- Jul 30, 2017
- 54
Basic Hardened AppGuard Policy XML
@Umbra and @Lockdown :
Might you be able to go into more detail for those of us still who are:
- still learning AppGuard
- wanting to tiptoe into Lockdown mode, and
- have no access to the hardened .xml since it was taken off mega, as discussed in Basic Hardened AppGuard Policy XML (FYI, I am unable to post a reply on that thread, so I created this new thread in order to continue that discussion)
your only lead is to use the Bouncer's vulnerable process list on Wilders.
Obviously you would add interpreters like cmd, powershell, etc.. to User Sapce - Yes (then remove them from Guarded Apps)
@Umbra and @Lockdown :
Might you be able to go into more detail for those of us still who are:
- still learning AppGuard
- wanting to tiptoe into Lockdown mode, and
- have no access to the hardened .xml since it was taken off mega, as discussed in Basic Hardened AppGuard Policy XML (FYI, I am unable to post a reply on that thread, so I created this new thread in order to continue that discussion)