Forums
New posts
Search forums
News
Security News
Technology News
Giveaways
Giveaways, Promotions and Contests
Discounts & Deals
Reviews
Users Reviews
Video Reviews
Support
Windows Malware Removal Help & Support
Inactive Support Threads
Mac Malware Removal Help & Support
Mobile Malware Removal Help & Support
Blog
Log in
Register
What's new
Search
Search titles only
By:
Search titles only
By:
Reply to thread
Menu
Install the app
Install
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Forums
Software
Security Apps
Hard_Configurator Tools
Hard_Configurator - Windows Hardening Configurator
Message
<blockquote data-quote="Andy Ful" data-source="post: 574990" data-attributes="member: 32260"><p><strong>Post updated in January 2025.</strong></p><p></p><p><span style="color: rgb(65, 168, 95)"><strong>The current version can be downloaded from GitHub:</strong></span></p><p>[URL unfurl="false"]https://github.com/AndyFul/Hard_Configurator/raw/master/Hard_Configurator_setup_7.0.0.1.exe[/URL]</p><p></p><p><span style="color: rgb(65, 168, 95)"><strong>The previous version can be downloaded from Softpedia:</strong></span></p><p>[URL unfurl="false"]https://www.softpedia.com/get/Tweak/System-Tweak/Hard-Configurator.shtml[/URL]</p><p></p><p><strong>WARNING!</strong></p><p><strong><span style="color: rgb(184, 49, 47)">The fake domain hard-configurator.com</span></strong> is used by some malicious actors. Please do not use it. Someone tries to fool people who want to get information about Hard_Configurator.</p><p></p><p><span style="color: rgb(65, 168, 95)"><strong>Support for Windows 11 22H2 and later versions was added in the version 6.1.1.1.</strong></span></p><p>Windows 11 ver. 22H2 (fresh installation) turns off by default Software Restriction Policies. So, Hard_Configurator ver. 6.0.1.1 (and prior) could not use SRP (restrictions from the left panel in H_C ). This issue was corrected in version 6.1.1.1. The current version can also work with enabled Smart App Control.</p><p></p><p><span style="color: rgb(41, 105, 176)"><strong>Developer website:</strong></span></p><p><strong><span style="font-size: 18px">[URL unfurl="true"]https://github.com/AndyFul/Hard_Configurator[/URL]</span></strong></p><p></p><p>Hard_Configurator was created after a discussion on the below treads:</p><p>[URL unfurl="false"]https://www.wilderssecurity.com/threads/maximising-windows-vista-security-with-lua-and-srp-even-without-ultimate.232857/[/URL]</p><p><a href="https://malwaretips.com/threads/software-restriction-policies-to-windows-home.63530/#post-544914" target="_blank">Secure Windows - Software restriction Policies to Windows Home</a></p><p><a href="https://malwaretips.com/threads/windows-pro-owner-use-software-restriction-policies.61871/page-4" target="_blank">Windows Pro owner? Use Software Restriction Policies!</a></p><p><a href="https://malwaretips.com/threads/do-you-use-security-reg-tweaks.65437/page-3" target="_blank">Poll - Do you use security reg tweaks?</a></p><p><a href="https://malwaretips.com/threads/run-by-smartscreen-utility.65145/" target="_blank">Run by SmartScreen utility</a></p><p></p><p>Microsoft documentation for Software Restriction Policies:</p><p>[URL unfurl="true"]https://learn.microsoft.com/en-us/windows-server/identity/software-restriction-policies/software-restriction-policies-technical-overview[/URL]</p><p>This documentation was made for Windows Server (2012, 2016, 2019, and 2022), but SRP works the same on Windows 7, 8, 8.1, 10, and 11.</p><p></p><p>Software Restriction Policies cannot work on the same computer together with Applocker Policies and also with Child Account (created via Microsoft Family Safety).</p><p></p><p><strong>What is Hard_Configurator for?</strong></p><p></p><p>This program can configure Windows built-in security to harden the system. When you close Hard_Configurator it closes all its processes. The real-time protection comes from the reconfigured Windows settings. Hard_Configurator can be seen as a Medium Integrity Level smart default-deny setup, which is based on SRP + Application Reputation Service (forced SmartScreen) + Windows hardening settings (restricting vulnerable features).</p><p>Hard_Configurator makes changes in the Windows Registry to accomplish the tasks enumerated below:</p><ol> <li data-xf-list-type="ol">Enabling Software Restriction Policies (SRP) in Windows Home editions.</li> <li data-xf-list-type="ol">Changing SRP Security Levels, Enforcement options, and Designated File Types.</li> <li data-xf-list-type="ol">Whitelisting files in SRP by path (also with wildcards) and by hash.</li> <li data-xf-list-type="ol">Blocking the vulnerable system executables via SRP.</li> <li data-xf-list-type="ol">Protecting (deny execution) writable subfolders in %WinDir% folder (via SRP).</li> <li data-xf-list-type="ol">Restricting shortcut execution to some folders only (via SRP).</li> <li data-xf-list-type="ol">Enabling Windows Defender advanced settings, like PUA protection, ASR rules, Network Protection, etc.</li> <li data-xf-list-type="ol">Blocking outbound connections of many LOLBins and user applications.</li> <li data-xf-list-type="ol">Filtering Windows Event Log for blocked outbound connections.</li> <li data-xf-list-type="ol">Protecting against weaponized documents, when MS Office and Adobe Acrobat Reader XI/DC are used to open them.</li> <li data-xf-list-type="ol">Disabling PowerShell script execution (Windows 7+).</li> <li data-xf-list-type="ol">Securing PowerShell by Constrained Language mode (SRP, PowerShell 5.0+)</li> <li data-xf-list-type="ol">Disabling execution of scripts managed by Windows Script Host.</li> <li data-xf-list-type="ol">Removing the "Run as administrator" option from the Explorer right-click context menu.</li> <li data-xf-list-type="ol">Forcing the SmartScreen for files without 'Mark Of The Web' (Windows 8+).</li> <li data-xf-list-type="ol">Disabling Remote Desktop, Remote Assistance, Remote Shell, and Remote Registry.</li> <li data-xf-list-type="ol">Disabling execution of 16-bit applications.</li> <li data-xf-list-type="ol">Securing Shell Extensions.</li> <li data-xf-list-type="ol">Disabling SMB protocols.</li> <li data-xf-list-type="ol">Disabling program elevation on Standard User Account.</li> <li data-xf-list-type="ol">Disabling Cached Logons.</li> <li data-xf-list-type="ol">Filtering Windows Event Log for blocked file execution events (Nirsoft FullEventLogView).</li> <li data-xf-list-type="ol">Filtering autoruns from the User Space, and script autoruns from anywhere (Sysinternals Autorunsc).</li> <li data-xf-list-type="ol">Turning ON/OFF all the above restrictions.</li> <li data-xf-list-type="ol">Restoring Windows Defaults.</li> <li data-xf-list-type="ol">Making System Restore Point.</li> <li data-xf-list-type="ol">Using predefined setting profiles for Windows 7, Windows 8, and Windows 10.</li> <li data-xf-list-type="ol">Saving the chosen restrictions as a profile, and restoring when needed.</li> <li data-xf-list-type="ol">Backup management for Profile Base (whitelist profiles and setting profiles).</li> <li data-xf-list-type="ol">Changing GUI skin.</li> <li data-xf-list-type="ol">Updating application.</li> <li data-xf-list-type="ol">Uninstalling application (Windows defaults restored).</li> </ol><p> (...) and some more ...</p><p></p><p>Many of the above tasks can be done by using Windows RegEdit. Anyway, with Hard_Configurator, it can be done more quickly and safely.</p><p></p><p><strong><span style="font-size: 18px">How to be unhappy with Hard_Configurator:</span></strong></p><ol> <li data-xf-list-type="ol">Install Hard_Configurator.</li> <li data-xf-list-type="ol">Ignore the info displayed during the installation.</li> <li data-xf-list-type="ol">Do not read the help files.</li> <li data-xf-list-type="ol">Do not read the Manual.</li> </ol><p><strong><span style="color: rgb(0, 168, 133)">This program was created for home Administrators (advanced users) to secure inexperienced users. </span></strong><img src="data:image/gif;base64,R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAAALAAAAAABAAEAAAIBRAA7" class="smilie smilie--sprite smilie--sprite109" alt=":)" title="Smile :)" loading="lazy" data-shortname=":)" /></p></blockquote><p></p>
[QUOTE="Andy Ful, post: 574990, member: 32260"] [B]Post updated in January 2025.[/B] [COLOR=rgb(65, 168, 95)][B]The current version can be downloaded from GitHub:[/B][/COLOR] [URL unfurl="false"]https://github.com/AndyFul/Hard_Configurator/raw/master/Hard_Configurator_setup_7.0.0.1.exe[/URL] [COLOR=rgb(65, 168, 95)][B]The previous version can be downloaded from Softpedia:[/B][/COLOR] [URL unfurl="false"]https://www.softpedia.com/get/Tweak/System-Tweak/Hard-Configurator.shtml[/URL] [B]WARNING! [COLOR=rgb(184, 49, 47)]The fake domain hard-configurator.com[/COLOR][/B] is used by some malicious actors. Please do not use it. Someone tries to fool people who want to get information about Hard_Configurator. [COLOR=rgb(65, 168, 95)][B]Support for Windows 11 22H2 and later versions was added in the version 6.1.1.1.[/B][/COLOR] Windows 11 ver. 22H2 (fresh installation) turns off by default Software Restriction Policies. So, Hard_Configurator ver. 6.0.1.1 (and prior) could not use SRP (restrictions from the left panel in H_C ). This issue was corrected in version 6.1.1.1. The current version can also work with enabled Smart App Control. [COLOR=rgb(41, 105, 176)][B]Developer website:[/B][/COLOR] [B][SIZE=5][URL unfurl="true"]https://github.com/AndyFul/Hard_Configurator[/URL][/SIZE][/B] Hard_Configurator was created after a discussion on the below treads: [URL unfurl="false"]https://www.wilderssecurity.com/threads/maximising-windows-vista-security-with-lua-and-srp-even-without-ultimate.232857/[/URL] [URL='https://malwaretips.com/threads/software-restriction-policies-to-windows-home.63530/#post-544914']Secure Windows - Software restriction Policies to Windows Home[/URL] [URL='https://malwaretips.com/threads/windows-pro-owner-use-software-restriction-policies.61871/page-4']Windows Pro owner? Use Software Restriction Policies![/URL] [URL='https://malwaretips.com/threads/do-you-use-security-reg-tweaks.65437/page-3']Poll - Do you use security reg tweaks?[/URL] [URL='https://malwaretips.com/threads/run-by-smartscreen-utility.65145/']Run by SmartScreen utility[/URL] Microsoft documentation for Software Restriction Policies: [URL unfurl="true"]https://learn.microsoft.com/en-us/windows-server/identity/software-restriction-policies/software-restriction-policies-technical-overview[/URL] This documentation was made for Windows Server (2012, 2016, 2019, and 2022), but SRP works the same on Windows 7, 8, 8.1, 10, and 11. Software Restriction Policies cannot work on the same computer together with Applocker Policies and also with Child Account (created via Microsoft Family Safety). [B]What is Hard_Configurator for?[/B] This program can configure Windows built-in security to harden the system. When you close Hard_Configurator it closes all its processes. The real-time protection comes from the reconfigured Windows settings. Hard_Configurator can be seen as a Medium Integrity Level smart default-deny setup, which is based on SRP + Application Reputation Service (forced SmartScreen) + Windows hardening settings (restricting vulnerable features). Hard_Configurator makes changes in the Windows Registry to accomplish the tasks enumerated below: [LIST=1] [*]Enabling Software Restriction Policies (SRP) in Windows Home editions. [*]Changing SRP Security Levels, Enforcement options, and Designated File Types. [*]Whitelisting files in SRP by path (also with wildcards) and by hash. [*]Blocking the vulnerable system executables via SRP. [*]Protecting (deny execution) writable subfolders in %WinDir% folder (via SRP). [*]Restricting shortcut execution to some folders only (via SRP). [*]Enabling Windows Defender advanced settings, like PUA protection, ASR rules, Network Protection, etc. [*]Blocking outbound connections of many LOLBins and user applications. [*]Filtering Windows Event Log for blocked outbound connections. [*]Protecting against weaponized documents, when MS Office and Adobe Acrobat Reader XI/DC are used to open them. [*]Disabling PowerShell script execution (Windows 7+). [*]Securing PowerShell by Constrained Language mode (SRP, PowerShell 5.0+) [*]Disabling execution of scripts managed by Windows Script Host. [*]Removing the "Run as administrator" option from the Explorer right-click context menu. [*]Forcing the SmartScreen for files without 'Mark Of The Web' (Windows 8+). [*]Disabling Remote Desktop, Remote Assistance, Remote Shell, and Remote Registry. [*]Disabling execution of 16-bit applications. [*]Securing Shell Extensions. [*]Disabling SMB protocols. [*]Disabling program elevation on Standard User Account. [*]Disabling Cached Logons. [*]Filtering Windows Event Log for blocked file execution events (Nirsoft FullEventLogView). [*]Filtering autoruns from the User Space, and script autoruns from anywhere (Sysinternals Autorunsc). [*]Turning ON/OFF all the above restrictions. [*]Restoring Windows Defaults. [*]Making System Restore Point. [*]Using predefined setting profiles for Windows 7, Windows 8, and Windows 10. [*]Saving the chosen restrictions as a profile, and restoring when needed. [*]Backup management for Profile Base (whitelist profiles and setting profiles). [*]Changing GUI skin. [*]Updating application. [*]Uninstalling application (Windows defaults restored). [/LIST] (...) and some more ... Many of the above tasks can be done by using Windows RegEdit. Anyway, with Hard_Configurator, it can be done more quickly and safely. [B][SIZE=5]How to be unhappy with Hard_Configurator:[/SIZE][/B] [LIST=1] [*]Install Hard_Configurator. [*]Ignore the info displayed during the installation. [*]Do not read the help files. [*]Do not read the Manual. [/LIST] [B][COLOR=rgb(0, 168, 133)]This program was created for home Administrators (advanced users) to secure inexperienced users. [/COLOR][/B]:) [/QUOTE]
Insert quotes…
Verification
Post reply
Top