@Zero Knowledge
Sad but I think OSArmor is nearly abandonware, no news or updates on Wilders either
We still actively maintain it, and we follow wilders and here too (tho without logging-in or replying frequently).
No critical issues have been reported with OSA UI, service or other components, mainly some FPs have been reported (that can also be excluded manually) and will get fixed in the new version.
Nothing much has changed in terms of attack vectors, infection chain steps and such compared to the 3 years old video here:
OSA has pre-built rules that can entirely block system processes used in common attack scenarios and it "closes ways" commonly exploited in infection chains. So it will block an infection chain at the begin, in the middle, or at the end by blocking the final payload execution. We also test OSA around three times per month using recent infection chains, and so far it has proven to provide strong protection against them, anyone can test this via MalwareBazaar samples that are almost always up-to-date.
We built OSA with strong internal rules that can keep-up with current and new threats without the need for too frequent updates. We’ve scheduled a major OSA update to improve some internal components. The release is planned for the coming weeks and will include fixes for all reported FPs. Our goal for OSA was to minimize the need for frequent updates, which is why you may not see new OSA releases very often.
Regarding alerts during the installation or uninstallation of other software: yes, that can happen if those programs need to execute some commonly abused system processes. This can indeed be annoying if you frequently install or uninstall software. Balancing false positives and strong protection is one of the most challenging aspects of any security program, as it always involves a trade-off. OSA’s default protection settings are designed to minimize FPs for typical use, but depending on how you use your PC and what other software you run (especially those that execute system processes), you may still encounter some FPs.
@bazang
So many issues with it and it is very weird the way the developer designed and intends user to configure it.
We’re happy with how OSA performs and with the flexibility it offers through the Configurator (or via remote files for automation and deployment in N systems). Most home users don’t need to do much after installation, while advanced users can easily increase the protection level using the various available options. OSA is being used in a variety of business and enterprise environments on Windows 10 and 11 systems, all operating reliably and without issues to date.
Report any bugs or usability issues, and the publisher don't want to hear any of it.
We always fixed all bugs that have been reported, please let me know if you have more info here.