Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Harden Windows Security Module v0.4.6 #289

Merged
merged 24 commits into from
Jul 7, 2024

Conversation

HotCakeX
Copy link
Owner

@HotCakeX HotCakeX commented Jul 2, 2024

What's New

The Downloads Defense Measures category now has an optional sub-category that allows you to choose a new type of WDAC policy to deploy automatically. This policy blocks dangerous and very old components on Windows. Please read this post for all the info about them..

Some 3rd party programs might still attempt to use these. Remember that you can easily remove the policy using the Unprotect-WindowsSecurity command at any time.

The components blocked by this optional WDAC policy are:

  • wscript.exe
  • mshta.exe
  • cscript.exe

  • Improved the overall performance and speed of the Harden Windows Security module through internal reconstruction.

  • Added a new Attack Surface Reduction rule: Block Webshell creation for Servers to the ASR Category.

  • Changed the Attack Surface reduction Rule Block executable files from running unless they meet a prevalence, age, or trusted list criterion from Block to Bock and Warn, which means it will allow the System Administrator to be able to allow the blocked file or app if they wish to without the need to use group policy editor. This should make it easier for developers or people that want to install newly released versions of programs before their reputation is determined by the system. This doesn't change the threat model whatsoever since you still need to have Administrator privileges to allow a blocked app, just like you need to have Administrator privileges to change the group policies.

  • Changed the Clipboard syncing in the Non-Admin category to be an optional sub-category instead of applying by default in that category.

  • The Confirm-SystemCompliance now takes into account the type of the registry keys too when performing compliance checks. When the registry key path, name and value match but the type doesn't match, (E.g., the module expects a DWORD but the value is QWORD or String), then that item will be shown as false. This further improves the accuracy and trustworthiness of the results.

  • The Microsoft Defender category now detects when GitHub Desktop or Git (standalone version) is installed and automatically adds their executables to the exceptions for mandatory ASLR as they are not compatible. More info here - Was also mentioned in this issue


@HotCakeX HotCakeX added the Enhancement 💯 New feature or request label Jul 2, 2024
@HotCakeX HotCakeX self-assigned this Jul 2, 2024
@HotCakeX HotCakeX marked this pull request as ready for review July 7, 2024 22:08
@HotCakeX HotCakeX merged commit 5960633 into main Jul 7, 2024
2 checks passed
@HotCakeX HotCakeX deleted the Harden-Windows-Security-Module-v0.4.6 branch July 7, 2024 23:22
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Enhancement 💯 New feature or request
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant