Search the Community
Showing results for tags 'policies'.
-
GUI to Manage Software Restriction Policies and harden Windows Home OS. Hard_Configurator ver. 6.0.0.0 (October 2021) This version supports also Windows 11. Please note: From the ver. 5.1.1.1, the Recommended Settings on Windows 8+ works differently as compared to ver. 5.0.0.0 (and prior). From the ver. 5.1.1.1, the Recommended Settings and some other predefined setting profiles use = ON, which whitelists the EXE and MSI files in ProgramData and user AppData folders (other files are blocked like in ver. 5.0.0.0). If one is happy with blocking the EXE and MSI files in ProgramData and user AppData folders, then it is necessary to set = OFF. From version 4.1.1.1 (July 2019) Hard_Configurator installer and all its executables are signed with "Certum Code Signing CA SHA2" certificate (Open Source Developer Andrzej Pluta). Version 6.0.0.0 (stable) 1. Introduced two color-changing buttons. When the restrictions are OFF, the buttons <Switch OFF/ON SRP> and <Switch OFF/ON Restrictions> change the background color from green to blue. 2. Fixed some minor bugs. 3. Added finger.exe to blocked sponsors and also to the H_C Enhanced profiles. 4. Added some EXE files to FirewallHardening LOLBin Blocklist: csc, cvtres, CasPol, finger, ilasm, jsc, Microsoft.Workflow.Compiler, mscorsvw, ngen, ngentask, vbc. 5. Added SLK and ELF file extensions to the default protected extensions in SRP and RunBySmartscreen. 6. Added a switch -p to run H_C and SwitchDefaultDeny with SRP enforcement to block all users (including Administrators) - it can be used especially on the older Windows versions to improve post-exploitation protection on default Admin account. This switch should be used only by very experienced users. 7. New version of ConfigureDefender: - Added some useful information to the Help and manual. - Added "Send All" setting to Automatic Sample Submission. - Updated ASR rules (1 new rule added). - Added the Warn mode to ASR rules. - Added INTERACTIVE Protection Level which uses ASR rules set to Warn. - Added the <Info> button next to the Protection Levels buttons. It displays information about which settings are enabled in DEFAULT, HIGH, INTERACTIVE, and MAX Protection Levels. - Redesigned slightly the layout of the Exploit Guard section. - Added support for event Id=1120. - Added CFA setting BDMO = Block Disk Modifications Only - folders will not be protected, but some important disk sectors will be still protected (Id = 1127). 8. Added support for Windows 11. [hide][Hidden Content]]
-
- 1
-
- hard
- configurator
-
(and 5 more)
Tagged with:
-
Evasor The Evasor is an automated security assessment tool which locates existing executables on the Windows operating system that can be used to bypass any Application Control rules. It is very easy to use, quick, saves time, and fully automated which generates for you a report including description, screenshots and mitigations suggestions, suites for both blue and red teams in the assessment of a post-exploitation phase. Usage instructions Download the Evasor project and compile it. Verify to exclude from the project the App.config file from the reference tree. [hide][Hidden Content]]