I have noticed that Windows Defender at high settings is heavy on the system. And other people have told me the same. Not sure exactly which protections are responsible for the lag on the system, but I set PUA Protection and Cloud Check Time back to default, and it seems to help.
If you aren't downloading and installing unknown files then why even enable these settings in the first place ? You already know a PUA\PUP from a legit one and don't need some AV to tell you. Plus, these AVs are all over the place on what they classify a PUA\PUP and it doesn't help a lot of folks. And then there are those folks who are hell bent on installing the program no matter what the AV tells them.
Yes, locked down mode with extra tweaks is much more secure.
Tweak number one, in my opinion, is to add c:\*script.exe to user space. It is almost a must.
This is because Appguard at OOTB (out of the box) settings does not protect windows script host, so this is tweak number 1.
Powershell is on the guarded apps list, so it won't be able to do much damage even at OOTB settings.
Granted that Appguard will block the payload that wscript spawns, even at OOTB settings, but it is not wise to let the malware get so far. Nip it in the bud.
The default AppGuard configuration provides high security. The product is software restriction policy - which means it can be made a whole lot more secure by someone willing to put forth some time and effort. A lot of people do not understand that software restriction policy is meant to be customized. It isn't a product that is pre-configured with a ton of policies. Note that I said policies and not rules. SRP uses policies whereas other security products use rules. The great advantage of SRP is that it is infinitely flexible, adaptable and can solve a huge range of security problems without the vast complexity of other products.
PowerShell, cscript, and wscript should be disabled. The vast majority of users do not need them and disabling them on a home system blocks a huge number of attacks.
My current config is Appguard + ReHIPS + Excubits MemProtect demo + Kaspersky Internet Security 19 RC.
It probably sounds like I am nuts to use so many advanced security applications together, but there is a method to my madness:
1 I don't have a lot of tweaks in Appguard, and I run it at "protected" level, not locked down.
2 I don't isolate everything in ReHIPS.
3 I don't have a lot of tweaks in KIS.
Basically, I pick and choose the features I like best in each of the various security softs I use.
That's about as overkill a security configuration as they come. I think it's bonkerz. I'll be surprised if you keep it for longer than a few weeks.
I use Chrome most of the time, it is in guarded apps by default in all the recent versions of Appguard.
You did the right thing with powershell. But I have it protected in ReHIPS, so I left it at default settings in Appguard.
I also did the registry hack to set powershell to constrained language.
I keep telling you that PowerShell isn't needed - that it should be disabled. I wouldn't tell you that if it wasn't true. The PowerShell commands that Office, DropBox, etc runs during updates, repairs, etc are "empty" and do not break anything. You are needlessly exposing your system to risk by keeping PowerShell enabled - all for nothing.
Perhaps there is a program out there that really needs PowerShell to update, but I am unaware of it. Microsoft Office and DropBox definitely do not need PowerShell to update.
Ahhh I am still using lifetime version 4.0 and it doesn't have any other browsers added. That was a good move on their part.
Browsers such as Chrome and Internet Explorer are added by default to the Guarded Apps list. Depending upon the version that you are using, Microsoft Edge might not be added by default.
Does the reg hack cover just powershell.exe in sys 32 & 64 folders or does it also cover PowerShell in the syswow 32 & 64 folders too? And does it cover powershell_ise.exe in the sys 32 and syswow folders?
Thanks
Constrained Language Mode restricts powershell scripts, commands, and other code executed by either PowerShell and PowerShell_ISE whether from disk or in-memory and whether it is by the System32 or the SysWOW64 version.
i guess I can block it with Eset hips as well but I'm not sure about it. i removed this dll btw
Lockdown can tell us.
Block PowerShell.exe, PowerShell_ISE.exe and System.Management.Automation.dll.
If you can, use wildcard in your ESET rules:
*powershell*
*powershell_ise*
*system.management.automation*
Send me a PM and I will explain further.