Wednesday, 28 December 2016

Desktop Security Configuration

Basic Information
PC Environment: Home / Private
Security Awareness: Advanced
Exposure to Malware: Not in a long time
Infection Rate: Rarely
Level of security risk: Medium
Intervals between Personal data backups: Monthly
Intervals between Virus scans: Weekly
Intervals between System cleanup and optimization: Monthly
Intervals between System Image backups: - 

Device Information
Operating system: Windows 10
Windows Edition: Pro 
Build: 1909
System Type: 64 bit OS
User Account Type: Administrator - Local account 

Computer Settings
User Account Control: Always Notify (Maximum) 
Smartscreen: Enabled 
Security Updates: Automatic Updates - All security and feature updates 
Security Protection Settings: Custom - Major changes for Increased Security
Remote Settings: Disabled
Windows Backup: Disabled
System Restore: Enabled for OS Drive
System Tweaks and Hardening

Real-time Protection
Main Malware Protection: Windows Defender Antivirus (at Maximum Security)
Main Cloud Anti-Virus: -

On-demand scanners
Local: Emsisoft Emergency Kit (EEK)
Cloud: Hitman Pro (Registered), IObit Malware Fighter

Firewall & Network Protection
Main Firewall: Windows Firewall + Binisoft WFC

DNS Protection: OpenDNS

Prevention Systems
HIPS: -
Behavior Blocker: NVT OSArmor (Lockdown settings)
Anti-Executable: NTV OSAmor
Software Restriction Policy: In-built


System Reinforcement
Anti-Exploit: VoodooShield
Removable Media/USB Protection: HMPA | OSA
Apps Hardening: HMPA
Docs/File/Folders Protection: SecureFolders
Keystroke Encryption: HMPA
Anti-keylogger: HMPA

Virtualization
System-Wide: Shadow Defender
Restriction-based Sandbox: -
Full Virtualization Sandbox: -
Virtual Machine: Virtual Box

Browser
Normal usage: Mozilla Firefox
Security/anonymous usage: Google Chrome

Browser Security/Extensions 
Ad-Blocker: uBlock Origin (Medium)
Web Privacy: uBlock Origin, HTTPS Everywhere
Password Management/Form Protection: LastPass
 
Privacy & Anonymity

Anti-Windows 10 Telemetry: Shutup10
Encrypted Container: VeraCrypt (Portable)
File Protection: Secure Folders (Portable)
File Encryption: Gpg4Win (Kleopatra)
VPN: OpenVPN

Monitoring
System Vulnerabilities Monitor:-
Process Monitor: Autorun (Portable)
Autorun/Startup Monitor: Process Hacker (portable) | Process Explorer (Portable)
Resources Monitoring: In-built Resources Monitor
Registry Manager: -
Network Monitor: -

System Maintenance & Optimization
Browser Cleaner: -
System Cleaner: Ccleaner (Portable) | Wise Disk Cleaner (portable)
System Optimizer: -

Recovery
Data Backup: Paragon Hard Disk Manager
Disk Imaging Backup: -
Boot CD: Acronis TI | Hiren Boot CD made bootable via USB

Virus and Malware Removal Tools 
EEK -- Zemana - Norton Power Eraser, Malwarebytes AdwCleaner
 
My configuration is made by virtue of the layered protection idea.

All my security software are selected specifically to run together without conflict, I set them for maximum compatibility/protection with the lowest resources usage possible.

Last updated: 10 April 2020

0 comments: