- Oct 1, 2019
- 1,120
Old laptop died, while helping an uncle migrating from old desktop to new laptop, so he gave me his old PC
Last edited:
Windows Hello is only saved locally and protected by TPMLocal account only & Windows Hello PIN? Is that even possible?
I never use such extensions. Your quote is corrupt ?.. (inspired by @security123 who used the bypass-paywalsl extension only on demand when running into a paywall).
uMatrix doesn't provide that isolation from Application Guard. You reduce your security with that setup.REPLACED Application Guard on-demand with uMatrix on-demand
Because Edge launches much faster without the Virtal machine sandbox of Application Guard, I removed Application Guard and added uMatrix again for on-demand usage
I never use such extensions. Your quote is corrupt ?
uMatrix doesn't provide that isolation from Application Guard. You reduce your security with that setup.
Also uMatrix doesn't increase your browser security at all.
Can be archived with browser internal permissionsWith my settings, uMatrix blocks scripts
Only for first party from block to allow and not on demand from allow to block for first AND third--partyCan be archived with browser internal permissions
I am using Windows Hello PIN on my HP 290 G1 which does not support TPM (no such option in BIOS). How my PIN is protected?Windows Hello is only saved locally and protected by TPM
Take a look at windows defender overview or open "TPM.msc" from start menu first to check that outI am using Windows Hello PIN on my HP 290 G1 which does not support TPM (no such option in BIOS). How my PIN is protected?
Totally fine. For insecure sites I use application guard edge anywayOnly for first party from block to allow and not on demand from allow to block for first AND third--party
Are you going to test it? At first sight it feels like driving a car without fastening seat belts.My Security setup will be based on Windows Defender Exploit protection, Andy Ful's Simple Windows Hardening and OSArmor.
On Windows 10, you can skip the block rules for MS Office, and simply apply blocking child processes for these applications via Exploit Protection from Microsoft Security Center (does not require Microsoft Defender).