Hard Configurator - kolejne narzędzie do tuningu bezpieczeństwa w Windows
#13
Od wczoraj nowa wersja - lista zmian za MT
Cytat:Hard_Configurator ver. 4.0.0.2 is available on GitHub:
  1. For Windows 64-bit: 

    [Aby zobaczyć linki, zarejestruj się tutaj]


  2. For Windows 32-bit:

    [Aby zobaczyć linki, zarejestruj się tutaj]

The executables were whitelisted by: Microsoft, Emsisoft, Symantec, Avast, and BitDefender.

What is new & corrected:
  1. Corrected the ability to whitelist OneDrive on SUA.

  2. Changed the way of using <Refresh Explorer> option to avoid problems on SUA.

  3. Added the warning before Hard_Configurator deinstallation, about using DocumentAntiExploit tool.

  4. Added the DocumentsAntiExploit tool to the SwitchDefaultDeny application, for managing different MS Office and Adobe Acrobat Reader XI/DC settings on different user accounts.

  5. In the 4.0.0.2 version the <Documents Anti-Exploit> option in Hard_Configurator can only change system-wide settings. Non-system-wide settings are now available only via DocumentsAntiExploit tool.

  6. Added IQY and SETTINGCONTENT-MS file extensions to the default list of Designated File Types and to the hardcoded dangerous extensions in RunBySmartScreen.

  7. Improved Shortcut protection.

  8. Improved the protection of MS Office and Adobe Acrobat Reader XI/DC applications, against the weaponized documents.

  9. Improved 'Run By SmartScreen' with over 250 blocked file extensions (SRP, Outlook Web Access, Gmail, and Adobe Acrobat Reader attachments blacklists). The extensions BAT, DLL, CMD, JSE, OCX, and VBE are now blocked with notification, instead of beeing checked by SmartScreen. Popular but vulnerable files (RTF, DOC, DOCX, XLS, XLSX, PUB, PPT, PPTX, ACCDB, PDF) related to MS Office and Adobe Reader, are opened with the warning instruction.

  10. Changed the names of some buttons in the TOOLS menu:
    <View Blocked Events> ---> <Blocked Events / Security Logs>
    <Run Autoruns: Scripts/UserSpace> ---> <Whitelist Autoruns / View Scripts>

  11. Changed 'Allow EXE' option in the <Whitelist by Path> to 'Allow EXE and TMP'. So, both EXE files and TMP files are whitelisted - this option is prepared to work with Avast Hardened Mode Aggressive as default-deny.

  12. Corrected the bug with <Update> button (did not work for the 64-bit version).

  13. Updated Hard_Configurator manual.

[Aby zobaczyć linki, zarejestruj się tutaj]

"Bezpieczeństwo jest podróżą, a nie celem samym w sobie - to nie jest problem, który można rozwiązać raz na zawsze"
"Zaufanie nie stanowi kontroli, a nadzieja nie jest strategią"
Odpowiedz


Wiadomości w tym wątku
RE: Hard Configurator - kolejne narzędzie do tuningu bezpieczeństwa w Windows - przez ichito - 20.11.2018, 10:40

Skocz do:


Użytkownicy przeglądający ten wątek: 2 gości