{"id":10718,"date":"2016-09-28T01:00:12","date_gmt":"2016-09-27T16:00:12","guid":{"rendered":"https:\/\/jirak.net\/wp\/introducing-windows-defender-application-guard-for-microsoft-edge\/"},"modified":"2016-09-28T01:36:03","modified_gmt":"2016-09-27T16:36:03","slug":"introducing-windows-defender-application-guard-for-microsoft-edge","status":"publish","type":"post","link":"https:\/\/jirak.net\/wp\/introducing-windows-defender-application-guard-for-microsoft-edge\/","title":{"rendered":"Introducing Windows Defender Application Guard for Microsoft Edge"},"content":{"rendered":"<p>Introducing Windows Defender Application Guard for Microsoft Edge<br \/>\n<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/jirak.net\/wp\/wp-content\/uploads\/2016\/09\/cve.png\" width=\"816\" height=\"438\"><\/p>\n<p>We\u2019re determined to make Microsoft Edge the safest and most secure browser. Over the past two years, we have been <a href=\"https:\/\/blogs.windows.com\/msedgedev\/tag\/security\/\">continuously innovating,<\/a> and we\u2019re proud of the progress we\u2019ve made. This is reflected by Microsoft Edge having the fewest vulnerabilities of any major browser on Windows since our release last year.<\/p>\n<div id=\"attachment_18884\" style=\"width: 826px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/winblogs.azureedge.net\/win\/2016\/09\/cve.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-18884\" src=\"https:\/\/winblogs.azureedge.net\/win\/2016\/09\/cve.png\" alt=\"Chart showing total numbers of CVEs for each browser according to the NVD. Edge lists the fewest with 122; Chrome, 233; Firefox, 232.\" width=\"816\" height=\"438\" \/><\/a><\/p>\n<p class=\"wp-caption-text\">Browser vulnerabilities (as of September 2016) for <a href=\"https:\/\/web.nvd.nist.gov\/view\/vuln\/search-results?adv_search=true&amp;cves=on&amp;cpe_vendor=cpe%3a%2f%3amicrosoft&amp;cpe_product=cpe%3a%2f%3amicrosoft%3aedge&amp;pub_date_start_month=6&amp;pub_date_start_year=2015&amp;pub_date_end_month=9&amp;pub_date_end_year=2016&amp;cvss_version=3&amp;cve_id=\">Microsoft Edge<\/a>, <a href=\"https:\/\/web.nvd.nist.gov\/view\/vuln\/search-results?adv_search=true&amp;cves=on&amp;cpe_vendor=cpe%3a%2f%3agoogle&amp;cpe_product=cpe%3a%2f%3agoogle%3achrome&amp;pub_date_start_month=6&amp;pub_date_start_year=2015&amp;pub_date_end_month=9&amp;pub_date_end_year=2016&amp;cvss_version=3&amp;cve_id=\">Chrome<\/a>, and <a href=\"https:\/\/web.nvd.nist.gov\/view\/vuln\/search-results?adv_search=true&amp;cves=on&amp;cpe_vendor=cpe%3a%2f%3amozilla&amp;cpe_product=cpe%3a%2f%3amozilla%3afirefox&amp;pub_date_start_month=6&amp;pub_date_start_year=2015&amp;pub_date_end_month=9&amp;pub_date_end_year=2016&amp;cvss_version=3&amp;cve_id=\">Firefox<\/a> (per the National Vulnerability Database) since Microsoft Edge was released.<\/p>\n<\/div>\n<p>While no modern browser\u2014or any complex application\u2014is free of vulnerabilities, the majority of the vulnerabilities for Microsoft Edge have been responsibly reported by professional security researchers who work with the Microsoft Security Response Center (MSRC) and the Microsoft Edge team to ensure customers are protected well before any attacker might use these vulnerabilities in the wild. Even better, there is no evidence that any vulnerabilities have been exploited in the wild as zero-day attacks.<\/p>\n<p>However, many businesses worldwide have come under increasing threat of targeted attacks, where attackers are crafting specialized attacks against a particular business, attempting to take control of corporate networks and data. For the most security-conscience businesses, we are introducing a new layer of defense-in-depth protection: Windows Defender Application Guard for Windows 10 Enterprise. Application Guard provides unprecedented protection against targeted threats using Microsoft\u2019s Hyper-V virtualization technology.<\/p>\n<\/p>\n<h1>Understanding targeted attacks against large Enterprises<\/h1>\n<p>The threat landscape has changed significantly in recent years. Today, over 90% of attacks use a hyperlink to initiate the attack to steal credentials, install malware, or exploit vulnerabilities.<\/p>\n<p><strong><a href=\"https:\/\/winblogs.azureedge.net\/win\/2016\/09\/attack.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-18881\" src=\"https:\/\/winblogs.azureedge.net\/win\/2016\/09\/attack.png\" alt=\"Diagram showing the anatomy of a typical attack; an attacker first enters (via browser or doc exploits, malicious attachments, etc); then establishes (service compromise, exploit or attachment execution, use of stolen credentials); then expands (kernel exploits, kernel-mode malware, etc.). The attacker endgame is business disruption, lost productivity, data theft, espionage, ransom, etc.\" width=\"653\" height=\"367\" \/><\/a><\/strong><\/p>\n<p>This is damaging not only to the business attacked, but also to the thousands, if not millions of users whose accounts and personal data may be stolen. Highly motivated and persistent attackers will often start with a social engineering trick: creating a well-crafted and personal email to known employees of the company. This email, which will often appear to be from a legitimate authority in the company, may ask the employee to click a link to read a supposedly important document. Unfortunately, that link is to a specially crafted malicious web site that may use a previously undisclosed vulnerability to install malware on the user\u2019s machine. Once established on that single computer, the attackers can then steal credentials and start to probe the rest of the network for other vulnerable machines, repeating the process on other computers until they achieve their objective, whether that is stealing data, intellectual property, or disrupting the business.<\/p>\n<h1>Breaking the attacker playbook<\/h1>\n<p>We\u2019re taking a systematic approach to disrupting these attackers by providing our customers with the tools they need to defend against these vectors of attack. Application Guard is designed to stop attackers from establishing a foothold on the local machine or from expanding out into the rest of the corporate network.<\/p>\n<p>By using our industry leading virtualization technology, potential threats are not only isolated from the network and system, but will be completely removed when the container is closed.<\/p>\n<h1>Digging deeper into Application Guard<\/h1>\n<p>Application Guard leverages virtualization technology born in the Microsoft Cloud to accomplish this disruption.<\/p>\n<p>When a user browses to a trusted web site, for example an internal accounting system web application, Microsoft Edge operates as it does today. It has access to local storage, can authenticate the user to internal sites with corporate credentials, standard cookies work, the user can save files to the local machine, and in general Windows just works. This mode, outlined in blue in the chart below,\u00a0is known as the Host version of Windows.<\/p>\n<div id=\"attachment_18887\" style=\"width: 663px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/winblogs.azureedge.net\/win\/2016\/09\/sandbox.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-18887\" src=\"https:\/\/winblogs.azureedge.net\/win\/2016\/09\/sandbox.png\" alt=\"Diagram showing two Windows instances running on the same device, managed by Hyper-V. The &quot;host&quot; operating system runs Edge trusted sites. The Application Guard instance runs a new instance of Windows, including minimum Windows Platform Services and an entirely separate kernel, which has no access to the normal operating environment.\" width=\"653\" height=\"367\" \/><\/a><\/p>\n<p class=\"wp-caption-text\">Application Guard isolates untrusted sites in a new instance of Windows at the hardware layer.<\/p>\n<\/div>\n<p>However, when an employee browses to a site that is not recognized or trusted by the network administrator, Application Guard steps in to isolate the potential threat. As shown in the mode outlined in red above, Application Guard creates a new instance of Windows at the hardware layer, with an entirely separate copy of the kernel and the minimum Windows Platform Services required to run Microsoft Edge. The underlying hardware enforces that this separate copy of Windows has no access to the user\u2019s normal operating environment.<\/p>\n<p>Application Guard\u2019s enforcement includes completely blocking access to memory, local storage, other installed applications, corporate network endpoints, or any other resources of interest to the attacker. This separate copy of Windows has no access to <em>any<\/em> credentials, including domain credentials, that may be stored in the permanent credential store.<\/p>\n<p>Most of the time, even untrusted sites are not malicious and perfectly safe to visit, and the user just expects them to work. This isolated environment allows these sites to function essentially as they would if they were running on the host version of Windows. In this case Application Guard does provide the essential features that users would expect to work, even when browsing untrusted sites, such as being able to copy and paste with the Windows clipboard, and being able to print content from those web sites to their work printer. This allows the user to still be productive even while the host is being protected by Application Guard. The enterprise administrator has control over this functionality using Microsoft management tools and policy, and can choose what they are comfortable with based on their own risk assessment.<\/p>\n<h1>Defense-in-depth isolation for enterprises<\/h1>\n<p>To improve on the security offered by purely software based sandboxes, Microsoft worked with several enterprise and government customers on a hardware based isolation approach to address these concerns. With Application Guard, Microsoft Edge protects your enterprise from advanced attacks that can infiltrate your network and devices via the Internet, creating a safer, worry-free browsing experience for customers.<\/p>\n<p>But what happens when the untrusted site is actually part of an attacker\u2019s malicious plan?\u00a0 Let\u2019s revisit the attack described above. An attacker sends a well-crafted email to an innocent employee of the company enticing them to visit a link on a site under the attacker\u2019s control. The innocent user, not noticing anything suspicious about the mail, clicks on the link to an untrusted location. In order to proactively keep the user and enterprise resources safe, Application Guard coordinates with Microsoft Edge to open that site in a temporary and isolated copy of Windows. In this case, even if the attacker\u2019s code is successful in attempting to exploit the browser, the attacker finds their code running in a clean environment with no interesting data, no access to any user credentials, and no access to other endpoints on the corporate network. The attack is completely disrupted. As soon as the user is done, whether or not they are even aware of the attack having taken place, this temporary container is thrown away, and any malware is discarded along with it. There is no way for the attacker to persist on that local machine, and even a compromised browser instance has no foothold to mount further attacks against the company\u2019s network. After deletion, a fresh new container is created for future browsing sessions.<\/p>\n<h1>Web developers and Application Guard<\/h1>\n<p>The good news for web developers is that they do not need to do anything different with their site code \u2013 Microsoft Edge renders sites in Application Guard fundamentally the same way it does in the host version of Windows. There is no need to detect when Microsoft Edge is running in this mode, nor any need to account for behavior differences. Since this temporary container is destroyed when the user is done, there is no persistence of any cookies or local storage when the user is finished.<\/p>\n<h1>We\u2019re committed keeping Enterprise users and data safe and secure<\/h1>\n<p>Our mission at Microsoft is to empower every person and every organization on the planet to achieve more. With Windows Defender Application Guard, enterprise users can take advantage of the vast power of Internet sites and services while still protecting corporate and personal data. This capability makes Microsoft Edge the most secure browser for the Enterprise.<\/p>\n<p>\u2015 John Hazen, Principal Program Manager, Microsoft Edge<br \/>\n\u2015 Chas Jeffries, Principal Program Manager, Application Guard<\/p>\n<p>Source: <a href=\"http:\/\/blogs.windows.com\/msedgedev\/2016\/09\/27\/application-guard-microsoft-edge\/\" target=\"_blank\">Introducing Windows Defender Application Guard for Microsoft Edge<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<div class=\"mh-excerpt\"><p>Introducing Windows Defender Application Guard for Microsoft Edge We\u2019re determined to make Microsoft Edge the safest and most secure browser. Over the past two years, we have been continuously innovating, and we\u2019re proud of the progress we\u2019ve made. This is reflected by Microsoft Edge having the fewest vulnerabilities of any major browser on Windows since our release last year. Browser vulnerabilities (as of September 2016) for Microsoft Edge, Chrome, and Firefox (per the National Vulnerability Database) since Microsoft Edge was released. While no modern browser\u2014or any complex application\u2014is free of vulnerabilities, the majority of the vulnerabilities for Microsoft Edge have been responsibly reported by professional security researchers who work with the Microsoft Security Response Center (MSRC) and the Microsoft Edge team to ensure customers are protected well before any attacker might use these vulnerabilities in the wild. Even better, there <a class=\"mh-excerpt-more\" href=\"https:\/\/jirak.net\/wp\/introducing-windows-defender-application-guard-for-microsoft-edge\/\" title=\"Introducing Windows Defender Application Guard for Microsoft Edge\">[ more&#8230; ]<\/a><\/p>\n<\/div>","protected":false},"author":1,"featured_media":10719,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[169],"tags":[201],"class_list":["post-10718","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","tag-windows"],"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts\/10718","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/comments?post=10718"}],"version-history":[{"count":1,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts\/10718\/revisions"}],"predecessor-version":[{"id":10720,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts\/10718\/revisions\/10720"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/media\/10719"}],"wp:attachment":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/media?parent=10718"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/categories?post=10718"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/tags?post=10718"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}