Windows_Security
Level 24
Thread author
Verified
Honorary Member
Top Poster
Content Creator
Well-known
- Mar 13, 2016
- 1,298
First create a restore point before applying any of the tweaks mentioned in this post
Intro
On Wilders Security forum a well know member with the nickname Lucy (helas, she is not active anymore, hope she is well) posted a registry file to use Software Restriction Policies on Windows Home versions also. The update should add SRP to both 32 and 64 bits versions of Windows Home.
What is SRP?
SRP stands for Software Restriction Policies. As the name says it can be used to restrict software on your PC. It has basically three modes disallowed, basic user and unrestricted.
Why only Basic User?
This SRP uses Basic User as default level. This setup allows Administrators to overrule the execution restrictions enforces by Software Restriction Policies (SRP). Because all software which is already installed needs elvation to update itself, SRP basic User allows Windows and your already installed programs in Program Files to update themselves from user space.
What is the benefit of this SRP?
This SRP blocks program executions which are not initiated by the user of regular programs already installed. This covers 95% of all malware intrusions. This 5% risk is the price you pay for having Software Restriction Policies which still keep the Administrator at the steering will (being able to auto-update already installed and install new with right click 'run as administrator). I will provide two tips (which are free programs) to close the last 5 percent.
Add Symantect tweak for MSI installs
By default explorer has an option to run any executable with elevated priveledges by using the "Run as Administrator". Strangely Microsoft does not provice this option for MSI installers. Symantec came up with a registry tweak to also provide the option for running MSI files as Adminstrator (link)
Save the text between --- (do not include --- lines) as Add_Run_MSI_Admin.reg and run it
--- start
Windows Registry Editor Version 5.00
[HKEY_CLASSES_ROOT\Msi.Package\shell\runas\command]
@=hex(2):22,00,25,00,53,00,79,00,73,00,74,00,65,00,6d,00,52,00,6f,00,6f,00,74,\
00,25,00,5c,00,53,00,79,00,73,00,74,00,65,00,6d,00,33,00,32,00,5c,00,6d,00,\
73,00,69,00,65,00,78,00,65,00,63,00,2e,00,65,00,78,00,65,00,22,00,20,00,2f,\
00,69,00,20,00,22,00,25,00,31,00,22,00,20,00,25,00,2a,00,00,00
--- end
Add software restriction Policies
These SRP are the simplest in its form, they run Windows and Program Files folder for bot 32 and 64 bits as unrestricted, applies for all files (including extra's mentioned by @Av Gurus) and all users (except Administrator). I used windows variables %ProgramFiles%, %ProgramFiles(x86)% and %ProgramW6432% from this source and the GUID's for ProgramFiles, ProgramFilesX86 and ProgramFilesX64 from this source
Save the text between --- (do not include --- lines) as Add_SRP_Basic_User.reg and run it
--- start
Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Safer]
[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Safer\CodeIdentifiers]
"DefaultLevel"=dword:00020000
"TransparentEnabled"=dword:00000002
"PolicyScope"=dword:00000001
"ExecutableTypes"=hex(7):57,00,53,00,48,00,00,00,27,00,57,00,53,00,46,00,00,00,\
57,00,53,00,46,00,00,00,57,00,53,00,43,00,00,00,57,00,53,00,00,00,56,00,42,\
00,53,00,00,00,56,00,42,00,45,00,00,00,56,00,42,00,00,00,55,00,52,00,4c,00,\
00,00,53,00,48,00,53,00,00,00,53,00,43,00,54,00,00,00,53,00,43,00,52,00,00,\
00,52,00,45,00,47,00,00,00,50,00,53,00,31,00,00,00,50,00,49,00,46,00,00,00,\
50,00,43,00,44,00,00,00,4f,00,43,00,58,00,00,00,4d,00,53,00,54,00,00,00,4d,\
00,53,00,50,00,00,00,4d,00,53,00,49,00,00,00,4d,00,53,00,43,00,00,00,4d,00,\
44,00,45,00,00,00,4d,00,44,00,42,00,00,00,4c,00,4e,00,4b,00,00,00,4a,00,53,\
00,45,00,00,00,4a,00,53,00,00,00,4a,00,41,00,52,00,00,00,49,00,53,00,50,00,\
00,00,49,00,4e,00,53,00,00,00,49,00,4e,00,46,00,00,00,48,00,54,00,41,00,00,\
00,48,00,4c,00,50,00,00,00,45,00,58,00,45,00,00,00,43,00,52,00,54,00,00,00,\
43,00,50,00,4c,00,00,00,43,00,4f,00,4d,00,00,00,43,00,4d,00,44,00,00,00,43,\
00,48,00,4d,00,00,00,42,00,41,00,54,00,00,00,42,00,41,00,53,00,00,00,41,00,\
44,00,50,00,00,00,41,00,44,00,45,00,00,00
"AuthenticodeEnabled"=dword:00000000
[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Safer\CodeIdentifiers\0]
[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Safer\CodeIdentifiers\0\Hashes]
[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Safer\CodeIdentifiers\0\Paths]
[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Safer\CodeIdentifiers\131072]
[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Safer\CodeIdentifiers\131072\Paths]
[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Safer\CodeIdentifiers\131072\UrlZones]
[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Safer\CodeIdentifiers\262144]
[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Safer\CodeIdentifiers\262144\Paths]
[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Safer\CodeIdentifiers\262144\Paths\{6D809377-6AF0-444B-8957-A3773F02200E}]
"LastModified"=hex(b):14,1f,bd,58,7c,11,d2,01
"Description"="Program Files on 64 bits"
"SaferFlags"=dword:00000000
"ItemData"=hex(2):25,00,50,00,72,00,6f,00,67,00,72,00,61,00,6d,00,57,00,36,00,\
34,00,33,00,32,00,25,00,00,00
[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Safer\CodeIdentifiers\262144\Paths\{7C5A40EF-A0FB-4BFC-874A-C0F2E0B9FA8E}]
"LastModified"=hex(b):b2,19,7a,3d,7c,11,d2,01
"Description"="Program Files (x86) on 64 bits"
"SaferFlags"=dword:00000000
"ItemData"=hex(2):25,00,50,00,72,00,6f,00,67,00,72,00,61,00,6d,00,46,00,69,00,\
6c,00,65,00,73,00,28,00,78,00,38,00,36,00,29,00,25,00,00,00
[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Safer\CodeIdentifiers\262144\Paths\{905E63B6-C1BF-494E-B29C-65B732D3D21A}]
"LastModified"=hex(b):62,e4,e4,4e,7c,11,d2,01
"Description"="Program Files (default)"
"SaferFlags"=dword:00000000
"ItemData"=hex(2):25,00,50,00,72,00,6f,00,67,00,72,00,61,00,6d,00,46,00,69,00,\
6c,00,65,00,73,00,25,00,00,00
[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Safer\CodeIdentifiers\262144\Paths\{F38BF404-1D43-42F2-9305-67DE0B28FC23}]
"LastModified"=hex(b):28,e1,f9,62,79,11,d2,01
"Description"="Windows"
"SaferFlags"=dword:00000000
"ItemData"=hex(2):25,00,53,00,79,00,73,00,74,00,65,00,6d,00,52,00,6f,00,6f,00,\
74,00,25,00,00,00
--- end
Restart Windows
Intro
On Wilders Security forum a well know member with the nickname Lucy (helas, she is not active anymore, hope she is well) posted a registry file to use Software Restriction Policies on Windows Home versions also. The update should add SRP to both 32 and 64 bits versions of Windows Home.
What is SRP?
SRP stands for Software Restriction Policies. As the name says it can be used to restrict software on your PC. It has basically three modes disallowed, basic user and unrestricted.
Why only Basic User?
This SRP uses Basic User as default level. This setup allows Administrators to overrule the execution restrictions enforces by Software Restriction Policies (SRP). Because all software which is already installed needs elvation to update itself, SRP basic User allows Windows and your already installed programs in Program Files to update themselves from user space.
What is the benefit of this SRP?
This SRP blocks program executions which are not initiated by the user of regular programs already installed. This covers 95% of all malware intrusions. This 5% risk is the price you pay for having Software Restriction Policies which still keep the Administrator at the steering will (being able to auto-update already installed and install new with right click 'run as administrator). I will provide two tips (which are free programs) to close the last 5 percent.
Add Symantect tweak for MSI installs
By default explorer has an option to run any executable with elevated priveledges by using the "Run as Administrator". Strangely Microsoft does not provice this option for MSI installers. Symantec came up with a registry tweak to also provide the option for running MSI files as Adminstrator (link)
Save the text between --- (do not include --- lines) as Add_Run_MSI_Admin.reg and run it
--- start
Windows Registry Editor Version 5.00
[HKEY_CLASSES_ROOT\Msi.Package\shell\runas\command]
@=hex(2):22,00,25,00,53,00,79,00,73,00,74,00,65,00,6d,00,52,00,6f,00,6f,00,74,\
00,25,00,5c,00,53,00,79,00,73,00,74,00,65,00,6d,00,33,00,32,00,5c,00,6d,00,\
73,00,69,00,65,00,78,00,65,00,63,00,2e,00,65,00,78,00,65,00,22,00,20,00,2f,\
00,69,00,20,00,22,00,25,00,31,00,22,00,20,00,25,00,2a,00,00,00
--- end
Add software restriction Policies
These SRP are the simplest in its form, they run Windows and Program Files folder for bot 32 and 64 bits as unrestricted, applies for all files (including extra's mentioned by @Av Gurus) and all users (except Administrator). I used windows variables %ProgramFiles%, %ProgramFiles(x86)% and %ProgramW6432% from this source and the GUID's for ProgramFiles, ProgramFilesX86 and ProgramFilesX64 from this source
Save the text between --- (do not include --- lines) as Add_SRP_Basic_User.reg and run it
--- start
Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Safer]
[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Safer\CodeIdentifiers]
"DefaultLevel"=dword:00020000
"TransparentEnabled"=dword:00000002
"PolicyScope"=dword:00000001
"ExecutableTypes"=hex(7):57,00,53,00,48,00,00,00,27,00,57,00,53,00,46,00,00,00,\
57,00,53,00,46,00,00,00,57,00,53,00,43,00,00,00,57,00,53,00,00,00,56,00,42,\
00,53,00,00,00,56,00,42,00,45,00,00,00,56,00,42,00,00,00,55,00,52,00,4c,00,\
00,00,53,00,48,00,53,00,00,00,53,00,43,00,54,00,00,00,53,00,43,00,52,00,00,\
00,52,00,45,00,47,00,00,00,50,00,53,00,31,00,00,00,50,00,49,00,46,00,00,00,\
50,00,43,00,44,00,00,00,4f,00,43,00,58,00,00,00,4d,00,53,00,54,00,00,00,4d,\
00,53,00,50,00,00,00,4d,00,53,00,49,00,00,00,4d,00,53,00,43,00,00,00,4d,00,\
44,00,45,00,00,00,4d,00,44,00,42,00,00,00,4c,00,4e,00,4b,00,00,00,4a,00,53,\
00,45,00,00,00,4a,00,53,00,00,00,4a,00,41,00,52,00,00,00,49,00,53,00,50,00,\
00,00,49,00,4e,00,53,00,00,00,49,00,4e,00,46,00,00,00,48,00,54,00,41,00,00,\
00,48,00,4c,00,50,00,00,00,45,00,58,00,45,00,00,00,43,00,52,00,54,00,00,00,\
43,00,50,00,4c,00,00,00,43,00,4f,00,4d,00,00,00,43,00,4d,00,44,00,00,00,43,\
00,48,00,4d,00,00,00,42,00,41,00,54,00,00,00,42,00,41,00,53,00,00,00,41,00,\
44,00,50,00,00,00,41,00,44,00,45,00,00,00
"AuthenticodeEnabled"=dword:00000000
[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Safer\CodeIdentifiers\0]
[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Safer\CodeIdentifiers\0\Hashes]
[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Safer\CodeIdentifiers\0\Paths]
[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Safer\CodeIdentifiers\131072]
[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Safer\CodeIdentifiers\131072\Paths]
[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Safer\CodeIdentifiers\131072\UrlZones]
[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Safer\CodeIdentifiers\262144]
[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Safer\CodeIdentifiers\262144\Paths]
[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Safer\CodeIdentifiers\262144\Paths\{6D809377-6AF0-444B-8957-A3773F02200E}]
"LastModified"=hex(b):14,1f,bd,58,7c,11,d2,01
"Description"="Program Files on 64 bits"
"SaferFlags"=dword:00000000
"ItemData"=hex(2):25,00,50,00,72,00,6f,00,67,00,72,00,61,00,6d,00,57,00,36,00,\
34,00,33,00,32,00,25,00,00,00
[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Safer\CodeIdentifiers\262144\Paths\{7C5A40EF-A0FB-4BFC-874A-C0F2E0B9FA8E}]
"LastModified"=hex(b):b2,19,7a,3d,7c,11,d2,01
"Description"="Program Files (x86) on 64 bits"
"SaferFlags"=dword:00000000
"ItemData"=hex(2):25,00,50,00,72,00,6f,00,67,00,72,00,61,00,6d,00,46,00,69,00,\
6c,00,65,00,73,00,28,00,78,00,38,00,36,00,29,00,25,00,00,00
[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Safer\CodeIdentifiers\262144\Paths\{905E63B6-C1BF-494E-B29C-65B732D3D21A}]
"LastModified"=hex(b):62,e4,e4,4e,7c,11,d2,01
"Description"="Program Files (default)"
"SaferFlags"=dword:00000000
"ItemData"=hex(2):25,00,50,00,72,00,6f,00,67,00,72,00,61,00,6d,00,46,00,69,00,\
6c,00,65,00,73,00,25,00,00,00
[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Safer\CodeIdentifiers\262144\Paths\{F38BF404-1D43-42F2-9305-67DE0B28FC23}]
"LastModified"=hex(b):28,e1,f9,62,79,11,d2,01
"Description"="Windows"
"SaferFlags"=dword:00000000
"ItemData"=hex(2):25,00,53,00,79,00,73,00,74,00,65,00,6d,00,52,00,6f,00,6f,00,\
74,00,25,00,00,00
--- end
Restart Windows
Last edited: