Back to the layered protection with several applications. Do MT members need additional tools for anti-script protection over the standard AV?
Let's suppose that the user has the below setup on Windows 10 (home environment with a NAT router):
- Default Windows settings + Standard AV based on signatures and heuristics.
- No installed MS Office and Adobe Acrobat applications + updated software.
- Explorer set to show file extensions + the basic knowledge about entries in the Type column.
- Basic knowledge, that most files used for installing applications and sharing files with other people, have the above extensions: .exe, .msi (installers), .docx, .xlsx, .pub, .pptx, .accdb (MS Office), .pdf (Adobe), .mobi, .epub, .azw (ebooks), .png, .jpg (photos), .mp3, .wma, .flv, .wmv, .mp4, .avi, .mkv (music and video), .zip (archive).
- All other file extensions should be considered as suspicious, except if the user expects such a file and know the application that opens it.
- UAC set to max and enabled SmartScreen.
- Safe web browser (Edge, Chrome, ...).
If the user is not a happy clicker, then the chances to infect the system without the knowledge and support of the user are close to 0. So, maybe it is not worthy to build the security pyramid, but learn a little and train a few healthy habits. It is possible, like training the habit of looking left and then right while crossing the road.