cruelsister
Level 43
Thread author
Verified
Honorary Member
Top Poster
Content Creator
Well-known
Forum Veteran
By necessity this turned into a brief review.
BRN should be informed ASAP before the end of Version 4.x.x..BRN should be made aware of this video.
Malicious macros can also be used to enable\disable Windows services - and not just digitally signed malware while running AppGuard in Protected mode.
There are a couple of simple things that can be done to hinder this:
Windows Task Scheduler (at.exe) and scheduled tasks (schtask.exe) are both already in AppGuard User Space - so no need to add them.
- Add sc.exe (command line utility to modify Windows Services) to User Space (AppGuard will block sc.exe launch during both Automatic Maintenance during system idle or manual Automatic Maintenance; sc.exe is used during system maintenance - so not recommended).
- Add powershell.exe and powershell_ise.exe to User Space.
- Disable macros in Microsoft Office, Kingsoft WPS and Softmaker Office.
- Set UAC to maximum setting.
Nice video CS...
BRN should be informed ASAP before the end of Version 4.x.x..
Anyone have gone to BRN support?!
Powershell and rundll32 is already included in guarded apps, will that work?!
From what I gather from the discussions in Wilders forum, the video exposed not a bug or bugs, but rather a design "flaw" of AppGuard, especially regarding the Protected mode and Trusted Publishers List.