There's a handful of technical guides which walk you through the process of converting your Windows driver policy into audit mode. Blocked drivers are allowed to load, but get flagged in the event logs. You would collect the events, and update your blocklist accordingly.
I would skip that for now, and try converting the current drivers policy file in XML before browsing it.
1. Download Matt Graeber's
WDACTools PowerShell module. Look for the green "Code" button on GitHub, select "Download ZIP".
2. Extract the ZIP to any local folder.
3. Run PowerShell as Admin:
Code:
Import-Module \path\to\folder\WDACTools.psd1 -Scope Global
ConvertTo-WDACCodeIntegrityPolicy -BinaryFilePath C:\Windows\System32\CodeIntegrity\driversipolicy.p7b -XmlFilePath DriverSiPolicy.xml
4. Open the converted policy XML, and browse for any drivers you might have as matches.
The blocklist XML is composed of three parts:
- Blocked CA authority signing certs used by vulnerable drivers
- Deny rules for blocked drivers, based on SHA1 and SHA256 hashes
- Deny rules for blocked drivers, based on specific filenames