- Dec 27, 2016
- 1,480
Kaspersky free + Comodo Firewall at restrictive settings had been my baseline for a year. I used to find peace in using virtualization, isolation and default-deny at the cost of experience.
Now, less of managing sandboxing FPs and rule issues of Comodo. I've shifted the paradigm to lesser real-time programs, more hardening, more ease of using PC as a user normally would (with occasional alerts). Balance. Now my mains are ESET + OSArmor.
I chose ESET since I'd never evaluated its features properly. It's light for real, provides a fairly customizable HIPS with many intuitive options. Some downsides I noticed --
For that, I've tried to reduce the attack surfaces so that ESET has little work to do. And then, managing some FW events and one-time HIPS rules.
I've spent the last week experimenting with HIPS and learning good and bad rules (this goes on). I would recommend HIPS to be set at least to 'Smart' Mode instead of 'Automatic', to be alerted very occasionally about suspicious activities.
My other configurations are as below
Now, less of managing sandboxing FPs and rule issues of Comodo. I've shifted the paradigm to lesser real-time programs, more hardening, more ease of using PC as a user normally would (with occasional alerts). Balance. Now my mains are ESET + OSArmor.
I chose ESET since I'd never evaluated its features properly. It's light for real, provides a fairly customizable HIPS with many intuitive options. Some downsides I noticed --
- ESET HIPS 'Ask' alerts auto-allow actions if not responded to within a minute
- ESET is forgiving ... in another way. To reduce the no. of FPs, it sometimes bails suspicious actions it tracked. And this has been re-instantiated here and at ESET forums
For that, I've tried to reduce the attack surfaces so that ESET has little work to do. And then, managing some FW events and one-time HIPS rules.
I've spent the last week experimenting with HIPS and learning good and bad rules (this goes on). I would recommend HIPS to be set at least to 'Smart' Mode instead of 'Automatic', to be alerted very occasionally about suspicious activities.
My other configurations are as below
- Unnecessary and risky Program Features disabled
- Unnecessary services disabled
- Unnecessary network protocols and provisions disabled via Network & Sharing Centre
- Distributed and remote access COM universally off
- Scripts execution universally OFF
- Remote assistance provisions OFF
- UAC at Always Notify + UAC bypass hardening as found in OSArmor
- Further restrictions using majority of SysHardener and OSArmor settings (+custom rules)
- Local Security policy changes
- network access - do not allow storage of credentials
- UAC Admin Approval Mode
- enter log-on screen only via Ctrl+Alt+Delete (to counter a fake screen)
- SecureBoot ON
- Smartscreen everywhere
- Core isolation > Memory Integrity ON (zemana has a problem with this fella)
- WD periodic scanning ON
- Hardening of browser using some flags
- WD Exploit protection settings for Edge (only a few, to not break regular browsing)
- Hyper-V VM for an isolated environment
- Restriction of R/W permissions over some important data, applicable to other users
- Using sandbox for running doubtful programs / Edge with WD App Guard for safe browsing
- Using NVT checksum tool to verify installers
- Updating OS + apps regularly
- Using alternatives to some popular 3rd party programs
- Password-protecting important data sent via mails
- Periodic checkup of online accounts
- Privacy settings
- 2FA
- 3rd party app access checks
- Experiment with Reg Guard & MemProtect (memory protection, indirect DLL blocking)
- Experiment to see if SRP/AppLocker ... would be practical for my needs. I often install software and libraries etc w.r.t. testing and programming - using extreme lockdown is a tough job
- Comprehensively add more LOLBAS LOLbins and some DLL-driven bypasses to blacklist using a program with such support
Last edited: