Forums
New posts
Search forums
News
Security News
Technology News
Giveaways
Giveaways, Promotions and Contests
Discounts & Deals
Reviews
Users Reviews
Video Reviews
Support
Windows Malware Removal Help & Support
Inactive Support Threads
Mac Malware Removal Help & Support
Mobile Malware Removal Help & Support
Blog
Log in
Register
What's new
Search
Search titles only
By:
Search titles only
By:
Reply to thread
Menu
Install the app
Install
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Forums
Software
Security Apps
Hard_Configurator Tools
Hard_Configurator - Windows Hardening Configurator
Message
<blockquote data-quote="Andy Ful" data-source="post: 602584" data-attributes="member: 32260"><p>Hard_Configurator new version 2.0.1.0 has been uploaded to GitHub:</p><p><a href="https://github.com/AndyFul/Hard_Configurator" target="_blank">GitHub - AndyFul/Hard_Configurator: GUI to Manage Software Restriction Policies and harden Windows Home OS</a></p><p></p><p>Some notable changes:</p><p></p><p>1. New options in <SRP Extensions> window: Add/Remove script extensions, Save/Restore extensions, Restore default extensions.</p><p></p><p>2. New <Tools> button with troubleshooting options:</p><p><Run SRP/Scripts EventLogView> - filters the output of NirSoft tool: FullEventLogView, to retrieve information about blocked events.</p><p><Run Autoruns: Scripts/UserSpace> - filters out all numerous autoruns from the System Space leaving only a few entries from the User Space. They are automatically whitelisted.</p><p><Turn ON Advanced SRP logging> - activates Verbose trace logging of SRP, and allows to view the log.</p><p><Restore Windows Defaults> - replaces the registry changes made by Hard_Configurator with Windows default values.</p><p></p><p>3. <Block Remote Assistance> option has been renamed to <Block Remote Access> and extended to include Remote Shell and Remote Registry.</p><p></p><p>4. On the first run, Hard_Configurator makes System Restore point , performs autoruns checking and whitelisting User Space autoruns.</p><p></p><p>5. Updated manual with extended information about how SRP can control file execution/opening, using API functions: ShellExecute, CreateProcess, LoadLibrary, and about unusual shortcuts handling.</p><p></p><p>Other changes are planned in the next version:</p><p>1. Blocking sponsors (system executables that can run binary files).</p><p>2. Blocking 16Bit programs.</p><p>3. Blocking UnSecure Shell extensions.</p></blockquote><p></p>
[QUOTE="Andy Ful, post: 602584, member: 32260"] Hard_Configurator new version 2.0.1.0 has been uploaded to GitHub: [URL='https://github.com/AndyFul/Hard_Configurator']GitHub - AndyFul/Hard_Configurator: GUI to Manage Software Restriction Policies and harden Windows Home OS[/URL] Some notable changes: 1. New options in <SRP Extensions> window: Add/Remove script extensions, Save/Restore extensions, Restore default extensions. 2. New <Tools> button with troubleshooting options: <Run SRP/Scripts EventLogView> - filters the output of NirSoft tool: FullEventLogView, to retrieve information about blocked events. <Run Autoruns: Scripts/UserSpace> - filters out all numerous autoruns from the System Space leaving only a few entries from the User Space. They are automatically whitelisted. <Turn ON Advanced SRP logging> - activates Verbose trace logging of SRP, and allows to view the log. <Restore Windows Defaults> - replaces the registry changes made by Hard_Configurator with Windows default values. 3. <Block Remote Assistance> option has been renamed to <Block Remote Access> and extended to include Remote Shell and Remote Registry. 4. On the first run, Hard_Configurator makes System Restore point , performs autoruns checking and whitelisting User Space autoruns. 5. Updated manual with extended information about how SRP can control file execution/opening, using API functions: ShellExecute, CreateProcess, LoadLibrary, and about unusual shortcuts handling. Other changes are planned in the next version: 1. Blocking sponsors (system executables that can run binary files). 2. Blocking 16Bit programs. 3. Blocking UnSecure Shell extensions. [/QUOTE]
Insert quotes…
Verification
Post reply
Top