mirror of
https://github.com/TommyTran732/Windows-Setup.git
synced 2024-11-08 17:21:45 -05:00
82 lines
3.8 KiB
Markdown
82 lines
3.8 KiB
Markdown
# Virus & threat protection
|
|
|
|
## Virus & threat protection settings
|
|
|
|
### Cloud-delivered protection
|
|
|
|
This sends hashes and file paths to Microsoft. Whether to keep this on or not depends on the threat model. I recommend keeping it on on a domain controller and gaming machines.
|
|
|
|
One caveat with this is that if it takes the cloud too long to scan, the computer will just run the executable. Might wanna increase the timeout later to make it less theatric:
|
|
|
|
- https://learn.microsoft.com/en-us/mem/intune/protect/antivirus-microsoft-defender-settings-windows
|
|
- https://learn.microsoft.com/en-us/windows/client-management/mdm/policy-csp-defender#defender-cloudextendedtimeout
|
|
|
|
### Automatic Sample Submission
|
|
|
|
Should be turned off. Supposedly will prompt if the files it want to submit are document files, but why not just make it prompt for every file it wants to submit?
|
|
|
|
## Ransomware protection
|
|
|
|
Turn on Controlled folder access. This will protect certain dirs and prevent direct writes to the disk.
|
|
|
|
# Firewall & Network protection
|
|
|
|
Tick "Block incoming connections" for Domain network, Private network, and Public network.
|
|
|
|
# App & browser control
|
|
|
|
## Smart App Control
|
|
|
|
Smart App Control forces Smartscreen for apps & files to be on, which could lead to privacy issues. It can also break certain applications. Whether to keep this on or not depends on the threat model.
|
|
|
|
On a side note, this breaks WSL.
|
|
|
|
## Reputation-based protection
|
|
|
|
### Check apps and files.
|
|
|
|
This sends hashes and file paths to Microsoft. It will also sends the URL of where you download a program from to Microsoft. Whether to keep this on or not depends on the threat model.
|
|
|
|
### SmartScreen for Microsoft Edge
|
|
|
|
This setting is independent from Smart App Control. Extremely privacy invasive. Sends **FULL URLs** to Microsoft. Whether to keep this on or not depends on the threat model, though it probably should be off in most cases.
|
|
|
|
Consider scenarios where you use Proton Drive/Mega/PrivateBin which append the encryption key in the URL. Now you are sending both the URL and the key to Microsoft. Something that's supposed to be private / end-to-end encrypted now gets leaked just like that. Or if you use PHPMyAdmin with the username & password appended for logins - now you are leaking access to your database.
|
|
|
|
### Phishing protection
|
|
|
|
This is extremely invasive to the point where I do not think it's okay to keep it on under any circumstances, with any kind of threat model.
|
|
|
|
https://support.microsoft.com/en-us/topic/protect-your-microsoft-password-from-being-phished-e4e8e611-e4b3-4be9-914c-db1657c337cf
|
|
|
|
The protection is minimal - it only "protects" the Microsoft account used to sign into Windows. The whole exercise is theatre, use a proper password manager and FIDO2.
|
|
|
|
### Potentially unwanted app blocking
|
|
|
|
Unclear what is being sent, probably the same as "Check apps and files".
|
|
|
|
### SmartScreen for Microsoft Store apps
|
|
|
|
Probably same as SmartScreen for Microsoft Edge. Might not be as egregious though if the apps you use don't access URLs you wanna keep private. I personally keep it on.
|
|
|
|
### Exploit protection
|
|
|
|
Turn Force randomization for images (Mandatory ALSR) to "On by default".
|
|
|
|
# Device Security
|
|
|
|
## Core Isolation
|
|
|
|
- Memory integrity -> Turn on
|
|
- Firmware protection -> Turn on
|
|
|
|
## Security Processor & Secure Boot
|
|
|
|
If theres aren't on, check the firmware settings. On Parallels, both should pass by default.
|
|
|
|
## Data encryption
|
|
|
|
Poor man's Bitlocker. Unless you are using Home edition, turn this off and use Bitlocker proper.
|
|
|
|
If you sign in with a Microsoft account, "Data Encryption" will submit the key protector to Microsoft (which means that Microsoft can decrypt your device should they get physical access to it). Not sure what happens when you do not login with a Microsoft account, but it is worse than a proper Bitlocker setup anyways (no TPM + PIN/USB drive etc), so just disable it.
|