@shmu26 is right. I am a beta tester of AppGuard and I like the way it uses SRP with light sandboxing (guarded applications). This is a very efficient way to protect users in Windows. I test AppGuard in the VirtualBox, and use Hard_Configurator in the real system.
Sandboxie (paid) is great when one wants to isolate/restrict a vulnerable application. The custom sandbox can be highly restrictive, so for example, any other application cannot run, the Internet access is disabled, the application cannot read from folders but can write to them or can read but cannot write to them, etc.
Ahh ok they are not running on the same system at the same time. That makes sense.
That is right. That is also a basis for forced SmartScreen. The user can choose 'Run As SmartScreen' option from Explorer context menu to safely execute EXE or MSI application installers. The application installer is first checked by SmartScreen Application Reputation and if it passes the check then it is allowed to run with Administrative Rights. The installation is ignored by default-deny protection. Forced Smartscreen feature can throw to SmartScreen, files which normally are ignored by SmartScreen, like files from: compressed archives, FAT 32 pendrives, ISO images or files downloaded via file downloaders outside web browsers, etc.Hard_Configurator and AppGuard have an important difference in how they handle elevated processes.
Hard_Configurator does not apply restrictions to elevated processes, but AppGuard does.
Yeah, I like it.That is right. That is also a basis for forced SmartScreen. The user can choose 'Run As SmartScreen' option from Explorer context menu to safely execute EXE or MSI application installers. The application installer is first checked by SmartScreen Application Reputation and if it passes the check then it is allowed to run with Administrative Rigths. The installation is ignored by default-deny protection. Forced Smartscreen feature, can throw to SmartScreen files which normally are ignored by SmartScreen like files from: compressed archives, FAT 32 pendrives, ISO images or files downloaded via file downloaders outside web browsers, etc.
But SRP and other HC functions work with any AV, or no AV, is this not so?There is a known fact that Windows Defender can cause irritating issues on some computers.
Yes, but whitelisting EXE files without using a good reputation cloud for them, weakens default-deny protection for EXE files. Hard_Configurator + Avast Hardened Aggressive mode is still a kind of smart default-deny protection. Hard_Configurator + any AV is not.But SRP and other HC functions work with any AV, or no AV, is this not so?
Got it. You are talking about a special setup for Avast hardened:Yes, but whitelisting EXE files without using a good reputation cloud for them, weakens default-deny protection for EXE files. Hard_Configurator + Avast Hardened Aggressive mode is still a kind of smart default-deny protection. Hard_Configurator + any AV is not.
That is right. I will have to send my executables to Avast for manual analysis and whitelisting, because it will kill them in the quarantine.Got it. You are talking about a special setup for Avast hardened:
SRP default/allow for exe files + Avast cloud reputation.
But the recommended SRP default/deny setup can be used with any AV, or without AV.
Did you have to exclude Hard_Configurator executables in Eset?I used it with Eset and it worked great!
Most of these great mitigations are enabled by default for all 64-bit processes on modern Windows 10 machines which is absolutely great to see. Although some of these mitigations are not applied (system-wide) on 32-bit processes. Using 32-bit processes on 64-bit systems these days is never the greatest idea but sometimes we don't have an alternative.Those mitigations are turned ON by default on Windows 10. There is no need to disable any of them. You have to remember that in Windows many settings are already configured even when in GPO the setting is 'Not configured'
I assume there is some reason why SEHOP is not applied by default to 32 bit processes. Do you maybe know what issues it could cause, or which processes are high risk for SEHOP?Most of these great mitigations are enabled by default for all 64-bit processes on modern Windows 10 machines which is absolutely great to see. Although some of these mitigations are not applied (system-wide) on 32-bit processes. Using 32-bit processes on 64-bit systems these days is never the greatest idea but sometimes we don't have an alternative.
So in the case of anyone wanting to further protect their 32-bit processes, they can use WDEG to apply per-process mitigations but also the new draft is out for Security baseline for Windows 10 v1803 “Redstone 4” – DRAFT (Security baseline for Windows 10 v1803 “Redstone 4” – DRAFT) for RS4 users. In that package, there are policy files to drop in C:\Windows\PolicyDefinitions which are some quite valuable security policies to manage in gpedit.msc manually. In particular, it contains a policy to enable which forces SEHOP specifically on all 32-bit processes as well so that you don't have to do it per-process. This covers system-wide.
I apologize if these details had already been covered here at MalwareTips since I haven't followed as closely here. I would really like to get myself more familiar with MT forum soon.
BTW, thank you for this great tool. I am always a big fan of tiny portable apps which contain a big punch as far as the security impact that they can provide in a light, efficient and portable way. Keep up the great work!
EDIT: The FINAL version of the security baseline for 1803 will be out shortly after RS4 goes public.