Windows_Security
Level 24
Thread author
Verified
Honorary Member
Top Poster
Content Creator
Well-known
- Mar 13, 2016
- 1,298
Inspired on Joanna Rutkowska post.
Could not find the blog of her anymore, but soon after VISTA was introduced she posted a blog on how she used new mechanisms, it involved Running Applications under a different user, (as Basic USer) Access Control List restrictions on folders. I added UAC (block elevation of unsigned processes), replaced SRP with AppLocker and made it more granular and added Windows 7 Parental Control and MemProtect to the mix. Thanks to @ichito here is Joanna's blog: The Invisible Things Lab's blog: Running Vista Every Day! scroll down to "User Interface Privilege Isolation and some little Fun"
Added Basic (limited) User for:
- Secure_Surfer: Browsing with Firefox (completely sandboxed with Run as other user & AppLocker)
- Backup_User: Backup with Syncback Free (is only user allowed to touch Quick Backup Folders)
Hardening through Group Policy & registry tweaks:
- Windows Firewall rules locked in GPO
- Macro's, plugins etc disabled in Office and Office programs only allowed to open/save to Downloads and My Documents (data partition)
- disabled 16 bits, gadgets, IE and other stuff I don't need like remote access/assistance/desktop/sharing etcetera
- Disabled Windows Script (other script/shells locked down with AppLocker)
- UAC-tweak: only allow signed programs to elevate
Hardening with Access Control Lists (ACL)
- Only allow admins to add folders/files in root directories of SSD/HDD's
- Added a "Deny traverse folder/execute" to UAC-holes in %WINDOWS% (also blocked by AppLocker)
- Added a "Deny traverse folder/execute & append/write data" to (all users) Startup Folders
- Added a "Deny traverse folder/execute" in all user folders (and other partition subfolders)
- Added a "Deny traverse folder/execute" to all internet facing folders in AppData subfolders
- Only allow "Backup_User" to CWX (create write delete) my quick backup folders (ransomware protection)
ISP-version of F-SECURE
- exclude folders %WINDOWS% and %PROGRAMFILES% from virusscan and deepguard
- added all user folders to ransomware protection
AppLocker rules
- Allow Everyone in Windows & Program Files, except UAC holes an unused Microsoft programs
- Allow Admins to update Microsoft, Mozilla, Google and F-Secure signed from user folders
- Deny Everyone to execute in Windows Folder except Microsoft signed
- Deny Everyone to execute in Chrome Folder execept Google signed
- et cetera
- Sandbox limited/standard users (Backup_User only allow only SyncBack, Secure_Surfer only Firefox)
= Joanna's user privilege isolation idea
Could not find the blog of her anymore, but soon after VISTA was introduced she posted a blog on how she used new mechanisms, it involved Running Applications under a different user, (as Basic USer) Access Control List restrictions on folders. I added UAC (block elevation of unsigned processes), replaced SRP with AppLocker and made it more granular and added Windows 7 Parental Control and MemProtect to the mix. Thanks to @ichito here is Joanna's blog: The Invisible Things Lab's blog: Running Vista Every Day! scroll down to "User Interface Privilege Isolation and some little Fun"
Added Basic (limited) User for:
- Secure_Surfer: Browsing with Firefox (completely sandboxed with Run as other user & AppLocker)
- Backup_User: Backup with Syncback Free (is only user allowed to touch Quick Backup Folders)
Hardening through Group Policy & registry tweaks:
- Windows Firewall rules locked in GPO
- Macro's, plugins etc disabled in Office and Office programs only allowed to open/save to Downloads and My Documents (data partition)
- disabled 16 bits, gadgets, IE and other stuff I don't need like remote access/assistance/desktop/sharing etcetera
- Disabled Windows Script (other script/shells locked down with AppLocker)
- UAC-tweak: only allow signed programs to elevate
Hardening with Access Control Lists (ACL)
- Only allow admins to add folders/files in root directories of SSD/HDD's
- Added a "Deny traverse folder/execute" to UAC-holes in %WINDOWS% (also blocked by AppLocker)
- Added a "Deny traverse folder/execute & append/write data" to (all users) Startup Folders
- Added a "Deny traverse folder/execute" in all user folders (and other partition subfolders)
- Added a "Deny traverse folder/execute" to all internet facing folders in AppData subfolders
- Only allow "Backup_User" to CWX (create write delete) my quick backup folders (ransomware protection)
ISP-version of F-SECURE
- exclude folders %WINDOWS% and %PROGRAMFILES% from virusscan and deepguard
- added all user folders to ransomware protection
AppLocker rules
- Allow Everyone in Windows & Program Files, except UAC holes an unused Microsoft programs
- Allow Admins to update Microsoft, Mozilla, Google and F-Secure signed from user folders
- Deny Everyone to execute in Windows Folder except Microsoft signed
- Deny Everyone to execute in Chrome Folder execept Google signed
- et cetera
- Sandbox limited/standard users (Backup_User only allow only SyncBack, Secure_Surfer only Firefox)
= Joanna's user privilege isolation idea
Last edited: