Forums
New posts
Search forums
News
Security News
Technology News
Giveaways
Giveaways, Promotions and Contests
Discounts & Deals
Reviews
Users Reviews
Video Reviews
Support
Windows Malware Removal Help & Support
Inactive Support Threads
Mac Malware Removal Help & Support
Mobile Malware Removal Help & Support
Blog
Log in
Register
What's new
Search
Search titles only
By:
Search titles only
By:
Reply to thread
Menu
Install the app
Install
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Forums
Security
Guides - Privacy & Security Tips
Software restriction Policies to Windows Home
Message
<blockquote data-quote="Andy Ful" data-source="post: 688248" data-attributes="member: 32260"><p>Hard_Configurator uses SRP with Default Security Level set to Basic User, but also uses some Disallowed/Unrestricted rules to stop shortcuts from executing EXE files from the User Space. <strong>Without those additional rules</strong>, the Default Security Level set to Basic User causes the loophole = <strong>shortcut can execute EXE file in the User Space that is not whitelisted.</strong></p><p>Did you try deactivating Controlled Folder Access, as I posted in my previous post? That would be the simplest way to check the impact of Controlled Folder Access on SRP.<img src="data:image/gif;base64,R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAAALAAAAAABAAEAAAIBRAA7" class="smilie smilie--sprite smilie--sprite109" alt=":)" title="Smile :)" loading="lazy" data-shortname=":)" /></p><p>See you later I must go out.<img src="data:image/gif;base64,R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAAALAAAAAABAAEAAAIBRAA7" class="smilie smilie--sprite smilie--sprite109" alt=":)" title="Smile :)" loading="lazy" data-shortname=":)" /></p></blockquote><p></p>
[QUOTE="Andy Ful, post: 688248, member: 32260"] Hard_Configurator uses SRP with Default Security Level set to Basic User, but also uses some Disallowed/Unrestricted rules to stop shortcuts from executing EXE files from the User Space. [B]Without those additional rules[/B], the Default Security Level set to Basic User causes the loophole = [B]shortcut can execute EXE file in the User Space that is not whitelisted.[/B] Did you try deactivating Controlled Folder Access, as I posted in my previous post? That would be the simplest way to check the impact of Controlled Folder Access on SRP.:) See you later I must go out.:) [/QUOTE]
Insert quotes…
Verification
Post reply
Top