Windows Defender Firewall

Discussion in 'other firewalls' started by Mr.X, Oct 7, 2017.

  1. EASTER

    EASTER Registered Member

    WF doesn't seem to be affected by @itman's snippet since powershell Full Language AND AS Admin is also up. Windows 11
    sshot-2024-09-02-17-51-53.jpg
    Just yesterday cleared and reset AppLocker after conducting some successful tests. Double Checked the registry under the HKEY_LOCAL_Machine\Software\Policies\Microsoft\Windows\SrpV2 key to be sure. All yesterday
     
    Last edited: Sep 2, 2024
  2. itman

    itman Registered Member

    Appears you didn't run PowerShell as Admin.
     
  3. EASTER

    EASTER Registered Member

    I'll play with that snippet later to find out why. But Powershell on this Windows 11 even has a separate OPEN POWESHELL HERE AS ADMIN in addition to my custom context menu Elevated Powershell
     
  4. itman

    itman Registered Member

    PowerShell in Admin mode appears as follow;
    PS_Admin.png
     
  5. EASTER

    EASTER Registered Member

    I run a test check. It's elevated with Admin. In fact i have code to elevate to SYSTEM when necessary.
    AS i said i will toy with that line later to see what is what why it doesn't run.
    sshot-2024-09-02-19-13-49.jpg
     
  6. wat0114

    wat0114 Registered Member

    Hi @EASTER

    I launched powershell as administrator as seen in screen shots and easily disabled Windows Security Firewall profiles. I'm just running Windows Security with Andy Ful's WHHL tool on Windows 11, 23H2.

    open powersshell as admin.jpg powershell disable windows firewall.png windows firewall disabled.jpg

    EDIT

    maybe you need the path: C:\Windows\System32> ?

    Edit #2

    Also worked using powershell x64
     
    Last edited: Sep 2, 2024
  7. itman

    itman Registered Member

    I will also add that creating a script to run Powershell as Admin silently is tricky but I am sure the malware creator's have one. Best way might be via .Net.
     
  8. Rasheed187

    Rasheed187 Registered Member

    I haven't followed all of the discussion, but just to clarify, this will also bypass WFC's Secure Rules and Secure Profile settings?
     
  9. EASTER

    EASTER Registered Member

    Last edited: Sep 4, 2024
  10. alexandrud

    alexandrud Developer

    The answer is no. This is why these extra features exist, to enhance the security.
     
  11. EASTER

    EASTER Registered Member

    @itman- Looks like @alexandrud's answer to @Rasheed187's Q on THAT is also another useful block

    Simple, plain communicating. And Security best of all. Another reason WFC is been time tested with my systems.
     
  12. i7ii

    i7ii Registered Member

    No. The solution is quite simple: Password Protected User Interface.

    It's 2024 and Microsoft still fails at the most basic logic behind "Administrative Privileges" as in "Password Protection". You have the option to use a password while Signing-in - but beyond that - one can easily execute and access any app with Admin Privileges. Really don't get why they didn't borrowed - such a simple practice from Linux Distros. That being said - devs can still protect their apps by implementing Password Protection - while accessing the UI. Since obviously, Admin privileges - can not bypass that. One would need a pretty complicated malware - to be able to brute-force the password as well.
     
  13. tnodir

    tnodir Developer

    1. If any program can run as Admin on your system, then the system is not secure.
    2. MS refuses security issues due to Admin rights.

    As you can disable Windows Firewall with Admin rights, so you also can disable/uninstall/etc Comodo Firewall too.
     
  14. i7ii

    i7ii Registered Member

    The way you put it - makes sense if you used only Linux up to this point and never seen a Windows System beyond a corporate environment or a public domain (like a school). Point being... when you buy a System with Windows (be it Desktop or Portable) - comes set-up with Admin account out of the box (obviously). Tho, the owner of this new systems could be a 81 years old grandpa, a 6 year old nephew or anyone in between (not just lacking basic Windows knowledge - which doesn't say much - but even the mental capability to follow some common sense rules). That being said - and taking the majority of Windows users into account - Microsoft devs deemed Windows Firewall as a lost cause (one of the least improved/updated features - or more like... "better than nothing"). Security wise - most of their resources are reserved for all the other security features - as a preventive measure against unwanted intruders (like a Trojan Malware exploiting some vulnerability and running as Admin). If those fail, it is what it is - as far as M$ is concerned.

    This days and for quite some time now (close to two decades) - tons of 3rd party security apps emerged trying to fill that gap (well, competition wise - it's Microsoft who struggles to compete with 3rd party security apps - not the other way around). And yet... most devs seem to follow the same principal (as if fond of risk taking) - by not including a basic yet common sense feature (especially for a security app) like a "Password Protected User Interface". Most but not all... among 3rd party Firewalls - EVORIM understood this part (implementing a Password Protected User Interface for Free Firewall). Which i find quite baffling... seeing that all the big boys (most popular) - couldn't think of something so obvious. Anyway, the best implementation of this feature - can be found in a password manager: KeePassXC (which requires a password to access the database - same as KeePass - but it's also including a Windows Security Feature - where beyond the password - it also needs the Login Pin).
     
  15. tnodir

    tnodir Developer

    I mainly use only Windows.

    And top security rules for Windows:
    1. Do not work as Admin.
    2. Set UAC to max level.

    Because, if malware can run as Admin, then game is over.

    At least malware can format your disks, so no passwords are required.)
     
  16. i7ii

    i7ii Registered Member

    Yes, malware can also be have a destructive purpose - but most commonly - it's a combination of malware + spyware - where the main purpose of the malware is to gain unauthorized access - and inject the spyware in question. Chaos/Destructive malware - was primarily devolved by children (immature individuals) - just having fun by spreading chaos or aiming to become infamous black hat hackers. But that was more common back in the old days - when online currencies or even using a credit card (let alone Crypto-Currency) - was still a new thing. This days (and for quite some time now) - malware is developed by cyber-criminals (or even kids who have such intent). Unless it's some corporate move or some type of sabotage - where destruction of data is the desired outcome - it's less likely to bump into that type of malware. While at the same time, there's probably quite a lot of individuals - with silent/passive malware (+ spyware) - which stays hidden (even design to leave a minimal digital footprint) - residing on infected systems for months if not years. Until, accidentally discovered by some 3rd party security app or an updated security update for Windows. Maybe even injected at Kernel Level.

    As mentioned in the other post, most common accounts for Windows - are Admin accounts. Only the corporate/bossiness world has strict user account policies as a standard - and same goes for schooling environments. This is just a common sense policy - adopted by local Administrators - to make their job easier. Tho, Deep Freeze Windows Snapshots was preferable - if endorsed by upper management.
     
  17. Rasheed187

    Rasheed187 Registered Member

    OK cool, so WFC actively blocks malware (no matter if they run with admin access), from disabling the Windows Firewall, pretty cool.

    This is not true, it doesn't matter if malware runs as admin, because behavior blockers can still block them from stuff like code injection, modifying registry, modifying files, keylogging. A good anti-malware solution will protect itself from being terminated.
     
  18. EASTER

    EASTER Registered Member

    @itman - Tested your script on Windows 10 IoT Enterprise and sure enough brought down the firewall in a flash. I added True to the same scipt to re-enable.

    So yes it works- Is there a way to BLOCK it from knocking it out even if Powershell forces that little snipper to turn it off? MS obviously shows no provisions against such a simple snippet that can put it out of commission
     
    Last edited: Sep 15, 2024
  19. EASTER

    EASTER Registered Member

    Last edited: Sep 15, 2024
  20. EASTER

    EASTER Registered Member

    Above is with Powershell 7.4.5

    This is with the default Powershell 5

    sshot-2024-09-15-06-39-20.jpg
     
  21. itman

    itman Registered Member

    Well and fine. But is the average Win 10/11 user using WFC?
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.
    Dismiss Notice