2) I know AppLocker secures things pretty well if you set the rules up correctly but I know I am still vulnerable to malware macros running in Word/Excel docs. How does one protect yourself from these nasties? Stupid question but if a macro was allowed to run that was in a Word/Excel doc what executables etc does the macro use to do its malicious activity? In AppLocker I have blocked many system executables from running for my non-admin account (such as powershell) so I was wondering if there was anything further I need to do to protect myself from malicious macros?
I thought I'd share my config in more detail now that the rebuild is (mostly) complete.
First off, after reinstalling I enabled Device and Credential Guard. This ended up being a frustrating experience! DG didn't like my video drivers (Intel HD 4000) for some reason (even after upgrading them) so every time I played a video file it caused a BSOD. I'm guessing I could have worked around this issue by buying a compatible video card with drivers that worked with DG but the deal breaker for me was Hyper-V. Since DG needs the Hyper-V role installed you can't run VMware Workstation Pro at the same time. I was willing to swap from VMware to Hyper-V (I use VMware Workstation everyday for my job) but I just couldn't get on with Hyper-V and it ended up frustrating me so in the end I had to remove DG/CG due to the drivers issue I was experiencing and not being able to use VMware Workstation. The other issue with DG is the limited and sometimes difficult to follow documentation. Also keeping your policy file up to date every time you install new software is time consuming and painful (took about 45min to create a new policy file on my i7/32GB RAM/SSD machine.
So after the above learning exercise I now have the following setup on my new secure desktop config:
1) Two user accounts. Lets call them User and Admin. Both of these accounts have very long passwords set and each one also has a PIN set. The User account has Windows Hello access enabled with the Logitech BRIO camera.
2) UAC set at it's maximum setting. I thought this would drive me nuts like it did when I last tried this but after the machine was setup it was pretty painless when prompted if I used the Admin PIN. This feature in Win10 is awesome.
3) Bitlocker enabled on ALL drives using AES-XTS 256bit and using an encryption key on a removeable USB key (I don't have TPM). If I want I can take the USB key with me and my encrypted drives will be safe.
4) I deleted ALL the default incoming and outgoing firewall rules and manually created ALL my own rules. Basically anything incoming is blocked except for ICMP and outgoing is controlled to the apps I want to have internet access for updating or for them to function properly. I also use Windows Firewall Control (WFC) to stop apps creating their own firewall rules by using a feature called "Secure Rules". This means my rules stay the same no matter what is installed/configured.
5) AppLocker is used. Basically my Admin account can run anything but my User account is very locked down/restricted to only run trusted apps. Most of my rules are Publish rules but there are a handful of hash rules due to the software not being signed. I also changed the default rule for modern apps to only allow Microsoft signed apps. The default was to run ALL signed apps which I didn't like.
I also changed the Publisher rule for all Microsoft software to EXCLUDE the following from running for extra security/safety (this is a long list but may be helpful):
6) I've also disabled cmd.exe from running for the User account so it can't be used.
7) Signature checking is enabled so that software that isn't signed CAN'T be run with admin rights while logged in as the User account
8) I'm using Windows Defender for AV protection using the real time protection and have Smart Screen enabled
9) I have also added the option in the local GPO to disable macros in Word/Excel/Powerpoint for files from the internet
10) IE11, Windows Media Player, SMB1 and a few other items were uninstalled from the Programs and Features options.
11) I have also enabled the "Ctrl+Alt+Del" screen as it adds another layer of security to the setup so you have to do the "3 finger salute" to login to the machine.
Phew! Hopefully I haven't forgotten anything. The only thing I haven't had any luck with so far is blocking the Edge browser from running using AppLocker. Any ideas?
I've been running the above config for about 2 weeks now and so far so good! Feels lean and mean and secure. It feels good to use the machine with a non-admin account and with all the other restrictions in place but it doesn't feel inconvenient to use.
I'm hoping this setup will protect me from virii, malware, ransomware and drive by attacks.
It's funny you should ask. When I was testing this on build 1607 and I had the "Ctrl+Alt+Del" screen enabled I *couldn't* login using the PIN. The only options I had on the logon screen were password and MS account. Now with build 1703 I have the PIN option too which I am really happy about.
I just wish that when you did a "Ctrl+Alt+Del" that you didn't need to click "Sign in options" each time to be able to select your login option (PIN, password, MS account or Hello). Maybe there is a way to change this?
I've been doing a small amount of reading on HIPS and Comodo Firewall keeps coming up. I used CF years ago and it was good at the time but I went off it so are there any alternatives to getting HIPS protection for my setup? I don't mind paying for something if it is good. Something with little to no bloat if possible.
Currently I met my goal of not having any third party protection on my newly installed Windows 10 machine (with the exception of WFC) and it's working well so far. Feels fast and minimalistic.
So I'm looking to take my security setup to the next level and was thinking about HIPS. Does anyone have any pointers or suggestions? I'm also open to any other security options or approaches so feel free to mention anything!
I have to say, running as a SUA account has been way WAY better than I originally thought. I almost never get UAC prompts unless I am (obviously) trying to to something admin related. While on the topic of UAC, there is a very useful column in task manager in the details tab that you can enable called "Elevated" and this will show you what processes are running with admin rights which is quite helpful.
I really had high hopes for Device Guard but have had to park this for now. I think MS needs to do two things to make DG more attractive:
1) Better documentation
2) Better tools to manage/maintain DG/CG
(it would also be great it be able to run VMware Workstation with DG/CG enabled)
Thanks for the link, I will try and sign up. When I tried on the weekend it said there was a database error.
I thought I'd post my AppLocker setup here for comment/criticism. This is my first setup using AppLocker:
First, all rules set to enforce:
Including DLL rules:
Executable Rules:
As you can see most are Publisher Rules with some File Hash Rules for software that isn't signed.
Simple Windows Installer Rules:
Only my single admin account can run these.
Same applies for Script Rules:
I did have to put in a File Hash rule for my onboard Intel video driver to run.
Lots of (mostly) Publisher DLL rules:
Packaged Apps Rules:
I changed this from a "*" rule to only Allow Microsoft signed software.
I think some of the magic happens with all the exceptions I have for Microsoft signed software. I based most of my exception list using Excubits blacklist (with some exceptions):
This is VERY powerful IF you are running a SUA. All those Microsoft signed executables that are vulnerable to malware and attacking your system (like regsvr32.exe) are blocked...nice!
The only thing I haven't been able to block so far is Edge.
Although I have a handful of File Hash rules only 3 or 4 of this software gets regularly updates so hopefully having to update this hashes doesn't become a pain.
I managed to register and request the trial/demo version so thank you.
Having read up a bit about ReHIPS and AppGuard it got me thinking:
Since I use anti-exe/whitelisting/AppLocker and I use a SUA and I have macros blocked system wide, do I even need or should I even be considering AppGuard and/or ReHIPS?
Since I use anti-exe/whitelisting/AppLocker and I use a SUA and I have macros blocked system wide, do I even need or should I even be considering AppGuard and/or ReHIPS?
Appguard would help you only for its memory/folder protection but except that Applocker does more or less the same as AG.
ReHIPS is a sandbox , so your apps and browsers will be isolated , and it has some application control.
I changed this from a "*" rule to only Allow Microsoft signed software.
I think some of the magic happens with all the exceptions I have for Microsoft signed software. I based most of my exception list using Excubits blacklist (with some exceptions):
This is VERY powerful IF you are running a SUA. All those Microsoft signed executables that are vulnerable to malware and attacking your system (like regsvr32.exe) are blocked...nice!
The only thing I haven't been able to block so far is Edge.
Although I have a handful of File Hash rules only 3 or 4 of this software gets regularly updates so hopefully having to update this hashes doesn't become a pain.