- Aug 31, 2016
- 578
CoolNo problem!
I'll post my firewall rules later today...
CoolNo problem!
I'll post my firewall rules later today...
Cool
Thanks for sharing your firewall rules. I like the idea of starting from scratch and then creating only the rules that are absolutely necessary.As promised, here are the incoming rules:
View attachment 147986
And outgoing rules:
View attachment 147987
To get to this point I started by deleting ALL the default rules after I reinstalling Windows. I then use WFC to stop apps auto creating rules on their own (ie: without my consent).
Yes , me too just cutomizing my WF took me a day (research + implementation) .It took me aaaaages to get my AppLocker and Windows Firewall Rules to this stage. I've been researching this for months and I think all the effort has paid off as this build/install/configuration is a pleasure to use so far. ;-)
I'm a big fan of WFC too. Just waiting for a fix for running on the latest Insider buildI'm really pleased with WFC. It's the only third party security software I have installed on the machine so far. It's a fantastic front end to the built in Windows Firewall. I really like the connection log, it makes troubleshooting MUCH easier than reading the firewall log in notepad!
So I've made some changes to my AppLocker Microsoft exception Publisher Rules. I have now added the following so that they cannot run:
I've been thinking about adding regedit.exe to my exception list too so that my SUA can't run the Registry Editor.
- odbcconf.exe
- sdbinst.exe
One thing that's worth doing is disabling Ease of access in Windows as this is such a security hole:
To disable Ease of access on login screen:
Change ownership of c:\windows\system32\utilman.exe to Administrators
cacls c:\windows\system32\utilman.exe /C /D Everyone
cacls c:\windows\syswow64\utilman.exe /C /D Everyone
The next thing I am considering for my secure build is to block/restrict removable devices/drives use Local Group Policy. More on that a bit later ;-)
I'm a big fan of WFC too. Just waiting for a fix for running on the latest Insider build
Really enjoying your updates. You do realise I'm going to let you do all the work and then steal your ideas?
;Set SmartScreen to warn:
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer]
"SmartScreenEnabled"="Prompt"
;Turn off Remote Assistance:
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Remote Assistance]
"fAllowToGetHelp"=dword:00000000
;Turn UAC to max setting:
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System]
"PromptOnSecureDesktop"=dword:00000001
"EnableLUA"=dword:00000001
"ConsentPromptBehaviorAdmin"=dword:00000002
;Enable PUP in Defender:
[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\MpEngine]
"MpEnablePus"=dword:00000001
;Deny elevation of unsigned executables:
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System]
"ValidateAdminCodeSignatures"=dword:00000001
;Enable Secure Sign in screen (Ctrl + Alt + Del:
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
"DisableCAD"=dword:00000000
[HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Winlogon]
"DisableCAD"=-
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System]
"DisableCAD"=-
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System]
"DisableCAD"=-
;Ask for user name and password at log on screen:
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System]
"dontdisplaylastusername"=dword:00000001
;Disable cmd.exe for SUA account:
[HKEY_CURRENT_USER\SOFTWARE\Policies\Microsoft\Windows\System]
"DisableCMD"=dword:00000001
1) Disable Network UI from login screen:
Computer Configuration - Administrative Templates - System - Logon: Change Do not display network selection UI to Enable
2) Disable app notifications on lock screen:
Computer Configuration - Administrative Templates - System - Logon: Change Turn off app notifications on the lock screen to Enable
@ParaXY about the reg tweaks , you should make a batch file and share it
I copied your reg tweaks there : Windows' Security Tweaks
Netsh interface ipv4 set global mldlevel=none
;Disable cmd.exe for current user:
[HKEY_CURRENT_USER\SOFTWARE\Policies\Microsoft\Windows\System]
"DisableCMD"=dword:00000000
Awesome! Many thanks for sharing the efforts of all your research and testing. Much appreciatedAfter tidying up my notes a bit I have attached my registry file (Windows10Customisations.txt) for (most) of the tweaks/changes I have made to my Windows 10 Enterprise setup (including some changes I made this morning). This includes security changes as well as look and feel changes. There is a brief description for each registry modification but if you are going to run this I would review the file first as I'm sure there are many settings that aren't suitable for some people/machines. I'd test it in a VM if you are interested in running this .reg file. NB: Some settings like the telemetry will only work on Enterprise versions.
I'll also include a screenshot of my "Programs and Features" so you can see what I uninstalled after installing Windows 10:
View attachment 148288
Guess I could remove "Windows Fax and Scan".
One change I made this morning was to enable cmd.exe again in the registry since I have an AppLocker rule to block this for my SUA account:
Code:;Disable cmd.exe for current user: [HKEY_CURRENT_USER\SOFTWARE\Policies\Microsoft\Windows\System] "DisableCMD"=dword:00000000
I've also attached a batch file containing some of the services I have disabled called "Services.txt". Basically I disable the following services:
Rename Windows10Customisations.txt to Windows10Customisations.reg and Services.txt to Services.bat.
- Connected User Experiences and Telemetry
- Windows Error Reporting
- dmwappushservice
- SSDP Discovery (UPnP)
- Network Connection Broker
- WinHttpAutoProxySvc
Awesome! Many thanks for sharing the efforts of all your research and testing. Much appreciated
The second one is Applocker attempting to validate the certificates of applications in the Applocker Policies.In my firewall logs I have loads of these outgoing requests being blocked:
View attachment 149456
Does anyone know what these are? Should I leave them blocked or allow them through the firewall?
I did a quick search online but didn't find anything helpful but these two entries seem to be flooding the logs.
So I would expect this needs to be allowed.The service also monitors the local machine trusted root certificate store, and it invokes a user-mode task (%SystemRoot%\System32\AppIdCertStoreCheck.exe) to reverify the certificates at least once per day and whenever there is a change to the certificate store.
The second one is Applocker attempting to validate the certificates of applications in the Applocker Policies.
Microsoft Windows Security | Microsoft Press Store
So I would expect this needs to be allowed.