Forums
New posts
Search forums
News
Security News
Technology News
Giveaways
Giveaways, Promotions and Contests
Discounts & Deals
Reviews
Users Reviews
Video Reviews
Support
Windows Malware Removal Help & Support
Inactive Support Threads
Mac Malware Removal Help & Support
Mobile Malware Removal Help & Support
Blog
Log in
Register
What's new
Search
Search titles only
By:
Search titles only
By:
Reply to thread
Menu
Install the app
Install
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Forums
Software
Security Apps
Hard_Configurator Tools
Hard_Configurator - Windows Hardening Configurator
Message
<blockquote data-quote="Andy Ful" data-source="post: 768466" data-attributes="member: 32260"><p>Here is the changelog for the new version.</p><p>Version 4.0.0.1</p><ol> <li data-xf-list-type="ol">Corrected the ability to whitelist OneDrive on SUA.</li> <li data-xf-list-type="ol">Changed the way of using <Refresh Explorer> option to avoid problems on SUA.</li> <li data-xf-list-type="ol">Added the warning before Hard_Configurator deinstallation, about using DocumentAntiExploit tool.</li> <li data-xf-list-type="ol">Added the DocumentsAntiExploit tool to the SwitchDefaultDeny application, for managing different MS Office and Adobe Acrobat Reader XI/DC settings on different user accounts.</li> <li data-xf-list-type="ol">In the 4.0.0.1 version the <Documents Anti-Exploit> option in Hard_Configurator can only change system-wide settings. Non-system-wide settings are now available only via DocumentsAntiExploit tool.</li> <li data-xf-list-type="ol">Added IQY and SETTINGCONTENT-MS file extensions to the default list of Designated File Types and to the hardcoded dangerous extensions in RunBySmartScreen.</li> <li data-xf-list-type="ol">Improved Shortcut protection.</li> <li data-xf-list-type="ol">Improved the protection of MS Office and Adobe Acrobat Reader XI/DC applications, against the weaponized documents.</li> <li data-xf-list-type="ol">Improved 'Run By SmartScreen' with over 250 blocked file extensions (SRP, Outlook Web Access, Gmail, and Adobe Acrobat Reader attachments blacklists). The extensions BAT, DLL, CMD, JSE, OCX, and VBE are now blocked with notification, instead of beeing checked by SmartScreen. Popular vulnerable files (RTF, DOC, DOCX, XLS, XLSX, PUB, PPT, PPTX, ACCDB, PDF) related to MS Office and Adobe Reader, are opened with the warning instruction.</li> <li data-xf-list-type="ol">Changed the names of some buttons in the TOOLS menu: <strong> <span style="color: rgb(0, 0, 0)"><View Blocked Events></span></strong> --> <span style="color: rgb(41, 105, 176)"><strong><Blocked Events / Security Logs></strong></span>, <strong> <Run Autoruns: Scripts/UserSpace></strong> --> <span style="color: rgb(41, 105, 176)"><strong><Whitelist Autoruns / View Scripts></strong></span></li> <li data-xf-list-type="ol">Changed '<span style="color: rgb(0, 0, 0)"><strong>Allow EXE</strong>'</span> option in the <Whitelist by Path> to <span style="color: rgb(41, 105, 176)"><strong>'Allow EXE and TMP</strong></span>'. So, both EXE files and TMP files are whitelisted - this option is prepared to work with Avast Hardened Mode Aggressive as default-deny.</li> <li data-xf-list-type="ol">Updated Hard_Configurator manual.</li> </ol></blockquote><p></p>
[QUOTE="Andy Ful, post: 768466, member: 32260"] Here is the changelog for the new version. Version 4.0.0.1 [LIST=1] [*]Corrected the ability to whitelist OneDrive on SUA. [*]Changed the way of using <Refresh Explorer> option to avoid problems on SUA. [*]Added the warning before Hard_Configurator deinstallation, about using DocumentAntiExploit tool. [*]Added the DocumentsAntiExploit tool to the SwitchDefaultDeny application, for managing different MS Office and Adobe Acrobat Reader XI/DC settings on different user accounts. [*]In the 4.0.0.1 version the <Documents Anti-Exploit> option in Hard_Configurator can only change system-wide settings. Non-system-wide settings are now available only via DocumentsAntiExploit tool. [*]Added IQY and SETTINGCONTENT-MS file extensions to the default list of Designated File Types and to the hardcoded dangerous extensions in RunBySmartScreen. [*]Improved Shortcut protection. [*]Improved the protection of MS Office and Adobe Acrobat Reader XI/DC applications, against the weaponized documents. [*]Improved 'Run By SmartScreen' with over 250 blocked file extensions (SRP, Outlook Web Access, Gmail, and Adobe Acrobat Reader attachments blacklists). The extensions BAT, DLL, CMD, JSE, OCX, and VBE are now blocked with notification, instead of beeing checked by SmartScreen. Popular vulnerable files (RTF, DOC, DOCX, XLS, XLSX, PUB, PPT, PPTX, ACCDB, PDF) related to MS Office and Adobe Reader, are opened with the warning instruction. [*]Changed the names of some buttons in the TOOLS menu: [B] [COLOR=rgb(0, 0, 0)]<View Blocked Events>[/COLOR][/B] --> [COLOR=rgb(41, 105, 176)][B]<Blocked Events / Security Logs>[/B][/COLOR], [B] <Run Autoruns: Scripts/UserSpace>[/B] --> [COLOR=rgb(41, 105, 176)][B]<Whitelist Autoruns / View Scripts>[/B][/COLOR] [*]Changed '[COLOR=rgb(0, 0, 0)][B]Allow EXE[/B]'[/COLOR] option in the <Whitelist by Path> to [COLOR=rgb(41, 105, 176)][B]'Allow EXE and TMP[/B][/COLOR]'. So, both EXE files and TMP files are whitelisted - this option is prepared to work with Avast Hardened Mode Aggressive as default-deny. [*]Updated Hard_Configurator manual. [/LIST] [/QUOTE]
Insert quotes…
Verification
Post reply
Top