- Apr 1, 2017
- 1,782
+1. Many ppl don't want to understand that auto sandbox won't solves anything.they can't differentiate if a sandboxed file is legitimate or not
+1. Many ppl don't want to understand that auto sandbox won't solves anything.they can't differentiate if a sandboxed file is legitimate or not
In this thread, we are talking about execution default-deny. The 'default-deny' is also commonly used in the context of the network traffic.How should we define the following; Ae they "Default-Deny"?
- Browser blocks a malicious download
- Extension prevents access to a phishing website
- Unable to install program due to account permissions (or see image).
It would be hard for many beginners to safely use default-deny setup. The exception could be the people who do not install new applications. Also in some cases, the configuration of default-deny setup may be hard even for more experienced users, especially when they use programs installed in the Userspace or external devices which run configuration/diagnostic/update scripts. Also, some web browser extensions and wrapped applications can cause problems in default-deny setup....
While default deny would appear to be better suited for beginners, one thing to keep in mind is most of them will not remove an infection, only block it from executing, where as your AV's upon detection will quarantine/remove
....
Even the simplest security requires knowledge. There are downsides to both methods for those lacking.It would be hard for many beginners to safely use default-deny setup. The exception could be the people who do not install new applications. Also in some cases, the configuration of default-deny setup may be hard even for more experienced users, especially when they use programs installed in the Userspace or external devices which run configuration/diagnostic/update scripts. Also, some web browser extensions and wrapped applications can cause problems in default-deny setup.
The best for beginners would be smart default-deny setup (based on file reputation), supervised occasionally by the advanced user.
If the beginners (in the home environment with well-updated system/software) use smart default-deny with blocked scripts and disabled active content for documents, then the chance to be infected is very very small. When using only AV solution, many infections are removed only partially. The chance of it is probably much greater than being infected when using smart default-deny.
In this thread, we are talking about execution default-deny. The 'default-deny' is also commonly used in the context of the network traffic.
The most common definition of execution default-deny setup would be as follows:
The crucial system processes and processes whitelisted by the user are allowed to run. Other processes are not allowed to run. Additionally, there can be some restrictions for DLLs or files that may have active content (scripts, scriptlets, documents with macros, etc.).
Some users may extend the above to include processes not blocked but ran restricted/isolated in the kind of sandbox.
The examples:
are not default-deny (even not for network traffic). In fact, they are default-allow with the blacklist. The blacklist contains signatures of malicious files and URLs of phishing websites.
- Browser blocks a malicious download
- Extension prevents access to a phishing website
The example "Unable to install program due to account permissions" is not default-deny too, because the user can run any executable that was downloaded outside the browser (no MOTW attached). The above protection is an Anti-Exe feature that can prevent users from installing any application outside Microsoft store, but the application has to be downloaded via the web browser or another online service that marks files with MOTW (MOTW = Mark Of The Web).
Also, Windows SmartScreen is not default-deny, because it uses MOTW, too. Probably, it would not be wrong to say that SmartScreen is based on default-deny feature for files with MOTW + whitelisting all files with a good reputation in Microsoft cloud.
Avast set to Hardened Mode Aggressive can be a kind of smart default-deny. The 'smart' means that the user additionally allows all executables that have a good reputation in the Avast cloud. All, not reputable executables will be blocked by default (even not malicious).
Windows SRP (Software Restriction Policies) can be set either to default-allow or default-deny.
The default-allow SRP setup was adopted in CryptoPrevent and some other Anti-Ransomware applications. The default-deny setup was adopted (recommended settings) in Hard_Configurator and Simple Software Restriction Policies.
Comodo Firewall (CS settings) can be considered as default-deny based on highly restricted sandbox. If one uses File Lookup, then it is a smart default-deny.
Anti-Exe applications (VoodooShield set to ON, NVT ERP) can be considered as default-deny setup.
AppGuard is default-deny SRP setup (based on 3rd party driver). In addition, it uses the Guarded Applications feature, which is a kind of isolation light sandbox for vulnerable processes.
Anti-Virus can monitor every single thing if they're configured that way.The recurring issue that is raised over-and-over is that default-deny does not tell the user what to do. A lot of the people that gravitate towards default-allow solutions are those that are paranoid and feel the need to inspect everything. The funny part is that they don't realize that the AV is not inspecting all files on the system against signatures or monitoring the files at all. In short, they don't know how AVs work for optimization and conservation of system resources. They think the AV is carefully monitoring every single thing on the system, when it isn't.
The locked system (no new installations), can be initially configured by an advanced user to allow system updates/upgrades and software auto-updates (in most cases). That is not a big deal when using SRP default-deny....
Even with a beginner using default deny that does not download, there is always product and operating system updates and upgrades, which today, are a constant, and would completely over whelm a beginner.
The question would be at this point, could she do so without you being there, ever...My wife uses such locked setup for a few years without any problem.
Your post is not totally correct. When a new file is downloaded or modified, etc. There are different events: creation, modify, deletion, etc. AVs could have some methods (pieces of source code) that can handle each of those events. So AVs monitor each new files on the OS and a well written product should skip by default system files (but verifying that they aren't false system files, so malware hidden in critical folders such asThe funny part is that they don't realize that the AV is not inspecting all files on the system against signatures or monitoring the files at all. In short, they don't know how AVs work for optimization and conservation of system resources. They think the AV is carefully monitoring every single thing on the system, when it isn't.
AppData, Win32, etc.
public bool creationEvent()
{
string filePath=component.getEventFullPath();
bool b = scan(filePath);
return b;
}
My wife uses such locked setup for a few years without any problem.
Military tanks and certain ics works like that. EvilGrade can hack windows systems via OTA. Theres also some nasty APT's out there using this method on windows android and ios. WSUS is the way to go in high secure environments. But thats expensive and only feasible for certain agencies/entities. I lknow that MOSSAD runs like that.
The cost of the hack must be less that the ROI If you can make it really expensive beyond their gain. You've already won. Cheers to that!
Although there are too many holes, we can manage them if your good at what you do.
It depends on the Anti-Virus product and how the vendor has implemented the components.Your post is not totally correct. When a new file is downloaded or modified, etc. There are different events: creation, modify, deletion, etc. AVs could have some methods (pieces of source code) that can handle each of those events. So AVs monitor each new files on the OS and a well written product should skip by default system files (but verifying that they aren't false system files, so malware hidden in critical folders such as
The funny part is that they don't realize that the AV is not inspecting all files on the system against signatures or monitoring the files at all.
She is a beginner in the security matter. She uses the computer for the standard tasks and does not install new programs. All updates are performed via Windows Updates, Microsoft store, and scheduled tasks. All applications are installed in 'Program Files' and can run only as standard user (elevation not allowed).The question would be at this point, could she do so without you being there, ever...
...
Unfortunately, a few programs she has to use were not available on Chromebooks 3 years ago.Mine too, it's called Chromebook. My life has become so simple these days, I have to create problems for myself.
...
What about the web-version of Microsoft Office or Google Docs? Food for thought. Maybe you've already looked down these avenues before, I'm sure you have.For viewing documents, I installed Universal Apps (Word Mobile, Excel Mobile, PowerPoint Mobile and Adobe Touch) which run in AppContainer. For document editing, I installed SoftMaker Office (no macro support or DDE vulnerability)
But I agree, that for most standard tasks the Chromebook is a perfect choice for the beginners.
Web versions are OK and maybe even more secure. But, applications installed on disk are slightly more user-friendly, especially for beginners. The user can simply click the file to open it for viewing, instead of opening Web application and use file explorer to find/open the document.What about the web-version of Microsoft Office or Google Docs? Food for thought. Maybe you've already looked down these avenues before, I'm sure you have.
...
I love them for online research and writing up notes. It just feels nice.Not just beginners. I use one now too. You should see the tools I have available on Chromebooks now. (Linux emulator or otherwise)
I've used the Universal App for Microsoft Word in the past and it worked nicely for me - I never ran into problems with it. I think Microsoft did a good job making a Universal App version because AppContainer is always a good bonus over nothing.Personally, I use Universal Apps for document viewing and Microsoft Office Online for document editing.