What do you mean by "... could have interacted ..."?Is it possible the C_D setting to warn on vulnerable signed drivers could have interacted with the old driver?
What do you mean by "... could have interacted ..."?Is it possible the C_D setting to warn on vulnerable signed drivers could have interacted with the old driver?
Installed H_C v6.0.0.0 beta1 over the top v5.1.1.2 on Windows 10 x64, and without any problems, thank!https://github.com/AndyFul/Hard_Configurator/raw/master/H_C_6_beta1.exe This beta version can be installed over the previous version (5.1.1.2).
This beta will be close to the stable version. I am focused on making it fully compatible with Windows 11. Some changes in ConfigureDefender are possible too.Installed H_C v6.0.0.0 beta1 over the top v5.1.1.2 on Windows 10 x64, and without any problems, thank!
I understand that this is just the beginning of a new version, but what are the plans for a stable release?
H_C does not protect firewall rules. The rules made specifically by H_C (can be seen in the FirewallHardening BlockList) are protected by the system. They require high privileges and system reboot to apply changes.H_C protects firewall rules from creating new rules or modifying existing rules by applications with elevated privileges (as admin)?
Thank! I guess it's hard to make all existing firewall rules protected so that programs from the admin can't create their own rules? That would be a very strong hardening.H_C does not protect firewall rules.
You can archive that with limited/ restricted Windows accountThank! I guess it's hard to make all existing firewall rules protected so that programs from the admin can't create their own rules? That would be a very strong hardening.
It is not possible via Windows native hardening (Administrative Windows Firewall Policies). One could create 3rd party driver to monitor Windows Firewall rules and prevent changing them by high privileged malware. But, even such protection can be bypassed when the attacker knows the protective driver.Thank! I guess it's hard to make all existing firewall rules protected so that programs from the admin can't create their own rules? That would be a very strong hardening.
I wondered if the outdated WiFi driver had been silently blocked by the ASR rule. Even though Microsoft says the 2018 driver was the "best" driver, I manually installed the latest one from Intel, which is 3 years newer. I look forward to installing the next version of C_D by itself to rule out any problem with that component, and if that's OK, I'll try the non-beta H_C 6.What do you mean by "... could have interacted ..."?
Yes. It is possible when using MAX or custom ConfigureDefender settings (although Defender alerts about blocked action). In the HIGH or INTERACTIVE settings, you should see an alert with the option to unblock the action. But, this should not end with crashing. Anyway, this ASR rule is new, so we cannot know it for sure.I wondered if the outdated WiFi driver had been silently blocked by the ASR rule. Even though Microsoft says the 2018 driver was the "best" driver, I manually installed the latest one from Intel, which is 3 years newer. I look forward to installing the next version of C_D by itself to rule out any problem with that component, and if that's OK, I'll try the non-beta H_C 6.
Almost, except points 9 and 10 in the changelog.@Andy Ful
Is beta of stand alone Configure Defender identical to the configure defender of Hard_Configurator beta?
It is not Explorer that needs an outbound connection for SmartScreen. Non of LOLBins in FH can disturb SmartScreen.In the Firewall rules I enable blocking all sponsors except explorer.exe (I thought that Explorer needs outbound connection for smart screen?).
Your proposition is OK, but I do not plan changes for now. For most users, it will not be better than the current layout. One can easily see that scripts are blocked.Question to @Andy Ful
Would you please make disabling commands and scripts an extra option in the MORE ... (right column hardening of H_C). By hiding this in the MORE hardening options, you could set it default to enabled.
In your H_C setup, the scripting is restricted except *.bat and *.cmd scripts that can still be run. These scripts are blocked in H_C only in the default-deny setup. Blocking the Sponsor cmd.exe blocks only the command lines that use cmd.exe (that is how Microsoft created CMD). Anyway, you have written "I disabled command and scripts with registry editor", so I assume that you have applied the right reg tweak:@Andy Ful
RE: Explorer: - Ok, thx will block explorer outbound also.
RE: blocking CMD.exe and scripts: As I read the right column H_C is only blocking powershell scripts (ps1) and windows scripts (vbs, wsf etc). Are bat and cmd-scripts already blocked also (your quote " One can easily see that scripts are blocked")
Why do you keep unrestricted shortcuts?@Andy Ful
RE: Explorer: - Ok, thx will block explorer outbound also.
Re: Sponsors: I have 23 blocked
RE: blocking CMD.exe and scripts: As I read the right column H_C is only blocking powershell scripts (ps1) and windows scripts (vbs, wsf etc). Are bat and cmd-scripts already blocked also (your quote " One can easily see that scripts are blocked")