Lemon60
Level 2
- Jun 11, 2019
- 71
Do you mean the option that prevents users to 'pause scan'?
ConfigureDefender can hide WSC to prevent children or newbies to pause scans or change WD settings.
No, just i want pause scan. Like another AVs.
Do you mean the option that prevents users to 'pause scan'?
ConfigureDefender can hide WSC to prevent children or newbies to pause scans or change WD settings.
What is the location of your 'pause scan' tweak in GPO?No, just i want pause scan. Like another AVs.
...
What is the location of your 'pause scan' tweak in GPO?
There is "Allow users to pause scan" tweak, but it works by default when not configured (the same when Enabled). If you set it to Disabled, then it will prevent stopping the scan.
Hi what are the best settings with this utility for windows defender, trying out WD after a fresh install?THks
Best balance for usability and protection is high. If you want to whitelist a bunch of stuff you can turn on controlled folder access. I just use OSArmor with it and call it a day.Hi what are the best settings with this utility for windows defender, trying out WD after a fresh install?THks
You use Osarmor with WD and configure defender?Best balance for usability and protection is high. If you want to whitelist a bunch of stuff you can turn on controlled folder access. I just use OSArmor with it and call it a day.
Yes, it covers a lot of scripts that most AVs are weak against. You could also use Syshardener, or just use Hard_Configurator which has Configure Defender incorporated. I had issues with Syshardener and never have issues with OSArmor.You use Osarmor with WD and configure defender?
You may try "High" profile which will leave 3 ASR rules and Controlled Folder Access set to "Off". You may either set these to "Audit" to check for potential conflicts with other software or you may enable them. I generally use "Max" profile with WSC set > "Visible" and Smartscreen for Edge and Explorer set > "Warn". It also sets Cloud Protection Level to "Block" and extends time limit to 60 sec. Remember that after selecting a profile (setting) you may adjust individual features to your liking.
ConfigureDefender does not change Tamper Protection setting in any way.(I'm new to using Windows 10 ) I ran configuredefender on w10_1903_vm the other day, "High" -- played awhile then shutdown w10, came back today and I see a security alert re
Virus & threat protection settings: Tamper protection is off. Your device may be vulnerable.
Is this tamper setting something that configuredefender should have tweaked? any way to "test" that all High settings were enabled??
ConfigureDefender does not change Tamper Protection setting in any way.
Windows 10 ver. 1903 has sometimes the issue of sudden rebooting. I have also one or two events when Tamper Protection was turned OFF after such reboot. Anyway (in rare cases), this can be also caused by some malware.
If you use the latest version of ConfigureDefender then after applying HIGH Protection level, you should press <REFRESH> button. This will also check if the settings were correctly written into Windows Registry. Please note, that most changes in Defender settings require rebooting the computer.
This can sometimes can be an advantage, especially with a low-speed Internet connection, when the sample is uploaded for analysis to the cloud. But usually, the malware classification takes only a few seconds.
After executing a file, WD cloud protection checks the file in the cloud to see if the file is safe or not. If the file you're running is already known to WD cloud then the checking usually happens within 10 seconds. In fact in less than 10 seconds. Maybe 1 or 2. When the option is set to 10 sec, if WD don't get any result from the cloud within 10 seconds, it will let the sample run but if you increase to let's say 60 seconds then WD will wait at least 60 seconds to get a verdict from the cloud. Increasing the time is more helpful in case of executing unknown files.
There are some possibilities....
Let me give you an example, few days ago I ran a fresh malious sample in Sanboxie. The sample was not known WD. Not even by their cloud (I checked before executing). My cloud checkup time was set 10 seconds. WD waited 10 seconds but couldn't get any result from the cloud so let the sample ran. It ran successfully and also created a startup entry.
Only 2 minutes later, I went on to delete the contents of Sandboxie but as soon as my PC accessed that file again, WD detected and deleted the file. I manually scanned the source sample on my PC and Windows Defender this time detected that file as well.
...
I’d rather be protected by points 1 & 3, and be thankful for point 2 eventually getting it, than have files work faster on occasion.There are some possibilities.
For the poins 1. and 3. , extending the cloud checkup time can be beneficial.
- WD could detect your sample after the limit of 10 seconds.
- WD could finish the analysis before 10 seconds and the computer was infected. Next, WD could detect the malware after some time due to postinfection telemetry.
- WD could detect the sample from another computer at a similar time on Windows E3 or E5 (enterprise editions). These editions allow more comprehensive analysis, including detonation in the sandbox.
But not for the point 2.
For the poins 1. and 3. , extending the cloud checkup time can be beneficial.
For points 1 & 3 WD has a pretty huge advantage over other AVs I think. Almost all AVs has some sort of cloud servers where with the help of AI and sandbox they analyze malwares and protect users against new threats via their cloud protection before creating signatures. For example, Kaspersky's KSN, ESET's Live Grid, etc has similar purpose. WD has this too. Microsoft being the owner of Azure cloud service and WD, they can afford to invest a lot of their cloud infrastructure to WD. So, Microsoft's Azure Cloud AI server network is a lot larger than other AVs server. As a result, they can process a lot more threats every minutes than their competitors. This clearly shows in many of the recent AV labs results. WD is still weak at signature based detection, they are late at creating signatures but their investment in the cloud is being paid of.I’d rather be protected by points 1 & 3, and be thankful for point 2 eventually getting it, than have files work faster on occasion.
Ha, ha. Then you can apply the settings used by @oldschool (MAX Protection Level, unhide the WD Security Center, and adjust SmartScreen settings).I’d rather be protected by points 1 & 3, and be thankful for point 2 eventually getting it, than have files work faster on occasion.