- Jan 27, 2018
- 1,486
I was sort of thinking that too but figured I would reply anyways.@rashmi probably posted about Microsoft Defender.![]()
I was sort of thinking that too but figured I would reply anyways.@rashmi probably posted about Microsoft Defender.![]()
Does Defender function properly or fully if you disable Windows Update?I did not notice that Microsoft Defender received updates solely through Windows Updates.
Most frequent updates are received via MAPS independently of Windows Updates:
![]()
Microsoft Defender Antivirus security intelligence and product updates - Microsoft Defender for Endpoint
Manage how Microsoft Defender Antivirus receives protection and product updates.learn.microsoft.com
In addition to MAPS, Defender updates are also received via Windows Updates:
- Security Intelligence Update (KB2267602)
- Antivirus antimalware platform (KB4052623)
- Malicious Software Removal Tool x64 (KB890830)
Does Defender function properly or fully if you disable Windows Update?
With Configure Defender set to "high" and "block executables" enabled, would you recommend any of your tools for managed average users?
When you said SmartScreen for Explorer, it put on Block or User ?I do not know (no one tested this).
I do not recommend my tools to average users. But, they can be used by "home administrators" to protect the computers of average users. The 'home administrator" must decide which tools should be used. More tools = more security = more work for the "home administrator".
The minimum setup balanced both for security and usability would be as follows:
Microsoft Defender with ConfigureDefender HIGH Protection Level + FirewallHardening (H_C Recommended blockList) + Edge web browser (SmartScreen + PUA) + SmartScreen for Explorer.
Such a setup could be probably OK also for many MT members. If the average user ignores SmartScreen, it should be set to Block in ConfigureDefender.
Block, if the average user ignores SmartScreen.When you said SmartScreen for Explorer, it put on Block or User ?
why Controlled Folder Access on Disabled with high recommendations ?
I'm currently testing CD and exploring Firewall Hardening. I downloaded the Firewall Hardening package, which includes Firewall Hardening and additional tools. Can I delete the extra tools and rename the folder as Firewall Hardening? Are you suggesting that I enable only H_C Recommended BlockList in Firewall Hardening for a balanced level of protection? The screenshots in the first post showcase the configuration for "child protection" in Configure Defender. Have you removed it?I do not know (no one tested this).
I do not recommend my tools to average users. But, they can be used by "home administrators" to protect the computers of average users. The 'home administrator" must decide which tools should be used. More tools = more security = more work for the "home administrator".
The minimum setup balanced both for security and usability would be as follows:
Microsoft Defender with ConfigureDefender HIGH Protection Level + FirewallHardening (H_C Recommended blockList) + Edge web browser (SmartScreen + PUA) + SmartScreen for Explorer.
Such a setup could be probably OK also for many MT members. If the average user ignores SmartScreen, it should be set to Block in ConfigureDefender.
Yes.I'm currently testing CD and exploring Firewall Hardening. I downloaded the Firewall Hardening package, which includes Firewall Hardening and additional tools. Can I delete the extra tools and rename the folder as Firewall Hardening?
Are you suggesting that I enable only H_C Recommended BlockList in Firewall Hardening for a balanced level of protection?
The screenshots in the first post showcase the configuration for "child protection" in Configure Defender. Have you removed it?
@Andy Ful Do you receive Configure Defender and Firewall Hardening alerts for blocked events?
How effective is Smart Screen's whitelist or whatever it has?
Is Firewall Hardening (H_C Recommended BlockList) safe or trouble-free? Any suggestions for it?
You can copy those executables anywhere you like, pin them to Start, Taskbar, etc. You can delete the rest of the HC folder's contents if you're not planning on using them. Users can also download CD and FWH executables separately from @Andy Ful's GitHub page.CD and FWH accessible through it's UI but maybe running both is possible hmm.
I do not use/test CyberLock so I do not know if applying ConfigureDefender and FirewallHardening would be OK.With me running CyberLock, I;m looking at using ConfigureDefender but where's a suggested place to run it from? I know running H_C along with CL is potential overkill but I also like that it's installed and CD and FWH accessible through it's UI but maybe running both is possible hmm.
I do not use/test CyberLock so I do not know if applying ConfigureDefender and FirewallHardening would be OK.
Anyway, Those tools have portable versions:
![]()
FirewallHardening tool
FIREWALLHARDENING (new ver. 3.0.0.1, July 2024) FirewallHardening is a part of the Hard_Configurator project and can be used also as a standalone application among a few others included in the H_C_HardeningTools repository...malwaretips.com
You can copy those executables anywhere you like, pin them to Start, Taskbar, etc. You can delete the rest of the HC folder's contents if you're not planning on using them. Users can also download CD and FWH executables separately from @Andy Ful's GitHub page.
I've tried it, no problems.I do not use/test CyberLock so I do not know if applying ConfigureDefender and FirewallHardening would be OK.
Good to know! CL does show a cmd alert when opening CD but easy enough to allow. FWH rules can be overridden by WFC which I'm also using though debating if WFC is needed with WFH and CL set to create block rules for unsafe files.I've tried it, no problems.
FH rules cannot be seen by WFC FYI. The FH rules override WFC rules. Andy Ful has stated this before.Good to know! CL does show a cmd alert when opening CD but easy enough to allow. FWH rules can be overridden by WFC which I'm also using though debating if WFC is needed with WFH and CL set to create block rules for unsafe files.