Advanced Security Thales' Config 2023

Last updated
Jan 8, 2023
Use case
Private use
Desktop OS
Windows 10
Device encryption
BitLocker (Windows)
Login unlock
    • Passwordless (PIN or Biometrics)
OS updates
Automatic updates
User Access Control
Always notify
WiFi network security
Router firewall: ON
Firmware: up-to-date
Malware protection
  1. Defender (Manually configured via GPO) (Description in the first post!)
  2. Syshardener
  3. Group Policy Settings (Description in the first post!)
  4. SRP (Description in the first post!)
Firewall protection
Microsoft Defender Firewall for Windows 11 / 10
Custom security info
Description in the first post!
Periodic scanners
Eset Online Scanner
Malware samples
I do not participate in malware testing.
Default browser / extensions
Edge: NONE
Secure DNS
Edge: NextDNS
VPN
Nope
Password manager
Keepass
Maintenance tools
Wise Disk Cleaner Free (Auto clean-up weekly)
Personal backup
Google Drive, Dropbox, Box, MEGA: Sync by Goodsync
Backup frequency
Manual
Recovery backup
AOMEI backupper PRO
Encrypted with random password.

Goodsync
Recovery plan integrity
Many successful results with my recovery plan
Risk factors
    • Browsing to popular websites
    • Working from home
    • Opening email attachments
    • Buying from online stores, entering banks card details
    • Logging into my bank account
    • Downloading software and files from reputable sites
    • Sharing and receiving files and torrents
    • Gaming
    • Streaming audio/video content from trusted sites or paid subscriptions
Computer specs
Feedback response

Critical feedback appreciated. If applicable, looking to make major changes.

Thales

Level 14
Thread author
Verified
Top Poster
Well-known
Nov 26, 2017
682
Block executable content from email client and webmail
BE9BA2D9-53EA-4CDC-84E5-9B1EEEE46550
Block all Office applications from creating child processes
D4F940AB-401B-4EFC-AADC-AD5F3C50688A
Block Office applications from creating executable content
3B576869-A4EC-4529-8536-B80A7769E899
Block Office applications from injecting code into other processes
75668C1F-73B5-4CF0-BB93-3ECF5CB7CC84
Block JavaScript or VBScript from launching downloaded executable content
D3E037E1-3EB8-44C8-A917-57927947596D
Block execution of potentially obfuscated scripts
5BEB7EFE-FD9A-4556-801D-275E5FFC04CC
Block Win32 API calls from Office macro
92E97FA1-2EDF-4476-BDD6-9DD0B4DDDC7B
Block executable files from running unless they meet a prevalence, age, or trusted list criterion
01443614-CD74-433A-B99E-2ECDC07BFC25
Use advanced protection against ransomware
C1DB55AB-C21A-4637-BB3F-A12568109D35
Block credential stealing from the Windows local security authority subsystem (lsass.exe)
9E6C4E1F-7D60-472F-BA1A-A39EF669E4B2
Block process creations originating from PSExec and WMI commands
D1E49AAC-8F56-4280-B9BA-993A6D77406C
Block untrusted and unsigned processes that run from USB
B2B3F03D-6A65-4F7B-A9C7-1C7EF74A9BA4
Block Office communication application from creating child processes
26190899-1602-49E8-8B27-EB1D0A1CE869
Block Adobe Reader from creating child processes
7674BA52-37EB-4A4F-A9A1-F0F9A1619A2C
Block persistence through WMI event subscription
E6DB77E5-3DF2-4CF1-B95A-636979351E5B.

Do not display network selection UI Enabled
Enumerate local users on domain-joined computers Disabled
Enumerate administrator accounts on elevation Disabled
Require trusted path for credential entry Enabled
Prevent the use of security questions for local accounts Enabled
Disable or enable software Secure Attention Sequence Disabled
Sign-in last interactive user automatically after a system-initiated restart Disabled
Interactive logon: Do not require CTRL+ALT+DEL Disabled

Boot-Start Driver Initialization Policy Enabled
Choose the boot-start drivers that can be initialized: Good and unknown

Turn off Microsoft Defender Antivirus Disabled
Configure detection for potentially unwanted applications Enabled
Configure local setting override for reporting to Microsoft MAPS Disabled
Configure the ‘Block at First Sight’ feature Enabled
Join Microsoft MAPS Enabled
Send file samples when further analysis is required Enabled
Configure extended cloud check Enabled
Specify the extended cloud check time in seconds: 50
Select cloud protection level Enabled
Select cloud blocking level: High blocking level or Zero Tolerance

Turn off real-time protection Disabled
Turn on behavior monitoring Enabled
Scan all downloaded files and attachments Enabled
Monitor file and program activity on your computer Enabled
Turn on raw volume write notifications Enabled
Turn on process scanning whenever real-time protection is enabled Enabled
Define the maximum size of downloaded files and attachments to be scanned Enabled
Configure local setting override for turn on behavior monitoring Disabled
Configure local setting override for scanning all downloaded files and attachments Disabled
Configure local setting override for monitoring file and program activity on your computer Disabled
Configure local setting override to turn on real-time protection Disabled
Configure local setting override for monitoring for incoming and outgoing file activity Disabled
Configure monitoring for incoming and outgoing file and program activity Enabled (Both)

Check for the latest virus and spyware definitions before running a scheduled scan Enabled
Scan archive files Enabled
Scan packed executables Enabled
Scan removable drives Enabled
Turn on e-mail scanning Enabled
Turn on heuristics Enabled
Configure detection for potentially unwanted application Enabled
Configure Windows Defender smartscreen Enabled

BitLocker Drive Encryption
Choose drive encryption method and cipher strength

Select the encryption method for operating system drives: XTS AES 256-bit
Select the encryption method for fixed data drives: XTS AES 256-bit
Select the encryption method for removable data drives: AES-CBC 256-bit
Disable new DMA devices when this computer is locked Enabled
Prevent memory overwrite on restart Disabled

Fixed Data Drives
Choose how BitLocker-protected removable drives can be recovered Enabled

Allow data recovery agent
Allow 48-digit recovery password
Allow 256-bit recovery key
Save BitLocker recovery information to AD DS for operating system drives
Backup recovery passwords and key packages
Configure use of passwords for fixed data drives Enabled
Allow password complexity
Minimum password length for fixed data drive: 14
Operating System Drives
Allow devices compliant with InstantGo or HSTI to opt out of pre-boot PIN. Disabled
Allow Secure Boot for integrity validation Enabled
Choose how BitLocker-protected operating system drives can be recovered Enabled

Allow data recovery agent
Allow 48-digit recovery password
Allow 256-bit recovery key
Save BitLocker recovery information to AD DS for operating system drives
Store recovery passwords and key packages
Configure minimum PIN length for startup Enabled
Minimum characters: 14
Configure use of passwords for operating system drives Enabled
Allow password complexity
Minimum password length for operating system drive: 14
Disallow standard users from changing the PIN or password Enabled
Require additional authentication at startup Enabled

UNCHECKED Allow BitLocker without a compatible TPM (requires a password or a startup key on a USB flash drive)
Allow TPM
Allow startup PIN with TPM
Allow startup key with TPM
Allow startup key and PIN with TPM
Reset platform validation data after BitLocker recovery Enabled

Removable Data Drives

Choose how BitLocker-protected removable drives can be recovered Enabled
Allow data recovery agent
Allow 48-digit recovery password
Allow 256-bit recovery key
Omit recovery options from the BitLocker setup wizard
Save BitLocker recovery information to AD DS for operating system drives
Backup recovery passwords and key packages
Do not enable BitLocker until recovery information is stored to AD DS for operating system drives
Configure use of passwords for fixed data drives Enabled
Allow password complexity
Minimum password length for fixed data drive: 14
Control use of BitLocker on removable drives Enabled
Allow users to apply BitLocker protection on removable data drives
Allow users to suspend and decrypt BitLocker on removable data drives

Prevent access to 16-bit applications Enabled
 
Last edited:

Thales

Level 14
Thread author
Verified
Top Poster
Well-known
Nov 26, 2017
682
Also,

Periodic security scanners: is for 3rd party tools, not the scanner of Your real-time product. You may add KVRT, EmsiSoft EK, ...
Yes I know but Microsoft Defender has an option to use as periodic scanner.
My real-time product is F-Secure SAFE.
1644602278362.png

1644602365143.png
 

Thales

Level 14
Thread author
Verified
Top Poster
Well-known
Nov 26, 2017
682
Expired my Enpass subscription.

I use Keepass again.
3 plugins, no browser extension.

Dropped Adblock plus.
I needed the adblocker because of YouTube ads (Nextdns removed the rest) but now I'm a premium subscriber, so I don't need it anymore.
 

Thales

Level 14
Thread author
Verified
Top Poster
Well-known
Nov 26, 2017
682
Changed to Chrome a couple of weeks ago.

Deleted Keepass!
Now I use Spreadsheet (WPS) inside the veracrypt container which is encrypted with AES, Serpent, Twofish.
I use Chrome to remember non-important passwords, so I rarely need to open the password database. I just need a new TOTP app.

This is experimental, if I find it very inconvenient I'm gonna go back to Keepass.
 
Last edited:

Thales

Level 14
Thread author
Verified
Top Poster
Well-known
Nov 26, 2017
682
I removed DefenderUI and changed the settings in gpedit.

MAPS: Advanced
Block at First sight Enabled
Cloud Protection Level: Zero tolerance
Extended cloud check: 50 sec
Configure detection for potentially unwanted applications Block

Huawei drivers blocked my core isolation, so I had to delete them manually but now it works
 

Thales

Level 14
Thread author
Verified
Top Poster
Well-known
Nov 26, 2017
682
I use EasUs todo backup free again. It has new design and the speed of the backup is good.
The backup is encrypted with random password.
 
  • Like
Reactions: Nevi and harlan4096

Thales

Level 14
Thread author
Verified
Top Poster
Well-known
Nov 26, 2017
682
This is a simple excel/wps (spreadsheet) You can hide the password with asterisk by formatting the cells.

However in wps you can also hide the password but it shows empty cells compared to the excel's asterisk.
 
Last edited:
  • Like
Reactions: Nevi and CyberTech

Thales

Level 14
Thread author
Verified
Top Poster
Well-known
Nov 26, 2017
682
Little changes on my system (in gpedit)

Configured ASR rules manually (set to 1/Block)
Block executable content from email client and webmail
Block all Office applications from creating child processes
Block Office applications from creating executable content
Block Office applications from injecting code into other processes
Block JavaScript or VBScript from launching downloaded executable content
Block execution of potentially obfuscated scripts
Block Win32 API calls from Office macro
Block executable files from running unless they meet a prevalence, age, or trusted list criterion
Use advanced protection against ransomware
Block credential stealing from the Windows local security authority subsystem (lsass.exe)
Block process creations originating from PSExec and WMI commands
Block untrusted and unsigned processes that run from USB
Block Office communication application from creating child processes
Block Adobe Reader from creating child processes

Turn off real time protection is Disabled
Allows to configure remote access to computers by using Remote Desktop Services. Disabled
Allow log on through Remote Desktop Services Empty
Prevent users from modifying app and browser settings Enabled
 
Last edited:

Asterixpl

Level 11
Verified
Mar 19, 2022
527
I use EasUs todo backup free again. It has new design and the speed of the backup is good.
The backup is encrypted with random password.

You are using the Free version. In my case, this program had problems restoring partitions. That's why I don't use it. But that was a few years ago. Maybe it's different now.
How does it work now?
 
  • Like
Reactions: Nevi and Thales

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top