I am still working on the <Documents Anti-Exploit> feature.
In the present form, it is a mix of system-wide and non-system-wide settings, which is too complicated for the simple ON/OFF button. Furthermore, the rest Hard_Configurator ON/OFF settings are system-wide. When the user wants to recover Windows defaults he/she has to use <Restore Windows Defaults> button and additionally log ON to every Administrator account to set <Documents Anti-Exploit> = OFF (also before uninstalling).
MS Office restrictions can be introduced in three ways:
- System-Wide for all accounts (HKLM Registry Hive) - require Admin Rights.
- Non-System-Wide Administrator Policies for the current account (HKU\SID Hive) - require Admin Rights.
- Non-System-Wide for the current account (HKU\SID Hive). Those settings overwrite the present settings configured from within MS Office applications.
The settings introduced via all 3 ways do not overwrite each other.
The first two do not also overwrite the actual MS Office settings, cannot be modified from within MS Office applications and cannot be modified by the malware running as standard user.
All three ways may be useful for the users in different variants.
I have an idea of splitting <Documents Anti-Exploit> feature between two applications to properly manage the above and avoid mentioned issues.
In Hard_Configurator only System-Wide settings (
point 1.) will be applied for all accounts (disable/enable VBA interpreter and Adobe Reader XI/DC restrictions). So, there will not be a problem to <Restore Windows Defaults> or uninstall Hard_Configurator. The new option will be added for allowing/blocking the features in the SwitchDefaultDeny application.
After uninstalling Hard_Configurator, SwitchDefaultDeny application will not be uninstalled - the user still will be able to manage MS Office restrictions for any current account.
In SwitchDefaultDeny the new feature will be added: <Document Anti-Exploit for the current account> (see the attachment). This feature is intended (for now) only for MS Office restrictions (Macros in documents, DDE, ActiveX, OLE, PowerPoint Actions, etc.). They will allow four configurable settings: ON1, OFF, ON2, OFF2, and three info-settings: 'Partial', 'Dangerous', '?'.
ON1 - apply MS Office restrictions in HKU\SID Registry Hive (
point 3.) and delete restrictions introduced via policy reg tweaks (
point 2.). The ON1 settings overwrite the settings initially introduced when using MS Office applications. But, they can be also modified from within MS Office applications. So, this setting can be useful for advanced users and non-happy-clickers.
ON2 - apply MS Office restrictions in HKU\SID Registry Hive via policy reg-tweaks (
point 2.). This setting can be useful for protecting happy-clickers or inexperienced users, because the settings are locked by administrator.
OFF2 - delete all MS Office restrictions introduced via policy reg-tweaks, but do not delete the settings initially introduced when using MS Office applications or via ON1.
OFF - delete all MS Office restrictions, so MS Office is set on default settings.
The info settings ('Partial', 'Dangerous', '?') will be displayed when the user applied non-standard settings from within MS Office applications or via an external program.
For protecting the inexperienced user, <Document Anti-Exploit for the current account> should be set to ON2 on the user account, and then disabled for modification in Hard_Configurator.