As you may know, OSArmor is a free anti exploit software that stays in the Windows Tray and protects the computer against auto executable scripts. The software has been designed by the NoVirus Thanks and is officially supported on Windows 7, Windows 8.1 and Windows 10.
- Block execution of pif, com and double file extensions.
- Block USB spreading malware.
- Prevent “important” system modifications via bcedit.exe.
- Block direct execution of scripts and exe files from archives.
- Prevent regsrv32 from executing remote scripts and /i: parameter.
- Block processes executed from wscript.exe, cscript.exe, mshta.exe and wmic.exe.
- Block executionpolicy bypass and windowstyle hidden in PowerShell.
- Block remote URL downloads from the command line.
- Limit Windows Screensaver files to Windows folder.
- Block execution of schtasks.exe.
After the application has been installed, the configuration parameters can be modified via File -> Open Configurator. If you ask me, the default settings are enough for regular users. For extra security, the software can block running apps from Local AppData, Roaming AppData, Common AppData, but I do not recommend this setting for regular users, do to the fact that it may break some programs.
Also, it can be configured to block apps created by NirSofer, VNC software and LogMeIn, software which is commonly used by IT support specialists.
Tjhe interface is simple and clean and displays the number of blocked processes, the last blocked process and the date and time when the process was blocked. If you need to perform troubleshooting, you can read the logs.
When this article was written, the latest version available was OSArmor 1.3. The software can be downloaded for free from here.
I have toyed a little with OSArmor and decided to keep it installed on the system.