Latest changes
Jul 31, 2020
Daily driver
My primary device
Operating system
Windows 10 Pro
OS build or version
Windows 10 version 2004
System type
64-bit operating system; x64-based processor
Update and Security
Allow all automatic updates
User Access Control
Always notify
Firewall and Network protection
Microsoft Defender Firewall is active
User permissions
Administrator account
User account
Sign in with Microsoft
Sign-in options
  • Windows Hello PIN
  • Security Key
  • Malware exposure
    No malware samples are downloaded
    Real-time Malware protection
    Microsoft Defender
    Modified security settings
    In gpedit:
    enabled anti-malware early start,
    block untrusted fonts,
    block advertising id,
    enabled virtualization-based security for Device Guard,
    enabled Kernel-DMA-protection,
    block Remote support + Remote shell access,
    block app start with voice command,
    enable safe start for integrity checks for Bitlocker,
    block new DMA devices if PC is locked,
    request additional authentication at startup for Bitlocker,
    disable Desktop Gadgets,
    block Flash & new tab content in Edge,
    block cloud in Windows search,
    block Cortana,
    disable popup notifications on locked screen
    change the inactivity limit to 15 minutes

    other stuff:
    run "dgreadiness_v3.7.2 -Enable"
    install "Hard_Configurator_beta_setup_5.1.1.2" with all recommend settings + some own
    Chromium-Edge flags & Anti-Exploit settings (see post)
    Adobe Touch as PDF reader with Anti-Exploit settings (see post)
    internal drives encrypted with Bitlocker
    change Data Execution Prevention (DEP) to AlwaysOn / enforcing
    In Defender - Exploit protection i enable/ enforce Dynamic ASLR
    Anti-Ransomware protection enabled
    Application Guard installed
    NextDNS DoT DNS
    sandboxed Defender
    Periodic scanners
    Microsoft Defender + Microsoft Defender (internal) offline scan + Desinfec't
    Browser and Extensions
    Chromium-Edge with AdGuard extension
    Privacy tools and VPN
    beside Windows settings, 3 different Edge profiles (see my thread about)
    Password manager
    KeePass
    Search engine
    Startpage
    Maintenance tools
    Windows internal tools
    Photos and Files backup
    Windows internal backup (file version history) to NAS + Personal Backup 6
    File Backup schedule
    Once or multiple times per week
    Backup and Restore
    Windows internal system restore points
    Backup schedule
    Once or more per week
    Computer Activity
  • Playing computer games
  • Online banking
  • Browsing the web and checking emails
  • Streaming movies, TV shows and music from the Internet
  • Computer Specifications
    Asrock B450 Pro4
    AMD Ryzen 5-2600
    Radeon RX 5700
    2x 8GB DDR4 memory
    232GB Crucial SSD for Windows, 476GB SanDisk SSD for Data
    different Nitrokey's, Bluetooth USB adapter
    Your changelog
    6th June: First post
    13th June: See SECURE: Complete - security123's Security Config 2020
    3th July: See SECURITY: Complete - security123's Security Config 2020
    6th July: switch to NextDNS (DoT): SECURITY: Complete - security123's Security Config 2020
    15th July: change a small Edge setting: SECURITY: Complete - security123's Security Config 2020
    16th July: Increase KeePass security to maximum: SECURITY: Complete - security123's Security Config 2020
    30th July: make Defender more secure, harden some Hard_Configurator settings: SECURITY: Complete - security123's Security Config 2020
    31th July: enable "paranoid extensions" in Hard_Configurator: SECURITY: Complete - security123's Security Config 2020

    security123

    Level 19
    Yesterday i made another change which i test and i don't revert it now:

    Before, i was using KeePass 2 with password & key file but key file was only on another internal hard drive then the database. Not very secure
    Then (some weeks now), i move the key file to secure tresor from OneDrive which need your 2FA every time you unlock it. While that's pretty secure, it was real annoying.
    So now i use that awesome solution:
    - database protected with password & key file - which is only saved on (normal) OneDrive which don't need every time the 2FA token
    - KeePass is upgraded with WinHelloUnlock plugin so KeePass can use (locally) Windows Hello and encrypt the database password securely in Windows Password Vault

    So a attacker now need:
    • Have access to the Windows Password Vault
    • Have access to the Cryptographic Key Windows used
    • Be able to Cryptographically sign the Cryptographic Key with Windows Hello
    • Have access to my OneDrive which is of course maximum secured
    And the best:
    i only need to enter my Windows Hello credentials and that's it. KeePass unlocked.
    Of course i need internet access, as the key file is still used and required for unlocking.
     

    security123

    Level 19
    Thanks to SearchLight i enable now running Windows Defender in its own Sandbox
    See Windows Defender Antivirus can now run in a sandbox - Microsoft Security

    Also in ConfigureDefender i enable "LSASS" protection and also "Shell Extension Security" in Hard_Configurator.

    Beside that, i own now a Nitrokey FIDO2 key but sadly only few sites (Microsoft for example) support FIDO2. Sadly also Windows itself doesn't support FIDO2 locally and only over Intune which isn't a option for us privat user's.
    Also i change/ correct my config overview a little bit.
     
    Last edited:

    ErzCrz

    Level 5
    Verified
    Thanks to SearchLight i enable now running Windows Defender in its own Sandbox
    See Windows Defender Antivirus can now run in a sandbox - Microsoft Security

    Also in ConfigureDefender i enable "LSASS" protection and also "Shell Extension Security" in Hard_Configurator.

    Beside that, i own now a Nitrokey FIDO2 key but sadly only few sites (Microsoft for example) support FIDO2. Sadly also Windows itself doesn't support FIDO2 locally and only over Intune which isn't a option for us privat user's.
    Also i change/ correct my config overview a little bit.
    I like the idea of WD running in sandbox. Is this capable in Windows 10 Home version? I should look into enabling LSASS and Shell extension when I get a minute.
     

    security123

    Level 19
    Today i enable another Hard_Configurator config:
    In "Designated File Types" i add the "Paranoid Extensions" but remove PS1, PS2, PSC1, PSC2, PS1XML, and PS2XML extensions as it's recommend in manual if <Block PowerShell Scripts> is set to ‘ON’.

    Paranoid Extensions include extended number of potentially dangerous file extensions (over 250 entries), which were abused in the wild to exploit Windows or MS Office. It can be used to protect casual users.
     
    Top