- Dec 25, 2017
- 158
the easy whistling option
??? What is this
the easy whistling option
rgr, I didn't notice it was open beta, thanks@_CyberGhosT_: The dev made it an open beta. Why not just go ahead and do it?
Or add OSA to trusted publisher list - it's avaliable in small box "Trust this Publisher" on the top of alert. The button to open and manage such list you can find in "Settings/tab Advanced.Here is a new v1.4 (pre-release)
Have you tried also to exclude OSArmor on Privatefirewall?
You should enable all "Allow" options for OSArmorDevSvc.exe, OSArmorDevUI.exe, OSArmorDevCfg.exe.
OSArmor doesn't autostart on Sua acc.
test18 boots in 16sec very fast on my XP and Privatefirewall service started on boot so problem fixed@Stas
Let me know if this test18 fixes the issues you reported on XP.
Other users on Wilders confirmed the issues are fixed in this test18 build.
[%PROCESS%: C:\Users\*\AppData\Local\Temp\Slimjet\Slimjet Archive.exe] [%PARENTPROCESS%: *\Slimjet\slimjet.exe] [%PARENTSIGNER%: FlashPeak Inc.]
Date/Time: 1/10/2018 3:11:47 PM
Process: [3968]C:\Users\evjlsrain\AppData\Local\Temp\Slimjet\Slimjet Archive.exe
Parent: [3840]C:\Program Files\Slimjet\slimjet.exe
Rule: AntiExploitSlimJet
Rule Name: (Anti-Exploit) Protect SlimJet Browser
Command Line: "C:\Users\EVJLSR~1\AppData\Local\Temp\Slimjet\Slimjet Archive.exe" -o"C:\Users\evjlsrain\AppData\Local\Slimjet\User Data\update_x64"
Signer:
Parent Signer: FlashPeak Inc.
Same here but sometimes not always!failed to start on boot
@Windows_Security
it's for NVT to natively do all this...I think
Even the settings that block all unsigned processes in appdata could probably be enabled by most users, but only if the user is ready to disable OSA when installing and updating programs. Otherwise, he will be very frustrated.I think most users could enable everything except for the settings that block all unsigned processes in appdata. Would you agree?
Ye, it stopped my Cameyo and kerish doctor from installing.a lot of FP!Would you agree?
@Chimaira and others impressed and overwhelmed by the many options of OSarmor
Andreas has put in many options of which some have a loose, medium and strict block variant. Some rules are a mystery because it is impossible to guess what is blocked ((e.g. the advanced rule: "block specific processes from self executing").
For members hesitating to take the dive, I have a composed a "safe" list of items to be blocked (compare it with Black Viper's safe list of Windows Processes to be disabled). Download the OsArmor.txt and rename it OSArmor.rules
Import this ruleset by clicking on OSarmor tray icon. Click the "Open Configurator" button, when configurator opens click the "Load from file" button and select the renamed OS.Armor.rules file. Next click on the "Anti-Exploit" tab and select all the programs you have running on your PC (so only enable the programs you recognize). Close the configurator.
Finally download the Exclusions.txt (this to make sure you can always install windows updates, might Microsoft use a way to update the system which is suspicious and blocked by the hardening rules of OSarmor).
Right click the OSarmor icon in the system tray, select Manage Exclusions. Allow the UAC elevation prompt. When the "NoVirusThanks OSArmor Exclusion Helper" screen appears click the "Open Exclusions" button. Now the content of the Exclusions.db file appears in Notepad. Open the Exclusions.txt file and copy and paste all lines from the Exclusions.txt to the Exclusions.db (you have two instances of Notepad open when you follow instructions correctly). Save the EXclusions.db and close the Exclusions.txt
Sorry I checked the rules, had one of my rules enabled, corrected it, please use the latest OSArmor.txt.Thanks for this. I will be testing this configuration out. Will report back how it goes.
The idea is to allow scripts and shell (don't disable them), but block them from acting suspiciously (e.g add them to exploit protection and block spawning of processes by them).