-
Notifications
You must be signed in to change notification settings - Fork 3
Open
Labels
enhancementNew feature or requestNew feature or request
Description
Feature Description
This proposal is designed to enhance privacy and security in Windows through the implementation of anti-forensic techniques. It involves disabling selected services and adjusting registry settings to minimize digital footprints and data collection. The specific changes include:
-
Minimizing System Logging and Data Collection:
- Volume Shadow Copy Service (
vss): Disabled to prevent the creation of system restore points and shadow copies, which could be used for data recovery. Command:sc config vss start= disabled. - Windows Event Log Service (
EventLog): Disabled to limit the logging of system events, reducing potential sources of forensic data. Command:sc config EventLog start= disabled. - Registry setting for
EventLog: Ensures the service is disabled at the registry level for consistency. Command:reg add "HKLM\SYSTEM\CurrentControlSet\Services\EventLog" /v Start /t REG_DWORD /d 4 /f.
- Volume Shadow Copy Service (
-
Enhancing User Privacy and Reducing File System Traces:
- UserAssist Tracking: Disabling registry keys that track program usage, preventing the accumulation of user activity logs.
- Commands:
reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v Start_TrackProgs /t REG_DWORD /d 0 /freg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v Start_TrackEnabled /t REG_DWORD /d 0 /f.
- Commands:
- NTFS Last Access Update: Disabling this feature stops the logging of file access timestamps, further reducing data available for forensic analysis. Command:
reg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\FileSystem" /v NtfsDisableLastAccessUpdate /t REG_DWORD /d 1 /f.
- UserAssist Tracking: Disabling registry keys that track program usage, preventing the accumulation of user activity logs.
Motivation
This configuration targets users who are concerned with digital privacy and security, especially those seeking to safeguard their information from forensic analysis. By limiting system logging and data collection, it reduces the potential for unwanted data recovery and analysis.
Alternatives
- Keeping the default configuration, which might allow for more extensive data collection and logging.
- Using specialized anti-forensic software, which may not be as integrated with the system or as user-friendly.
Confirmation
- I performed a search of the feature requests to avoid suggesting a duplicate feature
- I understand that not filling out this template correctly may lead to the request being closed
Metadata
Metadata
Assignees
Labels
enhancementNew feature or requestNew feature or request