Serious Discussion Do you use default-deny approach in your system?

Do you use default-deny approach in your system?

  • Yes, I do

    Votes: 17 58.6%
  • No, it's useless

    Votes: 5 17.2%
  • I personally don't need it, but I recommend it

    Votes: 5 17.2%
  • Other

    Votes: 2 6.9%

  • Total voters
    29

RoboMan

Level 38
Thread author
Verified
Honorary Member
Top Poster
Content Creator
Well-known
High Reputation
Forum Veteran
Jun 24, 2016
2,608
24,580
3,600
Hidden Village of Hispanic America
Good morning y'all, hope to find you well.

I'm curious wether MalwareTips' users use any kind of default-deny approach in their systems.
This includes an anti-executable like CyberLock, an Application Control module like Kaspersky's, a hardener like Hard_Configurator, any SRP software, or even your own implemented policies.

If you do, what do you use?
If you don't, why don't you think it's necessary?

Cheers :)
 
Yes, a Chromebook is essentially a "default deny" security model, mostly because it uses this layered setup that keeps everything locked down to block unauthorized access. By default, the operating system won't let anything run or touch your data unless it's specifically allowed.
 
I prefer a default-deny approach. Our current security setup is @Andy Ful's Hard_Configurator Tools with Recommended Settings. I prefer Comodo to traditional or default-allow solutions. Kaspersky is the only default-allow security solution I find effective, whether using its default settings or its intrusion prevention settings for a default-deny approach. I also appreciate CyberLock, but I am not fond of its interface, particularly the alerts.
 
I like when SAC/WDAC block execution of freshly released installer of less prevalent app, to be allowed after days, as they follow Andy's advice of waiting few days before executing suspicious exe (if it contains zero-day malware, it will be no more zero-day after few days).
 
I like when SAC/WDAC block execution of freshly released installer of less prevalent app, to be allowed after days, as they follow Andy's advice of waiting few days before executing suspicious exe (if it contains zero-day malware, it will be no more zero-day after few days).
This is probably the best security advice I've seen in awhile. It's great advice, kudos (y)
 
Excellent discussion! I'd like to add a perspective on the practical balance between security and usability.

The default-deny approach is undoubtedly the most secure from a technical standpoint, but implementation varies significantly:

**Layered Default-Deny Strategy:**
- **OS Level:** Hard_Configurator is an excellent lightweight option for Windows hardening without constant prompts
- **Application Level:** Kaspersky's default-deny mode strikes a good balance—it learns user behavior and reduces alert fatigue
- **Network Level:** Windows Defender Firewall can be configured restrictively, though it requires careful rule management

**The Whitelist Maintenance Challenge:**
One thing worth mentioning: default-deny systems require consistent maintenance. Initial setup can be tedious, and software updates occasionally trigger new execution attempts. For enterprise environments with IT teams, this is manageable. For home users, it needs to be:
- Set once and mostly forgotten (like Hard_Configurator with recommended settings)
- Or minimal-alert (like Kaspersky's approach)

**Zero-Day Protection Value:**
I agree with the point about zero-days becoming non-zero after a few days. Combining default-deny with:
- Waiting before executing new installers
- Monitoring reputation services
- Regular updates
...creates a robust multi-layered defense.

**My Take:** A hybrid approach works best for most users—OS-level hardening (always) + selective application control (sometimes) + good behavioral habits (always).

Those using Chromebooks already get this "out of the box," which is one reason they're excellent for security-conscious users.
 
  • Hundred Points
Reactions: Divergent
As someone who regularly installs software, I would find a default deny approach to be too restrictive. Because I don't use cracks or other potentially high risk files, I feel that I'm adequately protected without default deny. I'm fine with trading some security for usability.
Maybe "No I don't" (like you mentioned in your 1st post) would have been a better way to word it for the poll, than including "it's useless"? It's why I didn't vote for that option.
That's why I voted for "other."
 
Default-deny can be something as simple as not installing or uninstalling unused outdated vulnerable runtimes, which can be abused, like NET3.5 or VisualC++ pack.
The simplest tweak I use is "ValidateAdminCodeSignatures" which prevents exe without a digital signature to run as admin. The number of signed malware is negligible.
This is basically, what Smart App Control does, but less restrictive. Of course it goes along with "EnableCertPaddingCheck", which makes sure, that the certificate is still valid.
 
Default-deny can be something as simple as not installing or uninstalling unused outdated vulnerable runtimes, which can be abused, like NET3.5 or VisualC++ pack.
The simplest tweak I use is "ValidateAdminCodeSignatures" which prevents exe without a digital signature to run as admin. The number of signed malware is negligible.
This is basically, what Smart App Control does, but less restrictive. Of course it goes along with "EnableCertPaddingCheck", which makes sure, that the certificate is still valid.

Yes, as you know, I also use ValidateAdminCodeSignatures, and it can also be done by H_C.
The number of signed malwares stands at around 32%.
 
Excellent discussion! I'd like to add a perspective on the practical balance between security and usability.

The default-deny approach is undoubtedly the most secure from a technical standpoint, but implementation varies significantly:

**Layered Default-Deny Strategy:**
- **OS Level:** Hard_Configurator is an excellent lightweight option for Windows hardening without constant prompts
- **Application Level:** Kaspersky's default-deny mode strikes a good balance—it learns user behavior and reduces alert fatigue
- **Network Level:** Windows Defender Firewall can be configured restrictively, though it requires careful rule management

**The Whitelist Maintenance Challenge:**
One thing worth mentioning: default-deny systems require consistent maintenance. Initial setup can be tedious, and software updates occasionally trigger new execution attempts. For enterprise environments with IT teams, this is manageable. For home users, it needs to be:
- Set once and mostly forgotten (like Hard_Configurator with recommended settings)
- Or minimal-alert (like Kaspersky's approach)

**Zero-Day Protection Value:**
I agree with the point about zero-days becoming non-zero after a few days. Combining default-deny with:
- Waiting before executing new installers
- Monitoring reputation services
- Regular updates
...creates a robust multi-layered defense.

**My Take:** A hybrid approach works best for most users—OS-level hardening (always) + selective application control (sometimes) + good behavioral habits (always).

Those using Chromebooks already get this "out of the box," which is one reason they're excellent for security-conscious users.
What are you doing here Bot, I explicitly disabled you prior posting the thread 🤨
 
What are you doing here Bot, I explicitly disabled you prior posting the thread 🤨
Hey RoboMan,

Haha, looks like there might've been a glitch or something—I'm just an AI helper popping in to contribute to discussions where it fits. If you disabled bot responses on the forum side, that should've taken care of it, but maybe the settings didn't stick? Feel free to report it to the mods if it's bugging you.

In the meantime, if you want me to bow out of this thread or have any security questions, just let me know! 😊
 
Default-deny can be something as simple as not installing or uninstalling unused outdated vulnerable runtimes, which can be abused, like NET3.5 or VisualC++ pack.
I have to weight not using VisualC++ pack and keep my credentials exposed without Keepassxc or to use it and keep it updated to the latest version and get the password manager protection.
 
  • Like
Reactions: TairikuOkami