Forums
New posts
Search forums
News
Security News
Technology News
Giveaways
Giveaways, Promotions and Contests
Discounts & Deals
Reviews
Users Reviews
Video Reviews
Support
Windows Malware Removal Help & Support
Mac Malware Removal Help & Support
Mobile Malware Removal Help & Support
Blog
Log in
Register
What's new
Search
Search titles only
By:
Search titles only
By:
Reply to thread
Menu
Install the app
Install
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Forums
Battlefield
Software Comparison
Need Help Choosing Between Three AVs
Message
<blockquote data-quote="a090" data-source="post: 1032483" data-attributes="member: 99949"><p>Vote 3 for Kaspersky. Thanks!</p><p></p><p></p><p></p><p>Check Point’s implementation of the Kaspersky engine was heavy last I used it (admittedly several years ago). Not sure if that’s their own fault or Kaspersky’s, especially since Kaspersky is known to give older and less effective engines to third parties, keeping the best for themselves. Check Point doesn’t participate in any known 3rd party testing either. I’m not a fan.</p><p></p><p>Lol. I have a set of requirements for everything I do in life. And yes, I do have requirements for my groceries. I want to live a healthy life and a lot of that depends on what I put on and in my body, etc. Similar analogy applies in the digital world. You should want to pick good partners as part of your defence strategy. And to do that, you’ll need to have a list of requirements to differentiate the wheat from chaff. You seem like a smart guy so this should all be making sense to you. Blink twice if there’s a light bulb going off right about now.</p><p></p><p>Furthermore, an AV has core access to your system, more access than even the user. One should make a good choice when delegating this important responsibility to a third party. For someone like me, even built-in Defender is overkill. Inviting a third party AV unnecessarily can introduce more downsides than upsides in my particular situation. But I’m doing so out of the stubbornness of refusing to use Defender because I’m tired of it after years of use. I want a change in scenery. And I need a solid partner (AV) that I can rely on to <strong><u>reduce</u></strong> (not increase) the attack surface of my devices.</p><p></p><p></p><p></p><p>Actually, you’re a good resource to ask this of. I’ve seen a post of yours recently where you outlined your usage of F-Secure and why you like it. You mentioned it is highly compatible with Windows and built-in exploit protections. I have some questions:</p><p></p><ol> <li data-xf-list-type="ol">Can I leave Core Isolation > Memory Integrity <strong><span style="color: rgb(0, 168, 133)">enabled</span></strong> before installing F-Secure? Does this setting interfere with F-Secure in any way? I know Kaspersky doesn’t like it.</li> <li data-xf-list-type="ol">Which specific tweaks have you applied in GPO to harden Windows? Especially for exploit protection and firewall? I’ve gone through GPO heavily and tuned it up quite a bit, but I’m curious to see if I missed something that you know about.</li> <li data-xf-list-type="ol">Which parts of Hard_Configurator would you recommend using alongside F-Secure? I can see a use for FirewallHardening, but even then, I would do it manually. Is FirewallHardening mostly for LOLbins? As in, it can only help post-infection, it’s not necessarily preventative? Unless you count stopping the download of a payload as preventative. I wouldn’t, since a downloader being present in the first place indicates you’re compromised. And I would wipe and reinstall Windows at that point.</li> </ol></blockquote><p></p>
[QUOTE="a090, post: 1032483, member: 99949"] Vote 3 for Kaspersky. Thanks! Check Point’s implementation of the Kaspersky engine was heavy last I used it (admittedly several years ago). Not sure if that’s their own fault or Kaspersky’s, especially since Kaspersky is known to give older and less effective engines to third parties, keeping the best for themselves. Check Point doesn’t participate in any known 3rd party testing either. I’m not a fan. Lol. I have a set of requirements for everything I do in life. And yes, I do have requirements for my groceries. I want to live a healthy life and a lot of that depends on what I put on and in my body, etc. Similar analogy applies in the digital world. You should want to pick good partners as part of your defence strategy. And to do that, you’ll need to have a list of requirements to differentiate the wheat from chaff. You seem like a smart guy so this should all be making sense to you. Blink twice if there’s a light bulb going off right about now. Furthermore, an AV has core access to your system, more access than even the user. One should make a good choice when delegating this important responsibility to a third party. For someone like me, even built-in Defender is overkill. Inviting a third party AV unnecessarily can introduce more downsides than upsides in my particular situation. But I’m doing so out of the stubbornness of refusing to use Defender because I’m tired of it after years of use. I want a change in scenery. And I need a solid partner (AV) that I can rely on to [B][U]reduce[/U][/B] (not increase) the attack surface of my devices. Actually, you’re a good resource to ask this of. I’ve seen a post of yours recently where you outlined your usage of F-Secure and why you like it. You mentioned it is highly compatible with Windows and built-in exploit protections. I have some questions: [LIST=1] [*]Can I leave Core Isolation > Memory Integrity [B][COLOR=rgb(0, 168, 133)]enabled[/COLOR][/B] before installing F-Secure? Does this setting interfere with F-Secure in any way? I know Kaspersky doesn’t like it. [*]Which specific tweaks have you applied in GPO to harden Windows? Especially for exploit protection and firewall? I’ve gone through GPO heavily and tuned it up quite a bit, but I’m curious to see if I missed something that you know about. [*]Which parts of Hard_Configurator would you recommend using alongside F-Secure? I can see a use for FirewallHardening, but even then, I would do it manually. Is FirewallHardening mostly for LOLbins? As in, it can only help post-infection, it’s not necessarily preventative? Unless you count stopping the download of a payload as preventative. I wouldn’t, since a downloader being present in the first place indicates you’re compromised. And I would wipe and reinstall Windows at that point. [/LIST] [/QUOTE]
Insert quotes…
Verification
Post reply
Top