I'm add Lolbins and recommended H_C. And turn on logging events. It's enough?
Yes.I'm add Lolbins and recommended H_C. And turn on logging events. It's enough?
I assume I ran ConfigureDefender at default (or max or recommended) so should Tamper protection be off. should I just turn it ON from system Windows Security, or open ConfigureDefender and run it again? ie, is it normal for Tamper to be off after running CD?
ThanksConfigureDefender does not change Tamper Protection. If I recall correctly DefenderUI does.
You should turn ON Tamper Protection.![]()
Does the Cloud Protection Level or "Block executables..." use the ISG or SmartScreen backend?
When I click on the button Folders in the section Controlled Folder, the popup window CFA Folders doesn't show the default entries (Protected Folders).
This corresponds to an empty folder in the registry. Is this normal behavior?
@Andy Ful i couldn't find anything related to "Block use of copied or impersonated system tools" in configure defender manual. Any tips? Ty!
Block use of copied or impersonated system toolsThis rule blocks the use of executable files that are identified as copies of Windows system tools. These files are either duplicates or impostors of the original system tools. Some malicious programs might try to copy or impersonate Windows system tools to avoid detection or gain privileges. Allowing such executable files can lead to potential attacks. This rule prevents propagation and execution of such duplicates and impostors of the system tools on Windows machines.
@Andy Ful i couldn't find anything related to "Block use of copied or impersonated system tools" in configure defender manual. Any tips? Ty!
This specific rule blocked graphics driver after manual install, so I never used it again.I can only add that this ASR rule will block:
Edit.
- any executable in UserSpace with a file name of a system tool,
- any system tool copied from the original location and renamed (can recognize the internal name).
Fortunately, the blocked file can be excluded via ASR exclusions.
This specific rule blocked graphics driver after manual install, so I never used it again.
My top rules are those cloud-dependent.
It was "Block use of copied or impersonated system tools", not "Block abuse of exploited vulnerable signed drivers".It was not this rule, but probably "Block abuse of exploited vulnerable signed drivers". If you need to install the vulnerable driver for some important reason, just temporarily set the rule to Audit and install the driver.![]()
It was "Block use of copied or impersonated system tools", not "Block abuse of exploited vulnerable signed drivers".
The driver was Intel HD graphics one downloaded from the official support page of hp.
Seems MD considered the driver files impersonating the one installed earlier through Windows update.
I got from this website: https://support.hp.com/us-en/drivers/hp-compaq-pro-6300-small-form-factor-pc/5232881Interesting. Do you have access to this driver? I would like to test why it triggered this rule.
I got from this website: https://support.hp.com/us-en/drivers/hp-compaq-pro-6300-small-form-factor-pc/5232881
Intel Graphic Driver Win7 64b: sp78306.exe
Intel Graphic Driver Win7 64b: sp78306.exe