Advanced Plus Security Kongo's Computer Security Config 2024

Last updated
Jul 17, 2024
How it's used?
For home and private use
Operating system
macOS 15 Sequoia
On-device encryption
BitLocker Device Encryption for Windows
Log-in security
    • Hardware security key
Security updates
Allow security updates and latest features
Update channels
Allow stable updates only
User Access Control
Always notify
Smart App Control
Off
Network firewall
Enabled
About WiFi router
- Speedport Smart 4
- Firewalla Blue +
Real-time security
Deep Instinct Endpoint Protection
WhitelistCloud
Firewall security
Microsoft Defender Firewall with Advanced Security
About custom security

Hardening tools:
- Firewall Hardening (blocking outbound connections of LOLBins)
- Run by SmartScreen (forces SmartScreen to scan files of choice)

- STOP/DJVU Ransomware Vaccine (immunizes system against this type of ransomware)
- O&O ShutUp10 (recommended settings)
- O&O AppBuster (removed unecessary Windows 11 apps)
- Windows Sandbox



System settings:
- Microsoft Defender running in sandbox (inactive)
- Reputation Based Protections (all modules enabled)
- Smart App Control enabled

- Data Execution Prevention set to AlwaysOn
- Core Isolation: Memory Integrity enabled
-
Kernel-mode Hardware-enforced Stack Protection enabled
- Secure Boot enabled
- Drives encrypted via TPM (BitLocker)
- Windows Update Delivery Optimization disabled
- AutoPlay disabled
- Network Discovery disabled (Public Firewall profile)
- PowerShell --> Constrained Language Mode
- Hide extensions for known file types --> disabled
- Show hidden files --> enabled

- Virtualization enabled (allows Application Sandboxing)
- Custom Exploit Protection Settings for Firefox:
Code:
Block low integrity images - ON
Block remote images - ON
Block untrusted fonts - ON
Control flow guard (CFG) - ON
Data execution prevention (DEP) - ON + Enable thunk emulation - CHECKED
Disable extension points - ON
Force randomization for images (Mandatory ASLR) - ON + Do not allow stripped images - CHECKED
Randomize memory allocations (Bottom-up ASLR) - ON
Validate exception chains (SEHOP) - ON
Validate handle usage - ON
Validate heap integrity - ON
Validate image dependency integrity - ON

Thanks to @oldschool for sharing! :)

ㅤㅤㅤHardware Firewall (Firewalla Blue Plus):
- Active Protect (Strict)
- Ad Block (Strict)
- OISD blocklist enabled in Firewalla
- New Device Quarantine (restricted internet access for newly connected devices)

- Geo-IP Filtering (blocking connections from and to Russian + Chinese IPs)
- Unbound DNS enabled for all devices
‎‎‎ㅤ‎ ‎ ‎ ‎
Periodic malware scanners
Norton Power Eraser, X-Sec and AdwCleaner
Malware sample testing
I do participate in malware testing. See details about my testing environment below.
Environment for malware testing
‎‎‎ㅤㅤㅤ
VMware Workstation Player + Mullvad VPN on host machine while connected to the guest network.

Online Malware Analysis Platforms that I use:


- FileScan.iO
- Intenzer Analyze
- Hybrid Analysis
- VirusTotal
- Sophos Intelix
- ANY.RUN
-
Triage
- Kaspersky Threat Intelligence Portal
- Neiki.Dev
- ThreatZone
- UnpacMe


--> Currently I am barely testing
Browser(s) and extensions

Mozilla Firefox v. 132.0.0

Extensions:
- Ghostery
- SafeToOpen

- Bitwarden


Browser privacy and security settings:
- Tracking protection: Strict (enables Total Cookie Protection)
- Enable secure DNS using: Max Protection
- HTTPS-only-mode enabled
- DuckDuckGo set as search engine
- Pocket disabled
- Sending DNT-requests disabled (enabling makes you more identifiable and barely gives any advantage on most sites.)
- Clearing browsing data on exit
- Search suggestions disabled
- Websites overview disabled
- Blocking incoming location, camera and microphone requests
- AutoPlay for audio and video disabled
- Firefox telemetry disabled (also in about:config)
- Blocking pop-ups
- Warn when websites try to install addons enabled
- Protection against fraudulent content and dangerous software enabled



about:config tweaks:
- network.dns.echconfig.enabled =
true
- network.dns.use_https_rr_as_altsvc = true
- fission.autostart = true
- pdfjs.enableScripting =
false
- network.IDN_show_punycode = true
- security.ssl.require_safe_negotiation = true

- geo.enabled = false
- webgl.disabled = true
- network.trr.mode =
3 (NextDNS)

ㅤㅤ
Secure DNS

- NextDNS with DoH + OISD blocklist (Firefox exclusively)
- Unbound DNS (Network-wide)


Desktop VPN
Proton VPN with Secure Core, NetShield and Permanent Kill Switch
Password manager
Bitwarden Premium
Maintenance tools
PatchMyPC, RuckZuck, UpdateHub, HiBit Uninstaller and Windows built in tools for cleaning and optimization
File and Photo backup
backup to external drive when necessary
Subscriptions
    • Google One Standard 200GB
System recovery
Aomei Backupper
Risk factors
    • Browsing to popular websites
    • Browsing to unknown / untrusted / shady sites
    • Opening email attachments
    • Buying from online stores, entering banks card details
    • Downloading software and files from reputable sites
    • Gaming
    • Streaming audio/video content from shady sites
    • Downloading malware samples
Computer specs
GPU: Nvidia Geforce RTX 360 TI
CPU: Intel I5 12600K
RAM: 16 GB DDR4-3200 Crucial
Hard disks: 500 GB Samsung 970 EVO Plus + 1 TB Western Digital Blue
Notable changes
- Updated for year 2024
What I'm looking for?

Looking for minimum feedback.

Tiamati

Level 12
Verified
Top Poster
Well-known
Nov 8, 2016
574
Thanks for sharing that testing site, was looking for this one for a long time, as the one I used shut down. The reason I use MBG is the aggressiveness and the way it's blocking infecting content. It also seems to have some kind of behavioural web protection which you can see here:
MBL indeed block some TLD. i've already seen that.

However, now you can add TLD blocking to adguard or even use NEXTDNS to block more TLDs.

I suggest that you add this list to adguard rules:

! The Most Abused Top Level Domains
! The Spamhaus Project - The Top 10 Most Abused TLDs
||*.rest^$all
||*.gq^$all
||*.work^$all
||*.tk^$all
||*.ml^$all
||*.viajes^$all
||*.casa^$all
||*.london^$all
||*.cf^$all
||*.fail^$all
||*.surf^$all
||*.cam^$all
||*.exposed^$all
||*.buzz^$all
||*.fit^$all
||*.asia^$all
||*.date^$all
! Missing TLDs from NEXTDNS LIST
||*.email^$all
||*.recipes^$all
||*.cn^$all
||*.ga^$all

You can add more TLDs if you want. Just use this rule:
||*.TLD^$all

You can check more discussion here
 
Last edited by a moderator:

Kongo

Level 36
Thread author
Verified
Top Poster
Well-known
Feb 25, 2017
2,585
MBL indeed block some TLD. i've already seen that.

However, now you can add TLD blocking to adguard or even use NEXTDNS to block more TLDs.

I suggest that you add this list to adguard rules:

! The Most Abused Top Level Domains
! The Spamhaus Project - The Top 10 Most Abused TLDs
||*.rest^$all
||*.gq^$all
||*.work^$all
||*.tk^$all
||*.ml^$all
||*.viajes^$all
||*.casa^$all
||*.london^$all
||*.cf^$all
||*.fail^$all
||*.surf^$all
||*.cam^$all
||*.exposed^$all
||*.buzz^$all
||*.fit^$all
||*.asia^$all
||*.date^$all
! Missing TLDs from NEXTDNS LIST
||*.email^$all
||*.recipes^$all
||*.cn^$all
||*.ga^$all

You can add more TLDs if you want. Just use this rule:
||*.TLD^$all


You can check more discussion here
Thanks a lot, will add the rules. (y)
 

Kongo

Level 36
Thread author
Verified
Top Poster
Well-known
Feb 25, 2017
2,585
- removed Malwarebytes Browser Guard
+ added DocumentAntiExploit
+ changed some Windows settings for better security
+ tweaked Firefox a little more
+ added SHADE Sandbox Home Edition
 
Last edited:

HarborFront

Level 72
Verified
Top Poster
Content Creator
Oct 9, 2016
6,141
@SecureKongo

You can further harden FF with the settings from below. Note that some settings are duplicates whilst others have been deprecated


There is one setting in your list

devtools.onboarding.telemetry.logged = false

which is definitely not in FF 84.0.2 unless you set it. It may have been there in earlier FF versions.
 
Last edited:

Kongo

Level 36
Thread author
Verified
Top Poster
Well-known
Feb 25, 2017
2,585
How exactly?


Are you experiencing any problem with so many tweaks?
My bad, didn't see the questions.

1. Nothing special. Just enabled Data Execution Prevention for every service and program and disabled Windows Update Delivery Optimization.

2. Didn't experience any issues so far but that doesn't mean that it wouldn't cause problems for others. For my way of browsing it's well configured.:)
 
Last edited:

Kongo

Level 36
Thread author
Verified
Top Poster
Well-known
Feb 25, 2017
2,585
@SecureKongo

You can further harden FF with the settings from below. Note that some settings are duplicates whilst others have been deprecated


There is one setting in your list

devtools.onboarding.telemetry.logged = false

which is definitely not in FF 84.0.2 unless you set it. It may have been there in earlier FF versions.
Removed it from the list, thanks for mentioning. I probably accidentally added it to the list. I already used the tweaks from Restore Privacy and also linked it in my config. :)
 

HarborFront

Level 72
Verified
Top Poster
Content Creator
Oct 9, 2016
6,141
- removed Malwarebytes Browser Guard
- removed Flagfox
+ added VPN Unlimited Proxy
+ added DocumentAntiExploit
+ changed some Windows settings for better security
+ tweaked Firefox a little more
+ added SHADE Sandbox Home Edition
Shade Sandbox don't look good according to testing by @cruelsister below in post #215

 

Kongo

Level 36
Thread author
Verified
Top Poster
Well-known
Feb 25, 2017
2,585
Shade Sandbox don't look good according to testing by @cruelsister below in post #215

Yup, saw that already. Not really impressed so far either. Wanted to use it for browser isolation as I don't really like Sandboxie, but it just causes the browser and other software to freeze or crash immediatly. Will test it out some more and probably remove it later.
 
Last edited:

Thales

Level 15
Verified
Top Poster
Well-known
Nov 26, 2017
729
- changed some Group Policy settings (Mainly inspired by the config of @SecurityNightmares)

Could you also tell me the exact location of this setting:
(Start menu) Do not search the internet: activated
Aswesome!

- Sensitive files on encrypted volume (VeraCrypt)
Why not Bitlocker? I bet this is because of the other ciphers in Veracrypt. :D
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top