Advanced Plus Security CyberPanther Computer Security Configuration 2021

Last updated
Apr 23, 2021
How it's used?
For home and private use
Operating system
Windows 10
On-device encryption
Log-in security
    • Biometrics (Windows Hello PIN, TouchID, Face, Iris, Fingerprint)
Security updates
Allow security updates and latest features
User Access Control
Notify me only when programs try to make changes to my computer
Smart App Control
Network firewall
Real-time security
Norton 360 Deluxe
Firewall security
About custom security
Boot-time protection: aggressive mode
SONAR: aggressive mode
Blocking traffic for little-known apps: aggressive mode
Periodic malware scanners
EEK, Trend Micro House Call, F-secure online scanner
Malware sample testing
I do not participate in malware testing
Browser(s) and extensions
Edge (Chromium):
Norton Safe Web
Adguard
LastPass

Firefox:
Norton Safe Web
Adguard
LastPass
Secure DNS
Adguard DNS and Express VPN DNS Servers
Desktop VPN
Express VPN
Password manager
LastPass
Maintenance tools
Norton Performance
File and Photo backup
Acronis and Google Drive
System recovery
Acronis and Norton Backup
Risk factors
    • Working from home
    • Browsing to popular websites
    • Opening email attachments
    • Buying from online stores, entering banks card details
    • Logging into my bank account
    • Streaming audio/video content from trusted sites or paid subscriptions
    • Streaming audio/video content from shady sites
Computer specs
HP Spectre X360
Operating system: Windows 10 Pro 64
Processor, graphics & memory:
Intel® Core™ i7-1165G7 (up to 4.7 GHz, 12 MB L3 cache, 4 cores) + Intel® Iris® Xe Graphics + 16 GB(onboard)
Display: 13.5" diagonal, WUXGA+ (1920 x 1280), IPS, Touch, edge-to-edge glass, micro-edge, BrightView, anti-reflection, 400 nits
Storage: 512 GB PCIe® NVMe™ M.2 SSD
Battery: 4-cell, 66 Wh Li-ion polymer
Notable changes
UAC implemented to Always notify
Configured windows 10 native exploit protection
Changed Real-time Protection to G Data Internet Security
What I'm looking for?

Looking for maximum feedback.

cruelsister

Level 42
Verified
Honorary Member
Top Poster
Content Creator
Well-known
Apr 13, 2013
3,133
One thing that you need to evaluate is the utility of using UAC. Far too many malware strains will be immune to any action by UAC (like Mespinoza ransomware), or use the old dll hijack method:

Bypassing Windows 10 UAC with mock folders and DLL hijacking

like the WastedLocker ransomware. The latter is more disconcerting as why would a user deny the popup for Microsoft's own winsat.exe (which begins the malicious cascade)?

So although there is nothing wrong in enabling UAC, one must ask if it really adds anything to security.
 

Back3

Level 14
Verified
Top Poster
Apr 14, 2019
654
Would Gebert's straightforward mitigation advice to prevent UAC bypass attacks is setting UAC to "Always Notify" be enough? Doing so will always show the user UAC prompts before high-risk applications are executed.
 

Gandalf_The_Grey

Level 76
Verified
Honorary Member
Top Poster
Content Creator
Well-known
Apr 24, 2016
6,506
One thing that you need to evaluate is the utility of using UAC. Far too many malware strains will be immune to any action by UAC (like Mespinoza ransomware), or use the old dll hijack method:

Bypassing Windows 10 UAC with mock folders and DLL hijacking

like the WastedLocker ransomware. The latter is more disconcerting as why would a user deny the popup for Microsoft's own winsat.exe (which begins the malicious cascade)?

So although there is nothing wrong in enabling UAC, one must ask if it really adds anything to security.
And if you use UAC set it as recommended in the linked article to "Always Notify".
Gebert's straightforward mitigation advice to prevent UAC bypass attacks is setting UAC to "Always Notify." Doing so will always show the user UAC prompts before high-risk applications are executed.
Edit: learn to read before posting, allready posted by @Back3 (y)
 

CyberPanther

Level 6
Thread author
Verified
Well-known
Oct 1, 2019
295

CyberPanther

Level 6
Thread author
Verified
Well-known
Oct 1, 2019
295
One thing that you need to evaluate is the utility of using UAC. Far too many malware strains will be immune to any action by UAC (like Mespinoza ransomware), or use the old dll hijack method:

Bypassing Windows 10 UAC with mock folders and DLL hijacking

like the WastedLocker ransomware. The latter is more disconcerting as why would a user deny the popup for Microsoft's own winsat.exe (which begins the malicious cascade)?

So although there is nothing wrong in enabling UAC, one must ask if it really adds anything to security.
I am reading about UAC on Microsoft Documents and shall enable it soon.
Change User Access Control setting
 
F

ForgottenSeer 85179

Thanks for the tip. I will configure windows 10 native exploit protection. I am reading two articles found on Microsoft Documents:
Apply mitigations to help prevent attacks through vulnerabilities
Turn on exploit protection to help mitigate against attacks
You can also take a look at
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top