Hi i want to know what are your opiniones about windows defender whith this new bulid, i want to know if it likes you or you think is better than before
Please provide comments and solutions that are helpful to the author of this topic.
Read more: What's new with Windows Security on the Windows 10 October 2018 UpdateThis time around, we're not getting significant features with the Windows Security app. However, Microsoft is introducing a lot of tweaks, minor changes, and visual improvements with the October 2018 Update that should help make the experience a little easier to use by everyone, which is also key to help keep devices and data secure against hackers and malware.
Application Guard does not work on Windows Home.
A 64-bit computer with minimum 4 cores (logical processors) is required for hypervisor and virtualization-based security (VBS).
Microsoft requires 8GB RAM and 5GB free disk space.
AG does not work if VirtualBox or VMWare are installed (only one hypervisor is allowed).
AG works on Windows 10 Enterprise edition version 1709+ and Windows 10 Professional edition version 1803+.
The user may use the following registry values to enable Application Guard on machines that aren't meeting the recommended hardware configuration:
HKLM\software\Microsoft\Hvsi\SpecRequiredProcessorCount - Default is 4 cores. HKLM\software\Microsoft\Hvsi\SpecRequiredMemoryInGB - Default is 8GB. HKLM\software\Microsoft\Hvsi\SpecRequiredFreeDiskSpaceInGB - Default is 5GB.
Windows Defender Application Guard (Windows 10)
System requirements for Windows Defender Application Guard (Windows 10)
Application Guard does not work on Windows Home.
A 64-bit computer with minimum 4 cores (logical processors) is required for hypervisor and virtualization-based security (VBS).
Microsoft requires 8GB RAM and 5GB free disk space.
AG does not work if VirtualBox or VMWare are installed (only one hypervisor is allowed).
AG works on Windows 10 Enterprise edition version 1709+ and Windows 10 Professional edition version 1803+.
The user may use the following registry values to enable Application Guard on machines that aren't meeting the recommended hardware configuration:
HKLM\software\Microsoft\Hvsi\SpecRequiredProcessorCount - Default is 4 cores. HKLM\software\Microsoft\Hvsi\SpecRequiredMemoryInGB - Default is 8GB. HKLM\software\Microsoft\Hvsi\SpecRequiredFreeDiskSpaceInGB - Default is 5GB.
Windows Defender Application Guard (Windows 10)
System requirements for Windows Defender Application Guard (Windows 10)
I tried out Kaspersky IS, Bitdefender IS, and Windows Defender, all on 1809.
It seems that Microsoft did some magic to make Windows Defender faster than before, and 3rd party AVs slower than before.
I did not run performance tests, I am just reporting on how it "feels".
KIS used to be faster than WD, but now it is the reverse. The difference is particularly noticeable when launching MS Office apps.
My conclusion: if you want a strong and fast config, use Windows Defender with ASR rules enabled, but don't max out any settings related to cloud scanning, because cloud scanning is slow.
And harden your OS with SysHardener.
And harden your OS with SysHardener.
Yeah, there is a lot of overlap if you enable all the sponsors in Hard_Configurator, but SysHardener does some other things, like turning off SMB and putting powershell in constrained language and other stuff.If one uses @Andy Ful 's Hard_Configurator, then a lot of the settings in SysHardener make no sense. For example, enforcing the launch of digitally signed files when SRP default block is being applied makes no sense... because the SRP isn't going to allow anything to launch, even if it is digitally signed. And making firewall block rules for processes that are disabled from launching is uttlerly pointless.
What I am saying is that blindly enabling default-deny using Hard_Configurator and SysHardener makes no sense... but we know a lot of people do it because they are blinded by paranoia.
Yeah, there is a lot of overlap if you enable all the sponsors in Hard_Configurator, but SysHardener does some other things, like turning off SMB and putting powershell in constrained language and other stuff.
They are both activated in the recommended H_C settings.Yeah, there is a lot of overlap if you enable all the sponsors in Hard_Configurator, but SysHardener does some other things, like turning off SMB and putting powershell in constrained language and other stuff.
Wait a minute, H_C puts powershell in constrained language? I didn't know that. It is part of "No powershell exe"?They are both activated in the recommended H_C settings.
No. This is the Windows built-in SRP feature available when SRP is set to default-deny - requires PowerShell 5.0+.Wait a minute, H_C puts powershell in constrained language? I didn't know that. It is part of "No powershell exe"?
Wait a minute, H_C puts powershell in constrained language? I didn't know that. It is part of "No powershell exe"?