AppGuard 3.x 32/64 Bit

Discussion in 'other anti-malware software' started by shadek, Mar 12, 2011.

Thread Status:
Not open for further replies.
  1. siketa

    siketa Registered Member

    Joined:
    Oct 25, 2012
    Posts:
    2,718
    Location:
    Gaia
  2. Seven64

    Seven64 Guest

    With Sandboxie version 4.01 beta

    I only have to add :

    sandboxierpcss.exe
    sbiesvc.exe

    c:\sandbox folder to the folder exception list under the guarded apps tab with read/write permissions.

    Question, what is safer adding sbiesvc.exe to Power Apps or Memory Guard with ReadWrite?

    It will work either way, for me.
     
  3. Peter2150

    Peter2150 Global Moderator

    Joined:
    Sep 20, 2003
    Posts:
    20,590
    Yes, I feel I am. Problem on youtube, is 1) they may not state there qualifications, and 2) I take stuff on the internet with a grain of salt, unless I am familiar with the person.

    For example, I take the Emisisoft people's word on what they say, as I do with NVT's author, etc. But a nameless faceless person on Youtube, I use default deny.

    Pete
     
  4. Peter2150

    Peter2150 Global Moderator

    Joined:
    Sep 20, 2003
    Posts:
    20,590
    I prefer memory guard, as the rest of Appguards protections still work, where as a PowerApp has free reign.

    Also be careful of what you add as folders, as if you go to lockdown mode it might not work as you think.

    Pete
     
  5. pegr

    pegr Registered Member

    Joined:
    Apr 8, 2008
    Posts:
    2,280
    Location:
    UK
    +1 :thumb:
     
  6. Seven64

    Seven64 Guest

    Thanks Pete, do you or anyone else use the beta version 4.01. xx of SBIE? A lot has changed with it. I know I don't have to add anything to PowerApps anymore. These two sandboxiedcomlaunch.exe and sandboxiecrypto.exe do not have to be included at all.

    Wanted to know how to configure it correctly for AG.
     
  7. Brandonn2010

    Brandonn2010 Registered Member

    Joined:
    Jan 10, 2011
    Posts:
    1,854
    Oh yeah, I forgot the last time this happened it was inert upon reboot. Still wonder how it is allowed to execute in the first place.
     
  8. chris1341

    chris1341 Guest

    Remember though you need Power Apps for x64. Memory Guard exceptions won't work. SBIE4 might solve that but for now...........
     
  9. Cutting_Edgetech

    Cutting_Edgetech Registered Member

    Joined:
    Mar 30, 2006
    Posts:
    5,694
    Location:
    USA
    The test may have been lacking in some detail as to what happened to Appguard after the Rogue was allowed to run. We don't know whether Appguard's service was completely killed or not. The Appguard tray icon disappeared so the rogue was at least able to kill AppguardGUI.exe (that is if this is the service that runs the tray icon). AppGuardAgent.exe could have very well been killed. I don't believe the rogue should have been allowed to run to begin with. Also if AppguardAgent.exe was killed it would have not been contained. MBR protection would have been the only other defense at that point. MBR guard was tested against 5 different rootkits recently, and it only stopped 2 of them if I remember correctly.

    The tester's techniques appear to be conducted in a controlled manner, and have merit. I would recommend the tester show that the AppGuardAgent.exe has been killed after the rogue kills the tray icon to prove AG was fully bypassed (that is if MBR does not partially stop the threat). I believe the tester proved Appguard was at least partially bypassed if not fully bypassed. If I had my test machines right now then I would run my own test to see for myself if AppguardAgent.exe was killed. The test was run using VMware. I would run the test on a live machine instead of VMware to see if I get the same results. I don't believe VMware would have made a difference in this case. Usually if there is a difference the Malware will detect that it is being executed in a virtual machine, and will not compromise the Machine. In this case the machine was compromised.

    On another note we do not get to see any video of the test being conducted by these 3rd party testers like AV-comparatives, AV-Test.org, etc.. How do we know they were conducted correctly for sure? At least this person went through the trouble of recording his or her test so we can see how they were conducted.
     
    Last edited: Mar 10, 2013
  10. IBK

    IBK AV Expert

    Joined:
    Dec 22, 2003
    Posts:
    1,886
    Location:
    Innsbruck (Austria)
    jfyi: third-party testers collect data/logs too and for certain tests they even have videos for each test case as a proof. the results are usually scrutinized by the tested companies and they contact the testers if they have any disputes or see mistakes. that's also one of the reasons why there is usually a delay before you see results published, as first some week time is given as preview so the results can be verified to be correct before users see them. almost all vendors visit regularly testing labs to see e.g. their work / testing systems etc.
     
  11. Peter2150

    Peter2150 Global Moderator

    Joined:
    Sep 20, 2003
    Posts:
    20,590
    I just went and took a look at the appguard video. I could barely keep up with what he was doing he was moving so fast.
     
  12. Cutting_Edgetech

    Cutting_Edgetech Registered Member

    Joined:
    Mar 30, 2006
    Posts:
    5,694
    Location:
    USA
    I actually believe the test results of some of these professional third party organizations have a lot of validity to them, and hold merit. In fact I have made many post stating this when many other users on the forum said their test results were either worthless or didn't reflect real world scenarios. I was only using my statement as an example for other's reasoning for discrediting any test done by anyone other than a known professional test organization. Even when it seems obvious that their test have been conducted in a manner that should produce valid results. Questions could have been asked as to why the tester did not show if AppGuardAgent.exe was killed by showing the processes running after the Rogue killed the AppGuard tray icon. I only saw one user ask this question. I've seen nothing thus far to justify being disrespectful to the tester. I've seen a pattern of testers often becoming a target of disrespect instead of offering them advice or constructive criticism. Also, i'm a huge AG fan. I have been using AG since early version 1 beta release so I have no incentive to be bashing AG. I was one of the first beta testers of AG outside of BRN itself.
     
    Last edited: Mar 10, 2013
  13. Peter2150

    Peter2150 Global Moderator

    Joined:
    Sep 20, 2003
    Posts:
    20,590
    Well I am afraid I don't hold these people in very high regard. I've done testing to see if a product does what I want, but I don't feel the need to make and post videos. Also if indeed I found what appeared to be a serious flaw I wouldn't post a video I'd be in contact with the vendor to try and help fix it.

    So bottom line, I am suspicious of motive, and don't like the approach. Nothing personal

    Pete
     
  14. Space Ghost

    Space Ghost Registered Member

    Joined:
    Apr 21, 2011
    Posts:
    196
    Location:
    Poland
    I sent samples of malware to Barb_C. But I also wanted to warn users AppGuard to implicitly did not trust any program. Blackhole exploit kit is a popular exploit pack.
     
  15. m00nbl00d

    m00nbl00d Registered Member

    Joined:
    Jan 4, 2009
    Posts:
    6,623
    Yes, for a moment I thought superman was doing the test. :D Joke aside, I barely could see what each setting was for. :argh: Therefore, someone not already knowing where each setting is, won't know what the guy is doing.

    Resolution didn't help either.
     
  16. Peter2150

    Peter2150 Global Moderator

    Joined:
    Sep 20, 2003
    Posts:
    20,590
    Well done. Doesn't change my feelings about the "testers".
     
  17. Barb_C

    Barb_C Developer

    Joined:
    Jan 7, 2011
    Posts:
    1,234
    Location:
    Virginia
    Hello, Long time no see (and I apologize immensely for that!). Although I have not been on this board recently, customer support is always available via the AppGuard support email address (AppGuard@BlueRidgeNetworks.com). Even though I have been away, there is a team here at Blue Ridge that usually responds to those email support tickets in a timely manner.

    In the next few days, I plan on reviewing the posts on this thread since the beginning of the year and answer those that haven't been addressed (thanks to Pegr, Jmonge, Dbone, Safeguy, SpaceGhost, Peter2150, Arcanex and the many others that filled the gap during my absense I don't believe that there are many outstanding issues that I need to address).

    And lastly, as many of you have guessed, we have been focusing on the enterprise version in recent months, but I believe that the development team is going to get the go ahead very soon to work on another release of Consumer AppGuard (yea!). It will most likely be a minor release (not 4.0 for those that are waiting 4.0) which fixes the "phone home" issue and some other minor bug fixes. I will let you know more details as soon as I am notified.
     
  18. Peter2150

    Peter2150 Global Moderator

    Joined:
    Sep 20, 2003
    Posts:
    20,590
    Hi Barb

    Could you address the issus of the "bypass" reported recently in this thread.

    Pete
     
  19. Barb_C

    Barb_C Developer

    Joined:
    Jan 7, 2011
    Posts:
    1,234
    Location:
    Virginia
    AaLF, what OS are you running? I'm not sure why, but on Win7 64 bit, I am seeing the icon for removable media drives as set in my autorun file.

    If you trust the flash drive, you could "Allow USB Launches" from the AppGuard tray menu.
     
  20. Barb_C

    Barb_C Developer

    Joined:
    Jan 7, 2011
    Posts:
    1,234
    Location:
    Virginia
    AppGuard stops suspicious applications from running: AppGuard stops applications located outside of the Program Files and Windows folders unless they are published by a trusted vendor or on the AppGuard Guard List. Specifically, the following AppGuard protections accomplish this:

    Drive-by Download Protection: Stops suspicious programs from launching. Depending on the protection level, AppGuard stops or Guards applications located outside of the Program Files and Windows folders unless they are published by a trusted vendor or on the AppGuard Guard List.

    InstallGuard: Prevents installation of programs from untrusted vendors.

    AppGuard stops vulnerable applications from performing high-risk activities which may be exploited by malware: AppGuard simply blocks these activities – usually with no adverse side effects. Occasionally, when an application actually intends to perform a high-risk activity, AppGuard may block a legitimate action. In that case, the AppGuard protection level can be reduced in order to accommodate the program’s operation. Specifically, the following AppGuard protections accomplish this:

    Guarded Execution: Guarded Applications are prevented from performing high-risk activities that might be exploited by malware.

    MemoryGuard: Prevents programs from writing to or reading from other processes’ memory.

    Privacy Mode: Prevents browsers from reading private folders.
    Additionally, MBRGuard protects the computer’s master boot record.

    Regarding which applications to Guard: Any application that processes data or files originating from outside its host ought to be guarded. Any user-application can be guarded as long as it follows Microsoft's recommended best practices and does not write to the HKLM registry hive or to certain system directories. Not all applications follow these practices so any applications that are added to the Guard List should be tested while guarded to ensure that AppGuard does not interfere with their desired operation. Sometimes AppGuard will block an operation, but the guarded application still runs normally. In this case you may want AppGuard to disable all alerts or Ignore some of the messages for this application.
    Also any applications or services that run in the System context should not be Guarded.

    An application may actually consist of several executables. It may not be necessary to add all of the executables to the Guard List. If an executable is never called directly (i.e. it is always called from a parent process), then it is only necessary to add the parent process to the Guard List. AppGuard’s patented technology automatically Guards any application that is invoked by a Guarded parent process.
     
  21. Barb_C

    Barb_C Developer

    Joined:
    Jan 7, 2011
    Posts:
    1,234
    Location:
    Virginia
    Because AppGuard does not do scans, a fast machine is not required. Your machine should be fine. The recommended system requirements are:

    • Minimum 1.80 GHz 1.00 GB of RAM
    • 10 MB Hard Disk free space.
     
  22. Barb_C

    Barb_C Developer

    Joined:
    Jan 7, 2011
    Posts:
    1,234
    Location:
    Virginia
    If you are not planning on installing software from a web site, I would recommend using the Locked Down setting. This will absolutely stop any nasties that are trying to get into your system via the browser. That being said, I think most people use the High protection level and have not been compromised.
     
  23. Barb_C

    Barb_C Developer

    Joined:
    Jan 7, 2011
    Posts:
    1,234
    Location:
    Virginia
    The license is for 3 computers total. Also, we have had some users install on their clients or customers PCs.
     
  24. Barb_C

    Barb_C Developer

    Joined:
    Jan 7, 2011
    Posts:
    1,234
    Location:
    Virginia
    Good idea! Not sure why we didn't think of that. We'll try it in our lab and perhaps add windows update to our default policy in the next release.
     
  25. Barb_C

    Barb_C Developer

    Joined:
    Jan 7, 2011
    Posts:
    1,234
    Location:
    Virginia
    You are correct!
     
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.