Windows Defender Firewall

Discussion in 'other firewalls' started by Mr.X, Oct 7, 2017.

  1. EASTER

    EASTER Registered Member

    Joined:
    Jul 28, 2007
    Posts:
    11,493
    Location:
    U.S.A. (South)
    WF doesn't seem to be affected by @itman's snippet since powershell Full Language AND AS Admin is also up. Windows 11
    sshot-2024-09-02-17-51-53.jpg
    Just yesterday cleared and reset AppLocker after conducting some successful tests. Double Checked the registry under the HKEY_LOCAL_Machine\Software\Policies\Microsoft\Windows\SrpV2 key to be sure. All yesterday
     
    Last edited: Sep 2, 2024
  2. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,644
    Location:
    U.S.A.
    Appears you didn't run PowerShell as Admin.
     
  3. EASTER

    EASTER Registered Member

    Joined:
    Jul 28, 2007
    Posts:
    11,493
    Location:
    U.S.A. (South)
    I'll play with that snippet later to find out why. But Powershell on this Windows 11 even has a separate OPEN POWESHELL HERE AS ADMIN in addition to my custom context menu Elevated Powershell
     
  4. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,644
    Location:
    U.S.A.
    PowerShell in Admin mode appears as follow;
    PS_Admin.png
     
  5. EASTER

    EASTER Registered Member

    Joined:
    Jul 28, 2007
    Posts:
    11,493
    Location:
    U.S.A. (South)
    I run a test check. It's elevated with Admin. In fact i have code to elevate to SYSTEM when necessary.
    AS i said i will toy with that line later to see what is what why it doesn't run.
    sshot-2024-09-02-19-13-49.jpg
     
  6. wat0114

    wat0114 Registered Member

    Joined:
    Aug 5, 2012
    Posts:
    4,097
    Location:
    Canada
    Hi @EASTER

    I launched powershell as administrator as seen in screen shots and easily disabled Windows Security Firewall profiles. I'm just running Windows Security with Andy Ful's WHHL tool on Windows 11, 23H2.

    open powersshell as admin.jpg powershell disable windows firewall.png windows firewall disabled.jpg

    EDIT

    maybe you need the path: C:\Windows\System32> ?

    Edit #2

    Also worked using powershell x64
     
    Last edited: Sep 2, 2024
  7. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,644
    Location:
    U.S.A.
    I will also add that creating a script to run Powershell as Admin silently is tricky but I am sure the malware creator's have one. Best way might be via .Net.
     
  8. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    18,047
    Location:
    The Netherlands
    I haven't followed all of the discussion, but just to clarify, this will also bypass WFC's Secure Rules and Secure Profile settings?
     
  9. EASTER

    EASTER Registered Member

    Joined:
    Jul 28, 2007
    Posts:
    11,493
    Location:
    U.S.A. (South)
    Last edited: Sep 4, 2024
  10. alexandrud

    alexandrud Developer

    Joined:
    Apr 14, 2011
    Posts:
    2,515
    Location:
    Romania
    The answer is no. This is why these extra features exist, to enhance the security.
     
  11. EASTER

    EASTER Registered Member

    Joined:
    Jul 28, 2007
    Posts:
    11,493
    Location:
    U.S.A. (South)
    @itman- Looks like @alexandrud's answer to @Rasheed187's Q on THAT is also another useful block

    Simple, plain communicating. And Security best of all. Another reason WFC is been time tested with my systems.
     
  12. i7ii

    i7ii Registered Member

    Joined:
    Sep 4, 2024
    Posts:
    7
    Location:
    Europe
    No. The solution is quite simple: Password Protected User Interface.

    It's 2024 and Microsoft still fails at the most basic logic behind "Administrative Privileges" as in "Password Protection". You have the option to use a password while Signing-in - but beyond that - one can easily execute and access any app with Admin Privileges. Really don't get why they didn't borrowed - such a simple practice from Linux Distros. That being said - devs can still protect their apps by implementing Password Protection - while accessing the UI. Since obviously, Admin privileges - can not bypass that. One would need a pretty complicated malware - to be able to brute-force the password as well.
     
  13. tnodir

    tnodir Registered Member

    Joined:
    Oct 21, 2017
    Posts:
    299
    Location:
    etc
    1. If any program can run as Admin on your system, then the system is not secure.
    2. MS refuses security issues due to Admin rights.

    As you can disable Windows Firewall with Admin rights, so you also can disable/uninstall/etc Comodo Firewall too.
     
  14. i7ii

    i7ii Registered Member

    Joined:
    Sep 4, 2024
    Posts:
    7
    Location:
    Europe
    The way you put it - makes sense if you used only Linux up to this point and never seen a Windows System beyond a corporate environment or a public domain (like a school). Point being... when you buy a System with Windows (be it Desktop or Portable) - comes set-up with Admin account out of the box (obviously). Tho, the owner of this new systems could be a 81 years old grandpa, a 6 year old nephew or anyone in between (not just lacking basic Windows knowledge - which doesn't say much - but even the mental capability to follow some common sense rules). That being said - and taking the majority of Windows users into account - Microsoft devs deemed Windows Firewall as a lost cause (one of the least improved/updated features - or more like... "better than nothing"). Security wise - most of their resources are reserved for all the other security features - as a preventive measure against unwanted intruders (like a Trojan Malware exploiting some vulnerability and running as Admin). If those fail, it is what it is - as far as M$ is concerned.

    This days and for quite some time now (close to two decades) - tons of 3rd party security apps emerged trying to fill that gap (well, competition wise - it's Microsoft who struggles to compete with 3rd party security apps - not the other way around). And yet... most devs seem to follow the same principal (as if fond of risk taking) - by not including a basic yet common sense feature (especially for a security app) like a "Password Protected User Interface". Most but not all... among 3rd party Firewalls - EVORIM understood this part (implementing a Password Protected User Interface for Free Firewall). Which i find quite baffling... seeing that all the big boys (most popular) - couldn't think of something so obvious. Anyway, the best implementation of this feature - can be found in a password manager: KeePassXC (which requires a password to access the database - same as KeePass - but it's also including a Windows Security Feature - where beyond the password - it also needs the Login Pin).
     
  15. tnodir

    tnodir Registered Member

    Joined:
    Oct 21, 2017
    Posts:
    299
    Location:
    etc
    I mainly use only Windows.

    And top security rules for Windows:
    1. Do not work as Admin.
    2. Set UAC to max level.

    Because, if malware can run as Admin, then game is over.

    At least malware can format your disks, so no passwords are required.)
     
  16. i7ii

    i7ii Registered Member

    Joined:
    Sep 4, 2024
    Posts:
    7
    Location:
    Europe
    Yes, malware can also be have a destructive purpose - but most commonly - it's a combination of malware + spyware - where the main purpose of the malware is to gain unauthorized access - and inject the spyware in question. Chaos/Destructive malware - was primarily devolved by children (immature individuals) - just having fun by spreading chaos or aiming to become infamous black hat hackers. But that was more common back in the old days - when online currencies or even using a credit card (let alone Crypto-Currency) - was still a new thing. This days (and for quite some time now) - malware is developed by cyber-criminals (or even kids who have such intent). Unless it's some corporate move or some type of sabotage - where destruction of data is the desired outcome - it's less likely to bump into that type of malware. While at the same time, there's probably quite a lot of individuals - with silent/passive malware (+ spyware) - which stays hidden (even design to leave a minimal digital footprint) - residing on infected systems for months if not years. Until, accidentally discovered by some 3rd party security app or an updated security update for Windows. Maybe even injected at Kernel Level.

    As mentioned in the other post, most common accounts for Windows - are Admin accounts. Only the corporate/bossiness world has strict user account policies as a standard - and same goes for schooling environments. This is just a common sense policy - adopted by local Administrators - to make their job easier. Tho, Deep Freeze Windows Snapshots was preferable - if endorsed by upper management.
     
  17. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    18,047
    Location:
    The Netherlands
    OK cool, so WFC actively blocks malware (no matter if they run with admin access), from disabling the Windows Firewall, pretty cool.

    This is not true, it doesn't matter if malware runs as admin, because behavior blockers can still block them from stuff like code injection, modifying registry, modifying files, keylogging. A good anti-malware solution will protect itself from being terminated.
     
  18. EASTER

    EASTER Registered Member

    Joined:
    Jul 28, 2007
    Posts:
    11,493
    Location:
    U.S.A. (South)
    @itman - Tested your script on Windows 10 IoT Enterprise and sure enough brought down the firewall in a flash. I added True to the same scipt to re-enable.

    So yes it works- Is there a way to BLOCK it from knocking it out even if Powershell forces that little snipper to turn it off? MS obviously shows no provisions against such a simple snippet that can put it out of commission
     
    Last edited: Sep 15, 2024
  19. EASTER

    EASTER Registered Member

    Joined:
    Jul 28, 2007
    Posts:
    11,493
    Location:
    U.S.A. (South)
    Last edited: Sep 15, 2024
  20. EASTER

    EASTER Registered Member

    Joined:
    Jul 28, 2007
    Posts:
    11,493
    Location:
    U.S.A. (South)
    Above is with Powershell 7.4.5

    This is with the default Powershell 5

    sshot-2024-09-15-06-39-20.jpg
     
  21. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,644
    Location:
    U.S.A.
    Well and fine. But is the average Win 10/11 user using WFC?
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.