Security Summit West 2004 Redmond, WA Darren Canavor Longhorn Security.

Slides:



Advertisements
Similar presentations
IEs Protected Mode in Windows Vista TM January 20, 2006 Marc Silbey Program Manager.
Advertisements

© Leaf Solutions, LLC. All Rights Reserved What’s New in Everett Microsoft.Net V1.1.
Remote Desktop Services
Microsoft Windows XP SP2 Urs P. Küderli Strategic Security Advisor Microsoft Schweiz GmbH.
Securing. Agenda  Hard Drive Encryption  User Account Permissions  Root Level Access  Firewall Protection  Malware Protection.
Module 6: Configuring Windows XP Professional to Operate in a Microsoft Network.
Lesson 17: Configuring Security Policies
Windows Vista Security model and vulnerabilities.
©2006 Microsoft Corporation. All rights reserved. Application Compatibility in Windows Vista and the Application Compatibility Toolkit Micheal Sciacqua.
Sony White House Anthem Lockheed Aramco Bushehr nuclear reactor NSA Hacked Facebook Hacked Apple,Google,Microsoft,
Windows Forms 2.0 – ClickOnce Stephen Turner Software Design Engineer
Using Internet Information Server And Microsoft ® Internet Explorer To Implement Security On The Intranet HTTP.
Information for Developers Windows XP Service Pack 2 Information for Developers.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 10: Server Administration.
Lesson 18: Configuring Application Restriction Policies
Installation Requirements. Agenda Installation requirements Installation options Installing to correct folder locations Installing Windows resources Creating.
Visual Studio Whidbey: Deploying Applications Using ClickOnce Sean Draine Program Manager Microsoft Corporation Sean Draine Program Manager Microsoft Corporation.
1 ClickOnce: Advanced Topics in Web Based Application Deployment for Windows Forms and Avalon Jamie Cool Program Manager Microsoft Corporation Jamie Cool.
Module 8: Implementing Administrative Templates and Audit Policy.
2851A_C01. Microsoft Windows XP Service Pack 2 Security Technologies Bruce Cowper IT Pro Advisor Microsoft Canada.
Chapter 7 Installing and Using Windows XP Professional.
Microsoft ® Official Course Module 9 Configuring Applications.
Working with Applications Lesson 7. Objectives Administer Internet Explorer Secure Internet Explorer Configure Application Compatibility Configure Application.
Byron Alleman Will Galloway Jesse McCall. Permission Based Security Model Users can only use features for which their permissions grant them access Abstracts.
1 Group Account Administration Introduction to Groups Planning a Group Strategy Creating Groups Understanding Default Groups Groups for Administrators.
Week #7 Objectives: Secure Windows 7 Desktop
Module 10: Configuring Windows XP Professional to Operate in Microsoft Networks.
Windows Vista User Account Control (UAC) and Delphi Fredrik Haglund Developer Evangelist.
With Windows XP, you can share files and documents with other users on your computer and with other users on a network. There is a new user interface.
Troubleshooting Windows Vista Security Chapter 4.
Section 1: Introducing Group Policy What Is Group Policy? Group Policy Scenarios New Group Policy Features Introduced with Windows Server 2008 and Windows.
Testing Applications on Windows Vista TM Edited By Michael Shaw.
CSAS 2009 Running Windows as a Non- Administrator or how I learned to love “User” By: Kasey Dennler.
Security Planning and Administrative Delegation Lesson 6.
CN1176 Computer Support Kemtis Kunanuraksapong MSIS with Distinction MCT, MCTS, MCDST, MCP, A+
Windows XP to Windows 7 using P2V Migration. Agenda Deploying Local P2V Migration for SA Retro Mode Scripts Customize MDT 2010 with Disk2VHD Windows Virtual.
DEV325 Deploying Visual Studio.NET Applications Billy Hollis Author / Consultant.
Mark Aslett Microsoft Introduction to Application Compatibility.
User Account Control Requirements. Agenda Introducing UAC The shield icon UAC manifests Least User Access (LUA) predictor tool Partitioning an application.
Compatibility and Interoperability Requirements
Module 3 Configuring File Access and Printers on Windows ® 7 Clients.
Section 11: Implementing Software Restriction Policies and AppLocker What Is a Software Restriction Policy? Creating a Software Restriction Policy Using.
Aaron Margosis Principal Consultant Microsoft Session Code: CLI405.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
NetTech Solutions Security and Security Permissions Lesson Nine.
DEV395 No Touch Deployment for Windows Forms Jamie Cool Program Manager.NET Client Microsoft Corporation.
Module 10: Implementing Administrative Templates and Audit Policy.
Windows Vista: User Account Protection Securing Your Application with Least Privilege User Account Steve Hiskey FUN 406 Lead Program Manager, SBTU - Security.
Lesson 6: Controlling Access to Local Hardware and Applications
Module 7: Designing Security for Accounts and Services.
Unit 7 ITT TECHNICAL INSTITUTE NT1330 Client-Server Networking II Date: 2/3/2016 Instructor: Williams Obinkyereh.
Application Migration Fritz Ohman Alphageek
© ExplorNet’s Centers for Quality Teaching and Learning 1 Describe applications and services. Objective Course Weight 5%
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
Windows Vista Configuration MCTS : User Account Security.
Lesson 19: Configuring and Managing Updates
Deployment Planning Services
5/25/2018 2:39 AM © 2006 Microsoft Corporation. All rights reserved.
Modernizing your Remote Access
Building Secure Client Applications In Windows "Longhorn"
A Fast Track into Device Guard
Microsoft Build /13/2018 2:24 AM © 2016 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY,
The Application Lifecycle
Implementing Client Security on Windows 2000 and Windows XP Level 150
BACHELOR’S THESIS DEFENSE
BACHELOR’S THESIS DEFENSE
BACHELOR’S THESIS DEFENSE
Forum on Application Compatibility for Windows “Longhorn”
Modern LoB App Deployment
Security Planning and Administrative Delegation
Presentation transcript:

Security Summit West 2004 Redmond, WA Darren Canavor Longhorn Security

Agenda Definitions Definitions LUA Customer Pain Points LUA Customer Pain Points LUA Vision LUA Vision Desktop Control Desktop Control Tools Tools Security Questions for you Security Questions for you

Definitions LUA = Least Privileged User Account LUA = Least Privileged User Account  Run with just enough privilege to get the job done and no more!  Applications for regular users must be written to run as non-admin Administrator Administrator  A user of a machine that belongs to a user group that has permissions that are able to change local or domain state  Bluntly - a user that can destroy the user experience for everyone  Privilege == Obligation (view as a burden, not an enabler) PA = Protected Administrator PA = Protected Administrator  A user belonging to an admin group which obtains two tokens to run apps  At logon administrators will run a shell that has LUA default privilege  Elevated privileges are only granted to trusted applications AIM = Application Impact Management (aka Strongbox) AIM = Application Impact Management (aka Strongbox)  Virtualizes the legacy application view of Windows to remove admin dependency

LUA Customer Pain Points

Customer Pain Points Home: Virus and Spyware wrecks my machine Virus and Spyware wrecks my machine  Viruses and Spyware with Admin privilege can damage the machine Legacy applications require Admin to Install Legacy applications require Admin to Install  Users cannot install applications as NonAdmin Legacy applications require Admin to Run Legacy applications require Admin to Run  Users cannot run applications as NonAdmin Common OS Configuration tasks require Admin privilege Common OS Configuration tasks require Admin privilege  Users cannot perform common OS configuration tasks as LUA Users accidentally do the wrong thing Users accidentally do the wrong thing  Users running as Admin can inadvertently damage their machine Enterprise: Virus and Spyware wrecks my machine Virus and Spyware wrecks my machine  Viruses and Spyware with Admin privilege can damage the machine  Enterprise Admin attacks compromise corporation Line of Business applications require Admin to Run Line of Business applications require Admin to Run  Corporate Users cannot run applications as NonAdmin Common OS Configuration tasks require Admin privilege Common OS Configuration tasks require Admin privilege  Corporations can’t easily deploy users as LUA unless they compromise OS Security  Simple scenarios like VPN don’t work without Admin privilege  IT must reevaluate the LoB applications for each OS release due to inconsistent configuration settings

LUA Vison Vision Eliminate the risks caused by everyone running as administrator Strategy  Change the way that Windows runs so that common user tasks and most applications don’t require administrative privilege  Then advise and protect when administrator privilege is required Initiatives  Ensure Windows Users can run all Common User Tasks without Admin Privilege  Enable the Windows Infrastructure for users without Admin Privilege  Enable Apps to Install, Run, Update and Uninstall without Admin Privilege  Create Protected/Isolated Sessions for apps that do require Admin  Evangelize LUA to ISVs and Customers with Clear Guidelines, Education and Results Tracking

LUA Longhorn UX Goals OS feels like it was built for the LUA user OS feels like it was built for the LUA user Users know when they are about to do something potentially unsafe and are able to make an informed decision Users know when they are about to do something potentially unsafe and are able to make an informed decision  Windows always gives strong Security and Privacy recommendations  Users can undo damaging changes Users feel confident they can install or run any program without compromising their PC Users feel confident they can install or run any program without compromising their PC Users do not need to learn any major new concepts or procedures to be protected Users do not need to learn any major new concepts or procedures to be protected

Longhorn Is LUA Friendly Fix OS bugs (CPL, MSC, etc…) Fix OS bugs (CPL, MSC, etc…) Support Common LUA scenarios: Support Common LUA scenarios:  VPN  Display Settings  Power Management  Regional Settings  Clock  Calc  Etc. Support Per User Active X installation Support Per User Active X installation Support Per User File Extension handlers Support Per User File Extension handlers

LUA Infrastructure Support Make Per User installs work for LUA Make Per User installs work for LUA  Visual Studio, MSI 4.0, and OS support “MyPrograms”  Location: %USERPROFILE%\Local Settings\My Programs All LH Logo Applications run as LUA All LH Logo Applications run as LUA  AppCompat shims top X ISV applications Applications have manifests (Application or Deployment) Applications have manifests (Application or Deployment)  Defines what the application is and its system impact  Signed by either ISV or IT Department Trust infrastructure to support manifest signature validation Trust infrastructure to support manifest signature validation

LUA Deployments Support Runtime File/Registry Virtualization Runtime File/Registry Virtualization  Support / Management tools (debug transaction logs)  Educate PSS on how to debug Virtualization  Explorer support correct File view Trust infrastructure support Trust infrastructure support  Trust Manager  Application Information Service Simple Secure Consent UI Simple Secure Consent UI

Desktop Control Full control over what applications and drivers can be installed or run Full control over what applications and drivers can be installed or run Desktop Control Policy settings: Desktop Control Policy settings:  Lockdown: Only predefined publishers can install or run  Prompt: For unknown publishers ask the user for install or run permission  XP compatibility: No Trust check

Application Information Svc Overview

Managing Application Trust Trust determined by certificate used to sign code with a.k.a. ‘publisher’ Trust determined by certificate used to sign code with a.k.a. ‘publisher’  Authenticate against set of “Trusted Publishers” Administrators set policies controlling which publishers to trust Administrators set policies controlling which publishers to trust  Decide which are “Trusted Publishers”  Pre-populate “Trusted Publishers” certificates in OS Image (IBS)  GP Certificate trust download for machines joined to domain

Permissions For Installing Drivers Driver Store Driver Store  Repository of drivers on local machine  Requires Administrator permission to populate  “Stage” drivers for install  Once drivers are added to store they will install regardless of user permission Driver Package Integrity Driver Package Integrity  Longhorn will require all drivers to be digitally signed to install  Authenticode™ code signing works for all driver types in Longhorn  Signing check occurs before adding a driver to the Driver Store

Code Validation Process All code validation is a human decision All code validation is a human decision  Publishers can get signed app manifest (need to be in cert store)  Domain admins can sign deployment manifest (enterprise store)  Local admins can “bless” apps  By policy user can decide to change default behavior All local validation decisions are preserved in App Context All local validation decisions are preserved in App Context Code Integrity is assured by checking every.EXE and.DLL for validity Code Integrity is assured by checking every.EXE and.DLL for validity Application trust is assured at Runtime Application trust is assured at Runtime

LUA Predictor AppVerifier Intended to predict whether an application would work correctly as a non-admin. Intended to predict whether an application would work correctly as a non-admin.  Identifies API calls that would fail if attempted by a non-administrator  Identifies all Access requiring Admin privilege Example LUA Predictor test pass: Example LUA Predictor test pass:  Logon as Administrator and install LUA Predictor Shim  Build affinity to the applicable application  Test application and save log  Logon as Non Admin  Test application and save log Tool Location: Tool Location:

Security Questions For You Do you test applications as Least Privileged User (LUA) – non-administrators? Do you test applications as Least Privileged User (LUA) – non-administrators? Do you perform a threat analysis of applications before deploying them? Do you perform a threat analysis of applications before deploying them? Is it your goal to provision users to run with out administrator credentials, if so what percentage of your users run as non administrators? Is it your goal to provision users to run with out administrator credentials, if so what percentage of your users run as non administrators? Do your IT administrators have a secondary LUA account? Do your IT administrators have a secondary LUA account? Do you have a hard policy on what IT administrators can do when they are logged on? Do you have a hard policy on what IT administrators can do when they are logged on?  Ie. Not surf the internet? Do you write line-of-business applications in.NET managed code? Do you write line-of-business applications in.NET managed code? Do you see value in writing managed code with permission sets that limit what the application can do? Do you see value in writing managed code with permission sets that limit what the application can do? Do you see value in writing line-of-business apps to a highly restricted environment (a sandbox) that restricts that application enough that it doesn’t need a trust dialog to deploy? Do you see value in writing line-of-business apps to a highly restricted environment (a sandbox) that restricts that application enough that it doesn’t need a trust dialog to deploy?

© 2004 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary.