-
Notifications
You must be signed in to change notification settings - Fork 444
ArmBreaker
snowie2000 edited this page Jun 2, 2021
·
5 revisions
This option allows MacType to intercept process creation and downgrade some of the mitigation policy options in Windows 10 so that they can work with MacType again.
- 0, default, does nothing.
- 1, remove force ms sign requirement. Chrome needs this to be present to work with.
- 2, downgrade dynamic code generation restrictions. ProcessHacker and some other apps need this to work.
Please enable this option per executable so it does not affect system security too severely. Softwares can also use registry to apply mitigation policy to them before they are launched, which can't be intercepted and has to be removed manually from registry (or from group policy editor)
The registry path for mitigation policy is SOFTWARE\Policies\Microsoft\Windows NT\MitigationOptions\ProcessMitigationOptions
under HKEY_LOCAL_MACHINE or HKEY_CURRENT_USER
- Name
- HookChildProcesses
- HintingMode
- BoldWeight
- DirectWrite
- HintSmallFont
- MaxBitmap
- NormalWeight
- ItalicSlant
- GammaMode
- GammaValue
- Contrast
- RenderWeight
- BolderMode
- FontLoader
- FontLink
- FontSubstitutes
- MaxHeight
- LcdFilter
- AntiAliasMode
- UseMapping
- TextTuning
- TextTuningR
- TextTuningG
- TextTuningB
- LoadOnDemand
- CacheMaxFaces
- CacheMaxSizes
- CacheMaxBytes
- EnableKerning
- Shadow
- UseInclude