- Apr 1, 2017
- 1,782
Very light on resource and Robust.OSArmor Personal v1.6.8:
Very light on resource and Robust.OSArmor Personal v1.6.8:
+ Fixed all reported false positives
+ Fixed some false positives on Windows Server 2016
+ Added more signers to Trusted Vendors list
+ Added Block execution of any process related to Python
+ Added Block any process related to Jernej Simončič (wget & netcat signed)
+ Added Block execution of wget.exe
+ Include process and parent process file size in blocked-process events
+ Improved monitoring of processes with large file size (e.g 50+ MB)
+ Improved internal rules to block suspicious behaviors
+ Improved detection of malformed/obfuscated command-lines
+ Improved installer and uninstaller scripts
+ Minor improvements
This is the changelog so far:
+ Fixed all reported false positives
+ Added new internal rules to block suspicious behaviors
+ Improved the pre-filled text of exclusion rule when button "Exclude" is clicked
+ Updated NVT License Manager with latest version
+ Added more signers to Trusted Vendors list
+ Minor improvements
Please let me know if you find issues or FPs.
Thanks guys!
+ Added support for a dark theme if Windows Dark Mode is enabled
Screenshot of OSA when Windows Dark Mode is enabled:
* To test the dark theme, exit OSA GUI via OSA system tray icon -> Exit GUI -> Confirm action
* Now enable Windows Dark Mode and then start OSArmor UI
* In shorts, OSA GUI needs to be restarted
Please let me know if you find issues or FPs.
Thanks guys!
This new test version fixes the issue reported by itman.
We've released OSArmor v1.6.9:
Download OSArmor for Windows 7, 8, 10, 11 (32 & 64-bit) | OSArmor
Here is the changelog:
:
+ Fixed all reported false positives
+ Added new internal rules to block suspicious behaviors
+ Improved the pre-filled text of exclusion rule when button "Exclude" is clicked
+ Updated NVT License Manager with latest version
+ Added more signers to Trusted Vendors list
+ Added support for a dark theme if Windows Dark Mode is enabled
+ Minor improvements
If you find false positives or issues please let me know.
// Everyone
If you are running the test builds please update to this final version.
This is the changelog so far:
+ Fixed all reported false positives
+ Added new internal rules to block suspicious behaviors
+ Improved installer and uninstaller scripts
+ Minor improvements
Let me know if you find issues or FPs.
Thanks for the link. Have not used this product for a few years now but it's certainly a nice tool to have in your arsenal.Here is a pre-release test 1 for OSArmor Personal v1.7.0:
NoVirusThanks OSArmor: An Additional Layer of Defense
@novirusthanks -- OSArmor's license manager constantly uses cpu. AFAIK, none of my other security apps have a separate, real-time license manager using...www.wilderssecurity.com
This is the changelog so far:
+ Fixed all reported false positives
+ Added Block system processes on user space
+ Added new internal rules to block suspicious behaviors
+ Added more signers to Trusted Vendors list
+ Allow to use wildcards on IgnoredNotifications.db
+ Added Copy to Clipboard popup option on Manage Ignored Notifications
+ Improved installer and uninstaller scripts
+ Minor improvements
Let me know if you find any issues.
This rule "Block system processes on user space" is mostly oriented to companies and blocks system processes found in user space (i.e WerFault.exe copied to a user-writable folder and used to load wer.dll -malicious- in the same folder).
In my tests it didn't generate any alerts of legit behaviors, but it may depend on how you utilize the PC.
The rule needs to be enabled manually, it is not enabled in any protection profile at the moment.
We'll start working on SysHardener this week.
Currently SH works fine on W10 and W11, we're going to make it simpler and add new OS hardening tweaks.
+ Fixed all reported false positives
+ Added Block system processes on user space
+ Added new internal rules to block suspicious behaviors
+ Added more signers to Trusted Vendors list
+ Allow to use wildcards on IgnoredNotifications.db
+ Added Copy to Clipboard popup option on Manage Ignored Notifications
+ Improved installer and uninstaller scripts
+ Minor improvements
Here is the changelog so far:
+ Fixed all reported false positives
+ Added "Protection Option" button on Configurator GUI
+ Added new internal rules to block suspicious behaviors
+ Improved blocking of malicious .ISO files behaviors
+ Minor improvements
Let me know if you find any issue or FP.
@plat1098 @LoneWolf
"Now that you mention it, it would be nice if the Protection Modes were somehow placed into the main body of the Configurator"
Good point, added the button "Protection Options" in the "Protections" tab that should make things easier to select protection profiles:
Just added some minor improvements on internal rules.
Let me know if you find issues or FPs.
Here is a pre-release test 4 version of OSArmor PERSONAL v1.7.2:
Let me know if you find issues or FPs.
Here is a pre-release test 5 version of OSArmor PERSONAL v1.7.2:
Let me know if you find issues or FPs.
We are discussing about enabling the following protection options in the Extreme Protection profile:
Block signers not present in Trusted Vendors List
Block processes signed with an expired certificate
Block unsigned processes on user space
Block system processes on user space
Here is a pre-release test 6 version of OSArmor PERSONAL v1.7.2:
Here is what changed:
+ Block execution of curl is now enabled on Basic Protection profile
+ Improved blocking of processes with fake file extension
+ Improved many internal rules to block suspicious behaviors
Let me know if you find issues or FPs.