Advanced Plus Security Shmu26 Config in 2018

Last updated
Dec 28, 2018
Windows Edition
Pro
Security updates
Allow security updates and latest features
User Access Control
Always notify
Real-time security
Windows Defender with ConfigureDefender
Software Restriction Policy with Hard_Configurator
Firewall security
Microsoft Defender Firewall
Periodic malware scanners
Macrium Reflect does the job just fine...
Malware sample testing
I do not participate in malware testing
Browser(s) and extensions
Chrome
Edge
Maintenance tools
Hard_Configurator, SysHardener, BandiZip, PatchCleaner, autoruns
File and Photo backup
Dropbox
OneDrive
GoogleDrive
System recovery
Macrium Reflect, Timeshift (Ubuntu)
Great security configuration.

The only note I would like to make is for you to try to use a physically separate computer to run your virtual machines on, for maximum security, or even use a separate subnet for the virtual machines, to avoid contact with your main productive PC altogether.

You obviously have backup images covered as well, so... I guess I cannot recommend anything else. :D

Thanks for sharing your new config. :P
 
my alternate, non-paranoid config:

Windows Defender
Windows Firewall
standard user account
HitmanPro.Alert
Startup Sentinel
Process Lasso (to disallow script interpreters etc)
Hard_Configurator (for a few simple tweaks)
 
That's a pretty no-nonsense setup. Total coverage :)
I hope I get to try reHIPS sometime!

By curiosity , what ERP will cover that KIS won't? (I don't know much of KIS because i don't like it ^^)
Why dislike KIS :/
Is it the alerts or something else? I am aware of your lockdown approach :) but you said you dislike a particular AV solution, that triggered my curiosity.
In terms of standard AV solutions, it goes well beyond. I'll rate it in top two any time based on the features and protection.. my learning.
but you can still enables those alerts no?
KIS, by default, "disables" HIPS (the traditional alerts).
Yes we can enable..And when enabled, it showers with notifications right :D
Most of the times, looking at the application, I'll either "Trust the application" so that that sub-application/application related popups in the sequence are minimized. If it is not exactly trustable, I'll either respond to each (popups except during installations are quite less comparatively) or will trust the sequence for skipping its recurrence.

If at all the concerned app is risky and I allow some initial actions, the System Watcher+other restrictions+ZETA approach of Kaspersky (and my complementary protections) should further do the guarding.