When installing H_C, the user will be asked to uninstall Bash (Linux subsystem) and PowerShell 2.0. The user will be also asked to make the System Restore Point separately of whitelisting Autoruns entries (useful when roll up software is installed). Those improvements were proposed/discussed by
@Lockdown and
@shmu26.
I am working/playing for some time with the mix of H_C and SysHardener. It is called Casual User Protection (CUP), and will be similar to the H_C profile for Avast Hardened Aggressive mode (EXE and TMP files allowed). The CUP is similar to the idea of Simple Stupid Security.
Q&A - Simple Stupid Security vs. free AV
For now I plan 5 options:
<SmartScreen>
<Casual User Protection>
<Windows Defender high settings>
<Firewall hardening>
<Blocked Interpreters Log>
The applied restrictions:
- SmartScreen set to Block + installation of RunBySmartScreen.
- SRP default-deny. Allowed EXE, TMP, and MSI (.msi --> changed file association Msi.Package -> RunBySmartScreen).
- Documents Anti-Exploit (blocked macros in MS Office and Adobe Acrobat Reader XI/DC hardening.
- Blocked Outbound & Inbound Internet connections for predefined not blocked Interpreters: mshta.exe, hh.exe, mmc.exe, etc. and some other system executables like bitsadmin.exe, etc.
- Blocked Outbound & Inbound Internet connections for predefined vulnerable applications: MS Office, Adobe Acrobat Reader, etc.
- PowerShell set to Constrained Language Mode (PSLockdown policy) + Blocked script exec + blocked by path powershell.exe and powershell_ise.exe via HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\.
- Blocked Windows Script Host (registry tweak) + blocked wscript.exe, cscript.exe via 'Image File Execution Options' (for logging).
- Blocked: SMB protocols,Remote Desktop, Remote Assistance, Remote Registry, and Remote Shell.
- Uninstall PowerShell 2.0 and Bash (if installed).
- Change the network profile to Public.
The options 1-7 can be turned ON/OFF without Logging Off.
Points 7-10 and RunBySmartScreen are applied when installing CUP, and set to default Windows settings when uninstalling.
The user can use the last option (<Blocked Interpreters Log>), to check if any Windows script or PowerShell command were blocked. If nothing important is blocked, then the CUP settings can be safely applied.
I am experimenting with CUP - I am not quite sure, if such application will be useful. We will see.