Advanced Plus Security ErzCrz Security Config 2019

Last updated
Sep 30, 2019
Windows Edition
Home
Log-in security
Security updates
Allow security updates and latest features
User Access Control
Notify me only when programs try to make changes to my computer
Real-time security
Windows Defender
Firewall security
Microsoft Defender Firewall
About custom security
Andy Ful's Hard_Configurator at Recommended Settings, ConfigureDefender component set to High, Firewall Hardening all default rules enabled
Periodic malware scanners
Emisoft Emergency Kit, HitmanPro, Malwarebytes Adwcleaner
Malware sample testing
I do not participate in malware testing
Browser(s) and extensions
Chromium Edge Stable
Maintenance tools
Bleachbit
File and Photo backup
Monthly backup to external HD using Windows Built-in backup and occasional OneDrive manual sync
System recovery
Default Windows App
Risk factors
    • Gaming
    • Browsing to popular websites
    • Streaming audio/video content from shady sites
Computer specs
Intel i3 1.7ghz
GPU Intel 4400 HD
Ram 12 Gig
You can use ConfigureDefender to access advanced settings to harden Windows Defender. You may get the stand-alone version here Hard_Configurator — Download

Please edit configuration as well.

Many thanks for your help. Do let me know if I should do other tweaks. I have Win10 Home so don't have MS ATP.
 
  • Like
Reactions: oldschool and Jack
Still getting my head around Hard_configurator. Is there some way of training it? Will turning off default deny whitelist the programs I use? I'll look through the manual but thought I'd pose the question here as well.
 
Updated configuration as now running Windows Defender Firewall and AV as protection with system hardening & tweaks using Andy Ful's Hard_Configurator. I was also running OSArmor but probably not needed with Hard_Configurator running with Recommended settings.
 
Still getting my head around Hard_configurator. Is there some way of training it? Will turning off default deny whitelist the programs I use? I'll look through the manual but thought I'd pose the question here as well.

There is nothing to be trained. H_C is not realtime protection but uses Windows' built-in security features. Switch default/deny will not whitelist anything. It is simply an easy way to switch temporarily from Default-Deny to Default-Allow . Depending on the profile you use, RunAsSmartscreen is a simple way to bypass SRP when installing software. Looking through the manual is advised. (y)
 
There is nothing to be trained. H_C is not realtime protection but uses Windows' built-in security features. Switch default/deny will not whitelist anything. It is simply an easy way to switch temporarily from Default-Deny to Default-Allow . Depending on the profile you use, RunAsSmartscreen is a simple way to bypass SRP when installing software. Looking through the manual is advised. (y)

Thanks mate :)

I've got a bit more of an understanding with H_C now. Just gone with recommended settings and I had to whitelist a start menu folder to get SWTOR to run via the link rather than the launcher.exe. ConfigureDefender element set to High as that seems to be the one for most users and I enabled all the block defaults in FirewallHardening.

Working great now. My laptop feels fast and secure. I'm sure I'll find out about tweaks to protect me even more. It's a big change from running Comodo IS for a long time but I needed the change and glad I did so far. :)
 
Thanks mate :)

I've got a bit more of an understanding with H_C now. Just gone with recommended settings and I had to whitelist a start menu folder to get SWTOR to run via the link rather than the launcher.exe. ConfigureDefender element set to High as that seems to be the one for most users and I enabled all the block defaults in FirewallHardening.

Working great now. My laptop feels fast and secure. I'm sure I'll find out about tweaks to protect me even more. It's a big change from running Comodo IS for a long time but I needed the change and glad I did so far. :)

High settings are fine with H_C. You need add no more to the mix. I advise Max for those who use other companion softs, or no specific OS hardening.
 
I've got all Firewall Hardening rules added but explorer.exe connecting out to 443 which relates to updates from what I understand and Akamai is content delivery MS uses, Should I keep blocking that (it's one of the LOLBins rules or remove the rule and.or just use Recommended H_C rules?

Local Time: 2019/10/05 21:35:42
ProcessId: 3352
Application: C:\windows\explorer.exe
Direction: Outbound
SourceAddress: 2a02:c7d:3c5a:8d00:f926:b8ab:f32c:ee01
SourcePort: 53267
DestAddress: 2a02:26f0:db:29d::2c1a
DestPort: 443
Protocol: 6
FilterRTID: 4235304
LayerName: %%14611
LayerRTID: 50

**************************************
Local Time: 2019/10/05 21:35:42
ProcessId: 3352
Application: C:\windows\explorer.exe
Direction: Outbound
SourceAddress: 192.168.0.3
SourcePort: 53266
DestAddress: 2.19.153.179
DestPort: 443
Protocol: 6
FilterRTID: 4235303
LayerName: %%14611
LayerRTID: 48
 
I've got all Firewall Hardening rules added but explorer.exe connecting out to 443 which relates to updates from what I understand and Akamai is content delivery MS uses, Should I keep blocking that (it's one of the LOLBins rules or remove the rule and.or just use Recommended H_C rules?

Local Time: 2019/10/05 21:35:42
ProcessId: 3352
Application: C:\windows\explorer.exe
Direction: Outbound
SourceAddress: 2a02:c7d:3c5a:8d00:f926:b8ab:f32c:ee01
SourcePort: 53267
DestAddress: 2a02:26f0:db:29d::2c1a
DestPort: 443
Protocol: 6
FilterRTID: 4235304
LayerName: %%14611
LayerRTID: 50

**************************************
Local Time: 2019/10/05 21:35:42
ProcessId: 3352
Application: C:\windows\explorer.exe
Direction: Outbound
SourceAddress: 192.168.0.3
SourcePort: 53266
DestAddress: 2.19.153.179
DestPort: 443
Protocol: 6
FilterRTID: 4235303
LayerName: %%14611
LayerRTID: 48

Both addresses are from Akamai Technologies. The second is related to go.microsoft.com.edgekey.net