{"id":15686,"date":"2019-07-01T09:00:38","date_gmt":"2019-07-01T17:00:38","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2019\/07\/01\/news-9434\/"},"modified":"2019-07-01T09:00:38","modified_gmt":"2019-07-01T17:00:38","slug":"news-9434","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/07\/01\/news-9434\/","title":{"rendered":"Delivering major enhancements in Windows Defender Application Control with the Windows 10 May 2019 Update"},"content":{"rendered":"<p><strong>Credit to Author: Eric Avena| Date: Mon, 01 Jul 2019 16:25:25 +0000<\/strong><\/p>\n<p>With the Windows 10 May 2019 Update we delivered several important features for <a href=\"https:\/\/docs.microsoft.com\/windows\/security\/threat-protection\/windows-defender-application-control\/windows-defender-application-control\">Windows Defender Application Control<\/a> (WDAC), which was originally introduced to Windows as part of a scenario called Device Guard. WDAC works in conjunction with features like <a href=\"https:\/\/docs.microsoft.com\/windows\/security\/threat-protection\/windows-defender-application-guard\/wd-app-guard-overview\">Windows Defender Application Guard<\/a>, which provides hardware-based isolation of Microsoft Edge for enterprise-defined untrusted sites, to strengthen the security posture of Windows 10 systems.<\/p>\n<p>Our focus for this release was responding to some longstanding feedback on manageability improvements. We\u2019re excited to introduce the following new capabilities in Windows Defender Application Control:<\/p>\n<ol>\n<li>File path rules, including optional runtime admin protection checks<\/li>\n<li>Multiple policy file support with composability<\/li>\n<li>Application Control CSP to provide a new, richer MDM policy management capability<\/li>\n<li>COM object registration support in policy<\/li>\n<li>Disabling script enforcement rule option<\/li>\n<\/ol>\n<p>Application control is frequently identified as one of the most effective mitigations against modern security threats, because anything that\u2019s not allowed by policy is blocked from running. Even striving towards a simple policy like mandating that only signed code is allowed to execute can be incredibly impactful: in a recent analysis of Windows Defender ATP data, we saw that 96% of malware encountered is unsigned. Systems like Windows 10 in S mode, which uses WDAC technology to enforce that all code must be signed by Windows and Microsoft Store code signing certificates, have no malware infection issues.<\/p>\n<p>The new capabilities are designed to ease the journey for customers adopting application control in real-world environments with large numbers of applications, users, and devices.<\/p>\n<h3>File path rules, including optional runtime admin protection checks<\/h3>\n<p>For many customers looking to adopt application execution control while balancing IT overhead, rules based on file paths on managed client systems provide a useful model. The Windows 10 May 2019 Update introduces support for both allow and deny rules based on file path in Windows Defender Application Control.<\/p>\n<p>File path rules had been one of the few features available in <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/security\/threat-protection\/windows-defender-application-control\/applocker\/applocker-overview\">AppLocker<\/a>, the older native application control technology, that were not available to WDAC; deployment tools and methodologies built on top of AppLocker like <a href=\"https:\/\/blogs.msdn.microsoft.com\/aaron_margosis\/2018\/10\/11\/aaronlocker-update-v0-91-and-see-aaronlocker-in-action-on-channel-9\/\">AaronLocker<\/a> have relied on these rules as an important simplifying option for policy management. As we sought to close that gap, we wanted to preserve the stronger security posture available with WDAC that customers have come to expect. To this end, WDAC applies, by default, an option to check at runtime that apps and executables allowed based on file path rules must come from a file path that\u2019s only writable by administrator or higher privileged accounts. This runtime check provides an additional safeguard for file path rules that are otherwise inherently weaker than other identifiers like hash or signer rules, which rely on cryptographically verifiable attributes.<\/p>\n<p>This runtime capability can be controlled with the \u201cDisabled:Runtime FilePath Rule Protection\u201d rule option.<\/p>\n<p>The following example shows how to easily create rules for anything allowed under \u201cProgram Files\u201d and \u201cProgram Files (x86)\u201d, and then merge them with the sample policy that allows all Windows signed code (available under <em>C:WindowsschemasCodeIntegrityExamplePolicies<\/em>). The resulting merged policy file allows all Windows signed code and applications installed under \u201cProgram Files\u201d and \u201cProgram Files (x86)\u201d with the runtime protection that checks that anything executing under those paths is coming from a location only writable by administrator or higher privileged accounts.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-89582\" src=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/07\/1-File-path-rules-Windows-Defender-Application-Guard.png\" alt=\"Sample file path rules\" width=\"1459\" height=\"141\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/07\/1-File-path-rules-Windows-Defender-Application-Guard.png 1459w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/07\/1-File-path-rules-Windows-Defender-Application-Guard-300x29.png 300w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/07\/1-File-path-rules-Windows-Defender-Application-Guard-768x74.png 768w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/07\/1-File-path-rules-Windows-Defender-Application-Guard-1024x99.png 1024w\" sizes=\"auto, (max-width: 1459px) 100vw, 1459px\" \/><\/p>\n<h3>Multiple policy file support with composability<\/h3>\n<p>Limiting support to a single policy file means that a variety of app control scenarios from potentially different stakeholders or business groups need to be maintained in one place. This comes with an associated overhead: the coordination required to converge on the appropriate rules encapsulated in a single policy file.<\/p>\n<p>With the Windows 10 May 2019 Update multiple policy files are supported for WDAC. To facilitate composing behavior from multiple policy files, we have introduced the concept of base and supplemental policies:<\/p>\n<ul>\n<li><span style=\"text-decoration: underline;\">Base policies<\/span> &#8211; For any execution to be allowed, the application must pass each base policy independently. Base policies are used together to further restrict what\u2019s allowed. For example:<br \/> Let\u2019s assume a system has two policies: Base Policy A and Base Policy B with their own sets of rules. For foo.exe to run, it must be allowed by the rules in Base Policy A and also the rules in Base Policy B. Windows Defender Application Control policies on prior Windows 10 systems will continue to work on the May 2019 Update and will be treated as base policies.<\/li>\n<li><span style=\"text-decoration: underline;\">Supplemental policies<\/span> &#8211; As the name suggests, supplemental policies complement base policies with additional rules to be considered as part of the base policies they correspond to. Supplemental policies are tied to a specific base policy with an ID; a base policy may have multiple supplemental policies. Supplemental policies expand what is allowed by any base policy, but deny rules specified in a supplemental policy will not be honored.<\/li>\n<\/ul>\n<h3>Application Control CSP<\/h3>\n<p>Customers have been able to deploy Windows Defender Application Control policies via MDM using the CodeIntegrity node of the AppLocker configuration service provider (CSP). The AppLocker CSP has a number of limitations, most notably the lack of awareness of rebootless policy deployment support.<\/p>\n<p>The Windows 10 May 2019 Update now has a new Application Control CSP, which introduces much richer support for policy deployment over MDM and also provides support for:<\/p>\n<ul>\n<li>Rebootless policy deployment (For policies that have the \u201cEnabled:Update Policy No Reboot\u201d option set, the new Application Control CSP will not schedule a reboot on client systems getting the policy)<\/li>\n<li>Support for the new multiple policies<\/li>\n<li>For device management software vendors, better error reporting<\/li>\n<\/ul>\n<h3>COM object registration support<\/h3>\n<p>Windows Defender Application Control enforces a built-in allow list of COM object registrations to reduce the risk introduced from certain powerful COM objects. Customers have reported that while this capability is desirable from a security perspective, there are specific cases in their environments where they\u2019d like to allow the registration of additional COM objects required for their business.<\/p>\n<p>With the Windows 10 May 2019 Update customers can now specify COM objects that need to be allowed in environments they\u2019re managing with Windows Defender Application Control policies.<\/p>\n<h3>Disabled: Script Enforcement rule option support<\/h3>\n<p>The Windows 10 May 2019 Update with <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4497935\">KB4497935<\/a> introduces proper support for the Disabled: Script Enforcement rule option.<\/p>\n<p>Customers recognize the importance of having restrictions on script hosts but are often looking to break up their application control projects into smaller chunks to help with deployment feasibility. The \u201cDisabled:Script Enforcement\u201d rule option in the policy now turns off policy enforcement for MSIs, PowerShell scripts, and wsh-hosted scripts. This will allow IT departments to tackle EXE, DLL, and driver enforcement without needing to also simultaneously address script host control.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-89583\" src=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/07\/2-Disabled-script-enforcement-Windows-Defender-Application-Guard.png\" alt=\"Disabled: Script Enforcement rule \" width=\"553\" height=\"309\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/07\/2-Disabled-script-enforcement-Windows-Defender-Application-Guard.png 553w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/07\/2-Disabled-script-enforcement-Windows-Defender-Application-Guard-300x168.png 300w\" sizes=\"auto, (max-width: 553px) 100vw, 553px\" \/><\/p>\n<h3>Try the new capabilities today<\/h3>\n<p>We invite everyone to try these new <a href=\"https:\/\/docs.microsoft.com\/windows\/security\/threat-protection\/windows-defender-application-control\/windows-defender-application-control\">Windows Defender Application Control<\/a> capabilities, alongside existing features like <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/security\/threat-protection\/windows-defender-application-control\/use-windows-defender-application-control-with-managed-installer\">managed installer<\/a>. For customers using Microsoft Defender ATP, consider using <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/security\/threat-protection\/windows-defender-application-control\/querying-application-control-events-centrally-using-advanced-hunting\">Advanced hunting<\/a> to query the WDAC events centrally to understand and monitor the behavior of all these new policy controls on client machines in your environment. Learn about both new and existing functionalities with the <a href=\"https:\/\/docs.microsoft.com\/windows\/security\/threat-protection\/windows-defender-application-control\/windows-defender-application-control-deployment-guide\">Windows Defender Application Control deployment guide<\/a>.<\/p>\n<p>We\u2019re also working on supplementing the documentation we have out now. Stay tuned for updates from our team for tools and guidance on GitHub that provide more practical examples and ready-to-use scripts.<\/p>\n<p>&nbsp;<\/p>\n<p><strong><em>Nazmus Sakib<\/em><\/strong><br \/> <em>Senior Program Manager, Windows Defender Application Control team<\/em><\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/www.microsoft.com\/security\/blog\/2019\/07\/01\/delivering-major-enhancements-in-windows-defender-application-control-with-the-windows-10-may-2019-update\/\">Delivering major enhancements in Windows Defender Application Control with the Windows 10 May 2019 Update<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/www.microsoft.com\/security\/blog\/\">Microsoft Security<a>.<\/p>\n<p><a href=\"https:\/\/www.microsoft.com\/security\/blog\/2019\/07\/01\/delivering-major-enhancements-in-windows-defender-application-control-with-the-windows-10-may-2019-update\/\" target=\"bwo\" >https:\/\/blogs.technet.microsoft.com\/mmpc\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Eric Avena| Date: Mon, 01 Jul 2019 16:25:25 +0000<\/strong><\/p>\n<p>With the Windows 10 May 2019 Update we delivered several important features for Windows Defender Application Control. Our focus for this release was responding to some longstanding feedback on manageability improvements. We\u2019re excited to introduce new capabilities in Windows Defender Application Control.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/www.microsoft.com\/security\/blog\/2019\/07\/01\/delivering-major-enhancements-in-windows-defender-application-control-with-the-windows-10-may-2019-update\/\">Delivering major enhancements in Windows Defender Application Control with the Windows 10 May 2019 Update<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/www.microsoft.com\/security\/blog\/\">Microsoft Security<a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10759,10378],"tags":[4500],"class_list":["post-15686","post","type-post","status-publish","format-standard","hentry","category-microsoft","category-security","tag-cybersecurity"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/15686","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=15686"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/15686\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=15686"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=15686"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=15686"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}