Report addresses data and trends observed over the past several years, but focuses on the first half of 2009 (1H09) Major sections include Malicious.

Slides:



Advertisements
Similar presentations
Why should my organisation move to Internet Explorer 9? An upgrade guide for IT professionals.
Advertisements

Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
1. Enterprise Users & The Internet Main Office 365 IP & URL Page.
Enterprise CAL Overview. Different Types of CALs Standard CAL base A component Standard CAL is a base CAL that provides access rights to basic features.
 Troy Hopwood Program Manager Microsoft Corporation BB53.
Microsoft Security Solutions A Great New Way of Making $$$ !!! Jimmy Tan Platform Strategy Manager Microsoft Singapore.
MIX 09 4/15/ :14 PM © 2009 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered.
Threat Overview: The Italian Job / HTML_IFRAME.CU June 18, 2007.
Study conducted on behalf of Microsoft by Harris Interactive Inc. Study conducted on behalf of Microsoft by Harris Interactive, Inc. Study conducted on.
Multi-PC, Networked, Broadband Households US: 19.2 M, Globally: 40+ M and growing Source: Microsoft Primary Research CountryHouseholds (millions) Broadband.
Damian Leibaschoff Support Escalation Engineer Microsoft Becky Ochs Program Manager Microsoft.
Sophos anti-virus and anti-spam for business OARNET October 13, 2004.
Windows 7 Training Microsoft Confidential. Windows ® 7 Compatibility Version Checking.
What’s New in Exchange Online. Disclaimer This presentation contains preliminary information that may be changed substantially prior to final commercial.
Windows Optimized Desktop: Enhance Security & Control.
Cliff Evans Security and Privacy Lead Trustworthy Computing Group Microsoft UK.
Norman SecureSurf Protect your users when surfing the Internet.
Chapter Nine Maintaining a Computer Part III: Malware.
To receive our video stream in LiveMeeting: - Click on “Voice & Video” - Click the drop down next to the camera icon - Select “Show Main Video” Dial-in.
1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.
Product Manager, Windows Client Robert Geller. Need to differentiate from competitors Customer complexity driving cost Need new growth strategies Difficult.
Feature: Assign an Item to Multiple Sites © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names.
Tim Rains Group Product Manager Microsoft Session Code: SIA206.
Ken Malcolmson Senior Product Manager Microsoft Session Code: ITS206 Vinny Gullotto General Manager Microsoft Malware Protection Center.
Threat Management Gateway 2010 Questo sconosciuto? …ancora per poco! Manuela Polcaro Security Advisor.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
COMPREHENSIVE Windows Tutorial 5 Protecting Your Computer.
Virtual techdays INDIA │ 9-11 February 2011 Security Discussion: Ask the Experts M.S.Anand │ MTC Technology Specialist │ Microsoft Corporation Anirudh.
®® Microsoft Windows 7 Windows Tutorial 5 Protecting Your Computer.
© 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or.
© 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or.
Feature: Customer Combiner and Modifier © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are.
Cliff Evans Security and Privacy Lead Microsoft Ltd.
© 2009 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or.

Exchange Deployment Planning Services Exchange 2010 Complementary Products.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Virtual Machine Management Challenges What are Solution Accelerators? Offline Virtual Machine Servicing Tool Next Steps.
Benjamin Naden Windows Client Group Manager, Microsoft Singapore.
Understand Malware LESSON Security Fundamentals.
Service Pack 2 System Center Configuration Manager 2007.
© 2009 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks.
Windows Small Business Server 2003 R2 Powering Small Businesses.
© 2008 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or.
Opening up SMB with the exciting and new range of Windows Essential Server Solutions Robbie Upcroft, Microsoft Australia Wayne Small, SBS MVP.
Connect with life Ravi Sankar Technology Evangelist | Microsoft Corporation Ravisankar.spaces.live.com/blog.
Tim Rains Group Product Manager Microsoft Session Code: SIA101.
Delivering Assured Services John Weigelt National Technology Officer Microsoft Canada.
Internet Explorer 7 Updated Advice for the NHS 04 February 2008 Version 1.3.

Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Securing Tomorrow’s World Microsoft Security Roadmap Ed Gibson & Steve Lamb Microsoft Ltd.
demo User Signs Up Temporary Account is Created with Verification Link Sent User Clicks Link Account is Activated Login.Register(userName,
Vulnerabilities in Operating Systems Michael Gaydeski COSC December 2008.
Boris Ulík Technology Solutions Professional Microsoft Slovakia Microsoft ® System Center 2012: System Center Endpoint Protection 2012.
Microsoft NDA Material Adwait Joshi Sr. Technical Product Manager Microsoft Corporation.
David B. Cross Product Unit Manager Microsoft Corporation Session Code: SIA303 Donny Rose Senior Program Manager.
Microsoft Virtual Academy Talbott Crowell | Chief Architect, ThirdM.com Rob Latino | Program Manager in Office 365 Support, Microsoft.
Office 365 is cloud-based productivity, hosted by Microsoft.
Threat Management Gateway
Office Power Hour New developer APIs and features for Apps for Office
Microsoft Virtual Academy
Cybersecurity Strategy
SAM GDPR Assessment <Insert partner logo here>
Office Mac /30/2018 © 2010 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered.
Disaster Recovery as a Service
Enterprise Mode Overview
Microsoft Virtual Academy
Microsoft Data Insights Summit
Presentation transcript:

Report addresses data and trends observed over the past several years, but focuses on the first half of 2009 (1H09) Major sections include Malicious software and potentially unwanted software , spam and phishing threats Focus content on Malware and signed code Threat combinations Malicious Web sites Software vulnerability exploits Browser-based exploits Microsoft Office document exploits Drive-by download exploits Security and privacy breaches Software vulnerability disclosures Industry-wide vulnerability disclosures Microsoft Security Bulletins and the Exploitability Index Usage trends for Windows Update and Microsoft Update

Country/Region Computers Cleaned (1H09) Computers Cleaned (2H08) Change United States13,971,05613,245,7125.5% China2,799,4563,558, % Brazil2,156,2591,654, % United Kingdom2,043,4312,225, % Spain1,853,2341,544, % France1,703,2251,815, % Korea1,619,1351,368, % Italy1,192,867978, % Turkey1,161,133768, % Germany1,086,4731,209, % Mexico957,697915,6054.6% Canada942,826916,2632.9% Taiwan781,214466, % Russia581,601604, % Japan553,417417, % The15 locations with the most computers cleaned by Microsoft desktop anti-malware products in 1H09

Significant differences in threat patterns worldwide Threat categories worldwide and in eight locations around the world, by incidence among all computers cleaned, 1H09

Location1H09 Finland1.9 Austria2.1 Puerto Rico2.1 Philippines2.3 Vietnam2.4 Macao S.A.R2.2 Tunisia2.5 Morocco2.6 Algeria2.8 Kenya2.9 Kazakhstan2.9 Germany3.0 Location1H09 Serbia and Montenegro97.2 Turkey32.2 Brazil25.4 Spain21.6 Korea21.3 Saudi Arabia20.8 Taiwan20.4 Guatemala17.0 Russia15.0 Mexico14.5 Thailand14.0 Egypt13.7 Locations with the lowest infection rates, by CCM, in 1H09 (100,000 monthly MSRT executions or more) Locations with the highest infection rates, by CCM, in 1H09 (100,000 monthly MSRT executions or more)

Miscellaneous trojans remain very prevalent Worm infections increased significantly Computers cleaned by threat category, in percentages, 2H06-1H09 Circular Markers Represent Malware Square Markers Represent Potentially Unwanted Software

Infection rates of Windows Vista SP1 were 61.9% less than Windows XP SP3 Windows Vista with no service pack were 85.3% less than Windows XP with no service pack installed Number of computers cleaned for every 1,000 MSRT executions, by operating system, 1H09

Computers cleaned by threat category, in percentages, 2H06-1H09 Relative OS infection rates remain consistent over time

Family Most Significant Category 1H092H08 1Win32/ConfickerWorms5,217,8623,719 2Win32/TaterfWorms4,911,8651,916,446 3Win32/RenosTrojan Downloaders & Droppers3,323,1984,371,508 4Win32/ZangoSearchAssistantAdware2,933,6273,326,275 5Win32/FrethogPassword Stealers & Monitoring Tools2,754,2261,037,451 6 Win32/FakeXPAMiscellaneous Trojans2,384,4971,691,393 7Win32/VundoMiscellaneous Trojans2,119,6063,635,207 8Win32/AlureonMiscellaneous Trojans1,976,735510,281 9Win32/ZangoShoppingReportsAdware1,412,4761,752,252 10Win32/AgentMiscellaneous Trojans1,361,6671,289,178 Top 15 malware and potentially unwanted software families detected by Microsoft anti- malware desktop products worldwide, by number of unique infected computers, in 1H09

User reaction to threat alerts varies widely by severity User reaction to alerts, by severity, 1H09

User action is more consistent for malware categories User action by threat category, 1H09

Category1H092H08Difference Viruses68,008,49662,785,3588.3% Miscellaneous Trojans23,474,53916,638, % Password Stealers & Monitoring Tools7,087,1411,287, % Trojan Downloaders & Droppers6,251,2865,511, % Adware3,402,2241,422, % Misc. Potentially Unwanted Software 2,753,0083,332, % Worms2,707,5602,391, % Exploits1,311,250869, % Backdoors589,747631, % Spyware269,556116, % Total115,854,80794,985, % Unique samples by category, 1H09 and 2H08

Graph excludes virus samples Viruses can infect many different files, each considered unique

Family Most Significant Category Total Samples Total Reports Reports/ Sample Win32/Parite Viruses 40,932,14166,786, Win32/Virut Viruses 15,217,83931,000, Win32/Agent Miscellaneous Trojans 6,720,42210,236, Win32/Lolyda Password Stealers & Monitoring Tools 5,671,2518,293, Win32/Vundo Miscellaneous Trojans 5,130,14327,959, ASX/Wimad Trojan Downloaders & Droppers 3,339,29612,835, Win32/Sality Viruses 3,154,3686,495, Win32/Chir Viruses 3,100,2506,355, Win32/GameVance Adware 2,785,39510,263, Win32/Jeefo Viruses 2,589,94231,122, Top 10 families with more than 1 million unique samples detected in 1H09

Enterprise computers were more likely to encounter worms Home computers were more likely to encounter trojans Threat categories detected by Windows Live OneCare and Forefront Client Security, by percentage of all infected computers cleaned by each program, 1H09

Windows Live OneCare Top Families Most Significant Category Percent ASX/WimadTrojan Downloaders & Droppers10.3% Win32/AgentMiscellaneous Trojans7.4% Win32/RenosMiscellaneous Trojans5.0% Win32/Obfuscator Misc. Potentially Unwanted Software 3.4% Win32/PdfjscExploits3.0% Win32/Xilos Viruses2.9% Win32/SwifTrojan Downloaders & Droppers2.3% Win32/AlureonMiscellaneous Trojans2.3% Win32/FakeXPAMiscellaneous Trojans2.2% Win32/AutorunWorms1.9% Top 10 families detected on infected computers by Windows Live OneCare, by percentage of computers cleaned, in1H09

Forefront Client Security Top Families Most Significant Category Percent Win32/ConfickerWorms12.3% Win32/AutorunWorms6.6% Win32/HamweqWorms5.9% Win32/AgentMiscellaneous Trojans5.1% Win32/TaterfWorms3.9% Win32/Obfuscator Misc. Potentially Unwanted Software 1.9% Win32/RenosMiscellaneous Trojans1.7% Win32/RealVNC Password Stealers & Monitoring Tools 1.6% Win32/SalityViruses1.6% Autolt/RenocideWorms1.4% Top 10 families detected on infected computers by Forefront Client Security, by percentage of computers cleaned, in1H09

Family Most Significant Category % of Signed Threat Files % of Signed Threat Reports Win32/Hotbar Adware 0.0%31.3% Win32/ZangoSearchAssistant Adware 0.0%23.4% Win32/ZangoShoppingReports Adware 0.0%17.1% Win32/Pointfree Misc. Potentially Unwanted Software 0.3%4.7% Win32/BaiduSobar Misc. Potentially Unwanted Software 0.0%3.7% Win32/Wintrim Miscellaneous Trojans 52.8%3.3% Win32/SeekmoSearchAssistant Adware 0.0%2.5% Win32/RealVNC Misc. Potentially Unwanted Software 0.0%1.9% Win32/GameVance Adware 29.7%1.9% Win32/WinFixer Misc. Potentially Unwanted Software 0.1%0.7% The 10 families responsible for the most signed-code threat reports in 1H09 Criminals sign malware code in efforts to evade detection Certificates may be issued to malware authors by CAs

Infected computers frequently have multiple infections Trojan threats were most likely to download other threats Threats that downloaded other threats, 1H09

Trojans also comprise a significant proportion of threats downloaded by other threats Threats that were downloaded by other threats, 1H09

Adware is a much larger proportion of single-country families Breakdown of threats hosted in one country and in multiple countries, by category, in 1H09

More than 97% of unwanted messages were blocked at the edge Percentage of incoming messages blocked by FOPE using edge-blocking and content filtering, 1H06-1H09

Spam was dominated by product advertisements in 1H09 Inbound messages blocked by FOPE content filters, by category, in 1H09

Most spam is sent through botnets or other automated tools The geographic origin of spam does not necessarily indicate the physical location of the spammer Geographic origins of spam, by percentage of total spam sent, in 1H09

Educational institutions are the source of most spam sent, despite accounting for a low portion of the FOPE customer base Computer management strategies may be less strict Outbound spam sent through FOPE, by type of organization, in 1H09

FOPE Families Most Significant Category Percent Win32/SmallTrojan Downloaders & Droppers39.1% Win32/VirutViruses10.3% Win32/ZbotPassword Stealers & Monitoring Tools8.5% Win32/Delfinject Miscellaneous Potentially Unwanted Software 4.3% Win32/ProvisMiscellaneous Trojans3.4% Win32/VB Miscellaneous Trojans3.1% Win32/ProlacoWorms2.9% Win32/NetskyWorms2.6% Win32/MydoomWorms2.3% Win32/AutorunWorms2.1% Top 10 families detected in by Forefront Online Protection for Exchange, by percentage of all infected messages, in1H09

Windows Live Hotmail Families Most Significant Category Percent JS/RedirectorMiscellaneous Trojans10.4% Win32/NetskyWorms8.1% Win32/MabezatVirus4.7% Win32/HelpudMiscellaneous Trojans3.9% Win32/RochapTrojan Downloaders & Droppers3.5% Win32/Agent Miscellaneous Trojans2.6% Win32/GamaniaPassword Stealers & Monitoring Tools2.3% ASX/WimadTrojan Downloaders & Droppers2.2% Win32/MydoomWorms2.2% Win32/MywifeWorms2.1% Top 10 families detected in by Windows Live Hotmail, by percentage of all infected messages, in1H09

Family Most Significant Category Desktop & Mobile Client Percent Web Client Percent Total Percent JS/RedirectorMiscellaneous Trojans15.3%1.1%10.4% Win32/NetskyWorms10.8%3.0%8.1% Win32/MabezatVirus6.7%0.9%4.7% Win32/HelpudMiscellaneous Trojans3.2%5.3%3.9% Win32/RochapTrojan Downloaders & Droppers1.3%7.7%3.5% Win32/Agent Miscellaneous Trojans1.6%4.6%2.6% Win32/Gamania Password Stealers & Monitoring Tools 3.5%0.1%2.3% ASX/WimadTrojan Downloaders & Droppers1.7%3.2%2.2% Win32/MydoomWorms1.9%2.9%2.2% Win32/MywifeWorms1.9%2.5%2.1% Top 10 malware families detected by Windows Live Hotmail, by method of access, in1H09

Phishing impressions suddenly increased in May and June 2009 Phishing impressions tracked each month in 2H08 and 1H09, indexed to January 2009

The number of phishing sites did not increase to the same extent Active phishing sites tracked each month in 2H08 and 1H09, indexed to January 2009

The significant increase in phishing impressions seems to have been driven by one or more campaigns targeting social networks Impressions for each type of phishing site each month in 1H09

A small number of sites account for the bulk of social network phishes Active phishing sites tracked each month in 2H08 and 1H09, indexed to January 2009

RankFamily Most Significant Category Percent of Malware Impressions 1Win32/MoneytreeMisc. Potentially Unwanted Software32.8% 2Win32/PdfjscExploits5.2% 3Win32/RenosTrojan Downloaders & Droppers4.6% 4Win32/FakeXPAMiscellaneous Trojans4.6% 5Win32/WinwebsecMiscellaneous Trojans4.5% 6Win32/PrivacyCenter Miscellaneous Trojans4.2% 7Win32/ObfuscatorMiscellaneous Trojans4.0% 8Win32/InternetAntivirusMiscellaneous Trojans4.0% 9Win32/SmallTrojan Downloaders & Droppers3.7% 10Win32/FakereanMiscellaneous Trojans3.3% Top 10 malware families hosted on sites blocked by the SmartScreen filter in Internet Explorer in 1H09

Potentially unwanted software phishing impressions increased while detections diminished on the desktop SmartScreen may be having a measurable amount of success in preventing these threats reaching the desktop Threats hosted at URLs blocked by the SmartScreen filter, by category, in 2H08 and 1H09

Data taken from user-reported incidents, submissions of malicious code, and Windows error reports Data from multiple operating systems and browsers Browser-based exploits, by percentage, encountered in 1H09

The 10 browser-based vulnerabilities exploited most often, by month, January-June 2009

The most common system locale was China (China), at 53.6% of all incidents The second most common was United States (English), at 27.5% Browser-based exploits, by system locale, encountered in 1H08

On Windows XP-based machines, Microsoft vulnerabilities account for 56.4% of the exploits On Windows Vista-based machines, Microsoft vulnerabilities account for only 15.5% of the exploits Browser-based exploits targeting Microsoft and third-party software on computers running Windows XP in1H09 Browser-based exploits targeting Microsoft and third-party software on computers running Windows Vista in 1H09

On Windows XP-based machines Microsoft software accounted for 6 of the top 10 vulnerabilities The most commonly exploited vulnerability was disclosed and patched by Microsoft in 2006 The 10 browser-based vulnerabilities exploited most often on computers running Windows XP, by percentage of all exploits in 1H09

On Windows Vista-based machines Microsoft software accounted for only one of the top 10 vulnerabilities The 10 browser-based vulnerabilities exploited most often on computers running Windows Vista, by percentage of all exploits in1H09

Trojan downloaders & droppers are well suited to drive- by download attacks as they can then download additional threats Types of threat payloads delivered through drive-by downloads in 1H09

Percentile distribution of exploit servers by the number of drive-by pages pointing to each one, 1H09

Drive-by download pages pointing to exploit servers marutz.cn and 3b3.org during May 2009

Drive-by download exploit servers are concentrated in a small number of Top Level Domains These Top Level Domains are prevalent in heavily- populated countries Types of malware dropped during Microsoft Office exploit attacks

BulletinDateVulnerabilityCVE MS06-027June 2006Word Malformed Pointer Object VulnerabilityCVE MS06-028June 2006 PowerPoint Remote Code Execution using a Malformed Record Vulnerability CVE MS06-037July 2006Excel File Rebuilding OverflowCVE MS06-048August 2006PowerPoint mso.dll VulnerabilityCVE MS06-060October 2006Word Mail Merge VulnerabilityCVE MS07-014February 2007 Word Malformed Data Structures Vulnerability CVE MS07-015February 2007Excel Malformed Record VulnerabilityCVE MS07-025May 2007Drawing Object VulnerabilityCVE MS08-014March 2008Macro Validation VulnerabilityCVE MS09-009April 2009Excel Memory Corruption VulnerabilityCVE MS09-017May 2009PowerPoint Memory Corruption VulnerabilityCVE Vulnerabilities exploited in Microsoft Office file formats

Data from submissions of malicious code to Microsoft One vulnerability was the target of 71.0% of all attacks Microsoft Office file format exploits, by percentage, encountered in 1H09

The most common locales correspond to countries and regions with large populations Microsoft Office file format exploits, by percentage, encountered in 1H09

Microsoft Office file format exploits encountered, by date of last Windows or Office security update, in 1H09

VulnerabilityBulletin Office 2000 RTM Office XP RTM Office 2003 RTM Office 2007 RTM CVE MS06-028Yes No CVE MS06-037Yes No CVE MS06-027Yes No CVE MS06-048Yes No CVE MS06-060Yes No CVE MS Yes No CVE MS07-015Yes No CVE MS07-025Yes CVE MS08-014Yes CVE MS09-009Yes CVE MS09-017Yes Vulnerabilities affecting RTM versions of Office

VulnerabilityBulletin Office 2000 RTM Office XP RTM Office 2003 RTM Office 2007 RTM CVE MS06-028Yes No CVE MS06-037Yes No CVE MS06-027Yes No CVE MS06-048Yes No CVE MS06-060Yes No CVE MS Yes No CVE MS07-015Yes No CVE MS07-025Yes No CVE MS08-014Yes No CVE MS09-009Yes No CVE MS09-017Yes Vulnerabilities affecting Office with latest service packs installed

Types of malware dropped during Microsoft Office exploit attacks Nearly 90% of exploits involved a trojan or backdoor These threats allow access to install more malware

Family Most Significant Category Percent of trojans Win32/BuzusTrojan Downloaders & Droppers29.5% Win32/AgentBypassMiscellaneous Trojans11.7% Win32/EnfalMiscellaneous Trojans11.3% Win32/SmallMiscellaneous Trojans6.4% Win32/SystemHijackMiscellaneous Trojans3.0% Win32/ProcInject Miscellaneous Trojans 3.0% Win32/MalresTrojan Downloaders & Droppers2.6% Win32/KirpichTrojan Downloaders & Droppers2.3% Win32/MalagentMiscellaneous Trojans2.3% Win32/BumatMiscellaneous Trojans2.3% Top 10 trojan families used in Office exploits in 1H09

Family Most Significant Category Percent of trojans Win32/PoisonIvyBackdoors61.4% Win32/BifroseBackdoors7.4% Win32/RipnipBackdoors5.5% Win32/DifeqsBackdoors4.1% Win32/RilerBackdoors3.9% Win32/Farfil Backdoors 2.8% Win32/DelfBackdoors2.5% Win32/PcClientBackdoors2.3% Win32/VedenBackdoors2.3% Win32/AgentBackdoors1.8% Top 10 backdoor families used in Office exploits in 1H09

Hacking and viruses less than 25 percent of all notifications in 1H09 Most breaches resulted from stolen, lost or improperly disposed of equipment Security breach incidents, by incident type, 2H07 – 1H09

Disclosures in 1H09 down 28.4% from 2H08 1H09 had the lowest number of disclosures since 2H05 Industry-wide vulnerability disclosures by half-year, 1H04-1H09

Disclosure of high severity vulnerabilities down 12.9% The highest severity rating accounts for 6.7% of all disclosures Industry-wide vulnerability disclosures by severity, 1H09 Industry-wide vulnerability disclosures by severity by half-year, 2004–2009 Low Medium High

Proportion of Low complexity disclosures declined… …but majority of disclosures still remain Low complexity Industry-wide vulnerability disclosures by access complexity, 1H04–1H09

High severity vulnerabilities, by access complexity, in 1H percent of High severity vulnerabilities were also classified as Low complexity

Application vulnerabilities down sharply in 1H09 OS and browser vulnerabilities relatively stable Operating system, browser & application vulnerabilities as a percentage of all disclosures, 1H04-1H09

Microsoft vulnerability disclosures mirror the industry totals, though on a much smaller scale Vulnerability disclosures for Microsoft and non-Microsoft products, 1H04-1H09 Non-Microsoft Microsoft

Responsible disclosure rates rose to a high of 79.5% Responsible disclosures as a percentage of all disclosures involving Microsoft software, 1H05-1H09

In 1H09 Microsoft released 27 bulletins addressing 87 individual CVE-identified vulnerabilities Security bulletins released and CVEs addressed by half-year, 1H05-1H09

Microsoft continues to combine vulnerabilities into single updates, thus reducing the number of patching events Average number of CVEs addressed per security bulletin, 1H05-1H09

The Exploitability Index has helped IT professionals prioritized deployment of security updates CVEs with exploits discovered within 30 days, by Exploitability Index rating, in 1H09

Workaround and mitigation status for 1H09 security bulletins Microsoft gives workaround, mitigation or attack surface reduction advice where possible

Adoption of Microsoft Update has risen significantly Microsoft Update provides a more comprehensive solution than Windows Update alone Usage of Windows Update and Microsoft Update, 2H06-1H09, indexed to 2H06 total usage

Both WSUS and end-user update services are growing faster than the Windows installed base Users are choosing to enable updating on new and existing Windows installations Relative growth in Microsoft WSUS and end-user update services, 2H06-1H09, indexed to 2H06

Daily Windows error reports caused by Win32/Renos on Windows Vista computers in February and March 2007 A Windows Defender signature issued via Microsoft Update had a significant and dramatic impact on Win32/Renos trojan infections

Update service usage and software piracy rates for seven locations worldwide, relative to the United States Usage of Microsoft updates varies worldwide Variations are due to a variety of factors including broadband Internet connectivity, software piracy and the percentage of computers in enterprise environments

MythFact Anti-piracy updates are forcibly installed by Microsoft if users install updates through Windows Update and Automatic Updates Users can, through the Windows Update or Automatic Updates control panels, choose how updates are downloaded and installed. Use of the Windows Update and Microsoft Update Web sites (Windows XP and Windows Server 2003) is gated to require Genuine validation, but there is no restriction on the use of Automatic Updates on the local computer. Microsoft does not offer security updates to pirated systems. Microsoft offers all security updates for Windows and all other Microsoft products. They also allow all computers to install the latest service packs, update rollups, critical reliability updates, compatibility updates, and most software upgrades. Microsoft update services scan computers for pirated software and relay personally identifiable information (PII) back to Microsoft for use in criminal prosecutions. Microsoft’s update services do not collect and forward personally identifiable information back to Microsoft for use in criminal prosecutions. To help mitigate privacy concerns, Microsoft has obtained and continues to renew third-party privacy certification for each version of the Windows update client. For more information about how privacy is protected through Windows Update, refer to the Windows Update privacy statement. For more information on how privacy is protected through genuine software updates, refer to the Microsoft Genuine Advantage Privacy Statement. Microsoft update services will cause non-genuine computers to crash more often or experience performance problems. Functionality of Windows is reduced on non- genuine computers. The functionality, reliability, or performance of non-genuine Windows based computers is not degraded. The following things will occur for a non-genuine computer: The desktop background will be changed to the color black. The user will be periodically notified that the computer is non-genuine. The user may not be offered new software or less-critical (value added) updates that are offered to Genuine Windows-based computers.

© 2008 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.