Jump to content
YOUR-AD-HERE
HOSTING
TOOLS

Locked Hard Configurator - GUI to Manage Software Restriction Policies


itsMe

Recommended Posts

This is the hidden content, please

GUI to Manage Software Restriction Policies and harden Windows Home OS.

Hard_Configurator ver. 6.0.0.0 (October 2021)

This version supports also Windows 11.

Please note: From the ver. 5.1.1.1, the Recommended Settings on Windows 8+ works differently as compared to ver. 5.0.0.0 (and prior). From the ver. 5.1.1.1, the Recommended Settings and some other predefined setting profiles use = ON, which whitelists the EXE and MSI files in ProgramData and user AppData folders (other files are blocked like in ver. 5.0.0.0). If one is happy with blocking the EXE and MSI files in ProgramData and user AppData folders, then it is necessary to set = OFF.

From version 4.1.1.1 (July 2019) Hard_Configurator installer and all its executables are signed with "Certum Code Signing CA SHA2" certificate (Open Source Developer Andrzej Pluta).

Version 6.0.0.0 (stable)
1. Introduced two color-changing buttons. When the restrictions are OFF, the buttons <Switch OFF/ON SRP> and <Switch OFF/ON
Restrictions> change the background color from green to blue.
2. Fixed some minor bugs.
3. Added finger.exe to blocked sponsors and also to the H_C Enhanced profiles.
4. Added some EXE files to FirewallHardening LOLBin Blocklist: csc, cvtres, CasPol, finger, ilasm, jsc, Microsoft.Workflow.Compiler,
   mscorsvw, ngen, ngentask, vbc.
5. Added SLK and ELF file extensions to the default protected extensions in SRP and RunBySmartscreen.
6. Added a switch -p to run H_C and SwitchDefaultDeny with SRP enforcement to block all users (including Administrators) - it can be
   used especially on the older Windows versions to improve post-exploitation protection on default Admin account. This switch should
   be used only by very experienced users.
7. New version of ConfigureDefender:
- Added some useful information to the Help and manual.
- Added "Send All" setting to Automatic Sample Submission.
- Updated ASR rules (1 new rule added).
- Added the Warn mode to ASR rules.
- Added INTERACTIVE Protection Level which uses ASR rules set to Warn.
- Added the <Info> button next to the Protection Levels buttons. It displays information about which settings are enabled in DEFAULT,
  HIGH, INTERACTIVE, and MAX Protection Levels.
- Redesigned slightly the layout of the Exploit Guard section.
- Added support for event Id=1120.
- Added CFA setting BDMO = Block Disk Modifications Only - folders will not be protected, but some important disk sectors will be
  still protected (Id = 1127).
8. Added support for Windows 11.

This is the hidden content, please

Link to comment
Share on other sites

Guest
This topic is now closed to further replies.
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.