Forums
New posts
Search forums
News
Security News
Technology News
Giveaways
Giveaways, Promotions and Contests
Discounts & Deals
Reviews
Users Reviews
Video Reviews
Support
Windows Malware Removal Help & Support
Mac Malware Removal Help & Support
Mobile Malware Removal Help & Support
Blog
Log in
Register
What's new
Search
Search titles only
By:
Search titles only
By:
Reply to thread
Menu
Install the app
Install
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Forums
Software
Security Apps
Hard_Configurator Tools
Hard_Configurator - Windows Hardening Configurator
Message
<blockquote data-quote="Andy Ful" data-source="post: 741165" data-attributes="member: 32260"><p>Hard_Configurator ver. 4.0.0.0 is available on GitHub:</p><p><strong>For Windows 64-bit: </strong><a href="https://github.com/AndyFul/Hard_Configurator/blob/master/Hard_Configurator_setup(x64)_4.0.0.0.exe" target="_blank">AndyFul/Hard_Configurator</a></p><p><strong>For Windows 32-bit: </strong><a href="https://github.com/AndyFul/Hard_Configurator/blob/master/Hard_Configurator_setup(x86)_4.0.0.0.exe" target="_blank">AndyFul/Hard_Configurator</a></p><p>.</p><p>Hard_Configurator executables are whitelisted by Microsoft, Emsisoft, Symantec, and Avast. They are not accepted by SmartScreen, yet.</p><p>.</p><p><span style="color: rgb(0, 168, 133)"><strong>The EXE files</strong></span> can be allowed in Hard_Configurator when Avast is installed and uses the file reputation cloud for<strong><span style="color: rgb(0, 168, 133)"> them</span></strong> (that is the way how Avast works in Hardened Aggressive mode). So,<strong> Hard_Configurator + Avast Hardened Aggressive mode</strong> can work as default-deny security. The user can simply load the appropriate setting profile (depending on Windows version): WIndows_<span style="color: rgb(41, 105, 176)"><strong>7</strong></span>_Avast_Hardened_Mode_Aggressive (also for Windows <strong><span style="color: rgb(41, 105, 176)">Vista</span></strong>) or WIndows_<span style="color: rgb(41, 105, 176)"><strong>8</strong></span>_Avast_Hardened_Mode_Aggressive, or WIndows_<strong><span style="color: rgb(41, 105, 176)">10</span></strong>_Avast_Hardened_Mode_Aggressive.</p><p>.</p><p>The new version has also integrated ConfigureDefender tool, and the events blocked by Defender can be viewed similarly to SRP events when using <Tools><View Blocked Events>.</p><p><ConfigureDefender> option is available only when Windows Defender is the main AV in the system.</p><p>.</p><p>I also added the option <Documents Anti-Exploit> that works as follows:</p><ul> <li data-xf-list-type="ul">In MS Office, the below settings are applied (up to MS Office 2016):<br /> Disabled Macros for MS Office XP, MS Office 2003, and higher versions (Excel, FrontPage, Outlook, PowerPoint, Publisher, and Word).<br /> Disabled DDE for Word 2010, and higher versions (requires Windows Update KB4011575, pushed in January 2018).<br /> Disabled auto-update for any linked fields (including DDE and OLE) in Word 2007, Excel 2007, Outlook 2007, One Note 2013 and higher versions. Links may be updated manually by the user.<br /> Disabled ActiveX or MS Office 2007, and higher versions.<br /> Disabled OLE for MS Office 2007, and higher versions (Word, Excel, PowerPoint).</li> <li data-xf-list-type="ul">In Adobe Acrobat Reader XI/DC, all protective features are turned ON including <span style="color: rgb(85, 57, 130)"><strong>AppContainer Mode</strong></span> for Adobe Acrobat Reader DC.</li> </ul><p>The full list of changes:</p><p>Version 4.0.0.0</p><ol> <li data-xf-list-type="ol">Deinstallation of Hard_Configurator is available only from <Tools> <Uninstall Hard_Configurator>.</li> <li data-xf-list-type="ol">Added <Documents Ant-Exploit button> to block/unblock active content in MS Office and Adobe Acrobat Reader XI / DC.</li> <li data-xf-list-type="ol">Added <ConfigureDefender> button to run ConfigureDefender utility (installed with this package).</li> <li data-xf-list-type="ol">Added <Allow EXE files> button in 'Whitelist By Path' window. This feature allows all EXE files except ticked in <Block Sponsors>.</li> <li data-xf-list-type="ol">Added the Avast_Hardened_Mode_Aggressive profile to work with Avast, set to Hardened Aggressive mode.</li> <li data-xf-list-type="ol">Changed the name of the button <Run SRP/Scripts EventLogView> to <View Blocked Events>.</li> <li data-xf-list-type="ol">Extended the logged events in <View Blocked Events> to include Exploit Guard ASR, Controlled Folder Access, Network Protection, and Defender blocked/audited events.</li> <li data-xf-list-type="ol">Added some new paths to blacklist writable Windows subfolders.</li> <li data-xf-list-type="ol">Corrected the whitelisting of OneDrive executables.</li> <li data-xf-list-type="ol">Added the new versions of: Sysinternals Autoruns, NirSoft FullEventView, and 7-ZIP.</li> <li data-xf-list-type="ol">Recommended settings in ver. 4.0.0.0 are based on <Default Security Level> = 'Disallowed', as compared to <Default Security Level> = 'Basic User' used in the previous versions. The difference for the user will be visible only with the extended SRP protection for BAT and CMD files.</li> <li data-xf-list-type="ol">Added <Update> button to check/install the new Hard_Configurator versions.</li> </ol></blockquote><p></p>
[QUOTE="Andy Ful, post: 741165, member: 32260"] Hard_Configurator ver. 4.0.0.0 is available on GitHub: [B]For Windows 64-bit: [/B][URL='https://github.com/AndyFul/Hard_Configurator/blob/master/Hard_Configurator_setup(x64)_4.0.0.0.exe']AndyFul/Hard_Configurator[/URL] [B]For Windows 32-bit: [/B][URL='https://github.com/AndyFul/Hard_Configurator/blob/master/Hard_Configurator_setup(x86)_4.0.0.0.exe']AndyFul/Hard_Configurator[/URL] . Hard_Configurator executables are whitelisted by Microsoft, Emsisoft, Symantec, and Avast. They are not accepted by SmartScreen, yet. . [COLOR=rgb(0, 168, 133)][B]The EXE files[/B][/COLOR] can be allowed in Hard_Configurator when Avast is installed and uses the file reputation cloud for[B][COLOR=rgb(0, 168, 133)] them[/COLOR][/B] (that is the way how Avast works in Hardened Aggressive mode). So,[B] Hard_Configurator + Avast Hardened Aggressive mode[/B] can work as default-deny security. The user can simply load the appropriate setting profile (depending on Windows version): WIndows_[COLOR=rgb(41, 105, 176)][B]7[/B][/COLOR]_Avast_Hardened_Mode_Aggressive (also for Windows [B][COLOR=rgb(41, 105, 176)]Vista[/COLOR][/B]) or WIndows_[COLOR=rgb(41, 105, 176)][B]8[/B][/COLOR]_Avast_Hardened_Mode_Aggressive, or WIndows_[B][COLOR=rgb(41, 105, 176)]10[/COLOR][/B]_Avast_Hardened_Mode_Aggressive. . The new version has also integrated ConfigureDefender tool, and the events blocked by Defender can be viewed similarly to SRP events when using <Tools><View Blocked Events>. <ConfigureDefender> option is available only when Windows Defender is the main AV in the system. . I also added the option <Documents Anti-Exploit> that works as follows: [LIST] [*]In MS Office, the below settings are applied (up to MS Office 2016): Disabled Macros for MS Office XP, MS Office 2003, and higher versions (Excel, FrontPage, Outlook, PowerPoint, Publisher, and Word). Disabled DDE for Word 2010, and higher versions (requires Windows Update KB4011575, pushed in January 2018). Disabled auto-update for any linked fields (including DDE and OLE) in Word 2007, Excel 2007, Outlook 2007, One Note 2013 and higher versions. Links may be updated manually by the user. Disabled ActiveX or MS Office 2007, and higher versions. Disabled OLE for MS Office 2007, and higher versions (Word, Excel, PowerPoint). [*]In Adobe Acrobat Reader XI/DC, all protective features are turned ON including [COLOR=rgb(85, 57, 130)][B]AppContainer Mode[/B][/COLOR] for Adobe Acrobat Reader DC. [/LIST] The full list of changes: Version 4.0.0.0 [LIST=1] [*]Deinstallation of Hard_Configurator is available only from <Tools> <Uninstall Hard_Configurator>. [*]Added <Documents Ant-Exploit button> to block/unblock active content in MS Office and Adobe Acrobat Reader XI / DC. [*]Added <ConfigureDefender> button to run ConfigureDefender utility (installed with this package). [*]Added <Allow EXE files> button in 'Whitelist By Path' window. This feature allows all EXE files except ticked in <Block Sponsors>. [*]Added the Avast_Hardened_Mode_Aggressive profile to work with Avast, set to Hardened Aggressive mode. [*]Changed the name of the button <Run SRP/Scripts EventLogView> to <View Blocked Events>. [*]Extended the logged events in <View Blocked Events> to include Exploit Guard ASR, Controlled Folder Access, Network Protection, and Defender blocked/audited events. [*]Added some new paths to blacklist writable Windows subfolders. [*]Corrected the whitelisting of OneDrive executables. [*]Added the new versions of: Sysinternals Autoruns, NirSoft FullEventView, and 7-ZIP. [*]Recommended settings in ver. 4.0.0.0 are based on <Default Security Level> = 'Disallowed', as compared to <Default Security Level> = 'Basic User' used in the previous versions. The difference for the user will be visible only with the extended SRP protection for BAT and CMD files. [*]Added <Update> button to check/install the new Hard_Configurator versions. [/LIST] [/QUOTE]
Insert quotes…
Verification
Post reply
Top