Giter Club home page Giter Club logo

hard_configurator's Introduction

WARNING!

The actually fake domain hard-configurator.com has been used by some malicious actors for several months. Please do not use it. Someone tries to fool people who want to get information about Hard_Configurator.

Hard_Configurator ver. 7.0.0.0 (July 2024)

https://github.com/AndyFul/Hard_Configurator/raw/master/Hard_Configurator_setup_7.0.0.0.exe

Hard_Configurator ver. 6.1.1.1 (July 2023) - included support for Windows 11 22H2 and later versions

https://github.com/AndyFul/Hard_Configurator/raw/master/Hard_Configurator_setup_6.1.1.1.exe

Support for Windows 11 22H2 and later versions

Windows 11 ver. 22H2 (fresh installation) turns off by default Software Restriction Policies. So, Hard_Configurator ver. 6.0.1.1 cannot use SRP (restrictions from the left panel in H_C ). This issue is corrected in the new version 6.1.1.1. The H_C can also work with enabled Smart App Control from this version.

WARNING!!!

Hard_Configurator is an advanced tool for home Administrators. It is mainly intended to secure the computers of inexperienced users (children, happy clickers, etc.). Please read the help info about available options to avoid overkill setup.

Windows built-in Software Restriction Policies (SRP) are incompatible with AppLocker. Any active AppLocker rule introduced via GPO or MDM WMI Bridge, turns off SRP.

The Child Account activated via Microsoft Family Safety also uses AppLocker (via MDM), so SRP cannot work with it. This issue is persistent even after removing the Child Account because (due to a bug) the AppLocker rules are not removed. To recover SRP functionality, one must remove the AppLocker rules manually from the directory %Windir%\System32\AppLocker.

Hard_Configurator uses Windows built-in features. Some of them can be removed or added by Microsoft in the future major Windows upgrades. Please use the updated version of Hard_Configurator. The old versions can rarely produce some issues.

Version 4.0.0.0 was corrected in October 2018 to match Microsoft requirements, because, at the beginning of October, it was flagged as a hack-tool by Microsoft. The detection was related to ConfigureDefender ver. 1.0.1.1 which was installed with Hard_Configurator. ConfigureDefender ver. 1.0.1.1 was considered as a hack-tool by Microsoft, because it had an option to disable Windows Defender real-time protection. The corrected version of Hard_Configurator has been analyzed and accepted by Microsoft.

PROGRAM DESCRIPTION.

GUI to manage Software Restriction Policies (SRP) and harden Windows Home editions (Windows Vista at least). The informative Malwaretips thread about Hard_Configurator can be found here: https://malwaretips.com/threads/hard_configurator-windows-hardening-configurator.66416/

This program can configure Windows built-in security to harden the system. When you close Hard_Configurator it closes all its processes. The real-time protection comes from the reconfigured Windows settings. The Hard_Configurator Recommended_Settings can be seen as a Medium Integrity Level smart default-deny setup, which is based on SRP + Application Reputation Service (forced SmartScreen) + Windows hardening settings (restricting vulnerable features). The user can apply a more restrictive setup if needed. Hard_Configurator makes changes in the Windows Registry to accomplish the tasks enumerated below:

  1. Enabling Software Restriction Policies in Windows Home editions.
  2. Changing SRP Security Levels, Enforcement options, and Designated File Types.
  3. Whitelisting files in SRP by path (also with wildcards) and by hash.
  4. Blocking LOLBins via SRP.
  5. Protecting (deny execution) writable subfolders in %WinDir% folder (via SRP).
  6. Restricting the shortcut execution to some folders only (via SRP).
  7. Enabling Windows Defender advanced settings, like PUA protection, ASR rules, Network Protection, etc.
  8. Protecting against weaponized documents, when MS Office or Adobe Acrobat Reader XI/DC are used to open them.
  9. Enabling "Run as administrator" for MSI files.
  10. Hardening Windows Firewall by blocking the Internet access to LOLBins.
  11. Disabling PowerShell script execution (Windows 7+).
  12. Securing PowerShell by Constrained Language mode (SRP, PowerShell 5.0+)
  13. Disabling execution of scripts managed by Windows Script Host.
  14. Removing the "Run As Administrator" option from the Explorer right-click context menu.
  15. Forcing the SmartScreen reputation check for files without 'Mark Of The Web' (Windows 8+) and preventing DLL hijacking of SmartScreen.
  16. Disabling Remote Desktop, Remote Assistance, Remote Shell, and Remote Registry.
  17. Disabling execution of 16-bit applications.
  18. Enabling & Filtering Advanced SRP logging.
  19. Disabling SMB protocols.
  20. Disabling program elevation on Standard User Account.
  21. Enabling Validate Admin Code Signatures (UAC setting).
  22. Disabling Cached Logons.
  23. Filtering Windows Event Log for blocked file execution events (Nirsoft FullEventLogView).
  24. Filtering autoruns from the User Space, and script autoruns from anywhere (Sysinternals Autorunsc).
  25. Turning ON/OFF all the above restrictions.
  26. Restoring Windows Defaults.
  27. Making System Restore Point.
  28. Using predefined setting profiles for Windows 7, Windows 8, and Windows 10+.
  29. Saving the chosen restrictions as a profile, and restoring them when needed.
  30. Backup management for Profile Base (whitelist profiles and setting profiles).
  31. Changing GUI skin.
  32. Updating application.
  33. Uninstalling application (Windows defaults restored).

Most of the above tasks can be done by hand using Windows Regedit. Anyway, with Hard_Configurator, it can be done more quickly and safely. Also, the user can quickly apply custom settings saved in profiles.

Forcing SmartScreen check can protect the user when normally the SmartScreen for Explorer (in Windows 8+) is bypassed. That can happen if you have the executable file (EXE, MSI, etc.) when using:

  • the downloader or torrent application (EagleGet, utorrent etc.);
  • container format file (zip, 7z, arj, rar, etc.), except for some unpackers like ZIP built-in Windows unpacker.
  • CD/DVD/Blue-ray disc;
  • CD/DVD/Blue-ray disc image (iso, bin, etc.);
  • non-NTFS USB storage device (FAT32 pendrive, FAT32 USB disk);
  • Memory Card;

so the file does not have the proper Alternate Data Stream attached (Mark Of The Web).

Hard_Configurator is based on Windows built-in security, so there is no need to turn off the program restrictions to install Windows Updates, Universal Applications from Windows Store, and perform system Scheduled Tasks.

Contact:

Andrzej Pluta (@Andy Ful) [email protected]

hard_configurator's People

Contributors

andyful avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

hard_configurator's Issues

How to manually uninstall?

The program does not make an uninstaller.

There is an uninstall from the "Tools" button, but I don't fully understand this dialog:

hardconfig

It seems to imply values will be overwritten with defaults if I click Yes.

I don't want anything whatsoever to be changed. I just want to uninstall Hard_Configurator.

Can I just delete the Hard_Configurator directory in the Windows folder?

Are there any other directories, settings, or registry keys to get rid of?

Feature suggestion

This software is really great, I use it daily, and I've also recommended it wholeheartedly in my security guide on my website.

However, a feature that could really improve this software is a GUI for managing the shell extensions (after enabling Shell Extension Security), kind of like the SRP whitelist GUI.

It'd be nice if it would list all existing Shell Extensions, and an option to move them in or out of the Approved list. It's kind of tedious to do it manually, and this would entice more people to use that feature.

SRP not working on clean installs of Windows 11 22H2

Very easy to reproduce this one. Clean install 22H2 (specifically build 22621.xxx), install Hard_Configurator, try to apply SRP, relog/restart and you'll notice that it doesn't actually work. Easy way to find out is to block a sponsor and try to execute said sponsor.

This can be fixed if you apply SRP through group policy, delete the group policy SRP and then re-install SRP in Hard_Configurator, but it doesn't always work.

This started happening as of update 6.0.1.1. A fix would be appreciated.

Hey i really love this software but i have a question

Hey i really love this software but i have a question,
Can you (please) tell me where i can found the name of the "GPO" version of these settings.
Because on my own computer it work but i would like (one i have configured it successfully on home windows deploy it to "pro" version of windows through GPO, and some settings of Defender and hard configurator is hard to find in the Gpedit.msc)

if it's already in it sorry i don't have finded it.
Thanks

Not an issue, just a question

Andy

I have an old laptop which due to driver issues would not update to latests Windows10. The Windows10 version I am using is 21H1 which reaches end of service in december.

You once mentioned (on MalwareTips) that you were also looking at Windows Application Control, but I have not seen this dripping through in one of your excellent free programs.

I used the WDAC policy toolkit on Github to create a WDAC "signed and reputable mode" policy and deployed it using Powershell. I also used SimpleWindowsHardening to block risky file extensions and added through a registry hack the Microsoft Recommended Block rules to SRP (not in WDAC, so they are blocked in user mode only).

Because Microsoft also mentioned in the media that they will not update Mocrosoft Defender on end-of-service Windows 10 OS versions, I switched to a free antivirus. When I run MSINFO32 I stll see that WDAC is applied (using another AV), so it seems to work ok with third-party AV's.

So here is my request to you


Would it be an option to include the most relaxed WDAC-policy (allow signed and reputable) to SimpleWindowsHardening?

I realize your time is limited, but I think above use-case is not exceptional, there must be more people having old hardware on which the latest Windows OS does not run.

As far as I understood the new 'Smart App Control' feature uses the same database as WDAC 'signed and reputable' policy, so it seems that Microsoft thinks it is ready for every day use.


Regards

Kees1958

a functional requirement

Hi Andy, I have a request to get lolbins rules in firewall tools, I want to be able to import or at least have WFC recognized, because I found that WFC can't recognize rules imported by Firewall tools and create allow rules repeatedly, This also causes rules that should be blocked to lose their effect.

WHITELIST

Hi,

Does <Add Folder> include all sub-folders and all files? For example, if I install MSYS2 in C:\msys64 and add the path with <Add Folder>, I still have to add C:\msys64\usr\bin\bash.exe with <Add File> in order to use msys2/mingwXX.

Edit: I have blocked sponsor bash.exe - the reason for the above behavior.

I attached my config - config.zip. I have only one user profile.

It seems the default deny config and whitelist isn't quite appropriate setup for environment where Visual Studio/Intel OneApi is used. I added to whitelist C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Visual Studio 2022\Visual Studio Tools\VC so I can use the MSVC tools with x64 Native Tools Command Prompt for VS 2022. Cmd window is opening but with the following This program is blocked by group policy. For more information, contact your system administrator. [vcvarsall.bat] Environment initialized for: 'x64' When I check the log to see what is blocked - Access to C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe has been restricted by your Administrator by location with policy rule {1016bbe0-a716-428b-822e-5e544b6a3100} placed on path powershell.exe. If I run as Administrator x64 Native Tools Command Prompt for VS 2022 everything seems ok. But I don't want to compile/build with Admin privileges. What would be your recommendation for such setup? A profile like Windows_10_MT_Windows_Security_hardening.hdc?

Edit: Above related - I have to remove powershell.exe and reg.exe from the blocked sponsors if I want to build as regular user (without admin privileges). Any way for example, to have blocked sponsor powershell.exe and run a .bat file that calls powershell.exe (whitelist ?)?

current source code

Is there a current, up to date H_C source code available?
The one on here seems to be from 2 years ago.

2 blocks from WDAC, on WHH Light

I got two blocks after enabling WDAC. The first one is wsl, which you already explained to me that it is blocked by design. But I have no idea where the second block is coming from.

`******** WDAC blocked events for EXE and DLL files ********
***********************************************************




Event[0]:
Event Id = 3077
Local Time:  2024/04/08 19:58:55
Attempted Path = C:\Windows\System32\wsl.exe
Parent Process = C:\Program Files\WindowsApps\CanonicalGroupLimited.Ubuntu_2204.3.49.0_x64__79rhkp1fndgsc\ubuntu.exe
PolicyName = UserSpace Lock
UserWriteable = false


***********************************************************
***********************************************************


Event[1]:
Event Id = 3077
Local Time:  2024/04/08 19:56:10
Attempted Path = C:\Windows\System32\wsl.exe
Parent Process = C:\Program Files\WindowsApps\CanonicalGroupLimited.Ubuntu_2204.3.49.0_x64__79rhkp1fndgsc\ubuntu.exe
PolicyName = UserSpace Lock
UserWriteable = false


***********************************************************
***********************************************************


Event[2]:
Event Id = 3077
Local Time:  2024/04/08 19:42:22
Attempted Path = C:\Windows\SysWOW64\wbem\WMIC.exe
Parent Process = C:\Windows\SysWOW64\cmd.exe
PolicyName = UserSpace Lock
UserWriteable = false


***********************************************************
***********************************************************`

Logoff not always necessary

Logoff is not alway necessary to activate SRP.
I would suggest to disable and enable SRP on applying changes - that usually does the job...

Default deny mode causes executables to not function on the built-in administrator account

Edition Windows 11 Pro Insider Preview
Version 22H2
OS build 25131.1000
Experience Windows Feature Experience Pack 1000.25131.1000.0
image
I personally have no idea what could be causing this, even when disabling a specific policy which could be causing this (User Account Control: Admin Approval Mode for the built-in administrator account), nothing executes. Just says that I don't have permission on the built-in administrator account (the only administrator account on my system right now).

Adding EXE in release

hello it would be nice to publish the exe in release like that we can watch for release only (for update), since we don't oppen it every day github will warn to go the hard configurator to do the update

Thanks

Another feature request

A useful one this time. I've noticed that the blocked sponsors list in H_C does not encompass every executable that Microsoft has marked as unsafe in their recommended block rules.

It'd be nice to have an option to add and select any executable or DLL you want and add it as an item blocked by SRP. This could be helpful if new exploits or vulnerable executables emerge and you want to block them to be safe, without having to wait for an update to the blocked sponsors list.

Perhaps add a "Custom Block List" option under the Whitelist options in Hard_Configurator, which opens a new window similar to the whitelists, detailing all the items blocked by the user. This would also be a good addition to my security guide and I would be able to easily have people block vulnerable executables, whereas right now I can't do that without complications.

A good example of a harmful executable would be sethc.exe, which allows for a privilege escalation exploit on the lock screen. If this executable were to be blocked using the custom feature described above, this wouldn't be an issue. But right now, sethc is nowhere to be seen in the Blocked Sponsors list... therefore I once again request the addition of this feature.

Whitelist by path

There is an issue when I try to edit existing entries with the same name. They show up only once.

This can happen when you're trying to move form Restric'tor to H_C...

And edtiting (e.g. change name) inside the Whitelist would be great...

Blacklist / Autoblackliste user writeable folders

It would add additional securtiy if there is a Blacklist...

There are a lot of %windir% directories where users can write and execute...

It would be a great enhancement to have a blacklist an an auto add writeable (for everyone) folders automatically. (as it is in Restric'tor)

Path examples:
C:\WINDOWS\debug\WIA C:\WINDOWS\Hard_Configurator\Tools C:\WINDOWS\Registration\CRMLog C:\WINDOWS\servicing\Packages C:\WINDOWS\servicing\Sessions C:\WINDOWS\System32\Com\dmp C:\WINDOWS\System32\FxsTmp C:\WINDOWS\System32\spool\drivers\color C:\WINDOWS\System32\spool\PRINTERS C:\WINDOWS\System32\spool\SERVERS C:\WINDOWS\System32\Tasks C:\WINDOWS\System32\Tasks_Migrated C:\WINDOWS\SysWOW64\Com\dmp C:\WINDOWS\SysWOW64\FxsTmp C:\WINDOWS\SysWOW64\Tasks C:\WINDOWS\Tasks C:\WINDOWS\Temp

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.