Forums
New posts
Search forums
News
Security News
Technology News
Giveaways
Giveaways, Promotions and Contests
Discounts & Deals
Reviews
Users Reviews
Video Reviews
Support
Windows Malware Removal Help & Support
Inactive Support Threads
Mac Malware Removal Help & Support
Mobile Malware Removal Help & Support
Blog
Log in
Register
What's new
Search
Search titles only
By:
Search titles only
By:
Reply to thread
Menu
Install the app
Install
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Forums
Software
Security Apps
Microsoft Defender
Any replacements for Microsoft Defender Exploit Protection?
Message
<blockquote data-quote="Andy Ful" data-source="post: 1057844" data-attributes="member: 32260"><p>It is not possible to stop the RedTeams, except when making the computer unusable.</p><p>Your RedTeam most probably <s>exploits</s> abuses Svchost by injecting the DLL or shellcode.</p><p></p><p>You can try to identify what is exploited by using the combination of Hard_Configurator (set to block also Administrators + block all LOLBins) and strict WDAC policy (only Windows and Microsoft binaries allowed, dynamic code trust, no ISG). Do not forget to make a System Restore Point. This setup should be applied before the RedTeam attack. Next, you must inspect the H_C security log and WDAC events.</p><p>Your RedTem probably knows your Admin credentials, Microsoft Account passwords (and others too), so it will be hard to prevent their actions.</p><p></p><p>Edit.</p><p>I am not sure if you are on the right way. You should not focus on stopping your RedTeam but rather on using the setup that can demotivate other RedTeams and hackers.</p></blockquote><p></p>
[QUOTE="Andy Ful, post: 1057844, member: 32260"] It is not possible to stop the RedTeams, except when making the computer unusable. Your RedTeam most probably [S]exploits[/S] abuses Svchost by injecting the DLL or shellcode. You can try to identify what is exploited by using the combination of Hard_Configurator (set to block also Administrators + block all LOLBins) and strict WDAC policy (only Windows and Microsoft binaries allowed, dynamic code trust, no ISG). Do not forget to make a System Restore Point. This setup should be applied before the RedTeam attack. Next, you must inspect the H_C security log and WDAC events. Your RedTem probably knows your Admin credentials, Microsoft Account passwords (and others too), so it will be hard to prevent their actions. Edit. I am not sure if you are on the right way. You should not focus on stopping your RedTeam but rather on using the setup that can demotivate other RedTeams and hackers. [/QUOTE]
Insert quotes…
Verification
Post reply
Top