Forums
New posts
Search forums
News
Security News
Technology News
Giveaways
Giveaways, Promotions and Contests
Discounts & Deals
Reviews
Users Reviews
Video Reviews
Support
Windows Malware Removal Help & Support
Inactive Support Threads
Mac Malware Removal Help & Support
Mobile Malware Removal Help & Support
Blog
Log in
Register
What's new
Search
Search titles only
By:
Search titles only
By:
Reply to thread
Menu
Install the app
Install
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Forums
Software
Security Apps
Hard_Configurator Tools
Hard_Configurator - Windows Hardening Configurator
Message
<blockquote data-quote="Andy Ful" data-source="post: 745731" data-attributes="member: 32260"><p>If the user (like [USER=37647]@shmu26[/USER]) has to use the vulnerable applications (like MS Office with allowed macros), then the best practice is using the custom restricted SUA for those applications. This can be made by using the Hard_Configurator profiles: <span style="color: rgb(0, 168, 133)"><strong>Windows_10_NoElevationSUA_Enhanced</strong></span>, <span style="color: rgb(41, 105, 176)"><strong>Windows_8_NoElevationSUA_Enhanced</strong></span> or <span style="color: rgb(85, 57, 130)"><strong>Windows_7_NoElevationSUA_Enhanced.</strong></span></p><p><span style="color: rgb(0, 0, 0)">The above is especially convenient when those applications are updated via Windows Updates or via Task Scheduler (as Administrator).</span> This is also a limitation for such SUA, because there are not many applications which can update is such way. Sometimes it is possible to force an application to update via Task Scheduler by adding the custom task. Alternatively, the user can make updates manually on Admin Account.</p></blockquote><p></p>
[QUOTE="Andy Ful, post: 745731, member: 32260"] If the user (like [USER=37647]@shmu26[/USER]) has to use the vulnerable applications (like MS Office with allowed macros), then the best practice is using the custom restricted SUA for those applications. This can be made by using the Hard_Configurator profiles: [COLOR=rgb(0, 168, 133)][B]Windows_10_NoElevationSUA_Enhanced[/B][/COLOR], [COLOR=rgb(41, 105, 176)][B]Windows_8_NoElevationSUA_Enhanced[/B][/COLOR] or [COLOR=rgb(85, 57, 130)][B]Windows_7_NoElevationSUA_Enhanced.[/B][/COLOR] [COLOR=rgb(0, 0, 0)]The above is especially convenient when those applications are updated via Windows Updates or via Task Scheduler (as Administrator).[/COLOR] This is also a limitation for such SUA, because there are not many applications which can update is such way. Sometimes it is possible to force an application to update via Task Scheduler by adding the custom task. Alternatively, the user can make updates manually on Admin Account. [/QUOTE]
Insert quotes…
Verification
Post reply
Top