Forums
New posts
Search forums
News
Security News
Technology News
Giveaways
Giveaways, Promotions and Contests
Discounts & Deals
Reviews
Users Reviews
Video Reviews
Support
Windows Malware Removal Help & Support
Inactive Support Threads
Mac Malware Removal Help & Support
Mobile Malware Removal Help & Support
Blog
Log in
Register
What's new
Search
Search titles only
By:
Search titles only
By:
Reply to thread
Menu
Install the app
Install
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Forums
Software
Security Apps
Hard_Configurator Tools
ConfigureDefender utility for Windows 10/11
Message
<blockquote data-quote="Andy Ful" data-source="post: 904639" data-attributes="member: 32260"><p>For the home users, in the <span style="color: rgb(41, 105, 176)"><strong>Real-world scenario</strong></span>, the "ConfigureDefender HIGH preset for WD + Edge Chromium (SmartScreen + Ad-blocker) + FirewallHardening" is as good as many commercial AVs (home versions). This can be seen in most of the professional tests.</p><p>But, the situation is not so good when the user often shares files via flash drives (and moves these files to non-USB drives, like HDD partitions). There are two reasons for that:</p><ol> <li data-xf-list-type="ol">Such files do not have MOTW, so their detection is slightly lower (no "Block At First Sight").</li> <li data-xf-list-type="ol">The ASR protection of USB drives is not triggered if the file is copied from USB drive to non-USB drive and run from it.</li> </ol><p>If the user is a happy-clicker then in the above cases the standard AV protection can be insufficient. The solution is using the AV with Advanced Threat Protection (usually Business version). One can also use WD and extend the ConfigureDefender settings to include all ASR rules (also the rule "<strong>Block executable files from running unless they meet a prevalence, age, or trusted list criteria</strong>").</p><p></p><p>The interesting setup can be when using ASR rules with<span style="color: rgb(41, 105, 176)"><strong> excluded "Program Files ...", "ProgramData", and user "AppData" folders</strong></span>. Such a setup will allow software updates even for the low prevalence applications, so can be used by inexperienced users. Furthermore, It will allow safely installing most applications and games.</p><p>Unfortunately, some ASR rules related to MS Office (especially to prevent creating executable content) will not work with full strength, so additional anti-script protection is required - something like <span style="color: rgb(41, 105, 176)"><strong>Simple Windows Hardening</strong></span>.</p><p></p><p>The final setup based on Windows built-in features looks like:</p><p><strong>WD</strong> (CD all ASR rules + <span style="color: rgb(41, 105, 176)"><strong>additional exclusions</strong></span>) + <span style="color: rgb(41, 105, 176)"><strong>SWH</strong></span> +<strong> Edge Chromium</strong> (SmartScreen + Ad-blocker) + <strong>FirewallHardening.</strong></p><p>It can be used by inexperienced users in daily work. The initial configuration can be made by any semi-advanced user (no problem for many MT members).</p><p>Such a setup is similar to the Hard_Configurator Recommended Settings, but the user does not have to use the "Install by SmartScreen" entry from the Explorer context menu and can install applications from non-standalone installers (CD/DVD sources, ISO images, etc.).</p><p>Of course, one can equivalently use the H_C with Basic_Recommended_Settings (instead of SWH) and use the H_C built-in versions of ConfigureDefender and FirewallHardening.</p></blockquote><p></p>
[QUOTE="Andy Ful, post: 904639, member: 32260"] For the home users, in the [COLOR=rgb(41, 105, 176)][B]Real-world scenario[/B][/COLOR], the "ConfigureDefender HIGH preset for WD + Edge Chromium (SmartScreen + Ad-blocker) + FirewallHardening" is as good as many commercial AVs (home versions). This can be seen in most of the professional tests. But, the situation is not so good when the user often shares files via flash drives (and moves these files to non-USB drives, like HDD partitions). There are two reasons for that: [LIST=1] [*]Such files do not have MOTW, so their detection is slightly lower (no "Block At First Sight"). [*]The ASR protection of USB drives is not triggered if the file is copied from USB drive to non-USB drive and run from it. [/LIST] If the user is a happy-clicker then in the above cases the standard AV protection can be insufficient. The solution is using the AV with Advanced Threat Protection (usually Business version). One can also use WD and extend the ConfigureDefender settings to include all ASR rules (also the rule "[B]Block executable files from running unless they meet a prevalence, age, or trusted list criteria[/B]"). The interesting setup can be when using ASR rules with[COLOR=rgb(41, 105, 176)][B] excluded "Program Files ...", "ProgramData", and user "AppData" folders[/B][/COLOR]. Such a setup will allow software updates even for the low prevalence applications, so can be used by inexperienced users. Furthermore, It will allow safely installing most applications and games. Unfortunately, some ASR rules related to MS Office (especially to prevent creating executable content) will not work with full strength, so additional anti-script protection is required - something like [COLOR=rgb(41, 105, 176)][B]Simple Windows Hardening[/B][/COLOR]. The final setup based on Windows built-in features looks like: [B]WD[/B] (CD all ASR rules + [COLOR=rgb(41, 105, 176)][B]additional exclusions[/B][/COLOR]) + [COLOR=rgb(41, 105, 176)][B]SWH[/B][/COLOR] +[B] Edge Chromium[/B] (SmartScreen + Ad-blocker) + [B]FirewallHardening.[/B] It can be used by inexperienced users in daily work. The initial configuration can be made by any semi-advanced user (no problem for many MT members). Such a setup is similar to the Hard_Configurator Recommended Settings, but the user does not have to use the "Install by SmartScreen" entry from the Explorer context menu and can install applications from non-standalone installers (CD/DVD sources, ISO images, etc.). Of course, one can equivalently use the H_C with Basic_Recommended_Settings (instead of SWH) and use the H_C built-in versions of ConfigureDefender and FirewallHardening. [/QUOTE]
Insert quotes…
Verification
Post reply
Top