dans d&rsquo;autres r\u00e9pertoires, tels que le r\u00e9pertoire Program Files.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"none\">Le script ne bloque pas les fichiers ex\u00e9cutables lanc\u00e9s \u00e0 partir d&rsquo;une invite de commande ou d&rsquo;un fichier batch.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"none\">Le script peut \u00eatre contourn\u00e9 par des utilisateurs disposant de privil\u00e8ges administratifs.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">(<span class=\"EOP SCXW206836151 BCX0\" data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:360,&quot;335559739&quot;:360,&quot;335559740&quot;:259}\">Vous serez peut-\u00eatre int\u00e9ress\u00e9 par <a href=\"https:\/\/www.ninjaone.com\/fr\/blog\/comment-desactiver-les-outils-d-administration-locale-dans-windows-powershell\/\">la mani\u00e8re de d\u00e9sactiver les privil\u00e8ges administratifs locaux avec PowerShell<\/a>.)<\/span><\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"none\">NinjaOne peut aider les professionnels de l&rsquo;informatique \u00e0 bloquer de fa\u00e7on optimale les fichiers ex\u00e9cutables sur un nombre illimit\u00e9 de terminaux. NinjaOne est une <a href=\"https:\/\/www.ninjaone.com\/fr\/\">plateforme de gestion informatique bas\u00e9e sur le cloud<\/a> qui offre une vari\u00e9t\u00e9 de fonctionnalit\u00e9s pour la s\u00e9curit\u00e9, y compris la possibilit\u00e9 de cr\u00e9er et de d\u00e9ployer des strat\u00e9gies de restriction logicielle (SRP). La fonction SRP de NinjaOne est facile \u00e0 utiliser et peut \u00eatre personnalis\u00e9e pour bloquer l&rsquo;ex\u00e9cution de fichiers ex\u00e9cutables dans des r\u00e9pertoires sp\u00e9cifiques, des extensions de fichiers ou m\u00eame des applications enti\u00e8res. De plus, la fonction SRP de NinjaOne peut \u00eatre g\u00e9r\u00e9e de fa\u00e7on centralis\u00e9e, ce qui facilite l&rsquo;\u00e9volution vers un nombre illimit\u00e9 de terminaux.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:360,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Voici quelques-uns des avantages de l&rsquo;utilisation de NinjaOne pour bloquer les fichiers ex\u00e9cutables :<\/span><\/p>\n<ul style=\"font-weight: 400;\">\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"none\">D\u00e9ploiement sans faille : La fonction SRP de NinjaOne peut \u00eatre d\u00e9ploy\u00e9e sur les terminaux sans n\u00e9cessiter d&rsquo;installations ou de configurations individuelles. Cela permet de d\u00e9ployer facilement et rapidement la strat\u00e9gie sur un grand nombre de terminaux.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"none\">Gestion centralis\u00e9e : La fonction SRP de NinjaOne peut \u00eatre g\u00e9r\u00e9e de fa\u00e7on centralis\u00e9e \u00e0 partir d&rsquo;une seule console. Il est ainsi facile de cr\u00e9er, de modifier et de d\u00e9ployer des strat\u00e9gies de SRP sur l&rsquo;ensemble de vos terminaux.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"none\">Flexibilit\u00e9 : La fonction SRP de NinjaOne est flexible et peut \u00eatre personnalis\u00e9e pour r\u00e9pondre aux besoins sp\u00e9cifiques de votre entreprise. Vous pouvez choisir de bloquer les fichiers ex\u00e9cutables par r\u00e9pertoire, par extension de fichier ou m\u00eame par application.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"4\" data-aria-level=\"1\"><span data-contrast=\"none\">\u00c9volutivit\u00e9 : La fonction SRP de NinjaOne peut \u00eatre \u00e9tendue \u00e0 un nombre illimit\u00e9 de terminaux. Il s&rsquo;agit donc d&rsquo;une solution id\u00e9ale pour les entreprises de toutes tailles.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<\/ul>\n<p>En savoir plus sur NinjaOne <a href=\"https:\/\/www.ninjaone.com\/fr\/plateforme-de-gestion-de-terminaux\/\">Endpoint Management<\/a>.<\/p>\n","protected":false},"author":35,"featured_media":206863,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","_lmt_disableupdate":"no","_lmt_disable":""},"operating_system":[4212],"use_cases":[4287],"class_list":["post-208353","script_hub","type-script_hub","status-publish","has-post-thumbnail","hentry","script_hub_category-windows","use_cases-configuration-de-systeme"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.ninjaone.com\/fr\/wp-json\/wp\/v2\/script_hub\/208353","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ninjaone.com\/fr\/wp-json\/wp\/v2\/script_hub"}],"about":[{"href":"https:\/\/www.ninjaone.com\/fr\/wp-json\/wp\/v2\/types\/script_hub"}],"author":[{"embeddable":true,"href":"https:\/\/www.ninjaone.com\/fr\/wp-json\/wp\/v2\/users\/35"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ninjaone.com\/fr\/wp-json\/wp\/v2\/comments?post=208353"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.ninjaone.com\/fr\/wp-json\/wp\/v2\/media\/206863"}],"wp:attachment":[{"href":"https:\/\/www.ninjaone.com\/fr\/wp-json\/wp\/v2\/media?parent=208353"}],"wp:term":[{"taxonomy":"script_hub_category","embeddable":true,"href":"https:\/\/www.ninjaone.com\/fr\/wp-json\/wp\/v2\/operating_system?post=208353"},{"taxonomy":"use_cases","embeddable":true,"href":"https:\/\/www.ninjaone.com\/fr\/wp-json\/wp\/v2\/use_cases?post=208353"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}