1
0
mirror of https://github.com/TommyTran732/Windows-Setup.git synced 2024-11-22 16:11:45 -05:00
Windows-Setup/Windows Settings/Windows Security.md
Tommy 08ec7ab09f
Core Isolation
Signed-off-by: Tommy <contact@tommytran.io>
2023-12-30 17:19:40 -07:00

3.8 KiB

Virus & threat protection

Virus & threat protection settings

Cloud-delivered protection

This sends hashes and file paths to Microsoft. Whether to keep this on or not depends on the threat model. I recommend keeping it on on a domain controller and gaming machines.

One caveat with this is that if it takes the cloud too long to scan, the computer will just run the executable. Might wanna increase the timeout later to make it less theatric:

Automatic Sample Submission

Should be turned off. Supposedly will prompt if the files it want to submit are document files, but why not just make it prompt for every file it wants to submit?

Ransomware protection

Turn on Controlled folder access. This will protect certain dirs and prevent direct writes to the disk.

Firewall & Network protection

Tick "Block incoming connections" for Domain network, Private network, and Public network.

App & browser control

Smart App Control

Smart App Control forces Smartscreen for apps & files to be on, which could lead to privacy issues. It can also break certain applications. Whether to keep this on or not depends on the threat model.

On a side note, this breaks WSL.

Reputation-based protection

Check apps and files.

This sends hashes and file paths to Microsoft. It will also sends the URL of where you download a program from to Microsoft. Whether to keep this on or not depends on the threat model.

SmartScreen for Microsoft Edge

This setting is independent from Smart App Control. Extremely privacy invasive. Sends FULL URLs to Microsoft. Whether to keep this on or not depends on the threat model, though it probably should be off in most cases.

Consider scenarios where you use Proton Drive/Mega/PrivateBin which append the encryption key in the URL. Now you are sending both the URL and the key to Microsoft. Something that's supposed to be private / end-to-end encrypted now gets leaked just like that. Or if you use PHPMyAdmin with the username & password appended for logins - now you are leaking access to your database.

Phishing protection

This is extremely invasive to the point where I do not think it's okay to keep it on under any circumstances, with any kind of threat model.

https://support.microsoft.com/en-us/topic/protect-your-microsoft-password-from-being-phished-e4e8e611-e4b3-4be9-914c-db1657c337cf

The protection is minimal - it only "protects" the Microsoft account used to sign into Windows. The whole exercise is theatre, use a proper password manager and FIDO2.

Potentially unwanted app blocking

Unclear what is being sent, probably the same as "Check apps and files".

SmartScreen for Microsoft Store apps

Probably same as SmartScreen for Microsoft Edge. Might not be as egregious though if the apps you use don't access URLs you wanna keep private. I personally keep it on.

Exploit protection

Turn Force randomization for images (Mandatory ALSR) to "On by default".

Device Security

Core Isolation

  • Memory integrity -> Turn on
  • Firmware protection -> Turn on

Security Processor & Secure Boot

If theres aren't on, check the firmware settings. On Parallels, both should pass by default.

Data encryption

Poor man's Bitlocker. Unless you are using Home edition, turn this off and use Bitlocker proper.

If you sign in with a Microsoft account, "Data Encryption" will submit the key protector to Microsoft (which means that Microsoft can decrypt your device should they get physical access to it). Not sure what happens when you do not login with a Microsoft account, but it is worse than a proper Bitlocker setup anyways (no TPM + PIN/USB drive etc), so just disable it.