Basic Security root. pc setup configuration

Last updated
Aug 17, 2024
How it's used?
For home and private use
Operating system
macOS 15 Sequoia
On-device encryption
Other full-disk drive encryption software
Log-in security
    • Hardware security key
Security updates
Check for updates and Notify
Update channels
Allow stable updates only
User Access Control
Notify me only when programs try to make changes to my computer
Smart App Control
Evaluation mode
Network firewall
Enabled
Real-time security
Windows Security
Firewall security
Microsoft Defender Firewall with Advanced Security
About custom security
Windows 11 image built with MicroWin

AdGuard
Periodic malware scanners
RKill
HitmanPro
Malware sample testing
I do not participate in malware testing
Environment for malware testing
VMware Workstation Pro
Browser(s) and extensions
Brave
Librefox

uBlock Origin
Secure DNS
Control D
  • Dynamic DNS, Malware, New Domains, Phishing
  • HaGeZi Pro, TIF, Control D
  • DNS Rebind Protection, Disable DNSSEC, Block/Redirect/Bypass TTL
Desktop VPN
Proton VPN
  • Killswitch
  • Control D upstream

Windscribe
  • Control D upstream
Password manager
Proton Pass
Bitwarden
File and Photo backup
Filen (500GB Lifetime)
Other
Subscriptions
    • None
System recovery
MicroWin ISO
Backup
Risk factors
    • Browsing to popular websites
    • Opening email attachments
    • Buying from online stores, entering banks card details
    • Logging into my bank account
    • Downloading software and files from reputable sites
    • Gaming
    • Streaming audio/video content from trusted sites or paid subscriptions
    • Coding and development
Computer specs
Too much data mining.
What I'm looking for?

Looking for minimum feedback.

R

root.

Thread author
Actually it's ok.

I just got back from another "Advanced Plus" configuration, in which they are using a very similar setup to mine with these differences:

UAC set to "Do not dim"
No VPN
Risk factors including visiting shady websites, etc.

If this is what I need to do to achieve "Advanced Plus", I think I'm better off and more secure with my basic setup.
 
  • Wow
Reactions: harlan4096

harlan4096

Super Moderator
Verified
Staff Member
Malware Hunter
Well-known
Apr 28, 2015
8,897
Really? which one?

If You have UAC set to Do not dim, then the tag should be directly At-Risk... probably you did not announce the change of that setting to that status, and I missed that...

To sum up: no VPN, means not Plus + the last one could even be changed to Danger...
 
  • Like
Reactions: Berny and root.
R

root.

Thread author
Really? which one?

If You have UAC set to Do not dim, then the tag should be directly At-Risk... probably you did not announce the change of that setting to that status, and I missed that...

To sum up: no VPN, means not Plus + the last one could even be changed to Danger...
One of the top 5 most recently replied to. 😂

In any case, UAC set to the 2nd highest security while running a fully customized Windows 11 image is more than sufficient.

And a full system backup truly defeats the purpose of all the effort I put into creating my slimmed Windows 11 image.
 
  • Like
Reactions: harlan4096

harlan4096

Super Moderator
Verified
Staff Member
Malware Hunter
Well-known
Apr 28, 2015
8,897
1723919700616.png


It's not the 2nd highest, but below Default...
 
R

root.

Thread author
Maybe the person that initially approved it for public view accidentally changed something and then changed it back after you saw it. Idk.

Kindly leave the title as-is, as it is privacy-focused in itself, to stay off search engine results should I choose to keep the username.
 
Last edited by a moderator:
  • Wow
Reactions: Divine_Barakah

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top