Device Protection With Microsoft Endpoint Manager and Microsoft Defender For Endpoint - Module 08 - Exploit Guard and Application Guard
Device Protection With Microsoft Endpoint Manager and Microsoft Defender For Endpoint - Module 08 - Exploit Guard and Application Guard
Microsoft Services
V04.21-2010
Module 8.1 - Exploit Guard
• What is Exploit Guard?
• Exploit Guard Components
• Exploit Guard Requirements
• Lab 08.1: Exploit Guard
• Additional Resources
Module 08: Exploit Guard and
Application Guard.
Exploit Guard
Microsoft Confidential
What is Exploit Guard?
Microsoft Confidential
Exploit Guard components
OFF ON OFF
MACHINE MACHINE MACHINE
Exploit Guard
Module 08: Exploit Guard and
Application Guard.
Exploit Guard
Microsoft Confidential
Exploit Guard: Attack Surface Reduction Rules
• Contains over a dozen configurable rules that can enable or disable
specific behaviors
• Prevents actions and apps that are commonly used by malware, such as:
• Launching executables from email
• Scripts or applications that launch child processes
• Most rules can be set to Audit to monitor activity prior to being set to
Block
• Some rules support exclusions based on file or folder names
• Attack surface reduction supports environment variables and wildcards.
Intelligent Attack Surface Reduction Rules
Office Files Example
Smart-ASR control provides the ability to block behavior that balances security &
productivity
Blocking Office files, severely impacts
Office files (e.g. docx, docm, pptx, pptm, etc) productivity (as there are way more good
files than malicious files)
provided by WD
Exploit Guard Office files w/ macros,
Blocking Office files w/ macros that
download and execute content, is almost
Good files that download & exclusive behavior of bad files. Thus
Malicious files execute content negligent impact on productivity, with
dramatic security benefit.
Module 08: Exploit Guard and
Application Guard.
Exploit Guard
Microsoft Confidential
Exploit Guard: Controlled Folder Access
• CFA helps you protect valuable data from malicious apps and threats, such
as ransomware. It protects your data by checking against a list of known,
trusted apps.
• CFA works by only allowing apps to access protected folders if the app is
included on a list of trusted software. If an app isn't on the list, CFA will block
it from making changes to files inside protected folders.
• Apps are added to the trusted list based upon their prevalence and
reputation. Apps that are highly prevalent throughout your organization,
and that have never displayed any malicious behavior, are deemed
trustworthy and automatically added to the list. Apps can also be manually added to
the trusted list via Configuration Manager and Intune.
Controlled Folder Access
Simplified Approach:
• Protect default known folders
Microsoft Confidential
Exploit Guard: Network Protection
• Reduces the attack surface of your devices from Internet-based
events
• Expands the scope of Windows Defender SmartScreen by blocking all
outbound requests to low reputation sources (based on the domain
or hostname).
• When network protection blocks a connection, a notification will be
displayed from the Action Center. You can customize the notification
with your company details and contact information. You can also
enable the rules individually to customize what techniques the feature
monitors.
• Can be configured for audit mode to test prior to blocking
Network Protection: Supported browsers
Network Protection takes Windows Defender SmartScreen’s
industry-leading protection…
makes it available to all browsers and processes.
Network Protection: How
How Network it works
Protection Works
Microsoft Confidential
Exploit Guard: then…
Exploit Protection Exploit Protection than…
Exploit Guard: now…
Exploit Protection Exploit Protection now
Exploit Protection: Settings
Microsoft Confidential
Exploit Guard Requirements
• Features must be configured to enabled.
• Configuration methods:
• Windows Security User Interface
• Group Policy
• PowerShell
• Configuration Service Provider (CSP) such as System Center
Configuration Manager.
• Exploit Guard works best when paired with Microsoft Defender
for Endpoint which provides advanced reporting, monitoring,
and mitigation capabilities.
Lab 08.1: Exploit Guard
• Exercise 1: Create Exploit
Guard Policy
• Exercise 2: Verify Exploit
Guard Policy
Knowledge Measure
1. Which Exploit Guard component protects against
browser exploits?
2. What Exploit Guard component helps stop against the
spread of encrypting files inside specific folders?
3. What methods can be used to enable/configure Exploit
Guard?
Additional Resources
https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-a
tp/enable-exploit-protection
https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-at
p/windows-defender-advanced-threat-protection
Module 8.2 - Application Guard
Microsoft Confidential
What is Application Guard?
• Hardware Isolation leveraging a Hyper-V enabled container
• Administrator defines trusted sites through GPOs, Configuration Manager,
or Intune
• Untrusted sites launch in the isolated Hyper-V container
• Intended for:
• Enterprise Desktops and Laptops -Domain-joined and managed by your
organization.
• Bring your own device - Personally-owned laptops are not domain-joined, but are
managed by your organization through tools, such as Microsoft Intune.
• Personal devices - Personally-owned desktops or mobile laptops are not domain-
joined or managed by an organization. The user is an admin on the device and uses
a high-bandwidth wireless personal network while at home or a comparable public
network while outside.
So what’s changed? Why do we need to isolate our browser?
Apps
Windows Platform
Traditional
Services
Device Hardware
So what’s changed? Why do we need to isolate our browser?
Apps
Credential
Hardware
Trustlet
Device
Guard
Guard
based
Windows Platform
Services
isolation Kernel
Kernel
Windows 10
System Guard Container
Device Hardware
Hypervisor
Microsoft Edge with Application Guard
Microsoft
Apps
Edge
Device Hardware
Hypervisor (Hyper-V)
Application Guard and the
Anatomy of an Attack
Application Guard: Anatomy of an Attack
ATTACK
USER
PHISHING
Browser or
DEVICE Doc Exploit
Execution
PASS-THE-HASH NETWORK
ENDGAME
User receives
a suspicious email,
unwittingly the
user clicks the link
A new browser
Natoint.com
Natoint.com
window appears,
with window
decoration and
notification that
the site the user
wants
to open is not an
enterprise site and
needs to open in
a container
A new browser
Natoint.com
Natoint.com
window appears,
with window
decoration and
notification as
the user lands on an
untrusted website.
The user clicks to
allow the malware
to run and the
container is infected
Natoint.com
Natoint.com
Host
Encrypted
Container
Files
Host SENSE
Agent
Container Processes
SENSE Agent
Registry
data
Windows 10
Service Agents
Network
pocket data
Events
Office Threat Landscape – Adding in Office
Application Guard
Office documents are a popular vector for
attacks
• Office as a vector
• Abusing extensibility points (e.g. macros)
• Targeting vulnerable components (e.g.
Flash) from Office
• Social engineering end users to achieve
exploitation is common
• Office as a target
• Exploiting code vulnerabilities in Office
(e.g. CVE-2017-11882)
Copy-Paste*
Printers • Enable
Office • PDF, XPS • Disable
Allow vGPU
File Trust Setting
rendering
• Allow
• Enable
• Deny
• Disable
Windows
1. Contain existing and Office 0-day 1. Provide the full office experience 1. Provide on-client detonation
exploits (including kernel) for trusted documents outside the capability from any source
2. Dispose threats by recycling the container 2. Leverage ATP to identify safe
container 2. Provide Beyond read-only documents before promotion
3. Leverage state of the art Windows experience by allowing users to outside of container and auditing
isolation technology edit and save untrusted for SecOps visibility
documents from within the
container
Advanced threat isolation with Application Guard
Application Guard Host
Untrusted Document Container Trusted Document
Office Office
TLDR; Same as
Protected View
1. Document downloaded
from a trusted site
1. Document Windows Platform Windows Platform
Services Services
downloaded from
2. Attachment from
an untrusted site
someone inside your
tenant
2. Attachment from
someone outside Kernel Kernel
3. Documents opened
your tenant
from your tenant
Copy/Paste
3. Documents opened
Save 4. Documents opened
from another tenant
from your OneDrive
PrintAccess
Brokered (Consumer)
4. Document opened
from someone
5. Document from local
else's OneDrive
Hypervisor (Hyper-V) network shares
(Consumer)
Device hardware
Trusted Productivity
Deliver security without compromising productivity
NOTES: (1) Requires O365/M365 Security; (2) Must be using ProPlus, requires M365 Security; (3) Must be using ProPlus, requires O365/M365 Security; (4) Reporting varies by offering
Trusted Productivity: Deliver security without compromising productivity
Safe Documents
Desktop users can verify external
documents are safe no matter the source
Scenario:
• Untrusted documents in Protected View (or AG) are verified against MDATP
• MDATP determines if docs are safe and allowed to open outside a container
• Docs verified by MDATP + found safe no longer open in a sandbox
Trusted Productivity: Deliver security without compromising productivity
Application Guard
Users stay protected and productive with
container-based isolation
Today
Safe Documents
App Guard
Microsoft
Defender for
Endpoint
Integration
System Requirements – Hardware
Hardware Description
64-bit CPU A 64-bit computer with minimum 4 cores is required for
hypervisor and virtualization-based security (VBS). For
more info about Hyper-V, see
Hyper-V on Windows Server 2016 or
Introduction to Hyper-V on Windows 10. For more info
about hypervisor, see Hypervisor Specifications.
CPU virtualization Extended page tables, also called Second Level Address
Translation (SLAT)
-AND-
One of the following virtualization extensions for VBS:
VT-x (Intel)
-OR-
AMD-V
Hardware Memory Microsoft recommends 8GB RAM for optimal performance.
Microsoft Confidential
Prepare and Install
Choose Implementation Method:
• Standalone Mode
• Enterprise Mode
Microsoft Confidential
Configure Application Guard - Intune
Create a new Device Configuration Profile:
Create Profile->Win10, Endpoint Protection->Windows Defender Application
Guard->Enable, Configure all settings
• What are three methods you can use to configure Application Guard?