home *** CD-ROM | disk | FTP | other *** search
/ Computer Active Guide 2009 February / UG2.ISO / Programos / OutpostSecuritySuiteProInstall_samag.exe / {code_GetDest} / machine.ini < prev    next >
Encoding:
INI File  |  2009-01-23  |  33.3 KB  |  894 lines

  1. ; Warning! Agnitum Ltd. is not responsible for your system security and proper functioning
  2. ; in case of manual modification of this file
  3.  
  4. ; -------------------------------------------------------------------------------------------------------------------------
  5. ; General Settings
  6. ; -------------------------------------------------------------------------------------------------------------------------
  7.  
  8. [General]
  9. ; This value configures firewall driver behavior in case of unexpected ACS shutdown.
  10. ; If TRUE, all network activity is blocked.
  11. ExitProtection=TRUE
  12.  
  13. ; Protection of Outpost files and registry after service shutdown.
  14. SelfProtectinOnExit=TRUE
  15.  
  16. ; Enable or disable TCP telnet server on 805 port
  17. EnableDebugTCPServer=false
  18.  
  19. ; Enable or disable monitor(op_mon) start/stop service(acs)
  20. MonitorControllService=true
  21.  
  22. ; Do you want to start acs service if outpost gui is started
  23. StartACSOnMonitorStartup=yes
  24.  
  25. ; Disables sending and receiving rules to/from driver. Use for debug purposes
  26. DisableSendDriverRules=false
  27.  
  28. ; Enable or disable corporate mode functionality
  29. CorporateMode=false
  30.  
  31.  
  32. [GeneralDebug]
  33. ; This value configures firewall driver behavior in case of unexpected ACS shutdown.
  34. ; If TRUE, all network activity is blocked.
  35. ExitProtection=FALSE
  36.  
  37. ; Protection of Outpost files and registry after service shutdown.
  38. SelfProtectinOnExit=FALSE
  39.  
  40. ; Enable or disable TCP telnet server on 805 port
  41. EnableDebugTCPServer=true
  42.  
  43. ; Enable or disable monitor(op_mon) start/stop service(acs)
  44. MonitorControllService=false
  45.  
  46. ; Do you want to start acs service if outpost gui is started
  47. StartACSOnMonitorStartup=true
  48.  
  49. ; Disables sending and receiving rules to/from driver. Use for debug purposes
  50. DisableSendDriverRules=false
  51.  
  52. ; Enable or disable corporate mode functionality
  53. CorporateMode=false
  54.  
  55. [GlobalFirewallRules]
  56.  
  57. ; block netbios rules
  58. BlockNetbios=yes
  59.  
  60. ; block no-first fragments arrives before first fragment
  61. BlockNoOrderedFragment=yes
  62.  
  63. ; block icmp do not allowed by settings
  64. BlockNotAllowedICMP=yes
  65.  
  66. ; -------------------------------------------------------------------------------------------------------------------------
  67. ; Antileak Settings
  68. ; -------------------------------------------------------------------------------------------------------------------------
  69. [Antileak]
  70.  
  71. ; Allow controlling the TerminateProcess API
  72. ProcessTerminateControl=yes
  73.  
  74. ; Allow controlling the Direct Disk access
  75. DirectDiskControl=yes
  76.  
  77. ; -------------------------------------------------------------------------------------------------------------------------
  78. ; AFW Driver Settings
  79. ; -------------------------------------------------------------------------------------------------------------------------
  80. [AFW]
  81.  
  82. ; Allow traffic processing in user mode.
  83. EnableContentHandler=TRUE
  84. EnableContentProcessing=TRUE
  85.  
  86. ; -------------------------------------------------------------------------------------------------------------------------
  87. ; On Access Virus Scanner Settings
  88. ; -------------------------------------------------------------------------------------------------------------------------
  89. [OnAccessScanner]
  90.  
  91. ; Enable on-access scanner functionality. This functionality can be disanled due to compatibility reason
  92. ; with third-party AV software
  93. EnableScanner=true
  94.  
  95. ; If enabled, on-access scanner do not scan files on close.
  96. CompatibilityMode=false
  97.  
  98. ; If enabled, on-access scanner do not scan files on any access
  99. CompatibilityDisableOnAnyAccess=false
  100.  
  101. ; If enabled, use extended attributes for cache files(not modified attributes)
  102. ; depricated EnableAttributes=true
  103. CompatibilityEnableAttributes=true
  104.  
  105. ; -------------------------------------------------------------------------------------------------------------------------
  106. ; Antimalware Settings
  107. ; -------------------------------------------------------------------------------------------------------------------------
  108. [Antimalware]
  109. Engines=hax,asw,vb
  110. RebootScanProfile=
  111. RebootScan=FALSE
  112.  
  113.  
  114. ; -------------------------------------------------------------------------------------------------------------------------
  115. ; Autoupdate Settings
  116. ; -------------------------------------------------------------------------------------------------------------------------
  117. [update]
  118.  
  119. ; Path to the update server including root folder.
  120. server=http://updates.agnitum.com/update_suite20
  121.  
  122. ; Local path for update operation. This folder will contain all files, created during update operation.
  123. update_dir=update_oss20
  124.  
  125. [ConfigWizard]
  126. UpdatePreset=FALSE
  127. SmartScan=TRUE
  128.  
  129. ; -------------------------------------------------------------------------------------------------------------------------
  130. ; News download Settings
  131. ; -------------------------------------------------------------------------------------------------------------------------
  132. [news]
  133.  
  134. ; news download path from the root of acs.exe
  135. NewsPath=news
  136.  
  137. ; date of last news downloaded from server
  138. ;LastNewsBuild=1
  139.  
  140.  
  141. [Languages]
  142. CurrentLang=en
  143. LangList=en|ru
  144.  
  145. ; -------------------------------------------------------------------------------------------------------------------------
  146. ; Multimacros Description
  147. ; -------------------------------------------------------------------------------------------------------------------------
  148. ; Records containing such fragments will be expanded into several records. 
  149. ; For example:
  150. ; REGISTRY\{MachineOrUser}\Software\Microsoft\Windows\CurrentVersion\Run
  151. ; will be expanded as:
  152. ; REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Run
  153. ; REGISTRY\<User>\Software\Microsoft\Windows\CurrentVersion\Run
  154.  
  155. [SoftwareClasses64]
  156. ; 'Software' registry section description for x86 and x64 Windows platforms.
  157. SOFTWARE\CLASSES\
  158. SOFTWARE\CLASSES\Wow6432Node
  159.  
  160. [MachineOrUser]
  161. ; Description of registry sections that are common for a user and a system.
  162. MACHINE
  163. <User>
  164.  
  165. [OpenOrRunAs]
  166. ; Registry records - either Open, or RunAs - for shell.
  167. open
  168. runas
  169.  
  170. [ControlSet]
  171. ; x64 interceptor identifies ControlSet* as CurrentControlSet.
  172. ControlSet*
  173. CurrentControlSet
  174.  
  175. ; pre-defined groups:
  176. ; [System64]
  177. ; [Software64]
  178. ; [SoftwareClasses64]
  179.  
  180. ; -------------------------------------------------------------------------------------------------------------------------
  181. ; Macros Description
  182. ; -------------------------------------------------------------------------------------------------------------------------
  183.  
  184. [Macro]
  185. ; This section contains macro definitions. They can be applied to SelfProtection rules.
  186. ; Macros is defined in the following format: 
  187. ; MacroName=Value
  188. ; Macros is used the following way: <MacroName>. <MacroName> substring is replaced by Value.
  189. ; Recursive macros definition is allowed, for example:
  190. ; Macro1=aaa
  191. ; Macro2=<Macro1>bbb
  192. ; However in direct sequence only (Macro1 macros should be defined before using Macro2).
  193. ; WindowsDir and SystemDir macroses are already defined.
  194. DriversDir=<SystemDir>\Drivers
  195. FiltDir=<SystemDir>\Filt
  196. FullAccess=read write rename delete exec connect open_process thread_start thread_stop write_mem thread_ctx
  197. NoLearn=no_learn_open no_learn_exec no_learn_read no_learn_write no_learn_create no_learn_delete no_learn_rename
  198. LimitedAccess=no_learn_open read exec thread_start no_set_hook no_send_close allow_init_dde no_send_input 
  199. LimitedAccessNoLearn=<LimitedAccess> <NoLearn>
  200. AllFiles=*
  201. SystemDir32OrWow=<WindowsDir>\{System64}
  202. MachineServices=MACHINE\System\{ControlSet}\Services
  203. MachineControl=MACHINE\System\{ControlSet}\Control
  204. MachineCurrentVersion=MACHINE\Software\Microsoft\Windows\CurrentVersion
  205. MachineNTCurrentVersion3264=MACHINE\{Software64}\Microsoft\Windows NT\CurrentVersion
  206. CurrentVersionUserMachine3264={MachineOrUser}\{Software64}\Microsoft\Windows\CurrentVersion
  207. User=USER\*
  208.  
  209. ; Compiler directories are added to exclusions for debug convenience.
  210. [VCDirs]
  211. e:\msdev.2005
  212. e:\msdev.2008
  213. C:\Program Files\Microsoft Visual Studio 8
  214. c:\Program Files\Microsoft Visual Studio 9.0
  215.  
  216. ; Compiler files
  217. [Compilers]
  218. cl.exe
  219. link.exe
  220.  
  221. ; Windbg directories are added to exclusions for debug convenience.
  222. [WinDBGDirs]
  223. c:\Program Files\Debugging Tools for Windows
  224. c:\Program Files (x86)\Debugging Tools for Windows
  225.  
  226. ; Compiler files
  227. [DebuggerFiles]
  228. agestore.exe
  229. breakin.exe
  230. cdb.exe
  231. dbengprx.exe
  232. dbgrpc.exe
  233. dbgsrv.exe
  234. dbh.exe
  235. dumpchk.exe
  236. dumpexam.exe
  237. gflags.exe
  238. i386kd.exe
  239. ia64kd.exe
  240. kd.exe
  241. kdbgctrl.exe
  242. kdsrv.exe
  243. kill.exe
  244. list.exe
  245. logger.exe
  246. logviewer.exe
  247. ntsd.exe
  248. remote.exe
  249. rtlist.exe
  250. symchk.exe
  251. symstore.exe
  252. tlist.exe
  253. umdh.exe
  254. windbg.exe
  255.  
  256. ; Sysinternals directories are added to exclusions for debug convenience.
  257. [SysInternalDirs]
  258. c:\Sys Internals
  259.  
  260. ; Compiler files
  261. [SysInternalFiles]
  262. ProcessExplorer\procexp.exe
  263. ProcessMonitor\Procmon.exe
  264.  
  265. ; Compiler files are added to exclusions for debug convenience.
  266. [VCFiles]
  267. {VCDirs}\common7\ide\devenv.exe
  268. {VCDirs}\vc\bin\x86_amd64\{Compilers}
  269. {VCDirs}\vc\bin\md64\{Compilers}
  270. {VCDirs}\vc\bin\{Compilers}
  271. {VCDirs}\Common7\IDE\Remote Debugger\x64\msvsmon.exe
  272. {VCDirs}\Common7\IDE\mspdbsrv.exe
  273.  
  274. ; WinDBG files are added to exclusions for debug convenience.
  275. [WinDbgFiles]
  276. {WinDBGDirs}\{DebuggerFiles}
  277.  
  278. ; SysInternals files are added to exclusions for debug convenience.
  279. [WinDbgFiles]
  280. {WinDBGDirs}\{DebuggerFiles}
  281.  
  282. ; SysInternals files are added to exclusions for debug convenience.
  283. [SysIntFiles]
  284. {SysInternalDirs}\{SysInternalFiles}
  285.  
  286. ; -------------------------------------------------------------------------------------------------------------------------
  287. ; Self-Protection Settings
  288. ; -------------------------------------------------------------------------------------------------------------------------
  289. [UserAntileakExclusions]
  290. ; This section contains applications that are not monitored by Anti-leak.
  291. <SystemDir>\alg.exe
  292. <SystemDir>\dwm.exe
  293. <SystemDir>\wmiprvse.exe
  294. <SystemDir>\wdfmgr.exe
  295. <SystemDir>\taskeng.exe
  296.  
  297. [AntileakExclusions]
  298. ; This section contains applications that are not monitored by Anti-leak.
  299. <SystemDir>\ntoskrnl.exe
  300. <SystemDir>\csrss.exe
  301. <SystemDir>\lsass.exe
  302. <SystemDir>\lsm.exe
  303. <SystemDir>\smss.exe
  304. <SystemDir>\svchost.exe
  305. <SystemDir>\winlogon.exe
  306. <SystemDir>\taskeng.exe
  307. {OutpostExecutable}
  308. {UserAntileakExclusions}
  309.  
  310. [SelfProtectionExclusions]
  311. ; This section contains self-protection exclusions.
  312.  
  313. [OutpostExecutable]
  314. ; This section defines a set of applications that have access to Outpost folder and registry.
  315. <ExecDir>\acs.exe
  316. <ExecDir>\op_mon.exe
  317. <ExecDir>\feedback.exe
  318. <ExecDir>\unins0??.exe
  319. <ExecDir>\plugins\anti-spam\asp_srv.exe
  320. <ExecDir>\plugins\anti-spam.x64\asp_srv.exe
  321.  
  322. [DriverNames]
  323. sandbox
  324. afw
  325. afwcore
  326. vbengnt
  327.  
  328. [DriverPluginNames]
  329. vbfilt
  330. aswfilt
  331.  
  332. [OutpostFiles]
  333. ; This section describes the set of Outpost files.
  334. <ExecDir>\*
  335. <FiltDir>\*
  336. <DriversDir>\afw.sys
  337. <DriversDir>\afwcore.sys
  338. <DriversDir>\sandbox.sys
  339. <DriversDir>\sandbox64.sys
  340. <DriversDir>\vbengnt.sys
  341.  
  342. <SystemDir>\config\prcdrv.acl
  343. <SystemDir>\config\prc.acl
  344. <SystemDir>\config\afw_db.conf
  345. <SystemDir>\config\afw_hm.conf
  346.  
  347.  
  348. [OutpostRegistry]
  349. ; Registry keys which only Outpost has access to.
  350. REGISTRY\<MachineCurrentVersion>\Uninstall\Agnitum Outpost Firewall Pro*\*
  351. REGISTRY\<MachineCurrentVersion>\Uninstall\Agnitum Outpost Security Suite Pro*\*
  352. REGISTRY\<MachineCurrentVersion>\Run\OutpostMonitor
  353. REGISTRY\<MachineCurrentVersion>\Run\OutpostFeedBack
  354. REGISTRY\<MachineCurrentVersion>\App Paths\acs.exe\*
  355. REGISTRY\<MachineServices>\{DriverNames}\*
  356. REGISTRY\<MachineServices>\{DriverPluginNames}\*
  357. REGISTRY\<MachineServices>\acssrv\*
  358.  
  359. [ProtectedObjects]
  360. ; This section describes objects protected by self-protection mechanism.
  361. {OutpostFiles}
  362. {OutpostRegistry}
  363.  
  364.  
  365. [TrustedApplications]
  366. ; This section describes the set of applications that have access to Outpost folder.
  367. ; In this folder self-protection exclusions are stored.
  368. ; This application should better be removed after first start.
  369. ;<SystemDir32OrWow>\runonce.exe
  370. <SystemDir32OrWow>\autochk.exe
  371. <SystemDir32OrWow>\csrss.exe
  372. <SystemDir32OrWow>\svchost.exe
  373. <SystemDir32OrWow>\dfrgntfs.exe
  374. {AntileakExclusions}
  375. {SelfProtectionExclusions}
  376.  
  377. [FilteredApplications]
  378. ; This section contains applications for which write access is blocked without notification from Outpost.
  379. <SystemDir32OrWow>\mshta.exe
  380. <SystemDir32OrWow>\rundll32.exe
  381. <SystemDir32OrWow>\taskmgr.exe
  382. <SystemDir32OrWow>\searchindexer.exe
  383.  
  384. [RegistryApplications]
  385. <SystemDir32OrWow>\ntoskrnl.exe
  386. ; ≤Σαδσφε ≈≥εß√ φσ ß√δε Γετ∞εµφε±≥Φ ∩≡εΦτΓεδⁿφε ∞σφ ≥ⁿ start type
  387. ;<SystemDir32OrWow>\services.exe
  388.  
  389.  
  390. [AntispamRegEntries]
  391. spam threshold
  392. unsure threshold
  393. enable outlook
  394. enable express
  395.  
  396. [LogsExt]
  397. .log
  398. .0
  399.  
  400. [TrustedLogs]
  401. wl_hook
  402. oe_mail
  403. oe_mydb
  404. oe_scan
  405. oe_train
  406. oe_sink_old
  407. op_mail
  408. op_scan
  409. op_train
  410. op_gui
  411. selection
  412. enum
  413. expiredmail
  414. adviser
  415. asp_ipc
  416. memlog
  417. asp_srv
  418. tb_mail
  419. transact
  420.  
  421. [UninstallData]
  422. unins0??.dat
  423.  
  424.  
  425. [SelfProtection]
  426. ; In this section self-protection rules are described.
  427.  
  428. ; Rules for controlling file operations are written in the following format:
  429. ; object_set, access mask, subject_set
  430. ;
  431.  
  432. ; access mask:
  433. ; Attributes available for file operations (FILE=)
  434. ; read                - object read operation is allowed to the entity
  435. ; write                - object write operation is allowed to the entity
  436. ; delete            - operation of deleting the object file is allowed to the entity
  437. ; exec                - operation of launching the object is allowed to the entity
  438. ; connect            - operation of launching the object is allowed to the entity
  439. ; hidden            - operation of object masquerading from the entity
  440. ; full_access        - object has full access to the entity
  441. ; read_only            - object has read only access to the entity
  442.  
  443. ; open_process        - process opening is allowed
  444. ; thread_start        - remote thread starting is allowed
  445. ; thread_stop        - remote thread stopping is allowed
  446. ; write_mem            - remote writing to process memory is allowed
  447. ; thread_ctx        - remote setting of process context is allowed
  448.  
  449. ; no_scan           - do not scan object with on-access antivirus
  450. ; scan_on_exec      - scan file only if it is opened for execution
  451. ; no_override        - do not override rule if it is already defined for given object and subject
  452.  
  453. ; no_learn          - on blocking by the rule, service will not be notified
  454. ; no_learn_open     - service will not be notified on blocking open operation
  455. ; no_learn_exec     - --""-- launch operation
  456. ; no_learn_read     - --""-- read operation
  457. ; no_learn_write    - --""-- write operation
  458. ; no_learn_create   - --""-- creation operation
  459. ; no_learn_delete   - --""-- deletion operation
  460. ; no_learn_rename   - --""-- rename operation
  461.  
  462. ; Entity description. If entity name ends with \*, two rules are added.
  463. ; One for the entity, another for its child structures with the specified mask
  464.  
  465. {OutpostExecutable}       -> {ProtectedObjects}  = <FullAccess>
  466. {TrustedApplications}     -> {ProtectedObjects}  = <FullAccess> 
  467. <AllFiles>                -> {ProtectedObjects}  = <LimitedAccess>
  468. <AllFiles>                -> <ExecDir>\?         = read write exec
  469. {FilteredApplications}    -> {OutpostFiles}      = <LimitedAccessNoLearn>
  470. {RegistryApplications}    -> {OutpostRegistry}   = <FullAccess>
  471.  
  472.  
  473. <WindowsDir>\explorer.exe -> <ExecDir>\Thumbs.db = <FullAccess>
  474. <WindowsDir>\explorer.exe -> {OutpostExecutable} = <LimitedAccess> allow_send_input allow_send_close
  475.  
  476. ;http://btsx/ticket.aspx?id=13688
  477. <SystemDir32OrWow>\mshta.exe -> <ExecDir>\unins0??.exe = <LimitedAccess> open_process
  478. ;<AllFiles>                -> <ExecDir>\Plugins\BrowserBar\ie_bar.ini = <FullAccess>
  479. <AllFiles>                -> <ExecDir>\ie_bar.ini = <FullAccess>
  480. <AllFiles> -> <ExecDir>\{UninstallData} = <FullAccess> no_scan
  481. <AllFiles> -> <ExecDir>\log\{TrustedLogs}{LogsExt} = <FullAccess> no_scan
  482. <AllFiles> -> <ExecDir>\plugins\anti-spam\data\*  = <FullAccess> no_scan
  483. <AllFiles> -> <ExecDir>\plugins\anti-spam\*  = <FullAccess> no_scan
  484. <AllFiles> -> <ExecDir>\plugins\anti-spam.x64\*  = <FullAccess> no_scan
  485. <AllFiles> -> <ExecDir>\plugins\anti-spam.x64\data\*  = <FullAccess> no_scan
  486. <AllFiles> -> REGISTRY\<User>\Software\agnitum\Security Suite\{AntispamRegEntries} = <FullAccess>
  487.  
  488. ; Φ±Ωδ■≈σφΦ  - ∩≡Φ Φτ∞σφσφΦΦ Ωεφ⌠Φπ≤≡α÷ΦΦ ±Φ±≥σ∞α ∩≡ε∩Φ±√Γασ≥≥ Γ ²≥Φ Γσ≥ΩΦ φεΓ√σ τφα≈σφΦ 
  489. *->REGISTRY\<MachineServices>\afw\Parameters\Adapters\* = <FullAccess>
  490. *->REGISTRY\<MachineServices>\afw\Parameters\NdisAdapters\* = <FullAccess>
  491. *->REGISTRY\<MachineServices>\afw\Enum\* = <FullAccess>
  492. *->REGISTRY\<MachineServices>\afwcore\Enum\* = <FullAccess>
  493. *->REGISTRY\<MachineServices>\afwcore\Enum\* = <FullAccess>
  494. *->REGISTRY\<MachineServices>\acssrv\Enum\* = <FullAccess>
  495. *->REGISTRY\<MachineServices>\sandbox\Enum\* = <FullAccess>
  496. *->REGISTRY\<MachineServices>\sandbox64\Enum\* = <FullAccess>
  497.  
  498. ; φσ τα∙Φ∙ασ∞ ßεδⁿ°σ ∩≡ε÷σ±±εΓ csrss.exe - ∩ε²≥ε∞≤ ∩≡αΓΦδε φσ ≥≡σß≤σ≥± 
  499. ;<SystemDir>\services.exe -> <SystemDir>\csrss.exe = <FullAccess>
  500.  
  501. [SelfProtectionDebugAdd]
  502. {VCFiles}     -> {ProtectedObjects}  = <FullAccess> 
  503. {WinDbgFiles}     -> {ProtectedObjects}  = <FullAccess> 
  504. {SysIntFiles}     -> {ProtectedObjects}  = <FullAccess> 
  505. ; -------------------------------------------------------------------------------------------------------------------------
  506. ; On Access Scanner Rules
  507. ; -------------------------------------------------------------------------------------------------------------------------
  508. [NoScanExtensions]
  509. .log
  510. .pf
  511. .ci
  512. .dir
  513. .cdf-ms
  514. .part
  515.  
  516. [RegsitryFileStorage]
  517. default
  518. components
  519. sam
  520. security
  521. software
  522. system
  523. components
  524. default.sav
  525. sam.sav
  526. security.sav
  527. software.sav
  528. system.sav
  529. default.old
  530. sam.old
  531. security.old
  532. software.old
  533. system.old
  534.  
  535. [OnAccessScannerRules]
  536.  
  537. ; do not scan own log files when we write them
  538. ; {OutpostExecutable} -> <ExecDir>\log\* = <FullAccess> no_scan
  539. * -> <SystemDir>\Drivers\Etc\hosts=<FullAccess> no_scan no_override
  540.  
  541. ; do not allow malware to inject to outpost components
  542. {OutpostExecutable} -> * = <FullAccess> scan_on_exec
  543. *-><SystemRoot>\ProgramData\Agnitum\Security Suite\antispam_stat.ini=<FullAccess> no_scan
  544. *-><ExecDir>\plugins\anti-spam\data\base\*=<FullAccess> no_scan
  545. *-><ExecDir>\plugins\anti-spam.x64\data\base\*=<FullAccess> no_scan
  546.  
  547. * -> <SystemRoot>\System Volume Information\* = <FullAccess> scan_on_exec
  548. * -> <WindowsDir>\Prefetch\* = <FullAccess> scan_on_exec
  549. * -> <SystemDir>\wbem\logs\* = <FullAccess> scan_on_exec
  550.  
  551.  
  552. <SystemDir>\svchost.exe -> <WindowsDir>\* = <FullAccess> scan_on_exec
  553. <SystemDir>\ntoskrnl.exe -> <WindowsDir>\* = <FullAccess> scan_on_exec
  554.  
  555.  
  556. <SystemDir>\DfrgNtfs.exe -> * = <FullAccess> scan_on_exec
  557. <SystemDir>\SearchIndexer.exe -> * = <FullAccess> scan_on_exec
  558. <SystemDir>\SearchFilterHost.exe -> * = <FullAccess> scan_on_exec
  559. <SystemDir>\SearchProtocolHost.exe -> * = <FullAccess> scan_on_exec
  560.  
  561. <SystemDir>\wbem\wmiadap.exe -> <SystemDir>\perf*.dat = <FullAccess> no_scan
  562.  
  563. * -> \EXTENSIONS\*{NoScanExtensions} = no_scan
  564. * -> <SystemDir>\config\{RegsitryFileStorage} = <FullAccess> no_scan
  565. * -> <SystemDir>\config\regback\{RegsitryFileStorage} = <FullAccess> no_scan
  566. * -> <WindowsDir>\AppPatch\sysmain.sdb = <FullAccess> no_scan
  567. * -> <WindowsDir>\AppPatch\drvmain.sdb = <FullAccess> no_scan
  568.  
  569.  
  570.  
  571. ; -------------------------------------------------------------------------------------------------------------------------
  572. ; System Monitor Settings (for debug purposes)
  573. ; -------------------------------------------------------------------------------------------------------------------------
  574.  
  575. [SandboxMonitor]
  576. ; This section describes monitor settings used for debug purposes only.
  577. ; Macroses do not work here.
  578.  
  579. ; Operation mask for monitor. Available values:
  580. ; open exec read write close delete rename 
  581. Operations=
  582.  
  583. ; Whether operations with folders are monitored.
  584. FolderOperaton=TRUE
  585.  
  586. ; Whether operations with registry are monitored.
  587. RegistryOperation=TRUE
  588.  
  589. ; Whether operations with processes are monitored.
  590. InterprocOperation=FALSE
  591.  
  592. ; Whether non-file operations are monitored.
  593. FileOperation=FALSE
  594.  
  595.  
  596. ; -------------------------------------------------------------------------------------------------------------------------
  597. ; System Events Learning Settings
  598. ; -------------------------------------------------------------------------------------------------------------------------
  599.  
  600. [LearnOperations]
  601. ; This section describes learning channel settings.
  602. ; Macroses do not work in this section.
  603.  
  604. ; Operation mask for the learning channel. Available values:
  605. ; open exec read write close delete rename start stop 
  606. Operations=open exec read write close delete rename
  607.  
  608. ; Whether operations with folders are monitored.
  609. FolderOperaton=TRUE
  610.  
  611. ; Whether operations with registry are monitored.
  612. RegistryOperation=TRUE
  613.  
  614. ; Whether operations with processes are monitored.
  615. InterprocOperation=TRUE
  616.  
  617. ; Whether non-file operations are monitored.
  618. FileOperation=TRUE
  619.  
  620.  
  621. ; -------------------------------------------------------------------------------------------------------------------------
  622. ; ImproveNet Settings
  623. ; -------------------------------------------------------------------------------------------------------------------------
  624.  
  625. [ImproveNet]
  626. ; This section describes ImproveNet settings.
  627.  
  628. ; URL of the server where improve_net reports are stored
  629. URL=http://improvenet.agnitum.com/improvenet.php
  630.  
  631. ; ImproveNet task scheduling settings:
  632.  
  633. ; If ScheduleDay parameter is specified, ImproveNet task will be performed weekly,
  634. ; ScheduleDay specifies the number of a day, available values are 0-6 (0 corresponds to Monday).
  635. ; If ScheduleHour and ScheduleMinute are not specified, they are considered equal to 0.
  636. ScheduleDay=
  637.  
  638. ; If ScheduleHour parameter is specified (without ScheduleDay parameter), ImproveNet task will be performed
  639. ; daily, ScheduleHour specifies the number of an hour, available values are 0-23.
  640. ; If ScheduleMinute not specified, it is considered equal to 0.
  641. ScheduleHour=14
  642.  
  643. ; If ScheduleMinute parameter is specified (without ScheduleDay and ScheduleHour), ImproveNet task will be
  644. ; performed hourly, ScheduleMinute specifies the number of a minute, available values are 0-59.
  645. ScheduleMinute=0
  646.  
  647. ; ScheduleDay, ScheduleHour, ScheduleMinute settings can be specified together, 
  648. ; for example, if all these parameters are specified, ImproveNet task will be performed weekly on the specified day,
  649. ;  at the specified time.
  650.  
  651. [HTTPService]
  652. ; This section describes HTTP settings used in http_service.
  653.  
  654. ; HTTPVersion parameter specifies version to be used in requests,
  655. ; available values are 0.0, 1.0, 1.1
  656. HTTPVersion=1.0
  657.  
  658. ; AppendProductArg parameter specifies that product name should be added to each request,
  659. ; available values are TRUE, FALSE
  660. AppendProductArg=FALSE
  661.  
  662. ; AllowCaching parameter enables/disables caching,
  663. ; available values are TRUE, FALSE
  664. AllowCaching=FALSE
  665.  
  666. ; Proxy parameter defines whether proxy should be used, available
  667. ; values are auto, specified, disabled
  668. Proxy=auto
  669.  
  670. ; ProxyAddress, ProxyPort parameters are used if Proxy=specified,
  671. ; these parameters specify proxy server address and port
  672. ProxyAddress=
  673. ProxyPort=8080
  674.  
  675. ; ProxyAuth parameter specifies that proxy requires authorization, availavle values are TRUE, FALSE;
  676. ; ProxyLogin, ProxyPassword parameters specify credentials
  677. ProxyAuth=false
  678.  
  679. ; ProxyLogin, ProxyPassword parameters specify login and password for the proxy that requires autorization.
  680. ProxyLogin=
  681. ProxyPassword=
  682.  
  683. ; Number of attempts http_service does when it cannot complete request successfully.
  684. ; Minimum value is 3, maximum is 12.
  685. FailureAttempts=12
  686.  
  687.  
  688. [Protect]
  689. ; Protect plug-in state. If FALSE, no configuration in driver.
  690. Enable=TRUE
  691.  
  692. ; Maximum number of remote hosts for each attack, after which 
  693. ; the reports are stopped till report_timeout expiration.
  694.  
  695. MaxReportHost=10
  696.  
  697. ; Pause before repeated message about the attack for the 
  698. ; remote host, in hundreds ms.
  699. ReportTimeout=6000
  700.  
  701.  
  702. ; -------------------------------------------------------------------------------------------------------------------------
  703. ; Critical Objects Monitor Settings
  704. ; -------------------------------------------------------------------------------------------------------------------------
  705. [SystemMonitor]
  706. ; Main object monitor section.
  707. ; This section describes records for monitor.
  708. RegAutoStart=Auto Start Entries
  709. RegAutoLoad=Auto Start Modules
  710. RegWinLogon=WinLogon Settings
  711. RegShellExtensions=Shell Extensions
  712. RegShellCriticalEntries=Shell Critical Entries
  713. RegApplicationRestrictions=Application Restrictions
  714. RegActiveDesktop=Active Desktop
  715. RegInternetSettings=Internet Settings
  716. RegInternetExplorerPlugins=Explorer Plug-Ins
  717. RegInternetExplorerSettings=Explorer Settings
  718. Reg3rdPartyApplications=Third-Party Applications
  719. LegacyConfigurationFiles=Legacy Configuration Files
  720.  
  721. [DefragApp]
  722. ; Defragmentation sotfware category.
  723. <SystemDir32OrWow>\dfrgntfs.exe
  724.  
  725. [RegShellExtensions]
  726. ; Shell Extensions.
  727. *->REGISTRY\<MachineCurrentVersion>\Explorer\Browser Helper Objects\*=read
  728. *->REGISTRY\<MachineCurrentVersion>\Shell Extensions\Approved\*=read
  729. *->REGISTRY\<MachineCurrentVersion>\ShellServiceObjectDelayLoad\*=read
  730. *->REGISTRY\<MachineCurrentVersion>\Explorer\RemoteComputer\NameSpace\*=read
  731. *->REGISTRY\<CurrentVersionUserMachine3264>\Explorer\SharedTaskScheduler\*=read
  732. *->REGISTRY\MACHINE\{SoftwareClasses64}\SystemFileAssociations\shellex\ContextMenuHandlers\*=read
  733. *->REGISTRY\{MachineOrUser}\{Software64}\Microsoft\Active Setup\Installed Components\*=read
  734. <WindowsDir>\explorer.exe->REGISTRY\{MachineOrUser}\{Software64}\Microsoft\Active Setup\Installed Components\*=read write
  735.  
  736. [RegShellCriticalEntries]
  737. ; Object 'Windows Shell Open Commands' (85)----------
  738. *->REGISTRY\MACHINE\{SoftwareClasses64}\exefile\shell\{OpenOrRunAs}\command\*=read
  739. *->REGISTRY\MACHINE\{SoftwareClasses64}\comfile\shell\{OpenOrRunAs}\command\*=read
  740. *->REGISTRY\MACHINE\{SoftwareClasses64}\piffile\shell\{OpenOrRunAs}\command\*=read
  741. *->REGISTRY\MACHINE\{SoftwareClasses64}\batfile\shell\{OpenOrRunAs}\command\*=read
  742. *->REGISTRY\MACHINE\{SoftwareClasses64}\cmdfile\shell\{OpenOrRunAs}\command\*=read
  743. *->REGISTRY\MACHINE\{SoftwareClasses64}\scrfile\shell\{OpenOrRunAs}\command\*=read
  744. *->REGISTRY\<CurrentVersionUserMachine3264>\Explorer\ShellExecuteHooks\*=read
  745. *->REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\*\LocalServer32\*=read
  746.  
  747. [RegApplicationRestrictions]
  748. ; Application restrictions.
  749. *->REGISTRY\<User>\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\*=read
  750. *->REGISTRY\<User>\Software\Microsoft\Windows\CurrentVersion\Policies\System\*=read
  751. *->REGISTRY\<User>\Software\Policies\Microsoft\Internet Explorer\Control Panel\*=read
  752. *->REGISTRY\{MachineOrUser}\{Software64}\Policies\Microsoft\Internet Explorer\Restrictions\*=read
  753. *->REGISTRY\<MachineCurrentVersion>\Policies\DisableRegistryTools=read
  754. ;[ay] not sure why i have to add this rule
  755. ;*->REGISTRY=read
  756.  
  757. [RegInternetSettings]
  758. ; LSP providers.
  759. *->REGISTRY\<MachineServices>\WinSock2\Parameters\*=read
  760. *-><SystemDir>\Drivers\Etc\hosts=read no_scan
  761. <SystemDir32OrWow>\svchost.exe-><SystemDir>\Drivers\Etc\hosts=read write
  762. {DefragApp}-><SystemDir>\Drivers\Etc\hosts=read write
  763.  
  764. [RegActiveDesktop]
  765. ; Active Desktop settings.
  766. *->REGISTRY\<User>\Control Panel\Desktop\*=read
  767. *->REGISTRY\<User>\Control Panel\Desktop\WindowMetrics\*=read write delete
  768. *->REGISTRY\<User>\Software\Microsoft\Internet Explorer\Desktop\General\*=read
  769. *->REGISTRY\<User>\Software\Microsoft\Internet Explorer\Desktop\Components\*=read
  770. <WindowsDir>\explorer.exe->REGISTRY\<User>\Software\Microsoft\Internet Explorer\Desktop\General\*=read write delete
  771.  
  772. [RegInternetExplorerPlugins]
  773. ; Internet Explorer Plug-Ins.
  774. *->REGISTRY\{MachineOrUser}\{Software64}\Microsoft\Internet Explorer\MenuExt\*=read
  775. *->REGISTRY\{MachineOrUser}\{Software64}\Microsoft\Internet Explorer\Extensions\*=read
  776. *->REGISTRY\{MachineOrUser}\{Software64}\Microsoft\Internet Explorer\Explorer Bars\*=read
  777. *->REGISTRY\{MachineOrUser}\{Software64}\Microsoft\Internet Explorer\Plugins\Extension\*=read
  778. *->REGISTRY\{MachineOrUser}\{Software64}\Microsoft\Internet Explorer\Toolbar\ShellBrowser\*=read
  779. *->REGISTRY\{MachineOrUser}\{Software64}\Microsoft\Internet Explorer\Toolbar\WebBrowser\*=read
  780. <WindowsDir>\explorer.exe->REGISTRY\{MachineOrUser}\{Software64}\Microsoft\Internet Explorer\Toolbar\ShellBrowser\*=read write
  781. <ProgramDir>\Internet Explorer\iexplore.exe->REGISTRY\{MachineOrUser}\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser\*=read write
  782. <ProgramDirWow>\Internet Explorer\iexplore.exe->REGISTRY\{MachineOrUser}\Software\Wow6432Node\Microsoft\Internet Explorer\Toolbar\WebBrowser\*=read write
  783. <ProgramDir>\Internet Explorer\iexplore.exe->\REGISTRY\{MachineOrUser}\SOFTWARE\MICROSOFT\Internet Explorer\Extensions\*=read write
  784. <ProgramDirWow>\Internet Explorer\iexplore.exe->\REGISTRY\{MachineOrUser}\SOFTWARE\Wow6432Node\MICROSOFT\Internet Explorer\Extensions\*=read write
  785. <ExecDir>\op_mon.exe->REGISTRY\{MachineOrUser}\{Software64}\Microsoft\Internet Explorer\Extensions\*=read write
  786.  
  787. [RegInternetExplorerSettings]
  788. ; Internet Explorer URLs
  789. *->REGISTRY\{MachineOrUser}\{Software64}\Microsoft\Internet Explorer\Main\Start Page=read
  790. *->REGISTRY\{MachineOrUser}\{Software64}\Microsoft\Internet Explorer\Main\Search Page=read
  791. *->REGISTRY\{MachineOrUser}\{Software64}\Microsoft\Internet Explorer\AboutURLs\*=read
  792. *->REGISTRY\{MachineOrUser}\{Software64}\Microsoft\Internet Explorer\URLSearchHooks\*=read
  793. <SystemDir32OrWow>\ie4uinit.exe->REGISTRY\{MachineOrUser}\{Software64}\Microsoft\Internet Explorer\*=read write delete
  794.  
  795. [RegAutoStart]
  796. ; Startup Registry Files.
  797. *->REGISTRY\<CurrentVersionUserMachine3264>\Run\*=read
  798. *->REGISTRY\<CurrentVersionUserMachine3264>\RunOnce\*=read
  799. *->REGISTRY\<CurrentVersionUserMachine3264>\RunOnceEx\*=read
  800. *->REGISTRY\<CurrentVersionUserMachine3264>\RunServices\*=read
  801. *->REGISTRY\<User>\Software\Microsoft\Windows NT\CurrentVersion\Windows\load=read
  802. *->REGISTRY\<User>\Software\Microsoft\Windows NT\CurrentVersion\Windows\run\*=read
  803. *->REGISTRY\<MachineNTCurrentVersion3264>\Image File Execution Options\*=read
  804. *->REGISTRY\<MachineCurrentVersion>\policies\Explorer\Run\*=read
  805. ;*->C:\Documents and Settings\*\StartMenu\Programs\Startup\*=read
  806. <SystemDir>\ctfmon.exe->REGISTRY\USER\*\Software\Microsoft\Windows\CurrentVersion\Run\ctfmon.exe=read write delete
  807. <SystemDir>\ctfmon.exe->REGISTRY\USER\*\Software\Microsoft\Windows\CurrentVersion\Run\internat.exe=read write delete
  808. <SystemDir>\wermgr.exe->REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\LHWerQueuedReporting=read write delete
  809. *-><WindowsDir>\Tasks\*=read
  810. *-><DriversDir>\*.sys=read exec
  811. <ExecDir>\op_mon.exe-><DriversDir>\*.sys=<FullAccess>
  812. ; [ay] http://btsx/ticket.aspx?id=15050
  813. *-><WindowsDir>\System\*=read exec delete open_process
  814. *-><SystemDir32OrWow>\*=read exec delete open_process
  815. *-><SystemDir32OrWow>\config\*=<FullAccess>
  816. *-><SystemDir32OrWow>\spool\*=<FullAccess>
  817. *-><SystemDir32OrWow>\WBEM\*=<FullAccess>
  818.  
  819. ; [ay] not sure these rules works
  820. ; *-><SystemDir32OrWow>\*\*=<FullAccess>
  821.  
  822. ; [ay] http://btsx/ticket.aspx?id=15045
  823. *->REGISTRY\<MachineControl>\Terminal Server\Wds\rdpwd\StartupPrograms=read
  824. *->KNOWNDLLS\*=read exec
  825.  
  826.  
  827.  
  828. [RegAutoLoad]
  829. ; AppInit Dlls.
  830. *->REGISTRY\MACHINE\{Software64}\Microsoft\Windows NT\CurrentVersion\Windows\AppInit_DLLs=read
  831. *->REGISTRY\MACHINE\{Software64}\Microsoft\Windows NT\CurrentVersion\Windows\LoadAppInit_DLLs=read
  832. *->REGISTRY\MACHINE\{Software64}\Microsoft\Windows NT\CurrentVersion\Windows\IconServiceLib=read
  833. ; [ay] http://btsx/ticket.aspx?id=15046
  834. *->REGISTRY\<MachineServices>\SENS\Parameters\ServiceDll=read
  835. *->REGISTRY\MACHINE\{Software64}\Microsoft\Windows NT\CurrentVersion\AeDebug\Debugger=read
  836.  
  837.  
  838.  
  839.  
  840. [RegWinLogon]
  841. ; Windows Logon Policies.
  842. *->REGISTRY\<MachineNTCurrentVersion3264>\Winlogon\GPExtensions\*=read
  843. *->REGISTRY\<MachineNTCurrentVersion3264>\Winlogon\Notify\*=read
  844. *->REGISTRY\<MachineNTCurrentVersion3264>\WOW\boot\shell=read
  845. *->REGISTRY\<MachineNTCurrentVersion3264>\Winlogon\Userinit=read
  846. *->REGISTRY\<MachineNTCurrentVersion3264>\Winlogon\UIHost=read
  847. *->REGISTRY\{MachineOrUser}\Software\Policies\Microsoft\Windows\System\Scripts\Logon\*=read
  848. *->REGISTRY\<User>\Software\Microsoft\Windows\CurrentVersion\Policies\System\Shell*=read
  849.  
  850. [Reg3rdPartyApplications]
  851. ; Critical non-MS application settings.
  852.  
  853.  
  854. [ProtectedConfigFiles]
  855. ; Configuration files protected from modification.
  856. <WindowsDir>\win.ini
  857. <WindowsDir>\system.ini
  858. <SystemRoot>\autoexec.bat
  859. <SystemRoot>\config.sys
  860. <WindowsDir>\winstart.bat
  861. <WindowsDir>\dosstart.bat
  862. <SystemDir>\autoexec.nt
  863. <SystemDir>\config.nt
  864.  
  865.  
  866. [LegacyConfigurationFiles]
  867. ; Windows win.ini file.
  868. *->REGISTRY\<MachineNTCurrentVersion3264>\IniFileMapping\system.ini\*=read
  869. *->REGISTRY\<MachineNTCurrentVersion3264>\IniFileMapping\win.ini\*=read
  870. *->REGISTRY\<MachineNTCurrentVersion3264>\IniFileMapping\control.ini\*=read
  871. *->{ProtectedConfigFiles}=read
  872. {DefragApp}->{ProtectedConfigFiles}=read write
  873.  
  874.  
  875. ; REGISTRY\<MachineServices>\WinSock2\Parameters\NameSpace_Catalog5\Catalog_Entries\*
  876. ; REGISTRY\<MachineServices>\WinSock2\Parameters\NameSpace_Catalog5\Catalog_Entries64\*
  877. ; REGISTRY\<MachineServices>\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries\*
  878. ; REGISTRY\<MachineServices>\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries64\*
  879. ; Off screen
  880. ; ActiveX registration
  881. ; Services registration
  882. ; Object 'Explorer Trojan' (93)----------
  883. ; Dir: ±:\. Search explorer.exe
  884. ; FILE: 'C:\WINDOWS\control.ini' listen 'MMCPL-inetcpl.cpl' section-value. Check data for 'no' value.
  885. ; [RestrictAnonymous]
  886. ; Windows Restrict Anonymous
  887. ; REGISTRY\MACHINE\SYSTEM\ControlSet*\Control\Lsa\restrictanonymous
  888. ; [RegActiveSetup]
  889. ; Installed Components
  890. ;
  891. [license]
  892. Reseller=samag
  893.