-
A while ago, it was found that the svchost mitigation causes some MS unsigned dlls pollute event log unnecessarily and causes high resource usage. Details on this can be found on this pull request: #158 Feedback for this was also filed but it does not show any updates from MS's side: https://aka.ms/AAnaa72, https://aka.ms/AAnakja, https://aka.ms/AAnp88q While there is no official word from MS, have they made any changes to the associated files silently in any updates released after? Currently, I have to go in and turn off svchost mitigation each time I run the Harden-Windows-Security module. Any updates on this? |
Beta Was this translation helpful? Give feedback.
Replies: 1 comment 2 replies
-
Hi, ![]() I was going to mention it in the next update's release notes too: #193 |
Beta Was this translation helpful? Give feedback.
Hi,
They signed the file and it's been signed for a while now, unfortunately I don't know exactly when they released it to the stable channel but judging by the signing date it actually looks like they signed it the day after Harden windows security module v.0.2.6 was released!
I was going to mention it in the next update's release notes too: #193