Posts: 14,228
Threads: 9,428
Thanks Received: 8,996 in 7,147 posts
Thanks Given: 9,747
Joined: 12 September 18
15 January 23, 07:19
Quote:Here is the changelog:
[13-Jan-2023] v1.8.2.0
+ Added option to manually check for updates
+ Added new internal rules to block suspicious behaviors
+ Added more signers to Trusted Vendors list
+ Improved support for high-DPI
+ Do not ask for password when Enable Protection is clicked
+ Added option Allow known safe third-party processes behaviors
+ Added option Do not monitor non critical programs
+ Improved Block execution of Group Policy Editor
+ Improved Password-protect power options with Windows Admin Credentials
+ Fixed all reported false positives
+ Updated NVT License Manager with latest version
+ Renamed Extreme Protection profile in Maximum Protection
+ Updated Help/FAQs file
+ Minor improvements
If you have automatic updates enabled then OSArmor should auto-update in the next hours.
Else you can install it "over-the-top" of the installed version, reboot is not needed.
* If you used test builds you should manually update to this final version (install over-the-top is fine).
If you find false positives or issues please let me know.
A few information:
We added this new option "Allow known safe third-party processes behaviors" so users/companies have the option, if required, to disable the internal rules to allow known and safe third-party software behaviors (can be used to create personalized exclusion rules only for the third party software you have installed).
We also added this new option "Do not monitor non critical programs" (may be renamed in future) so users can choose to monitor any program (such as third-party file managers, etc) instead of monitoring only critical programs.
The above two options (enabled by default, at the moment) will help in reducing false positives, especially the first one.
The option "Enable internal rules to allow safe behaviors" now handles only system-related known and safe processes behaviors (highly recommended to have it enabled).