- Mar 23, 2015
- 555
I would like to call my current configuration "I SEE". In particular,
- I: Just "me" (my Common Sense).
- S: Symantec Endpoint Protection (unmanaged client).
Just like some other users of SD in MT, I also only use Shadow Defender on demand.- S: Symantec Endpoint Protection (unmanaged client).
- Reduced-size definitions of virus and spyware installed.
- Virus and Spyware Protection Settings:
- The level of Bloodhound heuristic virus detection is changed from Automatic to Aggressive.
- Download Insight:
- The sensitive level is changed from 5 (Typical) to 6 (High).
- "Files with no more than 5 users in Symantec Community will be detected as malicious" is enabled
- "Files known by users in Symantec Community for no more than 2 days will be detected as malicious" is enabled.
- Outlook Auto-Protect:
- "Insert a warning into the mail message" is disabled, because I have a really bad experience with a similar function of Bitdefender IS.
- Internet Email Auto-Protect:
- "Insert a warning into the mail message" is disabled.
- Proactive Threat Protection Settings:
- Sonar
- Action for low risk detection: changed from Log to Block
- Suspicious Behavior Detection
- Action for low risk detection: changed from Log to Prompt
- System Change Detection
- Actions for both DNS change detection and host file detection: changed from Log to Prompt
- Because I often need to modify the host file with notepad manually, I cannot change the actions here to Block.
- Actions for both DNS change detection and host file detection: changed from Log to Prompt
- Sonar
- Network Threat Protection:
- NetBIOS Protection enabled.
- Anti-Mac Spoofing enabled.
- Network Applcation Monitoring enabled.
- Denial of Service (DOS) detection enabled.
- "Prompt before allowing application traffic" checked.
- When this option is checked, the firewall of SEP will maintain a whitelist of applications that are allowed to connect to the internet.
- When a non-whitelisted application tries to connect to the internet, it will be prompted. Users can choose to allow it once or whitelist it permanently (adding a rule for it).
- This function is very strong. In my tests, I find that a whitelisted application will still be prompted when it is updated. I think the rule sets (whitelist) is not only based on the file paths, but also based on the hash codes, a little like EXE Radar Pro.
- It seems that non-existent applications will be cleaned automatically, not immediately though. I guess SEP will check the existence of the applications in the whitelist periodically.
- The program folders of EXE Radar Pro, Sandboxie and Shadow Defender are excluded in All Scans and Sonar.
- Lockdown mode in most cases.
- Disable new version notification. (Otherwise it continues to notify me that v3.0 stable is released.)
- External Devices: I check the option "Block processes executed from USBs". The other options are not checked because I do not have a CD-Rom drive, a network drive or a Ram disk.
- Lockdown mode: Here I tick the option "Ask user what to do" for vulnerable processes.
- I make some customized rules to whitelist some command lines for my printer.
- I add Chrome and Firefox to the application list.
- All options are kept default.
- Adding EXERadar.exe and ERPSvc.exe to the application list of EMET. I uncheck the options of "EAF" and "Caller" corresponding those two files.
Last edited: