Use a Software Restriction Policy to stop Virus and Trojan programs from running
By adding a Software Restriction Policy or using Parental Controls in Windows 7 and Windows 8 and using a Standard User account you can enhance security. This prevents a broad spectrum of attacks on your system. These neither need any updates, nor these slow down your computer. They don't need you to pay any cost and protect your system from sabotage. Software Restriction Policy is a stronger protection if it's set up correctly, because it can be applied to more than just .EXE files
Use a Software Restriction Policy to stop Virus and Trojan programs from running |
How Software Restriction Policy works
Most of the threat virus, Trojans, Trojan Horse etc. are .exe files and the Software Restriction Policy has a list of file types which might be harmful to your system, like .EXE files and it will not let them run if they're not in an approved location, like C:\Program Files and C:\Windows directories and a user having a standard or non administrator account has not enough privilege to put these harmful files into those locations.
It simply creates a "white list" of the .EXE files already existing on the system in the normal locations. However more program can be added to this white list when needed under the administrator account privilege. The administrator can also choose which software can be run on a per-user basis.
The cyber criminals could also attempt to use a legitimate program or feature to do something malicious in it. For additional protection against those dangers, install and configure Microsoft's free EMET utility. Always uninstall the software you don't actually need. Scan your system with Secunia's free Personal Software Inspector utility.
What types of attacks Software Restriction Policy prevent.
1. It will stop AutoRun worms that spread on removable storage (USB, CD and DVD, cameras, phones).
2. It will stop untrustworthy users from installing unwanted software or running portable apps, unless they have an Administrator password.
3. It will stop a broad range of exploits that borrow your own powers to execute a file and take malicious actions.
4. Encrypting your files and holding them for ransom.
5. Deleting your documents, music or videos.
6. Sending copies of your files to the bad guys
7. Installing user-mode malware into your user folder, a tactic now common for in-your-face "scare ware" fake security scams.
8. Stealing copies of your Windows key, your Office key, and your game keys to sell on the black market.
9. Software Restriction Policy will prompt you as needed if there's a new .EXE file to permit or deny, including software update files. If you install a new software even a printer or other device you'll need to audit your Software Restriction Policy rules to make sure there aren't any new loopholes.
adding a Software Restriction Policy, using Parental Controls in Windows, cryptolocker, software restriction policy appdata, software restriction policy block exe, software restriction policy windows 10, software restriction policy blacklist, software restriction policy best practice, disable software restriction policy registry, deploying a whitelist software restriction policy to prevent How do you use a software restriction policy, Which files are restricted by software restriction policy