- Mar 20, 2017
- 54
It's okay ? Or recommend an adjustment. Thank you.
I already made the settings described, it's the first thing I did. Thanks.Hello,
I cannot understand Spanish but it looks good. To really improve your system security you should look at Kaspersky's Application Control settings, that's were you can do the most work, here is a guide to help you - How to setup Kaspersky Internet Security 2016 for Maximum Protection (Guide) - it's for KIS 2016, but it should work on 2017 aswell!
@harlan4096, what about the idea of using Application Control to put script interpreters in the High Restricted category? What do you say about that kind of a tweak?In case of module "System Watcher", defaults settings are ok and should not be changed...
I'm scared, do I return it to the default configuration?@shmu26: I guess You did that because the last special sample I tested yesterday night that tried to Exploit cmd.exe. We have been testing at MWHub lately some similar/variants samples (usually .doc) that tried the same.
As You can see, in every case KTS2018 (and I guess also K2017 would do the same) in default settings detected the attack and blocked it without having signatures...
If that "strong tweak" is working fine for now for You, that's great... anyway I'm not sure whether You will have any issue in future with any other applications or Windows workings, let us know...
As I already said before in post#5, I would stay at default settings in "System Watcher" module in general, although I have all those settings in "Prompt for Action" in my working system, because I am in "Interactive Mode"@Jack @Winter Soldier @harlan4096 @shmu26 Something in English so they can understand.View attachment 144595
Returning to the default setting. ThanksAs I already said before in post#5, I would stay at default settings in "System Watcher" module, anyway I have all those settings in "Prompt for Action" in my working system, because I am in "Interactive Mode"![]()
Thanks, and it wasn't because of your latest test, it is just my general paranoia about script interpreters. Whatever my security config may be, I always try to get them under control.@shmu26: I guess You did that because the last special sample I tested yesterday night that tried to Exploit cmd.exe. We have been testing at MWHub lately some similar/variants samples (usually .doc) that tried the same.
As You can see, in every case KTS2018 (and I guess also K2017 would do the same) in default settings detected the attack and blocked it without having signatures...
If that "strong tweak" is working fine for now for You, that's great... anyway I'm not sure whether You will have any issue in future with any other applications or Windows working, please let us know...