New option
A new option under experimental section was introduced: ArmBreaker
It allows mactype to mildly compromise part of the system mitigation policy to make mactype work with some finicky programs like Chrome...
ArmBreaker
snowie2000 edited this page 12 hours ago · 2 revisions
Purpose
This option allows MacType to intercept process creation and downgrade some of the mitigation policy options in Windows 10 so that they can work with MacType again.
Possible values
0, default, does nothing.
1, remove force ms sign requirement. Chrome needs this to be present to work with.
2, downgrade dynamic code generation restrictions. ProcessHacker and some other apps need this to work.
Suggestions
Please enable this option per executable so it does not affect system security too severely. Softwares can also use registry to apply mitigation policy to them before they are launched, which can't be intercepted and has to be removed manually from registry (or from group policy editor)
The registry path for mitigation policy is SOFTWARE\Policies\Microsoft\Windows NT\MitigationOptions\ProcessMitigationOptions under HKEY_LOCAL_MACHINE or HKEY_CURRENT_USER