How vulnerable is FFW to malware attacks? #306
-
Hi. Certain manipulations with group policies, WFW settings and WFW registry ACL settings allow completely block any possibilities to disable built-in windows firewall to avoid any attacks from malware, as well as prevent any modifications of the rules. What can you recommend to minimize attack surface for Fort FW (except for blocking traffic option in the settings, password protection of uninstall and general advice to install AV).
Thanks |
Beta Was this translation helpful? Give feedback.
Replies: 5 comments 10 replies
-
Commands from command prompt are processed by Fort's UI process. So, it'll request a password for commands too. |
Beta Was this translation helpful? Give feedback.
-
There is no protection for Fort's driver. Admin can stop or uninstall it. The "disable service controls" option is for Service only. |
Beta Was this translation helpful? Give feedback.
-
FFW's driver can be opened by any user now. It is required to work without service. I'm going to restrict access to driver to Administrators (and System) only. So, if you will use FFW without service, then you will have to run it as Admin. (Or add "HKLM/Software/Fort Firewall/isDriverNonAdmin=1" registry value.) What do you think? @Emi-Emi-Emi |
Beta Was this translation helpful? Give feedback.
-
Sounds fine, that would be a good way of handling this, better security for most users who install it normally, and still a way for admins to override it through the registry, like any other policy, if needed. |
Beta Was this translation helpful? Give feedback.
-
Thank you for looking at improving the security of this excellent app. The idea looks very promising.
Please forgive me my intentions to get the full and clear picture of this. My eldery parents are rather illiterate in computer security. So, I should do my best to make their computers as protected as possible. |
Beta Was this translation helpful? Give feedback.
If you want more/max security for your parents, switch their accounts to be User only and enable the inbuilt Admin account and manage it that way, so they don't run anything as admin and that means malware won't be able to do much damage in a system, many programs still allow to install software without admin rights, even browsers, so it's not as restrictive as anyone would think, but it will lock down the computer so no changes in system files are made, which is always good.
This is always going to be an issue with Windows, they made admin accounts default to everyone and that opened many issues, so switching people to User will be better for most people who have a person who can manage it.