Setup Idea For all those people who post their Security Configurations

Last updated
May 4, 2025
How it's used?
For home and private use
Operating system
Windows 11
Other operating system
n/a
On-device encryption
BitLocker Device Encryption for Windows
Log-in security
    • Biometrics (Windows Hello PIN, TouchID, Face, Iris, Fingerprint)
Security updates
Allow security updates and latest features
Update channels
Allow stable updates only
User Access Control
Always notify
Smart App Control
Off
Network firewall
Enabled
About WiFi router
no WiFi thanks, I live in an apartment complex
Real-time security
Varies with each test
Firewall security
Microsoft Defender Firewall with Advanced Security
About custom security
Varies with each test
Periodic malware scanners
KAV
Malware sample testing
I do not participate in malware testing
Environment for malware testing
Varies with each test
Browser(s) and extensions
Brave and privacy badger
Secure DNS
Quad9
Desktop VPN
Proton Free
Password manager
Bitwarden
Maintenance tools
n/a
File and Photo backup
manual backup
System recovery
Macrium Reflect Free version ( from 2 yrs ago)
Risk factors
    • Browsing to popular websites
Computer specs
Intel i7 - 6600U. 16 Gb RAM. 512 Gb Nvme
Notable changes
n/a
Recommended for
  1. Experienced users
  2. Financial banking or trading

Victor M

Level 18
Thread author
Verified
Top Poster
Well-known
Oct 3, 2022
864
For all those people posting their security configs. If you are interested in testing to see how secure it really is, use an old machine to set it up and put it in your modem's DMZ. What that does is allow full internet access TO your machine, all protocols, all ports. Leave it for a week and then bring it offline and see if there are any problems. We all practice good security hygiene and never download malware, so this test things when things really go awry to see if your security is truly competent.

To see if there are any problems, you can setup Custom Views in Event Viewer. The list of event IDs are listed here: Appendix L - Events to Monitor .

There are several flavors when it comes to hackers. One type slips in and slips out without leaving any traces and don't bother you. They are very difficult to detect, but if you notice a gap in time in your logs then someone has probably erased some logs. The 2nd type notifies you that you've got security problems leaving a note or wallpaper. I got a hacker that sent me local mail on my Linux machine. The 3rd type wrecks your machine or wrecks some functionality so you'd definitely notice.

What you do next is up to you. You can shrug and say you can't stop hackers. Or you can say there is some way that they've got in, so there's a way to stop them. I take the second stance.

I make a drive image when I am done configuring before it ever goes online. (so find that offline AV installer, and pre-download the 2 "cumulative windows 11 x64" patches of the month from Microsoft Update Catalog so you can patch offline, and pre-download the latest MS Defender Intelligence mpam-fe.exe ). Two things are accomplished: a) you can be sure that the machine is absolutely clean and patched before it steps online b) you can re-use that drive image to make improvements without having to start from scratch. And that is a huge time saver because it takes 5 hrs for me to fully harden my machine.

I find it is better to see for myself how secure a setup really is, instead of waiting for @Shadowra to do her video tests. And then, the video tests only 1 or maybe 2 components of your security. These are real life scenarios that no video test can ever capture. The video tests gives you an idea of what to buy, but doing real life testing is where it really counts. Paying $60-$350 for a solution may give you a false sense of security. Sure you got all those knobs and switches to play with, but are they doing anything that really matters?

If at any point you want to leave this game, all you have to do is power off your modem for an hour or two. Then it would fetch a different ip address and no one is going bother you no more. To be extra safe, I have a hardware firewall with IPS Netgate 1100 pfSense+ Security Gateway between my modem and my internal LAN.
 
Last edited:

danb

From VoodooShield
Verified
Top Poster
Developer
Well-known
May 31, 2017
1,853
The battle goes on.

Victory is only temporary. The attacker was able to run things. Thus inserting his probably spyware module. Probably the firewall rules can use some improvement. He shouldn't be able to gain root, but that is if he didn't escalate privilege.

The SIEM hit a snag. Will have to fix it.
Instead of reporting "bypasses" like... "Something foreign is running in the background.", "Still something ran in the background after putting it online for 2 hrs." and "The attacker was able to run things. Thus inserting his probably spyware module.", please tell everyone exactly what was allowed to execute and show the SIEM logs.

Something is not configured correctly. Which WDAC mode are you running?

Default Windows Mode
Allow Microsoft Mode
Signed and Reputable Mode
 

danb

From VoodooShield
Verified
Top Poster
Developer
Well-known
May 31, 2017
1,853
BTW, I decided to run a DMZ test as well. I am starting with CyberLock since it has better logging than WDAC Lockdown, then I will move on to WDAC Lockdown. I completely disabled all of the other security layers, including Windows Firewall and so far nothing exiting at all. Either way, this will be a fun test, and if there are attacks we can block without adding unnecessary prompts when the device is behind a router, I am all for it.
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top