- Jul 30, 2017
- 54
do you change your AppGuard mode from Lockdown to Allow Installs?
For the sake of a perfect installation I always set to OFF, proven I downloaded a trusted installer/vendor file.Yes. you can't install in Lockdown Mode
For the sake of a perfect installation I always set to OFF, proven I downloaded a trusted installer/vendor file.
If you see block events while using Allow Installs when installing a program, disregard those logged block events unless there is an obvious breakage. I have never seen an obvious breakage happen.
With IDM if the user selects certain buttons during with Allow Installs, then AppGuard will prevent it.
@Lockdown , is it true that you have however seen breakage happen while using Allow Installs when installing a program that uses Powershell (e.g., DropBox and Office365)?
Pardon my ignorance but what is IDM in this context?
So if the Dropbox powershell command fails, it results in some unneeded installer files getting left behind?1. No; even with powershell disabled there isn't a permanent program breakage
DropBox update command lines for Powershell:
2017/08/11_16:42:48 > C:\Program Files (x86)\Dropbox\Client_32.4.23\Dropbox.exe > C:\Windows\System32\WindowsPowerShell\v1.0\powershell "Get-AppxPackage C27EB4BA.DropboxOEM | Remove-AppxPackage"
2017/08/11_16:42:50 > C:\Program Files (x86)\Dropbox\Client_32.4.23\Dropbox.exe > C:\Windows\System32\WindowsPowerShell\v1.0\powershell "Get-AppxProvisionedPackage -Online | Where-Object DisplayName -In \"C27EB4BA.DropboxOEM\" | Remove-ProvisionedAppxPackage -Online"
2. Internet Download Manager
So if the Dropbox powershell command fails, it results in some unneeded installer files getting left behind?
I was thinking I might then ask for your thoughts on the following, proposed AppGuard configuration and usage/process/procedure:
AppGuard Configuration:
<some ignorance>
AppGuard Usage/Process/Procedure:
<some ignorance>
So if the Dropbox powershell command fails, it results in some unneeded installer files getting left behind?
In the Guarded Apps list there is a tickbox.
1. ticked = launches as Guarded and MemoryGuarded
2. unticked = launches unguarded and unmemoryguarded
3. ticked & in User Space list set to YES = launches as Guarded and MemoryGuarded (Guarded Apps list supersedes User Space list)
4. unticked & User Space list set to NO = disabled\blocked (for Guarded Apps you must untick them to be blocked)
YepTo stop those 2 popup's from showing up every now and then, i just have to add them to "User Space" and set "include" to "no" right?
08/26/17 13:11:57 Prevented process <software_reporter_tool.exe | c:\program files\google\chrome\application\chrome.exe> from launching from <c:\users\stef\appdata\local\google\chrome\user data\swreporter\21.119.1>.
08/26/17 13:07:37 Prevented process <dismhost.exe | c:\windows\system32\cleanmgr.exe> from launching from <c:\users\stef\appdata\local\temp\cf7faa1b-8c78-4881-937f-d25948a17143>.
To stop those 2 popup's from showing up every now and then, i just have to add them to "User Space" and set "include" to "no" right?
08/26/17 13:11:57 Prevented process <software_reporter_tool.exe | c:\program files\google\chrome\application\chrome.exe> from launching from <c:\users\stef\appdata\local\google\chrome\user data\swreporter\21.119.1>.
08/26/17 13:07:37 Prevented process <dismhost.exe | c:\windows\system32\cleanmgr.exe> from launching from <c:\users\stef\appdata\local\temp\cf7faa1b-8c78-4881-937f-d25948a17143>.
Can you please tell us how AppGuard functions in use cases:
5. ticked & in User Space list set to NO
6. unticked & User Space list set to YES
?
nice thank youUse the wildcard * in file path locations that will change over time - such as version or random numbers.
For software_reporter_tool.exe, add this to User Space list and sent to NO:
c:\users\stef\appdata\local\google\chrome\user data\*\software_reporter_tool.exe, where * = version number that will change over time
For dismhost.exe, add this to User Space list and set to NO:
c:\users\stef\appdata\local\temp\*\dismhost.exe, where * = random number generated each time dismhost.exe is run.
I bet this has been asked somewhere, some time, but the official configuration recommendation for the AppGuard + Sandboxie combo is: "c:\sandbox an exception folder (on the Guarded Apps tab) and NOT to add c:\sandbox to user-space policy."
Sounds like AppGuard is not going to provide much memory protection for sandboxed apps, if you do this. Correct?
Any suggestions?
Thanks. By "official configuration recommendation for the AppGuard + Sandboxie combo", I was talking about Sandboxie's recommendation for solving compatibility issues.There is no official AppGuard LLC "position" on configuring any 3rd-party soft within AppGuard. The offical AppGuard LLC position is that any custom configuration is the user's prerogative and at their own risk. This is no different than any other software publisher.
The user may add the sandbox to the User Space list, but then there will be items blocked. To solve this, the user must create exclusions in the User Space list - thereby permitting the launch of processes and loading of dlls within the sandbox.
You do get memory protections for launched programs when the sandbox is added to User Space.
Since a user can configure\restrict program launches in Sanboxie, adding the sandbox to User Space in AppGuard is mostly superfluous.
Thanks. By "official configuration recommendation for the AppGuard + Sandboxie combo", I was talking about Sandboxie's recommendation for solving compatibility issues.