Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Generic User Avatar

What else do you recommend?


  • Please log in to reply
21 replies to this topic

#1 PatL

PatL

  •  Avatar image
  • Members
  • 355 posts
  • OFFLINE
  •  
  • Local time:09:49 PM

Posted 25 February 2024 - 12:41 AM

I want to make my PC as SECURE as possible. To do this I have Microsoft Defender for Endpoint with all settings at their most aggressive enabled (Think ConfigureDefender MAX settings set from the cloud), Malwarebytes Premium (With appropriate exclusions for Defender  for Endpoint enabled) Hitman Pro.Alert (Again with appropriate exclusions) Cyberlock Premium, and I have run the DoD STIG command settings settings for Defender and Firewall to fill any gaps I may have missed, I run a customized WDAC and Applocker setting as well. I also disabled any non in use USB drives/ports. What else do you recommend? For the record on why I have such security is because I'm studying malware development in an ethical hacking course and have previously made mistakes in my VM with actually broke free from said VM to damage my previous host, so my goal is to essentially immunize my host PC and keep it as literal secure as can be. I have one laptop to use for this so there's no use a secondary PC option. Yay. Thank you for your time. 



BC AdBot (Login to Remove)

 


#2 MoxieMomma

MoxieMomma

  •  Avatar image
  • BC Advisor
  • 2,642 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Local time:12:49 AM

Posted 25 February 2024 - 12:59 AM

"Microsoft Defender for Endpoint"??

Is this is a work or school computer?

#3 Pkshadow

Pkshadow

  •  Avatar image
  • BC Advisor
  • 12,972 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:On the Brow of the Hill, West Coast, Canada
  • Local time:10:49 PM

Posted 25 February 2024 - 01:00 AM

Might think again on those things.  It is absolutely to much.  Most of what you installed is 2nd opinion use and again is above need and will cause issues.

 

Since 1st way in is by user and usually email or browser.


" mosquitoes really wake up everyday and choose violence "   — dalia (@_dalia7)
www.cnn.com/2020/07/23/health/mosquitoes-attraction-humans-future-wellness-scn/index.html
 

I-7 ASUS ROG Rampage II Extreme  / ASUS TUF Gaming F17 / I-7 4770K ASUS ROG Maximus VI Extreme


#4 Porthos

Porthos

  •  Avatar image
  • Members
  • 1,093 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:12:49 AM

Posted 25 February 2024 - 01:20 AM

 I have one laptop to use for this so there's no use a secondary PC option.

I suggest keeping system images of a clean setup on an external drive that is kept unplugged from the system. Easy and fast restore.



#5 PatL

PatL
  • Topic Starter

  •  Avatar image
  • Members
  • 355 posts
  • OFFLINE
  •  
  • Local time:09:49 PM

Posted 25 February 2024 - 01:48 AM

"Microsoft Defender for Endpoint"??

Is this is a work or school computer?

work and school actually.

 

Might think again on those things.  It is absolutely to much.  Most of what you installed is 2nd opinion use and again is above need and will cause issues.

 

Since 1st way in is by user and usually email or browser.

I'm aware of that and have compensated for those possibilities thanks

 

 

 I have one laptop to use for this so there's no use a secondary PC option.

I suggest keeping system images of a clean setup on an external drive that is kept unplugged from the system. Easy and fast restore.

 

Surprisingly I didn't have a backup, would a clone of the drive work in your opinion?



#6 Porthos

Porthos

  •  Avatar image
  • Members
  • 1,093 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:12:49 AM

Posted 25 February 2024 - 02:27 AM

 

would a clone of the drive work in your opinion?

I guess if you keep it disconnected from the system. I always use/recommend images.



#7 MoxieMomma

MoxieMomma

  •  Avatar image
  • BC Advisor
  • 2,642 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Local time:12:49 AM

Posted 25 February 2024 - 06:44 AM


@PatL

You say that this is a work & school computer.

If this computer belongs to your employer or school, then it would be advisable to consult with their IT department about recommended and/or permissible (security) software applications and safety/security procedures.

In some organizations, end users are not permitted to modify these settings and configurations, or to install unapproved software, especially without permission, and doing so can subject the user to disciplinary action.

The same would also apply to unsafe computing practices, such as intentional downloading or "development" of malware, a practice that potentially jeopardizes the security of the entire enterprise.



Respectfully submitted

#8 quietman7

quietman7

    Bleepin' Gumshoe


  •  Avatar image
  • Global Moderator
  • 61,920 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:01:49 AM

Posted 25 February 2024 - 08:15 AM

I suggest keeping system images of a clean setup on an external drive that is kept unplugged from the system. Easy and fast restore.

+1

Any security strategy should include a backup plan.

Backing up data and disk imaging (redundancy) are among the most important prevention tasks users should perform on a regular basis to protect themselves from malware infection, yet it's still one of the most neglected areas.

A backup strategy is not only effective against ransomware and other harmful malware but also helps with catastrophic scenarios like hard disk failure, power failure and power surges which can damage internal hardware components. In some cases, the system can be rendered unbootable and you may not have access to the computer to back up any data. A computer's hard drive will not last forever and at some point its going to fail and eventually need replacing. Hard disk failure can occur suddenly without warning or it could occur gradually due to failing areas of the disc requiring repeated read attempts before successful access or as a result of bad clusters accumulating over time to the point the drive becomes unusable. Finally, there is always the possibility of system wide issues after applying Microsoft patches and even data loss due to buggy Windows updates.
 
IMPORTANT!!! When implementing a backup strategy include testing to ensure it works before an emergency arises; routinely check to verify backups are being made and stored properly; and isolate all backups (offline) to a device that is not always connected to the network or home computer so they are unreachable. If not, you risk not only malware infection but ransomware encrypting your backups and any backups of the backups when it strikes.

 

I use EaseUS Todo Backup Free and Macrium Reflect Free for doing my imaging tasks.
 
Many home users just buy an external hard drive, copy their critical data to it, disconnect the device and store it in a safe/secure location rather than try to monitor and maintain a complex backup system. Program like SoftByte Labs Comparator make doing these types of backups quick and easy for the average user or in between creating system images.

.
.
Microsoft MVP Alumni 2023Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023

Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif


#9 PatL

PatL
  • Topic Starter

  •  Avatar image
  • Members
  • 355 posts
  • OFFLINE
  •  
  • Local time:09:49 PM

Posted 25 February 2024 - 10:18 AM

@PatL

You say that this is a work & school computer.

If this computer belongs to your employer or school, then it would be advisable to consult with their IT department about recommended and/or permissible (security) software applications and safety/security procedures.

In some organizations, end users are not permitted to modify these settings and configurations, or to install unapproved software, especially without permission, and doing so can subject the user to disciplinary action.

The same would also apply to unsafe computing practices, such as intentional downloading or "development" of malware, a practice that potentially jeopardizes the security of the entire enterprise.



Respectfully submitted

 

I apologize I believe you're misunderstanding. It is my personal schooling/work computer I pay for and endpoint license for this and other devices I intend to acquire in the future. Does that make more sense now?



#10 PatL

PatL
  • Topic Starter

  •  Avatar image
  • Members
  • 355 posts
  • OFFLINE
  •  
  • Local time:09:49 PM

Posted 25 February 2024 - 10:19 AM

 

I suggest keeping system images of a clean setup on an external drive that is kept unplugged from the system. Easy and fast restore.

+1

Any security strategy should include a backup plan.

Backing up data and disk imaging (redundancy) are among the most important prevention tasks users should perform on a regular basis to protect themselves from malware infection, yet it's still one of the most neglected areas.

A backup strategy is not only effective against ransomware and other harmful malware but also helps with catastrophic scenarios like hard disk failure, power failure and power surges which can damage internal hardware components. In some cases, the system can be rendered unbootable and you may not have access to the computer to back up any data. A computer's hard drive will not last forever and at some point its going to fail and eventually need replacing. Hard disk failure can occur suddenly without warning or it could occur gradually due to failing areas of the disc requiring repeated read attempts before successful access or as a result of bad clusters accumulating over time to the point the drive becomes unusable. Finally, there is always the possibility of system wide issues after applying Microsoft patches and even data loss due to buggy Windows updates.
 
IMPORTANT!!! When implementing a backup strategy include testing to ensure it works before an emergency arises; routinely check to verify backups are being made and stored properly; and isolate all backups (offline) to a device that is not always connected to the network or home computer so they are unreachable. If not, you risk not only malware infection but ransomware encrypting your backups and any backups of the backups when it strikes.

 

I use EaseUS Todo Backup Free and Macrium Reflect Free for doing my imaging tasks.
 
Many home users just buy an external hard drive, copy their critical data to it, disconnect the device and store it in a safe/secure location rather than try to monitor and maintain a complex backup system. Program like SoftByte Labs Comparator make doing these types of backups quick and easy for the average user or in between creating system images.

 

 

I have now backed everything important up to 3 external drives



#11 quietman7

quietman7

    Bleepin' Gumshoe


  •  Avatar image
  • Global Moderator
  • 61,920 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:01:49 AM

Posted 25 February 2024 - 10:24 AM

:thumbup2: 


.
.
Microsoft MVP Alumni 2023Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023

Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif


#12 MoxieMomma

MoxieMomma

  •  Avatar image
  • BC Advisor
  • 2,642 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Local time:12:49 AM

Posted 25 February 2024 - 10:25 AM

"Endpoint" software is typically available to & used on Enterprise devices, not home computers.

As such, I apologize for the confusion.

Cheers

#13 PatL

PatL
  • Topic Starter

  •  Avatar image
  • Members
  • 355 posts
  • OFFLINE
  •  
  • Local time:09:49 PM

Posted 25 February 2024 - 10:49 AM

"Endpoint" software is typically available to & used on Enterprise devices, not home computers.

As such, I apologize for the confusion.

Cheers

 

Right I found a way to purchase a valid Endpoint license for a trial and error for my studies and work needs, it's pretty solid. Just have to add exceptions for MWB and HMPA and everything works perfectly. No breaches so far and all e-mail is checked in a double VM/Sandbox on encrypted VPN without any links or attachments being opened. so would you say with having backed everything up now that it's as good as I can get it?



#14 cryptodan

cryptodan

    Bleepin Madman


  •  Avatar image
  • Members
  • 34,434 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:USA
  • Local time:05:49 AM

Posted 25 February 2024 - 12:15 PM

I have one question though

Why are you computing in this manner?

I have been computing since 1993 and have been virus free with very minimal security settings. I could have a very rigorous security policy here at home but it's overkill and adds more things to troubleshoot during a computer issue.

US Navy Veteran from 2002 to 2006

Masters in Computer and Digital Forensics Expert - Stevenson University Alumni 2015

Arch Desktop - https://termbin.com/epij

Arch Laptop - https://www.termbin.com/dnwk

Ubuntu Server - https://termbin.com/zvra


#15 quietman7

quietman7

    Bleepin' Gumshoe


  •  Avatar image
  • Global Moderator
  • 61,920 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:01:49 AM

Posted 25 February 2024 - 12:23 PM

Just remember, the user is the first and last line of defense and security is a constant effort to stay one step ahead of the bad guys. The end user needs to stay informed, constantly educate themselves about the latest malware threats as well as those recommendations by security experts on how to protect themselves.
 
Security is all about layers and not depending on any one solution, technology or approach to protect yourself from cyber-criminals. The most important layer is you. No amount of security software is going to defend against today's sophisticated malware writers for those who do not practice safe computing and stay informed. It has been proven time and again that the end user is a more substantial factor (weakest link in the security chain) than the architecture of the operating system or installed protection software.


.
.
Microsoft MVP Alumni 2023Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023

Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif





1 user(s) are reading this topic

0 members, 1 guests, 0 anonymous users