Umbra Corp. Laboratory (VM config)

D

Deleted member 178

Thread author
---------------------------------------------------------------------
Real-time protection:
Main Local Anti-Virus: Gdata.
Main Cloud Anti-Virus:
Main Firewall : /
Main HIPS : /
Main Behavior Blocker : Gdata
Main Anti-Logger: /
Main Registry Watcher: /
----------------------------------------------------------------------
On-demand scanners:
Local: Comodo Cleaning Essential, MBAM, EAM free
Cloud: Hitman Pro
----------------------------------------------------------------------
Web/Network Protection:
Web Shield/URL Filter: Gdata
Domain manager:/
Dedicated Anti-Spyware: /
DNS Server: Comodo DNS
VPN: /
----------------------------------------------------------------------
Additionnal Protection
UAC: Maximum
Apps Protection: /
File Protection: /
Autorun Protection: /
Email Protection Gdata
Document Protection: /
USB Protection: /
Identity Protection/Banking Protection:/
Sandbox /
Virtualization /
Rollback: /
----------------------------------------------------------------------
System Reinforcement
Apps Hardening : /
HOSTS File Hardening/optimizing : /
Encryption: /
----------------------------------------------------------------------
Monitoring
Process Monitor: Comodo Killswitch, Process Hacker, Emsisoft Hijack Free
Startup/Registry Manager: Comodo Autoruns
System Utility : /
----------------------------------------------------------------------
 

Ink

Administrator
Verified
Staff Member
Well-known
Jan 8, 2011
22,361
I'm assuming you use snapshots in the VM software too, so when someone asks "do you have a backup solution". ... :rolleyes:

As for this special config, it will change often, so no need to comment further.
 
I

illumination

Thread author
This is one of those "satisfaction will never be attained things". It is not that Umbra could not secure his system with his knowledge and from all his testing, it is that he would become incredibly bored if he did not keep changing and testing! ;)
 

McLovin

Level 76
Verified
Honorary Member
Malware Hunter
Apr 17, 2011
9,222
Earth said:
I'm assuming you use snapshots in the VM software too, so when someone asks "do you have a backup solution". ... :rolleyes:

Yeah, that I kinda figured this time :p

Looks quite good.
 
P

Plexx

Thread author
Stranger said:
At least he get rid of comodo, maybe its temporary and on VM :p

He went ESET route for awhile due to its lightness but that will only last until OAP doesn't give him a BSOD.
 
D

Deleted member 178

Thread author
thewolfsmith72 said:
This is one of those "satisfaction will never be attained things". It is not that Umbra could not secure his system with his knowledge and from all his testing, it is that he would become incredibly bored if he did not keep changing and testing! ;)

very true :p

loveboy_lion said:
may be he is testing compatibility between both ESET and Returnil or just testing Eset

testing Returnil, it seems to mix Shadow Defender + Rollback RX at same time plus an RT AV...seeems interesting


Biozfear said:
Stranger said:
At least he get rid of comodo, maybe its temporary and on VM :p

He went ESET route for awhile due to its lightness but that will only last until OAP doesn't give him a BSOD.

That is also True ;)
 
D

Deleted member 178

Thread author
This VM config is basically a reflection of my main config unless i test some new apps and check the compatibility before adding them to my main config.
 
D

Deleted member 178

Thread author
Because my processor doesn't allow to run a second x64 system even on VM. and XP need less dedicated RAM than Win7

replaced: ESET by Gdata.
 

Ink

Administrator
Verified
Staff Member
Well-known
Jan 8, 2011
22,361
Windows XP is the best possible "worse-case scenario" for product testing.

MRF71 said:
Why not use windows 7 or 8 vs. XP?
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top