@cruelsister
Windows 10 built-in security is considered by many forum members as sufficient to protect them against malware (including ransomware). But, there are few valid tests, that can prove/disprove such claims. Could you, please test against ransomware & scriptors the below configuration:
1. SRP default deny.
2. Blocked Windows Script Host and Powershell.
3. Windows Defender + Forced Smartscreen.
I noticed that in malware tests most testers use malware samples without 'Mark of the Web', so those samples cannot be checked by SmartScreen Application reputation cloud. Forced SmartScreen can check files without 'Mark of the Web'.
If you want, you can use Hard_Configurator to quickly apply the above config.
If the file is blocked by SRP, it is possible in the test to run the malware sample using Forced SmartScreen (<Run As SmartScreen> = Administrator, option in Hard_Configurator). In the above config, Forced SmartScreen is an additional protection, applied when installing files with active default deny SRP.