- Oct 3, 2022
- 557
Hello Everyone,
Tbis is my Xmas rework of my aging PC.
Main components:
- hardenwindows11forsecurity.com hardening - disables unneeded services and network protocols and old security protocols
- Comodo Internet Security beta 2024 with Auto Containment (which I hope is as effective as Xcitium version)
- WDAC block rules for LoL.bins and blocks any foreign unsigned exe's ( 2nd layer to CIS )
- ReviOS os minimization. Minimization is a security approach - strips away unneeded technologies.
Standard account is further hardened removing Powershell, regedit and mmc access. (Least Privilege Principle) I don't care if there are built in security to these apps. They aren't, in MS terms, a security barrier. And the hardenwindows11 site further disables the Secondary Logon service and makes UAC default deny for standard accounts. So any attacker that lands onto the machine will land into this account, because I use it all the time, and should be contained inside. Granted my red team uses network + memory attacks mostly, but precautions precautions precautions.
Maybe I'll get another license for CyberLock for this machine. ( just as another layer )
ReviOS really sped up this old 3rd gen i5. No malfunction of Windows that I have discovered so far. The only thing I don't like is that it took away Virtualization-based Security. My cpu does support it. And the documentation says there is a Revision Tool that can re-enable things but I can't find a compiled exe, only source code. Maybe there was a checkbox that I could have unchecked. I will have another go at this.
EDIT. I reset Windows and had another go at configuring ReviOS. Nope, didn't miss any checkboxes. I miss that comfy feeling that "hardware virtualization" gives me.
Tbis is my Xmas rework of my aging PC.
Main components:
- hardenwindows11forsecurity.com hardening - disables unneeded services and network protocols and old security protocols
- Comodo Internet Security beta 2024 with Auto Containment (which I hope is as effective as Xcitium version)
- WDAC block rules for LoL.bins and blocks any foreign unsigned exe's ( 2nd layer to CIS )
- ReviOS os minimization. Minimization is a security approach - strips away unneeded technologies.
Standard account is further hardened removing Powershell, regedit and mmc access. (Least Privilege Principle) I don't care if there are built in security to these apps. They aren't, in MS terms, a security barrier. And the hardenwindows11 site further disables the Secondary Logon service and makes UAC default deny for standard accounts. So any attacker that lands onto the machine will land into this account, because I use it all the time, and should be contained inside. Granted my red team uses network + memory attacks mostly, but precautions precautions precautions.
Maybe I'll get another license for CyberLock for this machine. ( just as another layer )
ReviOS really sped up this old 3rd gen i5. No malfunction of Windows that I have discovered so far. The only thing I don't like is that it took away Virtualization-based Security. My cpu does support it. And the documentation says there is a Revision Tool that can re-enable things but I can't find a compiled exe, only source code. Maybe there was a checkbox that I could have unchecked. I will have another go at this.
EDIT. I reset Windows and had another go at configuring ReviOS. Nope, didn't miss any checkboxes. I miss that comfy feeling that "hardware virtualization" gives me.
Last edited: