I have seen a number of posts on this forum that are borderline ill-advising the novice end users to globally unblock files that are being blocked by Windows as a security feature. (Rant ahead: If you want to skip, you can scroll down to the images below to know how to do it securely). Being in cyber security research, I couldn't hereby stay without posting a caution post that this is the age of cyber attacks. The days when internet used to be a safe thing are long gone and a simple petty thing such as opening a news website and consuming your news content can unleash a drive-by attack on your computer without you even realising what just happened. In the worst case scenario, you could end up becoming a part of a global botnet, served a ransomware that could ruin your entire machine and even render your hardware useless by infecting the boot sector of your mechanical hard disk. If you do this on your work machine and end up compromising your corporate network unknowingly, you could potentially have to kiss your job goodbye with a hefty fine (depends upon your contract). I'm hereby advising you to NOT listen to anybody who tells you that it is totally safe to disable file blocking feature globally on your machine. What you can do, however, in a relatively safer way, is to create an exclusion path for your known good files which is a way to tell Windows Defender to not touch the files in that location. Here is a step by step guide regarding how to do it (the process should be VERY similar even if you have a third party anti-virus solution running instead of defender).
Once again, I cannot stress it enough. DO NOT unblock files globally on your machine if you don't want to run into unwanted troubles. The cyber threat factor is a real thing and it's good to take things seriously and handle your computer responsibly so that you don't end up ruining your machine and potentially becoming a part of a botnet that helps ruin other machines.
- Step 1: Type Windows Defender Settings in start menu search and click it to open:
- Click on Open Windows Defender Security Center:
- Click on Virus & Threat Protection:
- Click on Virus & Threat Protection Settings:
- Now, scroll down and click on Add or remove exclusions:
- Click on Add an exclusion dropdown menu button:
- Click on "Folder" from the dropdown menu:
- Now give the path to an existing directory or create a new directory which you want to exclude from Windows Defender's live monitoring. For this example, I've selected the default "Downloads" folder:
- The "Downloads" folder has now been added to Windows Defender exclusions. Whatever files I download or place locally inside this directory, Windows defender will NOT touch them.
- If you want to go one step further and want to whitelist a particular file locally, you can do a similar thing for individual executables or any other files as well following the same procedure. Just click on the dropdown menu again and this time select "File":
-
Why not use Configure Defender not to scan Downloaded attachments and files?
-
Charles P. Jefferies Lead Moderator Super Moderator
I deleted a number of posts in this thread. Some contained useful information, but there were personal remarks that made many un-editable. If your post has been deleted, you know who you are; you're welcome to repost, but filter out the personal remarks and argue only the facts. Thanks.
CharlesVasudev, Dannemand, Papusan and 1 other person like this. -
Last edited: Jul 17, 2019
-
6.|THE|1|BOSS|.9 Notebook Evangelist
Well... I don't use any kind of anti virus or security... just using uBlock, patching host files to block anything at system level... it is been 3 years... never encountered an issue... You Are The Security.. not those so called stupid [AI] anti virus programs
just saying.. knowing what you are doing is pretty much enough to live in a peace of mind..
Vasudev, S.K and Spartan@HIDevolution like this. -
P.S., Here is one out of the hundreds of recent examples: https://arstechnica.com/information...-the-worst-drive-by-attacks-in-recent-memory/
I go through a lot of this stuff daily (it's my bread and butter) and it's ugly to say the least, and you don't want any of it on your machine, trust me.Last edited: Jul 18, 2019 -
Its a harsh reality that typical non-tech-savy family members have most dangerous malwares in their PCs and devices even though you're a cyber security researcher. Happens to me every time when I cleanup my sis's laptop's weird slow response issues because of tons of drive by downloads and PUPs. So, I installed KSC Free and now switched to WD max containment mode using configure_defender 2.x.
If you want still more protection try SysHardener scripts.S.K likes this. -
I have a snort engine incident running on my home gateway that consumes signatures from a lot of sources including signatures from Emerging Threat and a lot of my proprietary signatures that I copy from my work activity and I get an sms as soon as there is a malicious hit so I can immediately take a look at the victim machine, which is mostly my wife's phone/computer or someone from the guests is carrying around a nice stack of malwares lol!
One thing that is very important for people to understand is that you cannot protect your network / devices by simply relying on "host file based blacklist" from X/Y/Z sources because drive-by attacks don't really need a malicious domain. Plus, self modifying campaigns that usually target ad service providers mostly dynamically generate a unique url / domain every time they are loaded (the response is usually encrypted which generates the GET requests), so it goes right through the host file based blacklist in most cases.Last edited: Jul 19, 2019 -
Even admin mode works just partially if I enable No-script execution ruleset in ConfigureDefender.S.K likes this. -
Last edited: Jul 19, 2019Vasudev likes this.
-
S.K likes this.
Unblock Files on Windows WITHOUT compromising global system security
Discussion in 'Windows OS and Software' started by S.K, Jul 17, 2019.