• Dealing with Windows Security's "Ransomware protection"

    From John C.@21:1/5 to All on Tue Feb 25 05:14:33 2025
    Windows Security's "Ransomware protection" is about as much of a PITA as
    User Account Control.

    I have this protection on, but man, I really don't like the way it
    blocks so many of the programs I have on my system from doing things.

    To allow an "app" (God I hate that corruption of the word APPLICATION),
    here's what you do (in case you don't know):

    1. Open Windows Security
    2. Click on "Virus & threat protection"
    3. Scroll down all the way so that you can see "Ransomware protection"
    4. Click on "Manage ransomware protection"
    5. Under "Controlled folder access" (which at this point should be in
    the "On" position), click on "Allow an app through Controlled folder access"
    6. Click on the "Add an allowed app" button
    7. Take it from there to add an application to the list.

    Does this PITA actually outweigh having Ransomware protection? That's a question I'm asking myself. As long as Windows Security doesn't actually
    remove a program before I have a chance to do this for a program, I can probably live with it. However, if a program actually DOES get removed,
    I will disable this protection.

    I've already turned UAC down to the lowest possible setting because it
    was distracting me way too often.

    What do YOU think about Ransomware protection?

    TIA.

    --
    John C.

    Take back Microsoft from India.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Frank Slootweg@21:1/5 to John C. on Tue Feb 25 13:52:15 2025
    John C. <r9jmg0@yahoo.com> wrote:
    Windows Security's "Ransomware protection" is about as much of a PITA as
    User Account Control.
    [...]
    What do YOU think about Ransomware protection?

    Not much. On my Windows 11 system, 'Controlled folder access' is *off*
    and I don't think I turned it off, so I assume 'off' is the default.

    I also checked on my wife's Windows 10 system and 'Controlled folder
    access' is off on that system as well. So the default *is* 'off',
    because I would never lessen security on that system.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Ed Cryer@21:1/5 to Frank Slootweg on Tue Feb 25 15:23:02 2025
    Frank Slootweg wrote:
    John C. <r9jmg0@yahoo.com> wrote:
    Windows Security's "Ransomware protection" is about as much of a PITA as
    User Account Control.
    [...]
    What do YOU think about Ransomware protection?

    Not much. On my Windows 11 system, 'Controlled folder access' is *off*
    and I don't think I turned it off, so I assume 'off' is the default.

    I also checked on my wife's Windows 10 system and 'Controlled folder access' is off on that system as well. So the default *is* 'off',
    because I would never lessen security on that system.

    It's off in my Win10 as well; default setting.
    I wonder how it actually functions to detect ransomware?

    My own protection is a well-kept backup image.

    Ed

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From VanguardLH@21:1/5 to John C. on Tue Feb 25 10:08:52 2025
    "John C." <r9jmg0@yahoo.com> wrote:

    Windows Security's "Ransomware protection" is about as much of a PITA as
    User Account Control.

    You were warned in the "How to boot into Windows 10 Safe Mode" thread
    when you mentioned you would enable Defender's ransomware protection.
    It is similar to 3rd-party firewalls with an option to block all
    outgoing network connections unless you choose to block always, allow temporarily, or allow always. In both, you get an option to throttle
    what can connect by the firewall, and what can access what for
    Defender's ransomware protection. You get more protection, and you
    choose to do the additional control. Both come with whitelists, so some programs are exempted, but you'll keep getting nagged until you decide
    on block always or allow always. Eventually the nags wane as you keep
    making those decisions unless, of course, you keep installing more
    software that requires more of your decisions which you opted into
    getting.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Newyana2@21:1/5 to John C. on Tue Feb 25 11:37:15 2025
    On 2/25/2025 8:14 AM, John C. wrote:
    Windows Security's "Ransomware protection" is about as much of a PITA as
    User Account Control.

    I have this protection on, but man, I really don't like the way it
    blocks so many of the programs I have on my system from doing things.

    To allow an "app" (God I hate that corruption of the word APPLICATION), here's what you do (in case you don't know):

    1. Open Windows Security
    2. Click on "Virus & threat protection"
    3. Scroll down all the way so that you can see "Ransomware protection"
    4. Click on "Manage ransomware protection"
    5. Under "Controlled folder access" (which at this point should be in
    the "On" position), click on "Allow an app through Controlled folder access" 6. Click on the "Add an allowed app" button
    7. Take it from there to add an application to the list.

    Does this PITA actually outweigh having Ransomware protection? That's a question I'm asking myself. As long as Windows Security doesn't actually remove a program before I have a chance to do this for a program, I can probably live with it. However, if a program actually DOES get removed,
    I will disable this protection.

    I've already turned UAC down to the lowest possible setting because it
    was distracting me way too often.

    What do YOU think about Ransomware protection?

    TIA.


    I have UAC and LUA both disabled. I don't know from
    ransomware protection. Win10 never bugs
    me. If anything does, I hunt it down and kill it without
    mercy. But I like to work without interruption. I don't like
    potholes in the road. You seem to prefer luxuriating in
    indignation. Given that, it seems to me that whatever
    you paid for Win10 was a bargain. If used properly, Win10
    can provide endless indignation fun for the whole family. :)

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Paul@21:1/5 to Ed Cryer on Tue Feb 25 13:35:55 2025
    On Tue, 2/25/2025 10:23 AM, Ed Cryer wrote:
    Frank Slootweg wrote:
    John C. <r9jmg0@yahoo.com> wrote:
    Windows Security's "Ransomware protection" is about as much of a PITA as >>> User Account Control.
    [...]
    What do YOU think about Ransomware protection?

       Not much. On my Windows 11 system, 'Controlled folder access' is *off* >> and I don't think I turned it off, so I assume 'off' is the default.

       I also checked on my wife's Windows 10 system and 'Controlled folder
    access' is off on that system as well. So the default *is* 'off',
    because I would never lessen security on that system.

    It's off in my Win10 as well; default setting.
    I wonder how it actually functions to detect ransomware?

    My own protection is a well-kept backup image.

    Ed

    Ransomware attack vectors and methods:

    Originally, naively named executables, blockable by AppLocker.

    Most common attack vector today, is targeted phishing (hospitals, town governments).

    Used to have a "service model". The infected punter was given an email
    address, to converse with. Talk the service agent "down from three
    Bitcoins to two Bitcoins". (That tells you this happened quite a long
    time ago -- Bitcoins were at a low of $3 each at one time.) The service
    agent would send you your key, you would decrypt your files.

    The Black Hats found this model too expensive. It took a lot of service
    agents. The service agent took a cut, and so on.

    Information on the latest (personalized) threats is slim.

    Likely to be via phishing (clicking the GoDaddy attachment concerning domain renewal).

    Ransomware hides stealthily for one month. It no longer attacks immediately.
    It seeks to understand what defenses you have (such as backup drives).

    Attack can be file-by-file, but that is old fashioned. Each file has
    an extension added to the end of it, indicating it has been attacked.
    The .xls and .doc are attacked first, as OS files are worthless.

    taxes.xls.osirus myproposal.doc.osirus

    A second attack mechanism, is to change the FDE key and cause
    the drive to instantly wink out. The part that I don't understand,
    is why would the previous FDE key be readable ? Making it readable,
    encourages this sort of attack.

    *******

    The proposed defense mechanisms don't appear to address all the
    attack methods. Some will be hidden to us (such as Windows Defender
    being "curious" about any agent approaching an FDE key). They tell us
    that root kits are not all that common any more, but who knows whether
    they go as a one-two punch for Ransomware.

    Maybe a safer backup, is to manually boot a Macrium CD and make
    a full to the external drive. Then shut down and disconnect the external
    until next time.

    What possibilities exist, for attack via UEFI ?

    Paul

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Ed Cryer@21:1/5 to All on Tue Feb 25 19:02:01 2025
    UGF1bCB3cm90ZToNCj4gT24gVHVlLCAyLzI1LzIwMjUgMTA6MjMgQU0sIEVkIENyeWVyIHdy b3RlOg0KPj4gRnJhbmsgU2xvb3R3ZWcgd3JvdGU6DQo+Pj4gSm9obiBDLiA8cjlqbWcwQHlh aG9vLmNvbT4gd3JvdGU6DQo+Pj4+IFdpbmRvd3MgU2VjdXJpdHkncyAiUmFuc29td2FyZSBw cm90ZWN0aW9uIiBpcyBhYm91dCBhcyBtdWNoIG9mIGEgUElUQSBhcw0KPj4+PiBVc2VyIEFj Y291bnQgQ29udHJvbC4NCj4+PiBbLi4uXQ0KPj4+PiBXaGF0IGRvIFlPVSB0aGluayBhYm91 dCBSYW5zb213YXJlIHByb3RlY3Rpb24/DQo+Pj4NCj4+PiAgwqDCoCBOb3QgbXVjaC4gT24g bXkgV2luZG93cyAxMSBzeXN0ZW0sICdDb250cm9sbGVkIGZvbGRlciBhY2Nlc3MnIGlzICpv ZmYqDQo+Pj4gYW5kIEkgZG9uJ3QgdGhpbmsgSSB0dXJuZWQgaXQgb2ZmLCBzbyBJIGFzc3Vt ZSAnb2ZmJyBpcyB0aGUgZGVmYXVsdC4NCj4+Pg0KPj4+ICDCoMKgIEkgYWxzbyBjaGVja2Vk IG9uIG15IHdpZmUncyBXaW5kb3dzIDEwIHN5c3RlbSBhbmQgJ0NvbnRyb2xsZWQgZm9sZGVy DQo+Pj4gYWNjZXNzJyBpcyBvZmYgb24gdGhhdCBzeXN0ZW0gYXMgd2VsbC4gU28gdGhlIGRl ZmF1bHQgKmlzKiAnb2ZmJywNCj4+PiBiZWNhdXNlIEkgd291bGQgbmV2ZXIgbGVzc2VuIHNl Y3VyaXR5IG9uIHRoYXQgc3lzdGVtLg0KPj4NCj4+IEl0J3Mgb2ZmIGluIG15IFdpbjEwIGFz IHdlbGw7IGRlZmF1bHQgc2V0dGluZy4NCj4+IEkgd29uZGVyIGhvdyBpdCBhY3R1YWxseSBm dW5jdGlvbnMgdG8gZGV0ZWN0IHJhbnNvbXdhcmU/DQo+Pg0KPj4gTXkgb3duIHByb3RlY3Rp b24gaXMgYSB3ZWxsLWtlcHQgYmFja3VwIGltYWdlLg0KPj4NCj4+IEVkDQo+IA0KPiBSYW5z b213YXJlIGF0dGFjayB2ZWN0b3JzIGFuZCBtZXRob2RzOg0KPiANCj4gT3JpZ2luYWxseSwg bmFpdmVseSBuYW1lZCBleGVjdXRhYmxlcywgYmxvY2thYmxlIGJ5IEFwcExvY2tlci4NCj4g DQo+IE1vc3QgY29tbW9uIGF0dGFjayB2ZWN0b3IgdG9kYXksIGlzIHRhcmdldGVkIHBoaXNo aW5nIChob3NwaXRhbHMsIHRvd24gZ292ZXJubWVudHMpLg0KPiANCj4gVXNlZCB0byBoYXZl IGEgInNlcnZpY2UgbW9kZWwiLiBUaGUgaW5mZWN0ZWQgcHVudGVyIHdhcyBnaXZlbiBhbiBl bWFpbA0KPiBhZGRyZXNzLCB0byBjb252ZXJzZSB3aXRoLiBUYWxrIHRoZSBzZXJ2aWNlIGFn ZW50ICJkb3duIGZyb20gdGhyZWUNCj4gQml0Y29pbnMgdG8gdHdvIEJpdGNvaW5zIi4gKFRo YXQgdGVsbHMgeW91IHRoaXMgaGFwcGVuZWQgcXVpdGUgYSBsb25nDQo+IHRpbWUgYWdvIC0t IEJpdGNvaW5zIHdlcmUgYXQgYSBsb3cgb2YgJDMgZWFjaCBhdCBvbmUgdGltZS4pIFRoZSBz ZXJ2aWNlDQo+IGFnZW50IHdvdWxkIHNlbmQgeW91IHlvdXIga2V5LCB5b3Ugd291bGQgZGVj cnlwdCB5b3VyIGZpbGVzLg0KPiANCj4gVGhlIEJsYWNrIEhhdHMgZm91bmQgdGhpcyBtb2Rl bCB0b28gZXhwZW5zaXZlLiBJdCB0b29rIGEgbG90IG9mIHNlcnZpY2UNCj4gYWdlbnRzLiBU aGUgc2VydmljZSBhZ2VudCB0b29rIGEgY3V0LCBhbmQgc28gb24uDQo+IA0KPiBJbmZvcm1h dGlvbiBvbiB0aGUgbGF0ZXN0IChwZXJzb25hbGl6ZWQpIHRocmVhdHMgaXMgc2xpbS4NCj4g DQo+IExpa2VseSB0byBiZSB2aWEgcGhpc2hpbmcgKGNsaWNraW5nIHRoZSBHb0RhZGR5IGF0 dGFjaG1lbnQgY29uY2VybmluZyBkb21haW4gcmVuZXdhbCkuDQo+IA0KPiBSYW5zb213YXJl IGhpZGVzIHN0ZWFsdGhpbHkgZm9yIG9uZSBtb250aC4gSXQgbm8gbG9uZ2VyIGF0dGFja3Mg aW1tZWRpYXRlbHkuDQo+IEl0IHNlZWtzIHRvIHVuZGVyc3RhbmQgd2hhdCBkZWZlbnNlcyB5 b3UgaGF2ZSAoc3VjaCBhcyBiYWNrdXAgZHJpdmVzKS4NCj4gDQo+IEF0dGFjayBjYW4gYmUg ZmlsZS1ieS1maWxlLCBidXQgdGhhdCBpcyBvbGQgZmFzaGlvbmVkLiBFYWNoIGZpbGUgaGFz DQo+IGFuIGV4dGVuc2lvbiBhZGRlZCB0byB0aGUgZW5kIG9mIGl0LCBpbmRpY2F0aW5nIGl0 IGhhcyBiZWVuIGF0dGFja2VkLg0KPiBUaGUgLnhscyBhbmQgLmRvYyBhcmUgYXR0YWNrZWQg Zmlyc3QsIGFzIE9TIGZpbGVzIGFyZSB3b3J0aGxlc3MuDQo+IA0KPiAgICAgIHRheGVzLnhs cy5vc2lydXMgICAgICBteXByb3Bvc2FsLmRvYy5vc2lydXMNCj4gDQo+IEEgc2Vjb25kIGF0 dGFjayBtZWNoYW5pc20sIGlzIHRvIGNoYW5nZSB0aGUgRkRFIGtleSBhbmQgY2F1c2UNCj4g dGhlIGRyaXZlIHRvIGluc3RhbnRseSB3aW5rIG91dC4gVGhlIHBhcnQgdGhhdCBJIGRvbid0 IHVuZGVyc3RhbmQsDQo+IGlzIHdoeSB3b3VsZCB0aGUgcHJldmlvdXMgRkRFIGtleSBiZSBy ZWFkYWJsZSA/IE1ha2luZyBpdCByZWFkYWJsZSwNCj4gZW5jb3VyYWdlcyB0aGlzIHNvcnQg b2YgYXR0YWNrLg0KPiANCj4gKioqKioqKg0KPiANCj4gVGhlIHByb3Bvc2VkIGRlZmVuc2Ug bWVjaGFuaXNtcyBkb24ndCBhcHBlYXIgdG8gYWRkcmVzcyBhbGwgdGhlDQo+IGF0dGFjayBt ZXRob2RzLiBTb21lIHdpbGwgYmUgaGlkZGVuIHRvIHVzIChzdWNoIGFzIFdpbmRvd3MgRGVm ZW5kZXINCj4gYmVpbmcgImN1cmlvdXMiIGFib3V0IGFueSBhZ2VudCBhcHByb2FjaGluZyBh biBGREUga2V5KS4gVGhleSB0ZWxsIHVzDQo+IHRoYXQgcm9vdCBraXRzIGFyZSBub3QgYWxs IHRoYXQgY29tbW9uIGFueSBtb3JlLCBidXQgd2hvIGtub3dzIHdoZXRoZXINCj4gdGhleSBn byBhcyBhIG9uZS10d28gcHVuY2ggZm9yIFJhbnNvbXdhcmUuDQo+IA0KPiBNYXliZSBhIHNh ZmVyIGJhY2t1cCwgaXMgdG8gbWFudWFsbHkgYm9vdCBhIE1hY3JpdW0gQ0QgYW5kIG1ha2UN Cj4gYSBmdWxsIHRvIHRoZSBleHRlcm5hbCBkcml2ZS4gVGhlbiBzaHV0IGRvd24gYW5kIGRp c2Nvbm5lY3QgdGhlIGV4dGVybmFsDQo+IHVudGlsIG5leHQgdGltZS4NCj4gDQo+IFdoYXQg cG9zc2liaWxpdGllcyBleGlzdCwgZm9yIGF0dGFjayB2aWEgVUVGSSA/DQo+IA0KPiAgICAg UGF1bA0KDQpUaGFua3MgZm9yIHRoZSByZXBseSwgUGF1bC4NCk1heSBJIHBvc2UgdHdvIHF1 ZXN0aW9ucz8NCjEuIFdoeSBjYW4ndCBub3JtYWwgQVYgZGV0ZWN0IHRob3NlIGx1cmtpbmcg cmFuc29td2FyZSBmaWxlcz8NCjIuIERvIHlvdSB0aGluayBteSBNYWNyaXVtIGJhY2t1cCBp bWFnZSBhbmQgTWFjcml1bSBSZWZsZWN0IGJvb3Rpbmcgd2lsbCANCmJlIHN1ZmZpY2llbnQg aW4gdGhlIGV2ZW50IG9mIHJhbnNvbXdhcmU/DQoNCg0KRWQNCg==

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Paul@21:1/5 to Ed Cryer on Tue Feb 25 16:09:49 2025
    On Tue, 2/25/2025 2:02 PM, Ed Cryer wrote:


    Thanks for the reply, Paul.
    May I pose two questions?
    1. Why can't normal AV detect those lurking ransomware files?
    2. Do you think my Macrium backup image and Macrium Reflect booting will be sufficient in the event of ransomware?


    Ed

    In the event of real Ransomware, your backup is gone, from when the
    backup drive was connected to the Hot OS. If you never connect the
    backup drive, except when backing up with the Macrium CD, then I see
    less opportunity for damage to the backup drive.

    Right now, I don't know if your backup image is encrypted, or it is infected. Maybe upon restoration, it encrypts itself again.

    A zero day is sufficient, to remain dormant on the machine and have
    no signature available in Windows Defender. Microsoft likes to celebrate the cases, where a Black Hat scans their prized plum with Virustotal, giving everyone a heads up of incoming malware. But nation state actors aren't
    that stupid, and there will be no advance warning "on radar". If the ransomware doesn't tip anything over, it can hide and wait for a month if it wants. Maybe it will be "dllhost" or "rundll" or any number of other anonymous executables. It could even be a "svchost" and blend in with the crowd.

    I see no reason to be "high-fiving" one another about how safe you are.
    But generally speaking, with exceptions, you aren't really a target.
    Attacking you is not "cost effective". Yes, they could make money off
    you, but they would sooner make money off a hospital.

    Paul

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Ant@21:1/5 to Ed Cryer on Tue Feb 25 21:27:56 2025
    Ed Cryer <ed@somewhere.in.the.uk> wrote:
    Frank Slootweg wrote:
    John C. <r9jmg0@yahoo.com> wrote:
    Windows Security's "Ransomware protection" is about as much of a PITA as >> User Account Control.
    [...]
    What do YOU think about Ransomware protection?

    Not much. On my Windows 11 system, 'Controlled folder access' is *off* and I don't think I turned it off, so I assume 'off' is the default.

    I also checked on my wife's Windows 10 system and 'Controlled folder access' is off on that system as well. So the default *is* 'off',
    because I would never lessen security on that system.

    It's off in my Win10 as well; default setting.
    I wonder how it actually functions to detect ransomware?

    My own protection is a well-kept backup image.

    And being smart not to do something stupid like click on and run bad stuff. Also, keeping everything updated!
    --
    "The Lord will fulfill his purpose for me; your steadfast love, O Lord, endures forever--do not abandon the works of your hands." --Psalm 138:8. Poopy Monday!
    Note: A fixed width font (Courier, Monospace, etc.) is required to see this signature correctly.
    /\___/\ Ant(Dude) @ http://aqfl.net & http://antfarm.home.dhs.org.
    / /\ /\ \ Please nuke ANT if replying by e-mail.
    | |o o| |
    \ _ /
    ( )

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From John C.@21:1/5 to VanguardLH on Thu Feb 27 06:32:07 2025
    VanguardLH wrote:
    John C. wrote:

    Windows Security's "Ransomware protection" is about as much of a PITA as
    User Account Control.

    You were warned in the "How to boot into Windows 10 Safe Mode" thread
    when you mentioned you would enable Defender's ransomware protection.

    Yes, and it caused me grief this morning when I attempted to get some photographs off of my camera using the freeware Cam2PC. Even though I
    added the application to the "Allowed Apps" list, I still can't get my
    pictures off of the camera other than by doing it manually in File Explorer.

    It is similar to 3rd-party firewalls with an option to block all
    outgoing network connections unless you choose to block always, allow temporarily, or allow always.

    Yes, FWs like Kerio 2.1.5, which I loved. But Kerio didn't munge program function after you okayed one like PFA does.

    In both, you get an option to throttle
    what can connect by the firewall, and what can access what for
    Defender's ransomware protection. You get more protection, and you
    choose to do the additional control. Both come with whitelists, so some programs are exempted, but you'll keep getting nagged until you decide
    on block always or allow always. Eventually the nags wane as you keep
    making those decisions unless, of course, you keep installing more
    software that requires more of your decisions which you opted into
    getting.

    Too true. And eventually, a lot of people just turn off Ransomware
    Protection in Windows Security. Like I just had to do.

    --
    John C.

    Take back Microsoft from India.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From John C.@21:1/5 to All on Thu Feb 27 06:35:21 2025
    On 25/02/25 08:37 AM, Newyana2 wrote:
    On 2/25/2025 8:14 AM, John C. wrote:
    Windows Security's "Ransomware protection" is about as much of a PITA as
    User Account Control.

    I have this protection on, but man, I really don't like the way it
    blocks so many of the programs I have on my system from doing things.

    To allow an "app" (God I hate that corruption of the word APPLICATION),
    here's what you do (in case you don't know):

    1. Open Windows Security
    2. Click on "Virus & threat protection"
    3. Scroll down all the way so that you can see "Ransomware protection"
    4. Click on "Manage ransomware protection"
    5. Under "Controlled folder access" (which at this point should be in
    the "On" position), click on "Allow an app through Controlled folder
    access"
    6. Click on the "Add an allowed app" button
    7. Take it from there to add an application to the list.

    Does this PITA actually outweigh having Ransomware protection? That's a
    question I'm asking myself. As long as Windows Security doesn't actually
    remove a program before I have a chance to do this for a program, I can
    probably live with it. However, if a program actually DOES get removed,
    I will disable this protection.

    I've already turned UAC down to the lowest possible setting because it
    was distracting me way too often.

    What do YOU think about Ransomware protection?

    TIA.


        I have UAC and LUA both disabled. I don't know from
    ransomware protection. Win10 never bugs
    me. If anything does, I hunt it down and kill it without
    mercy. But I like to work without interruption. I don't like
    potholes in the road. You seem to prefer luxuriating in
    indignation. Given that, it seems to me that whatever
    you paid for Win10 was a bargain. If used properly, Win10
    can provide endless indignation fun for the whole family. :)

    I'm blundering my way through all the W10 nonsense as best I can. This
    morning, I finally gave up and turned off PFA just like I did UAC.

    What gets me is that M$ seems to believe that those two clusterfucks are acceptable and that everybody will put up with the inconveniences that
    they impose. Instead, what's actually happening is that they M$ is
    killing itself as usership of W11 is actually dropping off.

    --
    John C.

    Take back Microsoft from India.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From John C.@21:1/5 to All on Thu Feb 27 06:38:00 2025
    On 25/02/25 10:57 AM, ...w¡ñ§±¤ñ wrote:
    John C. wrote on 2/25/2025 6:14 AM:
    Windows Security's "Ransomware protection" is about as much of a PITA as
    User Account Control.

    I have this protection on, but man, I really don't like the way it
    blocks so many of the programs I have on my system from doing things.

    To allow an "app" (God I hate that corruption of the word APPLICATION),
    here's what you do (in case you don't know):

    1. Open Windows Security
    2. Click on "Virus & threat protection"
    3. Scroll down all the way so that you can see "Ransomware protection"
    4. Click on "Manage ransomware protection"
    5. Under "Controlled folder access" (which at this point should be in
    the "On" position), click on "Allow an app through Controlled folder
    access"
    6. Click on the "Add an allowed app" button
    7. Take it from there to add an application to the list.

    Does this PITA actually outweigh having Ransomware protection? That's a
    question I'm asking myself. As long as Windows Security doesn't actually
    remove a program before I have a chance to do this for a program, I can
    probably live with it. However, if a program actually DOES get removed,
    I will disable this protection.

    I've already turned UAC down to the lowest possible setting because it
    was distracting me way too often.

    What do YOU think about Ransomware protection?

    TIA.


    Just another layer of o/s hardening - Ransomware/Controlled Folder
    Access (aka CFA)
     - CFA checks apps against a list of trusted apps

    ...a list which includes almost any program which isn't installed via
    the Microsoft Store. PFE blocked me from installing the WordPerfect
    Office X9 suite until I figured out what the problem was. How convenient
    for M$ that PFE would block installation of one of their major competitors.

     - Blocks apps that are suspicious or malicious from changing files in protected folders
     - Notifies you when an app is blocked from making changes

    The default in Windows 10/11 for CFA is 'Off' - i.e. disabled, requires
    user intervention to enable.
    Based on the information provided(or lack of), it might make sense
    to turn off CFA.

    Just did it this morning.

    --
    John C.

    Take back Microsoft from India.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From John C.@21:1/5 to All on Thu Feb 27 07:31:50 2025
    Newyana2 wrote:
    John C. wrote:

    I'm blundering my way through all the W10 nonsense as best I can. This
    morning, I finally gave up and turned off PFA just like I did UAC.

       PFA?

    "Protected Folder Access". I meant CFA (Controlled Folder Access.)

    I turned off Ransomware Protection completely, as seems to be the
    default now with a fresh W10 or W11 install. This, in turn, disabled CFA.

    Sorry about the confusion.

    --
    John C.

    Take back Microsoft from India.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Frank Slootweg@21:1/5 to newyana@invalid.nospam on Thu Feb 27 16:12:52 2025
    Newyana2 <newyana@invalid.nospam> wrote:
    On 2/27/2025 9:35 AM, John C. wrote:


    I'm blundering my way through all the W10 nonsense as best I can. This morning, I finally gave up and turned off PFA just like I did UAC.

    PFA?

    Yes, PFA - Predictive Failure Analysis [1] - for the expensive ECC -
    Error Correction Code - memory in John C.'s computer!

    Just kidding. In the meantime John explained that he meant CFA,
    Controlled Folder Access.

    [1] When I searched on 'PFA', Google came up with this: <https://learn.microsoft.com/en-us/windows-hardware/drivers/whea/predictive-failure-analysis--pfa->

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Newyana2@21:1/5 to John C. on Thu Feb 27 12:11:53 2025
    On 2/27/2025 10:31 AM, John C. wrote:
    Newyana2 wrote:
    John C. wrote:

    I'm blundering my way through all the W10 nonsense as best I can. This
    morning, I finally gave up and turned off PFA just like I did UAC.

       PFA?

    "Protected Folder Access". I meant CFA (Controlled Folder Access.)

    I turned off Ransomware Protection completely, as seems to be the
    default now with a fresh W10 or W11 install. This, in turn, disabled CFA.

    Sorry about the confusion.


    I'd never heard of that. I'd never heard of ransomware
    protection. I recently set up a new computer with dual boot
    of Win10 and 11, but never noticed anything about RP. Odd.
    But when I install a system I imediately set about cleaning it
    up, so maybe that's why.

    Looking now at my 1 year old Win10 22H2, there's no mention
    of RP in the lower catacombs of the ridiculous Settings app.
    I guess it must be new. A page online says it should be listed
    there.

    These convoluted settings, intertwined with control panel,
    are even more confusing with Win11, since MS have shuffled
    everything around.

    Settings -> Udates and Security -> Windows Security ->
    Open Windows Security. If I had MP that would be yet
    another step. Why? MS don't make a cellphone OS, yet they
    seem to be trying to design Windows GUI for a cellphone. Big,
    gaint, empty windows with little functionality, and lots of
    slide controls. Maybe there's something they're not telling us.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From VanguardLH@21:1/5 to John C. on Thu Feb 27 14:03:52 2025
    "John C." <r9jmg0@yahoo.com> wrote:

    On 25/02/25 08:37 AM, Newyana2 wrote:
    On 2/25/2025 8:14 AM, John C. wrote:
    Windows Security's "Ransomware protection" is about as much of a PITA as >>> User Account Control.

    I have this protection on, but man, I really don't like the way it
    blocks so many of the programs I have on my system from doing things.

    To allow an "app" (God I hate that corruption of the word APPLICATION),
    here's what you do (in case you don't know):

    1. Open Windows Security
    2. Click on "Virus & threat protection"
    3. Scroll down all the way so that you can see "Ransomware protection"
    4. Click on "Manage ransomware protection"
    5. Under "Controlled folder access" (which at this point should be in
    the "On" position), click on "Allow an app through Controlled folder
    access"
    6. Click on the "Add an allowed app" button
    7. Take it from there to add an application to the list.

    Does this PITA actually outweigh having Ransomware protection? That's a
    question I'm asking myself. As long as Windows Security doesn't actually >>> remove a program before I have a chance to do this for a program, I can
    probably live with it. However, if a program actually DOES get removed,
    I will disable this protection.

    I've already turned UAC down to the lowest possible setting because it
    was distracting me way too often.

    What do YOU think about Ransomware protection?

    TIA.


        I have UAC and LUA both disabled. I don't know from
    ransomware protection. Win10 never bugs
    me. If anything does, I hunt it down and kill it without
    mercy. But I like to work without interruption. I don't like
    potholes in the road. You seem to prefer luxuriating in
    indignation. Given that, it seems to me that whatever
    you paid for Win10 was a bargain. If used properly, Win10
    can provide endless indignation fun for the whole family. :)

    I'm blundering my way through all the W10 nonsense as best I can. This morning, I finally gave up and turned off PFA just like I did UAC.

    What gets me is that M$ seems to believe that those two clusterfucks are acceptable and that everybody will put up with the inconveniences that
    they impose. Instead, what's actually happening is that they M$ is
    killing itself as usership of W11 is actually dropping off.

    Those are additional protections on which Microsoft has no knowlege if
    you want to act, or not. No way is Microsoft going to know every piece
    of software, and then include all the ones you want in their whitelist.
    It's up to YOU to update the whitelist.

    https://youtu.be/-lhWjgbKRhI?t=41

    With protected folders protection enabled, you don't see a "Block
    History" link? Each item that was initially blocked (because it wasn't
    in the prebuilt or your updated whitelist) can be unblocked, so you
    should not get later prompts on the same program trying to access the
    protected folders. However, if you update a program, it is a new
    program to the whitelist, because it has a new hash. Else, if just the filename were used, any malware could pretend to be a whitelisted
    program, like malware calling itself notepad.exe. A hash is stored with
    the program, so both program name and hash must match in the whitelist.

    The ransomware protection should not be enabled until after you
    installed your typical suite of software after installing Windows. Then
    enable ransomware protection, and run each of your installed programs to
    get the prompts, and exclude them, so they are allowed thereafter. If
    they get updated (by you, or via some auto-update feature), yep, they
    are NOT the same program anymore, so you have to unblock again.

    Protecting folders is YOUR choice. Microsoft does not have way to know
    what YOU want to allow access to the protected folders. Hell, you may
    not even want MS Word or Notepad to have access, because that would be
    your choice. The onus is on you to decide. There are other tools
    available to protect folders, like encrypting them with a password you
    have to enter when some process wants access. Yep, YOU have to tell it
    if YOU want to grant access.

    Protected folders does have a whitelist that you can update to remove notifications on THAT version of a program, but you have to update the whitelist either by going into blocked history or the allowed apps list.

    If you keep getting alerted on a program that you already whitelist, you
    need to determine why that program keeps morphing to look like a new
    program.

    Even without any prompts, protecting folders is not the end-all solution
    to avoid ransomware mostly because it ultimately relies on the user
    making decisions, and users are the worst protection against ransomware.
    You can find examples of folks testing Windows' ransomware protection,
    like at:

    https://www.youtube.com/watch?v=oTRJNfjh_iU

    As just mentioned, this guy is testing by accepting everything instead
    of having it blocked. He's taking the stance of users that okay
    anything and everything to see how well the protection works on its own.

    Ransomware protection aka folder protection is just another hurdle in
    defending against malware; however, it is YOU that decides if the
    hurdles are there, and it is YOU that decides who gets to jump over the hurdles. Enabling the protection does not absolve you of your
    responsibility to make the decisions. While the nags will diminish over
    time except after software updates, you'll be in the middle of an
    intensive task to then get interrupted with a nag on protection.

    Ransomware aka folder protection is protection by handholding by you.
    Some programs are already whitelisted, but not many. As you build up
    the whitelist, the nags wane. When programs are updated, they are new
    programs (have a new hash), so they get whitelisted again.

    As for convenience of whitelisting, I don't recall if Defender's alert
    window that appears telling you it blocked a program from access has
    choices, like Yes (allow once), No (block once), Yes (always allow), or
    No (always block). If not, you're stuck having to drill into the
    settings to click on an item in the block history list, or to add to the whitelist. Lots of Youtube videos discuss how to setup and configure ransomware protection, but don't show it in actual use, like what the
    alert popup looks like, or what options it affords, if any. I saw one
    YT video showing a popup alert which had:

    Windows Security
    Virus & threat protection
    Unauthorized changes blocked
    Controlled folder access blocked <process) from making changes.
    Click to see settings.

    When you got that prompt, did you click on it to go to settings where
    you could then visit the blocked history or whitelist to update them to
    include what you think is a trusted process? Besides the popup alert,
    it should also be listed in the Notification Center for you to see it
    again, and you can click on the chevron to expand the notificcation, or
    click on the notification to go into ransomware settings. Looks like
    when you click on the notification/alert, you're taken to the blocked
    history page where you can then change the action from blocked to allow. Clicking on a blocked event will show the UAC prompt, if enabled, to
    ensure you want to make the change (and not some malware), and then more details appear for the blocked event, and where you see an Actions
    button to let you choose what to do. The only action may be "Allow on
    device" which should whitelist that process to grant it access (you get
    another UAC prompt to ensure you want to exclude the process). After whitelisting the previously blocked process, you should be able to run
    it again without interferrence from ransomware protection.

    While the intent of Defender's ransomware protection is to protect data
    files, it is based on folder access. Alas, some programs actually
    install and run from doc folders, like My Documents. Stupid, but it
    happens. So, you'll get prompted on the first run of those doc-foldered programs even if they were pre-whitelisted. The program wants to load
    from a protected folder to access data files in a protected folders.
    Ransomware protection does not protect the OS, or the executables, from
    getting encrypted or infected. It is only for data file protection.
    Ransomware doesn't fuck up the OS files, because it needs those to run
    to do its encrypting, and present prompts for the ransom.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From wasbit@21:1/5 to John C. on Fri Feb 28 09:37:36 2025
    On 27/02/2025 14:32, John C. wrote:
    VanguardLH wrote:
    John C. wrote:

    Windows Security's "Ransomware protection" is about as much of a PITA as >>> User Account Control.

    You were warned in the "How to boot into Windows 10 Safe Mode" thread
    when you mentioned you would enable Defender's ransomware protection.

    Yes, and it caused me grief this morning when I attempted to get some photographs off of my camera using the freeware Cam2PC. Even though I
    added the application to the "Allowed Apps" list, I still can't get my pictures off of the camera other than by doing it manually in File Explorer.

    snip <


    Why use software to connect a camera (or mobile phone) to a PC?
    A USB memory card reader or connection by wire is my preferred method.


    --
    Regards
    wasbit

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From John C.@21:1/5 to All on Fri Feb 28 05:17:43 2025
    Newyana2 wrote:
    John C. wrote:
    Newyana2 wrote:
    John C. wrote:

    I'm blundering my way through all the W10 nonsense as best I can. This >>>> morning, I finally gave up and turned off PFA just like I did UAC.

        PFA?

    "Protected Folder Access". I meant CFA (Controlled Folder Access.)

    I turned off Ransomware Protection completely, as seems to be the
    default now with a fresh W10 or W11 install. This, in turn, disabled CFA.

    Sorry about the confusion.


        I'd never heard of that. I'd never heard of ransomware
    protection. I recently set up a new computer with dual boot
    of Win10 and 11, but never noticed anything about RP. Odd.
    But when I install a system I imediately set about cleaning it
    up, so maybe that's why.

      Looking now at my 1 year old Win10 22H2, there's no mention
    of RP in the lower catacombs of the ridiculous Settings app.
    I guess it must be new. A page online says it should be listed
    there.

     These convoluted settings, intertwined with control panel,
    are even more confusing with Win11, since MS have shuffled
    everything around.

      Settings -> Udates and Security -> Windows Security ->
    Open Windows Security. If I had MP that would be yet
    another step. Why? MS don't make a cellphone OS, yet they
    seem to be trying to design Windows GUI for a cellphone. Big,
    gaint, empty windows with little functionality, and lots of
    slide controls. Maybe there's something they're not telling us.

    Ransomware Protection has been in Windows Security since 2017. It was
    added when Windows 10 was updated to Version 1703.

    Settings
    Update & Security
    Windows Security
    Virus & threat protection
    Scroll down and click on "Manage ransomware protection
    Either turn off or on the Controlled Folder Access button.

    If you turn it on, then you'll see "Allow an app through Controlled
    folder access", when you can do what it describes.

    It's a PITA to have to deal with this until all the APPLICATIONS (GOD I
    hate the term "app") I use are allowed, so I've turned the button off
    for now. Still trying to decide whether or not it's worth the effort and frustration of adding programs to the allowed list.

    --
    John C.

    Take back Microsoft from India.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Newyana2@21:1/5 to John C. on Thu Feb 27 10:20:13 2025
    On 2/27/2025 9:35 AM, John C. wrote:


    I'm blundering my way through all the W10 nonsense as best I can. This morning, I finally gave up and turned off PFA just like I did UAC.

    PFA?

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Newyana2@21:1/5 to John C. on Fri Feb 28 11:21:55 2025
    On 2/28/2025 8:17 AM, John C. wrote:
    Newyana2 wrote:
    John C. wrote:
    Newyana2 wrote:
    John C. wrote:

    I'm blundering my way through all the W10 nonsense as best I can. This >>>>> morning, I finally gave up and turned off PFA just like I did UAC.

        PFA?

    "Protected Folder Access". I meant CFA (Controlled Folder Access.)

    I turned off Ransomware Protection completely, as seems to be the
    default now with a fresh W10 or W11 install. This, in turn, disabled CFA. >>>
    Sorry about the confusion.


        I'd never heard of that. I'd never heard of ransomware
    protection. I recently set up a new computer with dual boot
    of Win10 and 11, but never noticed anything about RP. Odd.
    But when I install a system I imediately set about cleaning it
    up, so maybe that's why.

      Looking now at my 1 year old Win10 22H2, there's no mention
    of RP in the lower catacombs of the ridiculous Settings app.
    I guess it must be new. A page online says it should be listed
    there.

     These convoluted settings, intertwined with control panel,
    are even more confusing with Win11, since MS have shuffled
    everything around.

      Settings -> Udates and Security -> Windows Security ->
    Open Windows Security. If I had MP that would be yet
    another step. Why? MS don't make a cellphone OS, yet they
    seem to be trying to design Windows GUI for a cellphone. Big,
    gaint, empty windows with little functionality, and lots of
    slide controls. Maybe there's something they're not telling us.

    Ransomware Protection has been in Windows Security since 2017. It was
    added when Windows 10 was updated to Version 1703.

    Settings
    Update & Security
    Windows Security
    Virus & threat protection
    Scroll down and click on "Manage ransomware protection
    Either turn off or on the Controlled Folder Access button.

    If you turn it on, then you'll see "Allow an app through Controlled
    folder access", when you can do what it describes.

    Ah. I see. Boy is that buried! I have it turned off.
    I have most all of that stuff turned off. Windows Defender
    seems to be trying to look busy. I haven't bothered to
    figure out how to stop it. Maybe there's some value there.
    But in general it seems pretty much useless. It thinks I have
    all kinds of malware because I left a HOSTS file copy
    on the Desktop at one point.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From VanguardLH@21:1/5 to John C. on Fri Feb 28 11:55:07 2025
    "John C." <r9jmg0@yahoo.com> wrote:

    It's a PITA to have to deal with this until all the APPLICATIONS (GOD I
    hate the term "app") I use are allowed, so I've turned the button off
    for now.

    On Windows, they were called "programs". Later "applications" got used
    which was often shortened to "app" starting around 1992 -- 10 years
    before smartphones showed up, and 24 years before Microsoft's UWP apps
    showed up in Win10.

    Microsoft came out with the UWP (Universal Windows Platform) programs
    which they called "apps" to differentiate them from Win32 programs
    (which also includes x64 programs). Often "apps" is used to cover both
    Win32 programs and UWP apps mostly because most users don't know the
    difference between Win32 and UWP code nor do they want to. Then you
    have "apps" on mobile platforms, like Android and iOS which are coded differently again.

    Microsoft has a long history of using confusing and confounding product
    names and terminology.

    Still trying to decide whether or not it's worth the effort and
    frustration of adding programs to the allowed list.

    It doesn't detect malware. It is a heuristic scheme to detect unwanted behavior only against data files due to malware, or inadvertent or
    unauthorized actions by users. Just another hurdle to jump over whether
    by malware, or by you standing there monitoring what gets to jump over
    the hurdle.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Allan Higdon@21:1/5 to newyana@invalid.nospam on Fri Feb 28 15:39:34 2025
    On Fri, 28 Feb 2025 10:21:55 -0600, Newyana2 <newyana@invalid.nospam> wrote:

    Ah. I see. Boy is that buried! I have it turned off.
    I have most all of that stuff turned off. Windows Defender
    seems to be trying to look busy. I haven't bothered to
    figure out how to stop it. Maybe there's some value there.
    But in general it seems pretty much useless. It thinks I have
    all kinds of malware because I left a HOSTS file copy
    on the Desktop at one point.



    If you're like me, an on-demand standalone AV scanner is enough.
    One really good one is Emsisoft Emergency Kit. https://www.emsisoft.com/en/home/emergency-kit/

    I've been using Hellzerg Optimizer to disable Windows Defender. https://github.com/hellzerg/optimizer/#--how-to-disable-defender-in-windows-10-1903-and-later

    I disable Tamper Protection with a .Reg file.

    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Defender\Features] "TamperProtection"=dword:00000000

    You can use Winaero Tweaker to verify that Tamper Protection and Windows Defender are disabled.
    https://winaero.com/winaero-tweaker/

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Newyana2@21:1/5 to Allan Higdon on Fri Feb 28 22:29:07 2025
    On 2/28/2025 4:39 PM, Allan Higdon wrote:


    If you're like me, an on-demand standalone AV scanner is enough.
    One really good one is Emsisoft Emergency Kit. https://www.emsisoft.com/en/home/emergency-kit/

    I've been using Hellzerg Optimizer to disable Windows Defender. https://github.com/hellzerg/optimizer/#--how-to-disable-defender-in-windows-10-1903-and-later


    I disable Tamper Protection with a .Reg file.

    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Defender\Features] "TamperProtection"=dword:00000000

    You can use Winaero Tweaker to verify that Tamper Protection and Windows Defender are disabled.
    https://winaero.com/winaero-tweaker/

    Thanks. Good notes to check out. I have occasionally
    downloaded something like Clam to do a one-time check
    when I feel a bt of paranoia. I don't think I've ever tried
    Emsisoft.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From John C.@21:1/5 to All on Sun Mar 2 05:59:14 2025
    On 25/02/28 07:29 PM, Newyana2 wrote:
    On 2/28/2025 4:39 PM, Allan Higdon wrote:


    If you're like me, an on-demand standalone AV scanner is enough.
    One really good one is Emsisoft Emergency Kit.
    https://www.emsisoft.com/en/home/emergency-kit/

    I've been using Hellzerg Optimizer to disable Windows Defender.
    https://github.com/hellzerg/optimizer/#--how-to-disable-defender-in-windows-10-1903-and-later

    I disable Tamper Protection with a .Reg file.

    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Defender\Features]
    "TamperProtection"=dword:00000000

    You can use Winaero Tweaker to verify that Tamper Protection and
    Windows Defender are disabled.
    https://winaero.com/winaero-tweaker/

      Thanks. Good notes to check out. I have occasionally
    downloaded something like Clam to do a one-time check
    when I feel a bt of paranoia. I don't think I've ever tried
    Emsisoft.

    I used to use Trendmicro's "Housecall" free online scanner a long time
    ago. Still would probably work for somebody who doesn't mind knowingly
    exposing their soft underbelly to a corporation.

    --
    John C.

    Take back Microsoft from India.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From John C.@21:1/5 to Allan Higdon on Sun Mar 2 05:55:24 2025
    On 25/02/28 01:39 PM, Allan Higdon wrote:
    On Fri, 28 Feb 2025 10:21:55 -0600, Newyana2 <newyana@invalid.nospam>
    wrote:

        Ah. I see. Boy is that buried! I have it turned off.
    I have most all of that stuff turned off. Windows Defender
    seems to be trying to look busy. I haven't bothered to
    figure out how to stop it. Maybe there's some value there.
    But in general it seems pretty much useless. It thinks I have
      all kinds of malware because I left a HOSTS file copy
    on the Desktop at one point.



    If you're like me, an on-demand standalone AV scanner is enough.
    One really good one is Emsisoft Emergency Kit. https://www.emsisoft.com/en/home/emergency-kit/

    https://en.wikipedia.org/wiki/Emsisoft

    The first line in the article is:

    "Emsisoft Ltd. (est. 2003) is a New Zealand-based anti-virus software distributed company. They are notable for decrypting ransomware attacks
    to restore data."

    I've been using Hellzerg Optimizer to disable Windows Defender. https://github.com/hellzerg/optimizer/#--how-to-disable-defender-in-windows-10-1903-and-later

    I disable Tamper Protection with a .Reg file.

    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Defender\Features] "TamperProtection"=dword:00000000

    From a MS website (with the typical too-long URL):

    "Tamper protection is a feature that helps prevent malicious apps from
    changing important Microsoft Defender Antivirus settings. This includes settings such as real-time protection and cloud-delivered protection. By ensuring these settings remain unchanged, tamper protection helps
    maintain the integrity of your device's security configuration and
    prevents malicious apps from disabling critical security features.

    If tamper protection is turned on and you're an administrator on your
    device, you can still change these settings in the Windows Security app. However, other apps can't change these settings.

    You can turn tamper protection On or Off using the toggle button.

    Note: Tamper protection doesn't affect how third-party antivirus apps
    work or how they register with Windows Security"

    You can use Winaero Tweaker to verify that Tamper Protection and Windows Defender are disabled.
    https://winaero.com/winaero-tweaker/

    --
    John C.

    Take back Microsoft from India.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From John C.@21:1/5 to VanguardLH on Sun Mar 2 06:03:27 2025
    VanguardLH wrote:
    John C. wrote:

    It's a PITA to have to deal with this until all the APPLICATIONS (GOD I
    hate the term "app") I use are allowed, so I've turned the button off
    for now.

    On Windows, they were called "programs". Later "applications" got used
    which was often shortened to "app" starting around 1992 -- 10 years
    before smartphones showed up, and 24 years before Microsoft's UWP apps
    showed up in Win10.

    Huh. Didn't know it went that far back. Don't think I ever saw the term
    "app" used back then, but who knows.

    Microsoft came out with the UWP (Universal Windows Platform) programs
    which they called "apps" to differentiate them from Win32 programs
    (which also includes x64 programs). Often "apps" is used to cover both
    Win32 programs and UWP apps mostly because most users don't know the difference between Win32 and UWP code nor do they want to. Then you
    have "apps" on mobile platforms, like Android and iOS which are coded differently again.

    Microsoft has a long history of using confusing and confounding product
    names and terminology.

    Still trying to decide whether or not it's worth the effort and
    frustration of adding programs to the allowed list.

    It doesn't detect malware. It is a heuristic scheme to detect unwanted behavior only against data files due to malware, or inadvertent or unauthorized actions by users. Just another hurdle to jump over whether
    by malware, or by you standing there monitoring what gets to jump over
    the hurdle.

    Yes, I know. This is, of course, a consideration when deciding whether
    or not to leave CFA enabled or not.

    --
    John C.

    Take back Microsoft from India.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From John C.@21:1/5 to All on Sun Mar 2 06:05:21 2025
    ...w¡ñ§±¤ñ wrote:
    John C. wrote:

    PFE blocked me from installing the WordPerfect
    Office X9 suite until I figured out what the problem was. How convenient
    for M$ that PFE would block installation of one of their major
    competitors.

    PFE?

    Same as PFA?
     - when both should have been/really meant to reference CFA?

    In other posts I've clarified that I meant to say CFA instead of PFA.
    PFE was a typo. At the time I was in a hurry because these days, I have
    a lot on my plate.

    --
    John C.
    Take back Microsoft from India.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Ant@21:1/5 to John C. on Mon Mar 3 00:46:22 2025
    John C. <r9jmg0@yahoo.com> wrote:
    VanguardLH wrote:
    John C. wrote:

    It's a PITA to have to deal with this until all the APPLICATIONS (GOD I
    hate the term "app") I use are allowed, so I've turned the button off
    for now.

    On Windows, they were called "programs". Later "applications" got used which was often shortened to "app" starting around 1992 -- 10 years
    before smartphones showed up, and 24 years before Microsoft's UWP apps showed up in Win10.

    Huh. Didn't know it went that far back. Don't think I ever saw the term
    "app" used back then, but who knows.

    I only remember "App" in macOS X or so. I can't remember if classic MacOS used .app file extension.
    --
    "Do not fret because of evil men or be envious of those who do wrong; for like the grass they will soon wither, like green plants they will soon die away." --Psalm 37:1-2. Slammy Marchy!
    Note: A fixed width font (Courier, Monospace, etc.) is required to see this signature correctly.
    /\___/\ Ant(Dude) @ http://aqfl.net & http://antfarm.home.dhs.org.
    / /\ /\ \ Please nuke ANT if replying by e-mail.
    | |o o| |
    \ _ /
    ( )

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Hank Rogers@21:1/5 to Ant on Sun Mar 2 19:19:12 2025
    Ant wrote:
    John C. <r9jmg0@yahoo.com> wrote:
    VanguardLH wrote:
    John C. wrote:

    It's a PITA to have to deal with this until all the APPLICATIONS (GOD I >>>> hate the term "app") I use are allowed, so I've turned the button off
    for now.

    On Windows, they were called "programs". Later "applications" got used
    which was often shortened to "app" starting around 1992 -- 10 years
    before smartphones showed up, and 24 years before Microsoft's UWP apps
    showed up in Win10.

    Huh. Didn't know it went that far back. Don't think I ever saw the term
    "app" used back then, but who knows.

    I only remember "App" in macOS X or so. I can't remember if classic MacOS used .app file extension.


    These days, many young people call them an "appy". And these are now
    written by folks known as "developers", not programmers. The only
    difference I can see are all the tacky tattoos and gaudy body piercings :)

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)