In May 2019, I plan to push the new H_C version 4.0.1.0.
1. Added new version of RunBySmartScreen (minor changes)
2. Added new version of ConfigureDefender (corrected the issue with closing the application)
3. Added more blocked Sponsors (total number 171, LOLBins included).
4. Added more blocked Sponsors to Enhanced profiles.
5. Added new icons for H_C executables.
The new Sponsors added in ver. 4.0.1.0:
AddInProcess.exe, AddInProcess32.exe, AddInUtil.exe, at.exe, dvpack.dll, appvlp.exe, atbroker.exe, certutil.exe, cmdkey.exe, cmstp.exe, control.exe, diskshadow.exe, dnscmd.exe, dxcap.exe, esentutl.exe, expand.exe, extexport.exe, extrac32.exe, findstr.exe, forfiles.exe, ftp.exe, gpscript.exe, ie4uinit.exe, ieadvpack.dll, ieaframe.dll, jscript*.dll*, kill.exe, lxrun.exe, makecab.exe, manage-bde.wsf*, mavinject.exe, mftrace.exe, Microsoft.Workflow.Compiler.exe, msconfig.exe, msdeploy.exe, msdt.exe, mshtml.dll, mspub.exe, msra.exe, msxsl.exe, pcalua.exe, pcwrun.exe, pcwutl.dll, pester.bat*, PowershellCustomHost.exe, print.exe, psr.exe, pubprn.vbs*, regedit.exe, Register-cimprovider.exe, replace.exe, robocopy.exe, rpcping.exe, sc.exe, scriptrunner.exe, setupapi.dll, shdocvw.dll, shell32.dll, slmgr.vbs*, sqldumper.exe, sqlps.exe, SQLToolsPS.exe, SyncAppvPublishingServer.exe, SyncAppvPublishingServer.vbs*, syssetup.dll, te.exe, TextTransform.exe, tracker.exe, url.dll, verclsid.exe, vsjitdebugger.exe, wab.exe, winrm.vbs, wfc.exe, wsl.exe, wslconfig.exe, wslhost.exe, wsreset.exe, xwizard.exe, zipfldr.dll
The DLLs are blocked only when <Enforcement> = 'All files'. This setting is not included in H_C Recommended Settings, because it requires advanced whitelisting for DLLs. But, it may be used by really advanced users.
I would like to underline that blocking Sponsors make sense on the vulnerable system, vulnerable environment (public network), or when using vulnerable (not patched) software.