I have a screenshot for Computer Security policy for CIS 5 and there is no Services.exe under Windows System Application. So I imagine that is the one that is left over.
Could EricJH or any one else confirm if it can be deleted ?
There are two instances of services.exe and they are subject to different security policies, one policy applies to the Windows System Applications group and the other directly to services.exe. I assume the policies will be applied based on priority and request made.
Why is there only one rule in Cis v. 5.0 (like in my screenshot) ?
I suppose that v. 4 and v. 3 also had one Services.exe rule, and now I understand that having the second rule give more security to other complements.
[at] EricJH.
You said: " It is fixed in v. 5.8 beta " It sounded like it was a mistake or error in v. 5.5 and there was going to be only one Services.exe for future CIS versions, and my reason for posting my screenshot and asking which of the “services” could be deleted.
Under 5.5 they serve different purposes, which you can test by modifying the permissions of the individual services.exe. Also, the Windows System Applications group, is used in the firewall component.
So (in your opinion) it is not true what EricJH says about the fact that, being the rules read from top to bottom, the “second rule would never be hit” ???
Yes we changed some behaviors. Now it is part of system applications. So the other rule is actually redundant right now. t will be removed with the next versions.
it seems that "services.exe" proper place is among "Windows System Applications"
Do you confirm?
Is this the new 5.8 setting? Among “Windows System Applications”?
Is it safer with that policy than with its own “custom policy”?
What does it change from a “normal user” point of view?
The second rule is the one where you would be asked if a service would be installed.
Services and drivers are what I was referring to when I said it could be tested. Even though it may now be redundant - as already mentioned, the isolated instance of services.exe is no longer in 5.8 - it’s still quite easy to trigger the rule by changing it’s permissions and installing a driver. However, the same alerts may be generated if one changes the permissions on the Windows System Applications group. Of course, this affects all processes in the group.