diff --git a/windows/keep-secure/overview-of-threat-mitigations-in-windows-10.md b/windows/keep-secure/overview-of-threat-mitigations-in-windows-10.md new file mode 100644 index 0000000000..54181e1eb1 --- /dev/null +++ b/windows/keep-secure/overview-of-threat-mitigations-in-windows-10.md @@ -0,0 +1,486 @@ +# Overview of threat mitigations in Windows 10 + +This topic provides an overview of software and firmware threats faced in the current security landscape, and the mitigations that Windows 10 offers in response to these threats. + +**Note** If you are familiar with the [Enhanced Mitigation Experience Toolkit (EMET)](https://support.microsoft.com/en-us/kb/2458544) and want information about the many EMET mitigations built into Windows 10, and how to convert an EMET settings file into policies for Windows 10, see [Understanding Windows 10 in relation to the Enhanced Mitigation Experience Toolkit](#understanding-windows-10-in-relation-to-the-enhanced-mitigation-experience-toolkit), later in this topic. + +| **Section** | **Contents** | +|---------------------------------------------------------------------------------------------------------------------------------------------------------------------------|--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| +| [The security threat landscape](#_IntroductionThe_security_threat) | Describes the current nature of the security threat landscape, and outlines the basic ways that Windows 10 is designed to mitigate against software exploits and other similar threats. | +| [Windows 10 mitigations that you can configure](#_Windows_10_mitigations) | Provides tables of configurable threat mitigations with links to more information. Product features such as Device Guard appear in [Table 1](#_Windows_10_Mmitigations), and memory protection options such as Data Execution Prevention appear in [Table 2](#_Table_2_). | +| [Windows 10 mitigations that need no configuration](#windows-10-mitigations-that-need-no-configuration) | Provides descriptions of Windows 10 mitigations that require no configuration—they are built into the operating system. For example, heap protections and kernel pool protections are built into Windows 10. | +| [Understanding Windows 10 in relation to the Enhanced Mitigation Experience Toolkit](#understanding-windows-10-in-relation-to-the-enhanced-mitigation-experience-toolkit) | For IT professionals who in the past have used the [Enhanced Mitigation Experience Toolkit (EMET)](https://support.microsoft.com/en-us/kb/2458544), describes how the mitigations in EMET correspond to features built into Windows 10. It also describes how to convert an XML settings file created in EMET into mitigation policies for Windows 10. | + +## The security threat landscape + +Today’s security threat landscape is one of aggressive and tenacious threats. In previous years, malicious attackers mostly focused on gaining community recognition through their attacks and the personal enjoyment of temporarily taking a system offline. Since then, attacker’s motives have shifted toward monetizing their attacks, which includes holding machines and data hostage until the owners pay the demanded ransom, and exploiting the valuable information the attackers discover for monetary gain. Unlike these examples, modern attacks increasingly focus on large-scale intellectual property theft; targeted system degradation that results in financial loss; and now even cyberterrorism that threatens the security of individuals, businesses, and national interests all over the world. These attackers are typically highly trained individuals and security experts, some of whom are in the employ of nation states that have large budgets, seemingly unlimited human resources, and unknown motives. Threats like these require a different approach and mitigations that can meet the challenge. + +In recognition of this landscape, Windows 10, version 1703 includes multiple security features that were created to make it difficult (and costly) to find and exploit software vulnerabilities. These features are designed to: + +- Eliminate entire classes of vulnerabilities + +- Break exploitation techniques + +- Contain damage and prevent persistence + +- Limit the window of opportunity to exploit + +The following sections provide more detail about security mitigations in Windows 10, version 1703. + +## Windows 10 mitigations that you can configure + +Windows 10 mitigations that you can configure are listed in the following two tables. The first table focuses on features such as Device Guard, and the second table describes memory protection options such as Data Execution Prevention. Memory protection options provide specific mitigations against malware that attempts to manipulate memory to gain control of a system. + +**Table 1 Windows 10 mitigations that you can configure** + +
Mitigation and corresponding threat | +Description and links | +
---|---|
Device Guard, +which helps keep a device free of +malware or other untrusted apps +(can be enhanced by secure boot, described in the next row) |
+Device Guard includes Code Integrity policies, a whitelist you create of trusted apps—the only apps allowed to run in your organization. Device Guard also includes Virtualization-Based Security (VBS), which has specific hardware requirements, and works with Code Integrity policies to help stop attacks even if they gain entrance to the kernel. +Device Guard is included in Windows 10 Enterprise and Windows Server 2016. +More information: Introduction to Device Guard |
+
UEFI secure boot, +which mitigates against +bootkits and rootkits |
+Universal Extensible Firmware Interface (UEFI) Secure Boot helps protect the boot process and firmware from tampering, such as from a physically present attacker or from forms of malware that run early in the boot process or in kernel after startup. +More information: UEFI and secure boot |
+
Credential Guard, +which mitigates against +credential theft attacks, such as Pass-the-Hash or Pass-The-Ticket |
+Credential Guard uses virtualization-based security to isolate secrets, such as NTLM password hashes and Kerberos Ticket Granting Tickets, so that only privileged system software can access them. +Credential Guard is included in Windows 10 Enterprise and Windows Server 2016. +More information: Protect derived domain credentials with Credential Guard |
+
Blocking of untrusted fonts, +which mitigates against +elevation-of-privilege attacks from untrusted fonts |
+The Block Untrusted Fonts setting allows you to prevent users from loading untrusted fonts onto your network. Blocking untrusted fonts helps prevent both remote (web-based or email-based) and local elevation-of-privilege attacks associated with the parsing of font files. +More information: Block untrusted fonts in an enterprise |
+
OS key pinning, +which mitigates against +man-in-the-middle attacks that leverage PKI |
+With OS key pinning, you can “pin” (associate) an X.509 certificate and its public key to its legitimate Certification Authority (root or leaf). This provides validation for digitally signed certificates (SSL certifcates) used while browsing, and mitigates against man-in the-middle attacks that involve these certificates. +More information: OS_KEY_PINNING_LINK. |
+
The SmartScreen Filter, +which mitigates against +malicious applications that a user might download |
+The SmartScreen Filter can check the reputation of a downloaded application by using a service that Microsoft maintains. The first time a user runs an app that originates from the Internet (even if the user copied it from another PC), the SmartScreen filter checks to see if the app lacks a reputation or is known to be malicious, and responds accordingly. +More information: The SmartScreen Filter, later in this topic |
+
Windows Defender (antimalware), which mitigates against multiple threats | +Windows 10 includes Windows Defender, a robust inbox antimalware solution. Windows Defender has been significantly improved since it was introduced in Windows 8. +More information: Windows Defender, later in this topic. |
+
Memory protections listed in Table 2, +which mitigate against +malware that uses memory manipulation techniques such as buffer overruns |
+This set of mitigations helps protect against memory-based attacks, where malware or other code manipulates memory to gain control of a system. For example, malware may use buffer overruns to inject malicious executable code into memory. +A minority of trusted apps will not be able to run if some of these mitigations are set to their most restrictive settings. Testing can help you maximize protection while still allowing needed apps to run correctly. +More information: Table 2, later in this topic |
+
Mitigation and corresponding threat | +Description | +
---|---|
Data Execution Prevention (DEP), which mitigates against +exploitation of buffer overruns |
+Data Execution Prevention (DEP) is a system-level memory protection feature that has been available in Windows operating systems for over a decade. DEP enables the system to mark one or more pages of memory as non-executable, which prevents code from being run from that region of memory, to help prevent exploitation of buffer overruns. +DEP helps prevent code from being run from data pages such as the default heap, stacks, and memory pools. Although some applications have compatibility problems with DEP, the vast majority of applications do not. +For more information, see Data Execution Prevention, later in this topic. +Group Policy settings for this mitigation: See Override Process Mitigation Options to help enforce app-related security policies. |
+
SEHOP, +which mitigates against +overwrites of the Structured Exception Handler |
+Structured Exception Handling Overwrite Protection (SEHOP) is designed to block exploits that use the Structured Exception Handler (SEH) overwrite technique. Because this protection mechanism is provided at run-time, it helps protect applications regardless of whether they have been compiled with the latest improvements. Although some applications have compatibility problems with SEHOP, the vast majority of applications do not. +For more information, see Structured Exception Handling Overwrite Protection, later in this topic. +Group Policy setting for this mitigation: See Override Process Mitigation Options to help enforce app-related security policies. |
+
ASLR, +which mitigates against +malware attacks based on expected memory locations |
+Address Space Layout Randomization (ASLR) loads DLLs into random memory addresses at boot time. This mitigates against malware designed to attack specific memory locations where specific DLLs are expected to be loaded. +For more information, see Address Space Layout Randomization, later in this topic. +Group Policy settings for this mitigation: See Override Process Mitigation Options to help enforce app-related security policies. |
+
Mitigation and corresponding threat | +Description | +
---|---|
Heap protections, +which mitigate against +exploitation of the heap |
+Windows 10 includes protections for the heap, such as the use of internal data structures which help protect against corruption of memory used by the heap. +More information: Windows heap protections, later in this topic. |
+
Kernel pool protections, +which mitigate against +exploitation of pool memory used by the kernel |
+Windows 10 includes protections for the pool of memory used by the kernel. For example, safe unlinking protects against pool overruns that are combined with unlinking operations to create an attack. +More information: Kernel pool protections, later in this topic. |
+
Control Flow Guard, +which mitigates against +exploits based on flow between code locations in memory |
+Control Flow Guard (CFG) is a mitigation built into Microsoft Edge, IE11, and other features in Windows 10. +CFG is a mitigation that any developer can configure into an application when it’s compiled. For such an application, CFG can detect an attacker’s attempt to change the intended flow of code. If this occurs, CFG terminates the application. Administrators can request software vendors to deliver Windows applications compiled with CFG enabled. +More information: Control Flow Guard, later in this topic. |
+
Additional memory protections, +such as protections against +NULL page derefences |
+Windows 10 includes a variety of memory protections, such as reserving the lowest 64 KB of process memory for the system, which helps protect against the “NULL dereference” technique and other threats. +For more information, see Additional memory protections, later in this topic |
+
Universal Windows apps protections, +which mitigate against +multiple threats |
+Universal Windows apps are carefully screened before being made available, and they run in an AppContainer sandbox with limited privileges and capabilities. +More information: Universal Windows apps protections, later in this topic. |
+
Protections built into Microsoft Edge (the browser), +which mitigate against +multiple threats |
+Windows 10 includes an entirely new browser, Microsoft Edge, designed with multiple security improvements. +More information: Microsoft Edge and Internet Explorer 11, later in this topic. |
+
Specific EMET features | +How these EMET features map +to Windows 10 features |
+
---|---|
|
+Included in Windows 10 as configurable features. See Table 2, earlier in this topic. +Also see the section that follows for steps you can take to convert your EMET settings for these features into policies that you can apply to Windows 10. |
+
|
+Supported in Windows 10, for all applications that are written to use these functions. See Table 4, earlier in this topic. | +
|
+No action needed; mitigations for this threat are built into Windows 10, as described in Additional memory protections, earlier in this topic. | +
|
+Mitigated in Windows 10 with applications compiled with Control Flow Guard, as described in Control Flow Guard, earlier in this topic. | +