- Jul 30, 2017
- 54
1: when i install or update one of my few installed softs.Thank you, @Umbra .
I am looking to understand the processes/procedures you use surrounding these settings. E.g.,
1- what are the scenarios where you take your machine out of lockdown mode?
2- what steps do you take when you would like to update applications other than those made by your "security soft's vendors"?
old setting, it didn't have the xml file yet, and the Guarded Apps list changed since ( obviously ^^). but the rest is still valid.@Lockdown , what do you think of the above configuration?
There are pending changes forthcoming to significantly tighten security when executing digitally signed files in Protected mode.
@Lockdown , have these changed been implemented yet in the latest 4.x or 5.x releases of AppGuard?
Thank you, @Umbra .
- what are the scenarios where you take your machine out of lockdown mode?
when i install or update one of my few installed softs.
You don't have to do anything for Windows Updates. If you use manually downloaded and installed KBs from Microsoft's KB Windows Update portal via the browser, they should install in Protected mode, but are not going to install in Locked Down mode.
If you want to install something, then yes, you have to lower protection to either Allow Installs or OFF. In Allow Installs, powershell is not going to be permitted to do some things, so if the installer uses powershell, you see blocks of powershell in the Activity Report, then lower protection to OFF when using that installer. Few installers use powershell. The only ones I know of at the moment is the Office365 and DropBox installer. Something blocked is not a permanent breakage. Your Activity Report is not going to be completely empty for trusted programs; in fact it will be full of block events for trusted programs. All those block events are not important unless something is obviously broken.
Locked Down mode blocks everything launched in User Space - even Microsoft digitally signed files. So unless you are running bunch of programs from User Space (including a USB flash drive) you will not see much blocked.
On W10 it will be dismhost.exe (Windows automatic maintenance), OneDriveStandaloneUpdater.exe, and OneDrive.exe as they launch from AppData. If you don't ever use OneDrive, then uninstall it.
Protected mode is there when you need to lower it and run some digitally signed process from a publisher on the TPL from User Space.
For security, just use Locked Down mode.
You have to manually add the sofware's publisher then set its level to install (as BRN is , so appguard is updated automatically without user interactions)
The Publisher List is only for Protected Mode, if you are on Lockdown , you have to set AG to Install Mode)
Only applications on the Guard List can execute from User Space while in Lock Down mode (User must manually add applications to the list; AppGuard comes with small pre-loaded list of Guarded Applications)
Not yet. Next release of 5.X. No ETA at this time.
For the time being, just remove all the publishers in the default Trusted Publisher List that you do not need.
@Lockdown , for users who utilize Protected Mode, what do you typically advise them to add to the Trusted Publisher List - e.g., add only MS, BRN and security software products, and add them as allow Install?
I recognize there are multiple strategies regarding this... might the most common AppGuard configuration strategies be documented somewhere?
yes, and maybe your hardware vendors.add only MS, BRN and security software products, and add them as allow Install?
nope, because SRP is all about adjusting the options and rules for a specific system so there is no "guide" ; allow what you need to be running, guard (if possible) those that connect internet , block all the rest.I recognize there are multiple strategies regarding this... might the most common AppGuard configuration strategies be documented somewhere?
I recognize there are multiple strategies regarding this... might the most common AppGuard configuration strategies be documented somewhere?
I suggest keep both Microsoft and BRN. If you have any programs that use digitally signed updates from C:\Users\<User>\* you can add those too.
@Lockdown , given your stated strategy, can System Space apps (e.g., other security software such as Adguard) perform their automatic updates without any need for their publishers to be in the TPL, while in Protected Mode?
Yes. you can't install in Lockdown Mode
if in Install Mode , yes. If not, no.4. What elements of @Umbra 's above configuration allow you to perform updates to your software that you don't categorize as security software (i.e., software written by vendors that you do not add as Trusted Publishers within AppGuard)?
I disabled totally Powershell from running on my system, so i don't (want to) use any apps needing it.5. have you had to account for any software installers that uses Powershell (e.g., DropBox and Office365)?
yep , it the best scenario.6.a What do you recommend for users who want to both:
- use Lockdown mode, and
- utilize apps that run from within User Space (e.g., OneDrive, Windows Maintenance service, etc.)
?
E.g., might you recommend:
6.b - add publishers of OneDrive, Windows Maintenance service, and any other apps within User Space to the Trusted Publishers List (TPL) and set their levels to Install, and temporarily change from Lockdown Mode to Protected Mode in order to run these apps from within User Space?
nope, it may block the update process in some stages.6.c. - add the publishers of OneDrive, Windows Maintenance service, and any other apps within User Space to the Guard list, and remain in Lockdown mode while running these apps from within User Space?
nope may cause updating issues too.6.d - in the User Space list, exclude the file paths of OneDrive, Windows Maintenance service, and any other apps within User Space [User Space (NO)] , and remain in Lockdown mode while running these apps?
Yep.Reference:
AppGuard 4.x 32/64 Bit
"I assume you are running AppGuard in Locked Down mode. AppGuard will block all processes from executing from User Space in Locked Down mode - unless they are added by the user to the Guarded Apps list.
...
If you don't want to see it blocked, then you have to allow it (Software Reporter).
To allow it, exclude its file path from User Space (NO) in the User Space list.
"
All internet-facing/vulnerable apps/processes you're using should be guarded. Critical processes and security ones shouldn't.7. Do you have any guidance for which sorts of apps users can set as Guarded without causing interference to functionality and operation, and which should not be set as Guarded?
Your best bet is start out using Protected Mode. Locked Down mode disables the Trusted Publisher List. This even the digitally signed files from publishers on the TPL will not launch. If you start out slowly, you will understand. Please don't try to build and anti-NSA\CIA policy right from the beginning.
1-goodAppGuard Configuration:
1- TPL: All security software vendors are in TPL (i.e., MS, BRN, plus a few others noted in my configuration: SECURE - Meltcheesedec Security Configuration 2017 )
2- TPL: in addition, add publishers of apps within User Space (e.g., OneDrive, Windows Maintenance service, and any other apps within User Space) to the Trusted Publishers List (TPL) and set their levels to Install
3- Guard List: Add "wscript.exe, cscript.exe and powershell_ise.exe to the Guarded Apps list" (Reference: Basic Hardened AppGuard Policy XML (continued) ) and "Commonly Exploited Programs" list you posted on Basic Hardened AppGuard Policy XML
1- install is better, if it causes issues, just untick powershell in Guarded Apps temporarily.AppGuard Usage/Process/Procedure:
1- While installing software (in which installers may user Powershell): AppGuard is in OFF mode
2- While initializing automatic updates of existing software in System Space whose publishers are in TPL (configured as allowing Install): AppGuard is in Protected Mode
3- While initializing automatic updates of existing software in System Space whose publishers are NOT in TPL: I'm confused on this; should AppGuard be in Protected Mode or Allow Installs mode?
4- While running apps within User Space (e.g., OneDrive, Windows Maintenance service, and any other apps within User Space) whose publishers are in TPL (configured as allowing Install): AppGuard is in Protected Mode
5- While web surfing, viewing email, and downloading any files: AppGuard is in Lockdown mode
5- it's fine , remember Guarded Apps overrides User Space.
@Lockdown mode: the issue is that true AppGuard devotees and power users such as @Umbra are:
- very respected on these boards, and
- regularly post that Locked Down mode is by far the optimal configuration setup, even upon first using AppGuard
So users like me then ask you tons of questions in order to learn AppGuard .
E.g.,
After I review responses by you (thanks in advance for your help) and @Umbra to the questions I posed in reply
Appguard Configuration & Setup demo Thread
I was thinking I might then ask for your thoughts on the following, proposed AppGuard configuration and usage/process/procedure:
AppGuard Configuration:
- TPL: All security software vendors are in TPL (i.e., MS, BRN, plus a few others noted in my configuration: SECURE - Meltcheesedec Security Configuration 2017 )
- TPL: in addition, add publishers of apps within User Space (e.g., OneDrive, Windows Maintenance service, and any other apps within User Space) to the Trusted Publishers List (TPL) and set their levels to Install
- Guard List: Add "wscript.exe, cscript.exe and powershell_ise.exe to the Guarded Apps list" (Reference: Basic Hardened AppGuard Policy XML (continued) ) and "Commonly Exploited Programs" list you posted on Basic Hardened AppGuard Policy XML
AppGuard Usage/Process/Procedure:
- While installing software (in which installers may user Powershell): AppGuard is in OFF mode
- While initializing automatic updates of existing software in System Space whose publishers are in TPL (configured as allowing Install): AppGuard is in Protected Mode
- While initializing automatic updates of existing software in System Space whose publishers are NOT in TPL: I'm confused on this; should AppGuard be in Protected Mode or Allow Installs mode?
- While running apps within User Space (e.g., OneDrive, Windows Maintenance service, and any other apps within User Space) whose publishers are in TPL (configured as allowing Install): AppGuard is in Protected Mode
- While web surfing, viewing email, and downloading any files: AppGuard is in Lockdown mode
What do you think?
@Umbra , questions:
7. might you be able to please provide me more detail concerning your statement, as it relates to my proposed configuration above? E.g.,
8. are you suggesting (concerning my configuration above) that I not add my "apps within User Space (e.g., OneDrive, Windows Maintenance service, and any other apps within User Space)" as Guarded?
Lockdown answered you in details in the post above@Umbra , questions:
7. might you be able to please provide me more detail concerning your statement, as it relates to my proposed configuration above? E.g.,
Exact, choose one or the other, Guarded Apps is about items restriction, User-Space is made to fully "block" or "allow" items.8. are you suggesting (concerning my configuration above) that I not add my "apps within User Space (e.g., OneDrive, Windows Maintenance service, and any other apps within User Space)" as Guarded?