6/4/2018 THR2256 Windows Defender Application Guard making Microsoft Edge the world’s most secure browser! Chas Jeffries Lead Program Manager Windows.

Slides:



Advertisements
Similar presentations
Microsoft Virtual Academy
Advertisements

Microsoft Virtual Academy
Secure Hyperconnectivity with TeamViewer and Windows technologies
Deploy and get started with Microsoft Advanced Threat Analytics
Microsoft Virtual Academy
Secure Windows 10 with Intune, Azure AD and Configuration Manager
5/31/2018 3:40 PM BRK3113 How Microsoft IT builds Privileged Access Workstation using Windows 10 and Windows Server 2016 Jian (Jane) Yan Sr. Program Manager.
How Microsoft uses Windows Defender ATP–Welcome to a SecOps world!
How To Deliver Apps Faster And Secure Them The Microsoft Way
Cloud Security IS Application-Centric Security
Microsoft Virtual Academy
Azure Information Protection Strategy and Roadmap
6/10/2018 5:07 PM THR2218 Deploying Windows Defender AV and more with Intune and Configuration Manager Amitai Senior Program Manager,
Contain and Isolate Ransomware with Citrix and Microsoft
Azure Cloud Shell Magic of Modern Command-line Management
6/17/ :27 AM BRK3341 Unlock extensibility by connecting your service to PowerApps and Microsoft Flow Theresa (Tessa) Palmer–Sr. Program Manager Sunay.
6/19/2018 2:57 AM THR3092 Monitor and investigate actions on your user and data with alerts, insights and reports Binyan Chen Program Manager II, Office.
Learning about Containers in the Real World
6/25/ :13 PM BRK1076 Make Windows devices more secure by taking them out of your existing infrastructure Chris Rhodes & Andrew Bettany MCTs & MVPs.
Microsoft Edge Security with Windows Defender Application Guard
6/26/2018 5:24 AM THR1083 Enabling Advanced Security Capabilities: Drive consistent authorization across multiple applications Bryan Bolling Solution Architect,
Optimizing Microsoft OneDrive for the enterprise
Protect sensitive information with Office 365 DLP
Building an effective ATA solution
A Fast Track into Device Guard
Microsoft Ignite /31/ :08 AM
Understanding Windows Analytics Update Compliance
Why WCD is WiCkeD for modern deployment
Workflow Orchestration with Adobe I/O
Customize Office 365 Search and create result sources
The utility belt for managing security and compliance in Office 365
Automated Response with Windows Defender ATP
Best Practices for Securing Hybrid Clouds
9/12/2018 7:18 AM THR1081 Don’t be the first victim of new malware Turn Windows Defender AV Cloud Protection on! Amitai Senior Program.
Automate all things! Microsoft Azure continuous deployment
Prevent Costly Data Leaks from Microsoft Office 365
Azure PowerShell Aaron Roney Senior Program Manager Cormac McCarthy
Laura A. Robinson July 10, June 30, /15/2018 4:19 PM
11/17/2018 6:41 PM BRK3392 Windows 10 servicing explained (WAAS) Deploying Windows as an inplace upgrade Adnan Hendricks Microspecialist
Continuous Delivery with Visual Studio Team Services
Azure Advisor: Optimization in the best way
Microsoft Virtual Academy
Bring existing desktop apps to UWP with the Desktop Bridge
Mobile Center and VSTS:​ Better together for your Mobile DevOps
11/27/2018 BRK2081 Windows Defender Application Guard making Microsoft Edge the world’s most secure browser! Chas Jeffries Lead Program Manager Windows.
12/5/2018 2:50 AM How to secure your front door with real-time risk assessments of your logons Jan Ketil Skanke COO and Principal Cloud Architect CloudWay.
Microsoft products for non-profits
Automating security for better, continuous compliance in the cloud
Microsoft Virtual Academy
Five mistakes to avoid when deploying Enterprise Mobility + Security
MDM Migration Analysis Tool (MMAT)
What’s new in the Fall Creators Update for Windows Defender ATP
Microsoft Virtual Academy
Overview: Dynamics 365 for Project Service Automation
Microsoft Virtual Academy
Keep up with Office 365 evolution in the real world
Understand your Azure cloud assets dependencies with BMC Discovery
Getting the most out of Azure resources with Azure Advisor
4/16/2019 4:15 PM How Microsoft does IT: How Microsoft IT is embracing modern to build SharePoint experiences Sam Crewdson Senior Program Manager Rene.
4/21/2019 7:09 AM THR2098 Unlock New Opportunities with Nintex Hawkeye Process Intelligence and Workflow Analytics Sr. Product.
Consolidate, manage, backup, and secure your cloud content
Designing Bots that Fit Your Organization
Microsoft Virtual Academy
WCF and .NET Framework Microservices in Containers
Deploying and Managing Windows To Go
Microsoft Virtual Academy
Microsoft Data Insights Summit
Microsoft Virtual Academy
Mobile App Management David Alessi — Support Topic Owner for Enterprise Windows Phone, Microsoft Corporation Simon May — Enterprise Device Infrastructuralist,
Microsoft Virtual Academy
Presentation transcript:

6/4/2018 THR2256 Windows Defender Application Guard making Microsoft Edge the world’s most secure browser! Chas Jeffries Lead Program Manager Windows Enterprise and Security © 2016 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION

Agenda Security landscape and Windows Defender Application Guard overview Demo: application guard stand-alone mode Containers Setup & deployment Demo: application guard enterprise mode Threat detection Q&A

Evolution of attacks Mischief Fraud and theft Damage and disruption 6/4/2018 Evolution of attacks Mischief Script kiddies Unsophisticated Fraud and theft Organized crime More sophisticated Damage and disruption Nations, terror groups, activists Very sophisticated and well resourced © 2016 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION

Anatomy of an attack ENTER ESTABLISH EXPAND ENDGAME 6/4/2018 Anatomy of an attack ATTACK Browser or doc exploit delivery USER Malicious attachment delivery ENTER Phishing attacks Kernel exploits DEVICE ESTABLISH Kernel-mode malware Pass-the-hash EXPAND NETWORK ENDGAME Business disruption Lost productivity Data theft Espionage, loss of IP Ransom © 2016 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION

Attacks happen fast and are hard to stop 6/4/2018 Attacks happen fast and are hard to stop If an attacker sends an email to 100 people in your company… …30 people will open it… …12 people will open the attachment or click on the link… …and all will do it in the 3 minutes 45 seconds… Source: Verizon 2016 Data Breach Investigations Report © 2016 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION

Anatomy of an attack: strontium 6/4/2018 Anatomy of an attack: strontium ATTACK PHISHING USER DEVICE BROWSER OR DOC EXPLOIT EXECUTION PASS-THE-HASH NETWORK ENDGAME Theft of sensitive information, disruption of government © 2016 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION

Theft of sensitive information, disruption of government 6/4/2018 Anatomy of an attack: strontium ATTACK Mon, 9 November 2015, 13:20 RE: Mission In Central African Republic John Smith John Smith <defense.adviser.smith@gmail.com> Dear Sir! Please be advised that The Spanish Army personnel and a large number of Spanish Guardia Civil officers currently deployed in the Central African Republic (CAR) as part of the European EUFOR RCA mission will return to Spain in early March as the mission draws to a close. Visit http://natoint.com/900117-spain-forces-conclude-mission-in-central-african-republic/ for additional info. Best regards, Capt. John Smith, Defence Adviser, Public Diplomacy Division NATO, Brussels Defence.adviser.smith@gmail.com PHISHING USER DEVICE Browser or Doc Exploit Execution PASS-THE-HASH NETWORK ENDGAME Theft of sensitive information, disruption of government © 2016 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION

1 2 3 Anatomy of an attack: strontium Land on exploit page 6/4/2018 Anatomy of an attack: strontium 1 2 3 ATTACK PHISHING USER DEVICE Browser or Doc Exploit Execution PASS-THE-HASH NETWORK Land on exploit page Exploit runs Redirected to legitimate page ENDGAME Theft of sensitive information, disruption of government © 2016 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION

The problem… The user sees a normal-looking website

Theft of sensitive information, disruption of government 6/4/2018 8:52 AM Anatomy of an attack: strontium ATTACK PHISHING USER DEVICE Browser or Doc Exploit Execution PASS-THE-HASH NETWORK ENDGAME Theft of sensitive information, disruption of government © 2016 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION

Windows Threat Resistance Evolution 6/4/2018 Windows Threat Resistance Evolution © 2016 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION

Protect Detect Respond Windows 7 Windows 10 6/4/2018 Protect Detect Respond Windows 7 Trusted Platform Module (TPM) SmartScreen BitLocker BitLocker to Go Windows 10 Windows Defender System Guard Windows Defender Exploit Guard Windows Defender Application Control Windows Defender Antivirus Windows Defender ATP Microsoft Edge Windows Hello Windows Hello Companion Devices Windows Information Protection Legacy or Modern Devices (Upgraded from Win 7 or 32-bit Windows 8) Windows Defender System Guard * Windows Defender Exploit Guard * Windows Defender Credential Guard Windows Defender Device Guard Windows Defender Application Guard BitLocker ** Windows Hello Biometric Sensors Modern Devices (Fresh install or upgrade from 64-bit Win 8 ) * Includes advanced functionality on modern devices ** Automatically provisioned © 2016 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION

6/4/2018 So what’s changed? © 2016 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION

Current threat landscape Driving the need for hardware based isolation 15 14 6 6 5 5 6 2 2 1 Source: MSRC and Microsoft One Protection Team

Traditional platform stack 6/4/2018 Kernel Windows Platform Services Device Hardware Apps Traditional platform stack © 2016 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION

System Guard Container 6/4/2018 8:52 AM System Guard Container Kernel Device Guard Credential Guard Trustlet Apps Windows Platform Services Hardware based isolation Windows 10 Kernel Device Hardware Hypervisor © 2016 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION

Microsoft Edge with Windows Defender Application Guard 6/4/2018 8:52 AM Microsoft Edge with Windows Defender Application Guard Moves browser sessions to an isolated, virtualized environment Provides significantly increased protection and hardens attacker favorite entry-point Device Hardware System Container Kernel Windows Platform Services Microsoft Edge Hypervisor (Hyper-V) Critical System Processes Apps © 2016 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION

Application Guard experience

User receives a suspicious email, unwittingly the user clicks the link

Natoint.com A new browser window appears, with window decoration and notification that the site the user wants to open is not an enterprise site and needs to open in a container

Natoint.com A new browser window appears, with window decoration and notification as the user lands on an untrusted website. The user clicks to allow the malware to run and the container is infected

Natoint.com The user closes the Edge window and the session is discarded when the user logs off

Back on the host, all is good Back on the host, all is good. The malware was not able to jump out of the container; it’s isolated to the container

Demo Windows Defender Application Guard Stand-alone Mode

Functionality in isolation 6/4/2018 Functionality in isolation © 2016 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION

Expected basic functionality 6/4/2018 Expected basic functionality Copy/paste Printing Administrator policy controls Host © 2016 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION

Persistence of user state between sessions The state of the container is persisted between sessions, i.e. cookies, remembered passwords, favorites, temporary files will be persisted from session to session in a container using temp VHD Host VM VHD

What is a container? Microsoft Build 2016 6/4/2018 8:52 AM © 2016 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Client containers, based on server technology

Application Guard service POLICY SITE LIST Host browser Browser plug-in GP or MDM Microsoft Edge Browser plug-in Policy store Read Windows Platform Services Enterprise client (Host) Management Hypervisor Security Isolation (HVSI) Monitor and enforce Kernel Windows Platform Services Hypervisor Kernel Virtual Switch Virtual Switch plug-in

User browses to a non-enterprise site POLICY SITE LIST Host browser Browser plug-in GP or MDM Microsoft Edge Browser plug-in Policy store Read Windows Platform Services Enterprise client (Host) Management Hypervisor Security Isolation (HVSI) Notification of a new URL Kernel Windows Platform Services Hypervisor Kernel Virtual Switch Virtual Switch plug-in

The URL is untrusted, it redirects to container POLICY SITE LIST Host browser Browser plug-in GP or MDM Microsoft Edge Browser plug-in Policy store Read Windows Platform Services Enterprise client (Host) Management Hypervisor Security Isolation (HVSI) Kernel Lookup fails, inject into container Windows Platform Services Hypervisor Kernel Virtual Switch Virtual Switch plug-in

Container lifecycle: Isolation and eviction 6/4/2018 Container lifecycle: Isolation and eviction Containers persist the life of the logged on session Containers are discarded on logoff or reboot 1 2 3 © 2016 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION

Setup and deployment

Deployment workflow Plan and prepare Install Configure Enable Pre-requisites Enterprise Site List Install Windows Defender Application Guard Configure Windows Defender Application Guard Enable Windows Defender Application Guard

Configuring Site Lists All other sites Application Guard Neutral sites Host Enterprise Cloud resources Enterprise Resources (Intranet) Host + Application Guard

Client requirements for deployment HW requirements CPU—64-bit with virtualization extensions RAM—8GB recommended Windows 10 Fall Creators Update Miscellaneous Enable CPU virtualization from BIOS

Configure policies  Turn On/Off Windows Defender Application Guard Copy-Paste Direction Host to Container Container to Host Copy-Paste Content Type Text Images Printers PDF XPS Local Printers Network Printers Strict versus Relaxed Content Filtering Allow Data Persistence On/Off Allow Auditing On/Off

Demo Windows Defender Application Guard Enterprise Mode

Windows Defender ATP integration

INTELLIGENCE DRIVEN ENDPOINT PROTECTION, DETECTION AND REPONSE 6/4/2018 WINDOWS DEFENDER ATP INTELLIGENCE DRIVEN ENDPOINT PROTECTION, DETECTION AND REPONSE Built into Windows 10, not bolted on Protection built deep into Windows and in the cloud provides best in class performance and eliminates 3rd party agents and complex infrastructure. Single pane of glass and centralized management Enterprise grade, easy to enable and integrate into your environment. Enabling security operations to investigate, determine scope of an incident and take action using correlated data across the suite. Analytics based, cloud powered protection and response Fusing the deep OS expertise, data science and Microsoft Intelligent Security Graph to quickly adapt to changing threats, deploy new defenses, and orchestrate remediation. Amplified by the power of Microsoft Secure Windows Defender Suite is a key component of the Microsoft Secure stack that brings together and amplifies security across devices, identity and information. © 2016 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION

Azure ATP Cloud SecOps Console Windows Security Center Console Defender ATP Integration Host Encrypted Container Files Host SENSE Agent Processes Container SENSE Agent Registry data Windows 10 Service Agents Network pocket data Events

Key take aways Windows Defender Application Guard designed from the ground up using next generation Hyper-V client containers Completely isolates Microsoft Edge from the host PC using hardware based isolation with IE11 integration Integrated with Windows Defender ATP for threat detection Available in Windows 10 Enterprise Edition Support to Enterprise and Stand-alone modes Application Guard will change the attacker playbook Coming in the Windows 10 Fall Creators Update

How can I try it? Microsoft Technology Adoption (TAP) Program TAP is a pre-release program run by Windows engineering to obtain deep customer feedback, early and throughout the development cycle to ensure new technology investments meets the needs of the marketplace Interested in joining TAP? Contact to email osnext@microsoft.com Microsoft Windows Insider Program (WIP) This program is designed exclusively for people who want be involved in the process. So if you want to help us build the best Windows yet, we want you to join us. be first to experience the new ideas and concepts we’re building. In return, we want to know what you think. You’ll get an easy-to-use Feedback Hub app to send us your feedback, which will help guide us along the way Interested in joining WIP? Visit https://insider.windows.com/ Windows Defender ATP Information & Trial Learn more about Windows Defender ATP here: https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp Microsoft is offering a free 90-day trial program for Windows Defender ATP. Interested in a pilot? Visit http://aka.ms/wdatp © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Please evaluate this session Tech Ready 15 6/4/2018 Please evaluate this session From your Please expand notes window at bottom of slide and read. Then Delete this text box. PC or tablet: visit MyIgnite https://myignite.microsoft.com/evaluations Phone: download and use the Microsoft Ignite mobile app https://aka.ms/ignite.mobileapp Your input is important! © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.