For the home users, in the
Real-world scenario, the "ConfigureDefender HIGH preset for WD + Edge Chromium (SmartScreen + Ad-blocker) + FirewallHardening" is as good as many commercial AVs (home versions). This can be seen in most of the professional tests.
But, the situation is not so good when the user often shares files via flash drives (and moves these files to non-USB drives, like HDD partitions). There are two reasons for that:
- Such files do not have MOTW, so their detection is slightly lower (no "Block At First Sight").
- The ASR protection of USB drives is not triggered if the file is copied from USB drive to non-USB drive and run from it.
If the user is a happy-clicker then in the above cases the standard AV protection can be insufficient. The solution is using the AV with Advanced Threat Protection (usually Business version). One can also use WD and extend the ConfigureDefender settings to include all ASR rules (also the rule "
Block executable files from running unless they meet a prevalence, age, or trusted list criteria").
The interesting setup can be when using ASR rules with
excluded "Program Files ...", "ProgramData", and user "AppData" folders. Such a setup will allow software updates even for the low prevalence applications, so can be used by inexperienced users. Furthermore, It will allow safely installing most applications and games.
Unfortunately, some ASR rules related to MS Office (especially to prevent creating executable content) will not work with full strength, so additional anti-script protection is required - something like
Simple Windows Hardening.
The final setup based on Windows built-in features looks like:
WD (CD all ASR rules +
additional exclusions) +
SWH +
Edge Chromium (SmartScreen + Ad-blocker) +
FirewallHardening.
It can be used by inexperienced users in daily work. The initial configuration can be made by any semi-advanced user (no problem for many MT members).
Such a setup is similar to the Hard_Configurator Recommended Settings, but the user does not have to use the "Install by SmartScreen" entry from the Explorer context menu and can install applications from non-standalone installers (CD/DVD sources, ISO images, etc.).
Of course, one can equivalently use the H_C with Basic_Recommended_Settings (instead of SWH) and use the H_C built-in versions of ConfigureDefender and FirewallHardening.