D
Deleted member 178
@Andy Ful if Lsass.exe protection is enabled, Windows Backup will fail.
(which is supposed to be expected, HMPA seems to do the same)
(which is supposed to be expected, HMPA seems to do the same)
Thanks.@Andy Ful if Lsass.exe protection is enabled, Windows Backup will fail.
(which is supposed to be expected, HMPA seems to do the same)
Welcome to Windows , where one development department doesn't consult with the others LOLThanks.
It is sad. So, one Windows feature is probably not compatible with another.:notworthy:
sadly it is the most important because advanced malware always try to abuse it. (EternalBlue/DoublePulsar)Lsass.exe is the one ASR rule that I leave disabled, because it conflicts with lots of software.
And what about the lsass protection in AppGuard? How much will it help against advanced malware?sadly it is the most important because advanced malware always try to abuse it. (EternalBlue/DoublePulsar)
in AG, lsass.exe is Memprotected. other process can't read/write in it.And what about the lsass protection in AppGuard? How much will it help against advanced malware?
Just installed it. Also disabled this option too! Really good idea to read through a thread sometimes!Lsass.exe is the one ASR rule that I leave disabled, because it conflicts with lots of software.
Attack surface reduction.Excuse me, but what is it, ASR?
OK, Thanks @shmu26.Attack surface reduction.
This is what Microsoft calls a collection of advanced Windows Defender features, which can be controlled and managed by Configure_Defender.
Some of them used to be in incorporated in EMET.
... Really good idea to read through a thread sometimes!
~LDogg
Yep. You learn some information you may not have thought of or known about.Ya think?
After the first update update of Windows 10 ver. 1809 (I just did it yesterday), the trick with executing PowerShell from VBScript (JScript) is now blocked. The trick was for fooling one of the ASR rules which blocked the execution when VBScript (JScript) malware downloaded the payload and next executed it, by using only one script engine.Andy, would ConfigureDefender at max settings block the ransomware attack used on this video?
Video - Windows Defender vs GandCrab Ransomware: video review
Is this a default option on WD or only if you enable ConfigureDefender? The very same scenario of this video with latest Windows update should block it?So now, the GandCrab Ransomware from the video would be blocked by the ASR rule "Block JavaScript or VBScript from launching downloaded executable content"
After the first update update of Windows 10 ver. 1809 (I just did it yesterday), the trick with executing PowerShell from VBScript (JScript) is now blocked. The trick was for fooling one of the ASR rules which blocked the execution when VBScript (JScript) malware downloaded the payload and next executed it, by using only one script engine.
So now, the GandCrab Ransomware from the video would be blocked by the ASR rule "Block JavaScript or VBScript from launching downloaded executable content" (or the old name used in Configuredefender "Impede JavaScript and VBScript to launch executables"). But, this malware technique will be surely enhanced in the next versions to bypass WD protection.
Generally the ASR rules are evolving and are stronger than before.
ASR rules are deactivated in WD default settings. They can be activated via PowerShell cmdlets or via policies on Windows 10 Home (policies would require editing the Registry). ConfigureDefender is a GUI that uses PowerShell to activate ASR. I checked the "two script engines" trick some time ago and it could fool ASR, so the malware was probably successful. I did not test this trick again until today, after the first update of Windows 10 ver. 1809. I do not know if the same is true for other Windows 10 versions.Is this a default option on WD or only if you enable ConfigureDefender? The very same scenario of this video with latest Windows update should block it?
This is recommended and most efficient for home users. Those users who cannot do it, for some reason, can consider activating WD ASR rules....
The fine-grained rules blocking specific behaviors is a pipe-dream fallacy - because new malicious behaviors that bypass current rules are implemented. Merely disable wscript and the rest of unwanted stepchild processes. This is not difficult. This is really easy. It is almost "push button" protection.
This is recommended and most efficient for home users. Those users who cannot do it, for some reason, can consider activating WD ASR rules.
What home user is going to genuinely need features like VBScript or local JScript? I cannot think of a single one. I think it is simpler for it to just be disabled and be done with it than relying on ASR which is going to be a risky game of hit'n'miss each time.LOL... it is a whole lot easier to disable wscript than to enable WD ASR. Some people just like being difficult. :X3: