For UniGetUI :
even if I have disbaled or desactivated all powershell lines (4) HC_Recommanded in FirewallHardening.
View attachment 289253
View attachment 289252 And when I lock MinimalFirewall, why this error ? SRP Policy Scope, High or Standard, the same...
Of course not.Ha. Ha.
Does it also block the .gif examples of ClickFix attacks?![]()
******** WDAC blocked events for EXE and DLL files ********
***********************************************************
Event[0]:
Event Id = 3077
Local Time: 2025/06/26 15:47:42
Attempted Path = %UserProfile%\AppData\Local\Temp\UniGetUI\ElevatedWinGetTemp\WinGet\WinSCP.WinSCP.6.5.2\download.exe
Parent Process = C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.26.400.0_x64__8wekyb3d8bbwe\winget.exe
PolicyName = UserSpace Lock
UserWriteable = true
***********************************************************
***********************************************************
@Andy Ful, check out the GIF I recorded for you to see.WHHLight package vs. FileFix attack
Similarly to ClickFix method, this attack can be mainly prevented by FirewallHardening.
malwaretips.com
cybersecuritynews.com
Once the victim double-clicked the attachment, Windows treated it as a compressed folder exposing a single shortcut.
The shortcut’s icon mimicked a contract update, but its target invoked PowerShell with hidden-window parameters, searching the disk for the parent polyglot and launching it through rundll32.exe.
A benign spreadsheet was simultaneously extracted to %TEMP% and opened, masking the compromise with an authentic-looking document.
@Andy Ful, Could you integrate ConfigureDefender and FirewallHardening into the WHHLight interface for convenient access, similar to H_C?
I always start with WHHLight first, as it would block the most or more than others, right? It would then be more convenient to access other tools from the WHHLight interface. I can simply create a WHHLight link in Biniware Run rather than minimizing windows and reaching the desktop.I could. However, objectively speaking, this would not be more convenient.
Currently, you have one shortcut on the Desktop that gives direct access to ConfigureDefender and FirewallHardening (without running WHHLight) via a folder opened in File Explorer. Why would you want to choose a longer path and run WHHLight first, and then ConfigureDefender or FirewallHardening?
The H_C installation folder contains many files, so finding ConfigureDefender or FirewallHardening in the opened folder would be rather inconvenient.
I always start with WHHLight first, as it would block the most or more than others, right? It would then be more convenient to access other tools from the WHHLight interface. I can simply create a WHHLight link in Biniware Run rather than minimizing windows and reaching the desktop.
Can you safely pin WHHLight or H_C icons to the taskbar?
Does WHHLight apply less hardening than H_C, as WHHLight includes WDAC?
Then, it would be the same—reaching the desktop vs. reaching the Biniware Run icon—to access "each" WHHLight tool.The solution would be adding ConfigureDefender and FirewallHardening to Biniware Run.
WHHLight shows another instance/icon on the taskbar when you access the pinned one. Could you explain why?Yes. You can use the right-click Explorer context menu to pin any executable to the taskbar (Properties >> Show more options >> Pin to taskbar) or create the shortcut on the Desktop.
So the SRP blocking/hardening experience would be more or less the same with both WHHLight and H_C except for EXE and MSI files. Correct? WHHLight has a slight advantage in the sense that you get additional cloud reputation with WDAC.Less SRP hardening for EXE and MSI files (covered by WDAC).
I agree both integrated and individual ways have pros and cons.For now, I like the idea of WHHLight package of a few independent tools, instead of the WHHLight application with integrated tools. This has some pros and cons.
"We'll be getting back to you soon enough!"I do not exclude the possibility of integration in the future.![]()
WHHLight shows another instance/icon on the taskbar when you access the pinned one.
So the SRP blocking/hardening experience would be more or less the same with both WHHLight and H_C except for EXE and MSI files.
WHHLight has a slight advantage in the sense that you get additional cloud reputation with WDAC.
I believe H_C/WHHLight suites, paired with their recommended tools, offer better protection than ComodoFW, Comodo's proactive configuration, disabled HIPS, and containment.