Merged PR 14304: 2/14 PM Publish
@ -11,6 +11,11 @@
|
|||||||
"redirect_document_id": true
|
"redirect_document_id": true
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
"source_path": "windows/security/threat-protection/windows-defender-atp/how-hardware-based-containers-help-protect-windows.md",
|
||||||
|
"redirect_url": "/windows/security/threat-protection/windows-defender-system-guard/how-hardware-based-containers-help-protect-windows",
|
||||||
|
"redirect_document_id": true
|
||||||
|
},
|
||||||
|
{
|
||||||
"source_path": "browsers/edge/enterprise-guidance-using-microsoft-edge-and-ie11.md",
|
"source_path": "browsers/edge/enterprise-guidance-using-microsoft-edge-and-ie11.md",
|
||||||
"redirect_url": "https://docs.microsoft.com/microsoft-edge/deploy/emie-to-improve-compatibility",
|
"redirect_url": "https://docs.microsoft.com/microsoft-edge/deploy/emie-to-improve-compatibility",
|
||||||
"redirect_document_id": true
|
"redirect_document_id": true
|
||||||
|
@ -7,7 +7,7 @@
|
|||||||
##### [Hardware-based isolation](windows-defender-atp/overview-hardware-based-isolation.md)
|
##### [Hardware-based isolation](windows-defender-atp/overview-hardware-based-isolation.md)
|
||||||
###### [Application isolation](windows-defender-application-guard/wd-app-guard-overview.md)
|
###### [Application isolation](windows-defender-application-guard/wd-app-guard-overview.md)
|
||||||
####### [System requirements](windows-defender-application-guard/reqs-wd-app-guard.md)
|
####### [System requirements](windows-defender-application-guard/reqs-wd-app-guard.md)
|
||||||
###### [System isolation](windows-defender-atp/how-hardware-based-containers-help-protect-windows.md)
|
###### [System integrity](windows-defender-system-guard/how-hardware-based-root-of-trust-helps-protect-windows.md)
|
||||||
##### [Application control](windows-defender-application-control/windows-defender-application-control.md)
|
##### [Application control](windows-defender-application-control/windows-defender-application-control.md)
|
||||||
##### [Exploit protection](windows-defender-exploit-guard/exploit-protection-exploit-guard.md)
|
##### [Exploit protection](windows-defender-exploit-guard/exploit-protection-exploit-guard.md)
|
||||||
##### [Network protection](windows-defender-exploit-guard/network-protection-exploit-guard.md)
|
##### [Network protection](windows-defender-exploit-guard/network-protection-exploit-guard.md)
|
||||||
@ -122,7 +122,9 @@
|
|||||||
|
|
||||||
### [Configure and manage capabilities](windows-defender-atp/onboard.md)
|
### [Configure and manage capabilities](windows-defender-atp/onboard.md)
|
||||||
#### [Configure attack surface reduction](windows-defender-atp/configure-attack-surface-reduction.md)
|
#### [Configure attack surface reduction](windows-defender-atp/configure-attack-surface-reduction.md)
|
||||||
##### [Hardware-based isolation](windows-defender-application-guard/install-wd-app-guard.md)
|
####Hardware-based isolation
|
||||||
|
##### [System isolation](windows-defender-system-guard/system-guard-secure-launch-and-smm-protection.md)
|
||||||
|
##### [Application isolation](windows-defender-application-guard/install-wd-app-guard.md)
|
||||||
###### [Configuration settings](windows-defender-application-guard/configure-wd-app-guard.md)
|
###### [Configuration settings](windows-defender-application-guard/configure-wd-app-guard.md)
|
||||||
##### [Application control](windows-defender-application-control/windows-defender-application-control.md)
|
##### [Application control](windows-defender-application-control/windows-defender-application-control.md)
|
||||||
##### Device control
|
##### Device control
|
||||||
|
@ -5,7 +5,7 @@
|
|||||||
#### [Hardware-based isolation](overview-hardware-based-isolation.md)
|
#### [Hardware-based isolation](overview-hardware-based-isolation.md)
|
||||||
##### [Application isolation](../windows-defender-application-guard/wd-app-guard-overview.md)
|
##### [Application isolation](../windows-defender-application-guard/wd-app-guard-overview.md)
|
||||||
###### [System requirements](../windows-defender-application-guard/reqs-wd-app-guard.md)
|
###### [System requirements](../windows-defender-application-guard/reqs-wd-app-guard.md)
|
||||||
##### [System isolation](how-hardware-based-containers-help-protect-windows.md)
|
##### [System integrity](../windows-defender-system-guard/how-hardware-based-root-of-trust-helps-protect-windows.md)
|
||||||
#### [Application control](../windows-defender-application-control/windows-defender-application-control.md)
|
#### [Application control](../windows-defender-application-control/windows-defender-application-control.md)
|
||||||
#### [Exploit protection](../windows-defender-exploit-guard/exploit-protection-exploit-guard.md)
|
#### [Exploit protection](../windows-defender-exploit-guard/exploit-protection-exploit-guard.md)
|
||||||
#### [Network protection](../windows-defender-exploit-guard/network-protection-exploit-guard.md)
|
#### [Network protection](../windows-defender-exploit-guard/network-protection-exploit-guard.md)
|
||||||
@ -120,7 +120,9 @@
|
|||||||
|
|
||||||
## [Configure and manage capabilities](onboard.md)
|
## [Configure and manage capabilities](onboard.md)
|
||||||
### [Configure attack surface reduction](configure-attack-surface-reduction.md)
|
### [Configure attack surface reduction](configure-attack-surface-reduction.md)
|
||||||
#### [Hardware-based isolation](../windows-defender-application-guard/install-wd-app-guard.md)
|
###Hardware-based isolation
|
||||||
|
#### [System integrity](../windows-defender-system-guard/system-guard-secure-launch-and-smm-protection.md)
|
||||||
|
#### [Application isolation](../windows-defender-application-guard/install-wd-app-guard.md)
|
||||||
##### [Configuration settings](../windows-defender-application-guard/configure-wd-app-guard.md)
|
##### [Configuration settings](../windows-defender-application-guard/configure-wd-app-guard.md)
|
||||||
#### [Application control](../windows-defender-application-control/windows-defender-application-control.md)
|
#### [Application control](../windows-defender-application-control/windows-defender-application-control.md)
|
||||||
#### Device control
|
#### Device control
|
||||||
|
@ -1,58 +0,0 @@
|
|||||||
---
|
|
||||||
title: How hardware-based containers help protect Windows 10 (Windows 10)
|
|
||||||
description: Windows 10 uses containers to isolate sensitive system services and data, enabling them to remain secure even when the operating system has been compromised.
|
|
||||||
ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb
|
|
||||||
search.appverid: met150
|
|
||||||
ms.prod: w10
|
|
||||||
ms.mktglfcycl: deploy
|
|
||||||
ms.sitesec: library
|
|
||||||
ms.pagetype: security
|
|
||||||
ms.localizationpriority: medium
|
|
||||||
manager: dansimp
|
|
||||||
audience: ITPro
|
|
||||||
ms.collection: M365-security-compliance
|
|
||||||
ms.topic: article
|
|
||||||
author: justinha
|
|
||||||
ms.date: 08/01/2018
|
|
||||||
---
|
|
||||||
|
|
||||||
|
|
||||||
# Windows Defender System Guard: How hardware-based containers help protect Windows 10
|
|
||||||
|
|
||||||
Windows 10 uses containers to isolate sensitive system services and data, enabling them to remain secure even when the operating system has been compromised.
|
|
||||||
Windows 10 protects critical resources, such as the Windows authentication stack, single sign-on tokens, Windows Hello biometric stack, and Virtual Trusted Platform Module, by using a container type called Windows Defender System Guard.
|
|
||||||
|
|
||||||
Windows Defender System Guard reorganizes the existing Windows 10 system integrity features under one roof and sets up the next set of investments in Windows security. It's designed to make the these security guarantees:
|
|
||||||
|
|
||||||
- Protect and maintain the integrity of the system as it starts up
|
|
||||||
- Protect and maintain the integrity of the system after it's running
|
|
||||||
- Validate that system integrity has truly been maintained through local and remote attestation
|
|
||||||
|
|
||||||
## Maintaining the integrity of the system as it starts
|
|
||||||
|
|
||||||
With Windows 7, one of the means attackers would use to persist and evade detection was to install what is often referred to as a bootkit or rootkit on the system. This malicious software would start before Windows started, or during the boot process itself, enabling it to start with the highest level of privilege.
|
|
||||||
|
|
||||||
With Windows 10 running on modern hardware (that is, Windows 8-certified or greater) we have a hardware-based root of trust that helps us ensure that no unauthorized firmware or software (such as a bootkit) can start before the Windows bootloader. This hardware-based root of trust comes from the device’s Secure Boot feature, which is part of the Unified Extensible Firmware Interface (UEFI).
|
|
||||||
|
|
||||||
After successful verification and startup of the device’s firmware and Windows bootloader, the next opportunity for attackers to tamper with the system’s integrity is while the rest of the Windows operating system and defenses are starting. As an attacker, embedding your malicious code using a rootkit within the boot process enables you to gain the maximum level of privilege and gives you the ability to more easily persist and evade detection.
|
|
||||||
|
|
||||||
This is where Windows Defender System Guard protection begins with its ability to ensure that only properly signed and secure Windows files and drivers, including third party, can start on the device. At the end of the Windows boot process, System Guard will start the system’s antimalware solution, which scans all third party drivers, at which point the system boot process is completed. In the end, Windows Defender System Guard helps ensure that the system securely boots with integrity and that it hasn’t been compromised before the remainder of your system defenses start.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
## Maintaining integrity of the system after it’s running (run time)
|
|
||||||
|
|
||||||
Prior to Windows 10, if an attacker exploited the system and gained SYSTEM level privilege or they compromised the kernel itself, it was game over. The level of control that an attacker would acquire in this condition would enable them to tamper with and bypass many, if not all, of your system defenses. While we have a number of development practices and technologies (such as Windows Defender Exploit Guard) that have made it difficult to gain this level of privilege in Windows 10, the reality is that we needed a way to maintain the integrity of the most sensitive Windows services and data, even when the highest level of privilege has been secured by an adversary.
|
|
||||||
|
|
||||||
With Windows 10, we introduced the concept of virtualization-based security (VBS), which enables us to contain the most sensitive Windows services and data in hardware-based isolation, which is the Windows Defender System Guard container. This secure environment provides us with the hardware-based security boundary we need to be able to secure and maintain the integrity of critical system services at run time like Credential Guard, Device Guard, Virtual TPM and parts of Windows Defender Exploit Guard, just to name a few.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
## Validating platform integrity after Windows is running (run time)
|
|
||||||
|
|
||||||
While Windows Defender System Guard provides advanced protection that will help protect and maintain the integrity of the platform during boot and at run time, the reality is that we must apply an "assume breach" mentality to even our most sophisticated security technologies. We should be able to trust that the technologies are successfully doing their jobs, but we also need the ability to verify that they were successful in achieving their goals. When it comes to platform integrity, we can’t just trust the platform, which potentially could be compromised, to self-attest to its security state. So Windows Defender System Guard includes a series of technologies that enable remote analysis of the device’s integrity.
|
|
||||||
|
|
||||||
As Windows 10 boots, a series of integrity measurements are taken by Windows Defender System Guard using the device’s Trusted Platform Module 2.0 (TPM 2.0). This process and data are hardware-isolated away from Windows to help ensure that the measurement data is not subject to the type of tampering that could happen if the platform was compromised. From here, the measurements can be used to determine the integrity of the device’s firmware, hardware configuration state, and Windows boot-related components, just to name a few. After the system boots, Windows Defender System Guard signs and seals these measurements using the TPM. Upon request, a management system like Intune or System Center Configuration Manager can acquire them for remote analysis. If Windows Defender System Guard indicates that the device lacks integrity, the management system can take a series of actions, such as denying the device access to resources.
|
|
||||||
|
|
||||||
|
|
||||||

|
|
@ -35,13 +35,16 @@ The following steps guide you on how to create roles in Windows Defender Securit
|
|||||||
3. Enter the role name, description, and permissions you'd like to assign to the role.
|
3. Enter the role name, description, and permissions you'd like to assign to the role.
|
||||||
|
|
||||||
- **Role name**
|
- **Role name**
|
||||||
|
|
||||||
- **Description**
|
- **Description**
|
||||||
|
|
||||||
- **Permissions**
|
- **Permissions**
|
||||||
- **View data** - Users can view information in the portal.
|
- **View data** - Users can view information in the portal.
|
||||||
- **Alerts investigation** - Users can manage alerts, initiate automated investigations, collect investigation packages, manage machine tags, and export machine timeline.
|
- **Alerts investigation** - Users can manage alerts, initiate automated investigations, collect investigation packages, manage machine tags, and export machine timeline.
|
||||||
- **Active remediation actions** - Users can take response actions and approve or dismiss pending remediation actions.
|
- **Active remediation actions** - Users can take response actions and approve or dismiss pending remediation actions.
|
||||||
|
- **Manage portal system settings** - Users can configure storage settings, SIEM and threat intel API settings (applies globally), advanced settings, automated file uploads, roles and machine groups.
|
||||||
|
|
||||||
|
>[!NOTE]
|
||||||
|
>This setting is only available in the Windows Defender ATP administrator (default) role.
|
||||||
|
|
||||||
- **Manage security settings** - Users can configure alert suppression settings, manage allowed/blocked lists for automation, manage folder exclusions for automation, onboard and offboard machines, and manage email notifications.
|
- **Manage security settings** - Users can configure alert suppression settings, manage allowed/blocked lists for automation, manage folder exclusions for automation, onboard and offboard machines, and manage email notifications.
|
||||||
|
|
||||||
4. Click **Next** to assign the role to an Azure AD group.
|
4. Click **Next** to assign the role to an Azure AD group.
|
||||||
|
@ -15,7 +15,7 @@ ms.author: v-anbic
|
|||||||
|
|
||||||
# Enable attack surface reduction rules
|
# Enable attack surface reduction rules
|
||||||
|
|
||||||
Attack surface reduction rules help prevent actions and apps that malware often uses to infect computers. You can set attack surface reduction rules for computers running Windows 10 or Windows Server 2019.
|
[Attack surface reduction rules](attack-surface-reduction-exploit-guard.md) help prevent actions and apps that malware often uses to infect computers. You can set attack surface reduction rules for computers running Windows 10 or Windows Server 2019.
|
||||||
|
|
||||||
To use ASR rules, you need either a Windows 10 Enterprise E3 or E5 license. We recommend an E5 license so you can take advantage of the advanced monitoring and reporting capabilities available in Windows Defender Advanced Threat Protection (Windows Defender ATP). These advanced capabilities aren't available with an E3 license, but you can develop your own monitoring and reporting tools to use in conjuction with ASR rules.
|
To use ASR rules, you need either a Windows 10 Enterprise E3 or E5 license. We recommend an E5 license so you can take advantage of the advanced monitoring and reporting capabilities available in Windows Defender Advanced Threat Protection (Windows Defender ATP). These advanced capabilities aren't available with an E3 license, but you can develop your own monitoring and reporting tools to use in conjuction with ASR rules.
|
||||||
|
|
||||||
|
@ -11,7 +11,7 @@ ms.pagetype: security
|
|||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
author: andreabichsel
|
author: andreabichsel
|
||||||
ms.author: v-anbic
|
ms.author: v-anbic
|
||||||
ms.date: 10/02/2018
|
ms.date: 02/14/2019
|
||||||
---
|
---
|
||||||
|
|
||||||
# Enable controlled folder access
|
# Enable controlled folder access
|
||||||
@ -20,7 +20,7 @@ ms.date: 10/02/2018
|
|||||||
|
|
||||||
- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf)
|
- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf)
|
||||||
|
|
||||||
Controlled folder access helps you protect valuable data from malicious apps and threats, such as ransomware. It is part of [Windows Defender Exploit Guard](windows-defender-exploit-guard.md). Controlled folder access is supported on Windows Server 2019 as well as Windows 10 clients.
|
[Controlled folder access](controlled-folders-exploit-guard.md) helps you protect valuable data from malicious apps and threats, such as ransomware. It is part of [Windows Defender Exploit Guard](windows-defender-exploit-guard.md). Controlled folder access is supported on Windows Server 2019 as well as Windows 10 clients.
|
||||||
|
|
||||||
This topic describes how to enable Controlled folder access with the Windows Security app, Group Policy, PowerShell, and mobile device management (MDM) configuration service providers (CSPs).
|
This topic describes how to enable Controlled folder access with the Windows Security app, Group Policy, PowerShell, and mobile device management (MDM) configuration service providers (CSPs).
|
||||||
|
|
||||||
|
@ -11,7 +11,7 @@ ms.pagetype: security
|
|||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
author: andreabichsel
|
author: andreabichsel
|
||||||
ms.author: v-anbic
|
ms.author: v-anbic
|
||||||
ms.date: 08/08/2018
|
ms.date: 02/14/2019
|
||||||
---
|
---
|
||||||
|
|
||||||
# Enable exploit protection
|
# Enable exploit protection
|
||||||
@ -20,9 +20,9 @@ ms.date: 08/08/2018
|
|||||||
|
|
||||||
- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf)
|
- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf)
|
||||||
|
|
||||||
Exploit protection applies helps protect devices from malware that use exploits to spread and infect. It consists of a number of mitigations that can be applied at either the operating system level, or at the individual app level.
|
[Exploit protection](exploit-protection-exploit-guard.md) helps protect against malware that uses exploits to infect devices and spread. It consists of a number of mitigations that can be applied to either the operating system or individual apps.
|
||||||
|
|
||||||
Many of the features that were part of the Enhanced Mitigation Experience Toolkit (EMET) are included in exploit protection.
|
Many features from the Enhanced Mitigation Experience Toolkit (EMET) are included in exploit protection.
|
||||||
|
|
||||||
## Enable and audit exploit protection
|
## Enable and audit exploit protection
|
||||||
|
|
||||||
|
@ -11,7 +11,7 @@ ms.pagetype: security
|
|||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
author: andreabichsel
|
author: andreabichsel
|
||||||
ms.author: v-anbic
|
ms.author: v-anbic
|
||||||
ms.date: 05/30/2018
|
ms.date: 02/14/2019
|
||||||
---
|
---
|
||||||
|
|
||||||
# Enable network protection
|
# Enable network protection
|
||||||
@ -20,7 +20,7 @@ ms.date: 05/30/2018
|
|||||||
|
|
||||||
- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf)
|
- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf)
|
||||||
|
|
||||||
Network protection helps to prevent employees from using any application to access dangerous domains that may host phishing scams, exploits, and other malicious content on the Internet.
|
[Network protection](network-protection-exploit-guard.md) helps to prevent employees from using any application to access dangerous domains that may host phishing scams, exploits, and other malicious content on the Internet.
|
||||||
|
|
||||||
This topic describes how to enable network protection with Group Policy, PowerShell cmdlets, and configuration service providers (CSPs) for mobile device management (MDM).
|
This topic describes how to enable network protection with Group Policy, PowerShell cmdlets, and configuration service providers (CSPs) for mobile device management (MDM).
|
||||||
|
|
||||||
|
@ -11,7 +11,7 @@ ms.pagetype: security
|
|||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
author: andreabichsel
|
author: andreabichsel
|
||||||
ms.author: v-anbic
|
ms.author: v-anbic
|
||||||
ms.date: 11/29/2018
|
ms.date: 02/14/2019
|
||||||
---
|
---
|
||||||
|
|
||||||
# Protect your network
|
# Protect your network
|
||||||
@ -71,7 +71,7 @@ You can review the Windows event log to see events that are created when network
|
|||||||
1125 | Event when network protection fires in audit mode
|
1125 | Event when network protection fires in audit mode
|
||||||
1126 | Event when network protection fires in block mode
|
1126 | Event when network protection fires in block mode
|
||||||
|
|
||||||
## In this section
|
## Related topics
|
||||||
|
|
||||||
Topic | Description
|
Topic | Description
|
||||||
---|---
|
---|---
|
||||||
|
@ -0,0 +1,83 @@
|
|||||||
|
---
|
||||||
|
title: How a hardware-based root of trust helps protect Windows 10 (Windows 10)
|
||||||
|
description: Windows 10 uses a hardware-based root of trust to securely protect systems against firmware exploits.
|
||||||
|
ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb
|
||||||
|
search.appverid: met150
|
||||||
|
ms.prod: w10
|
||||||
|
ms.mktglfcycl: deploy
|
||||||
|
ms.sitesec: library
|
||||||
|
ms.pagetype: security
|
||||||
|
ms.localizationpriority: medium
|
||||||
|
author: justinha
|
||||||
|
ms.date: 02/14/2019
|
||||||
|
---
|
||||||
|
|
||||||
|
|
||||||
|
# Windows Defender System Guard: How a hardware-based root of trust helps protect Windows 10
|
||||||
|
|
||||||
|
In order to protect critical resources such as the Windows authentication stack, single sign-on tokens, the Windows Hello biometric stack, and the Virtual Trusted Platform Module, a system's firmware and hardware must be trustworthy.
|
||||||
|
|
||||||
|
Windows Defender System Guard reorganizes the existing Windows 10 system integrity features under one roof and sets up the next set of investments in Windows security. It's designed to make these security guarantees:
|
||||||
|
|
||||||
|
- Protect and maintain the integrity of the system as it starts up
|
||||||
|
- Validate that system integrity has truly been maintained through local and remote attestation
|
||||||
|
|
||||||
|
## Maintaining the integrity of the system as it starts
|
||||||
|
|
||||||
|
### Static Root of Trust for Measurement (SRTM)
|
||||||
|
|
||||||
|
With Windows 7, one of the means attackers would use to persist and evade detection was to install what is often referred to as a bootkit or rootkit on the system.
|
||||||
|
This malicious software would start before Windows started, or during the boot process itself, enabling it to start with the highest level of privilege.
|
||||||
|
|
||||||
|
With Windows 10 running on modern hardware (that is, Windows 8-certified or greater) a hardware-based root of trust helps ensure that no unauthorized firmware or software (such as a bootkit) can start before the Windows bootloader.
|
||||||
|
This hardware-based root of trust comes from the device’s Secure Boot feature, which is part of the Unified Extensible Firmware Interface (UEFI).
|
||||||
|
This technique of measuring the static early boot UEFI components is called the Static Root of Trust for Measurement (SRTM).
|
||||||
|
|
||||||
|
As there are thousands of PC vendors that produce numerous models with different UEFI BIOS versions, there becomes an incredibly large number of SRTM measurements upon bootup.
|
||||||
|
Two techniques exist to establish trust here—either maintain a list of known 'bad' SRTM measurements (also known as a blacklist), or a list of known 'good' SRTM measurements (also known as a whitelist).
|
||||||
|
Each option has a drawback:
|
||||||
|
|
||||||
|
- A list of known 'bad' SRTM measurements allows a hacker to change just 1 bit in a component to create an entirely new SRTM hash that needs to be listed.
|
||||||
|
- A list of known 'good' SRTM measurements requires each new BIOS/PC combination measurement to be carefully added, which is slow.
|
||||||
|
In addition, a bug fix for UEFI code can take a long time to design, build, retest, validate, and redeploy.
|
||||||
|
|
||||||
|
### Secure Launch—the Dynamic Root of Trust for Measurement (DRTM)
|
||||||
|
|
||||||
|
Windows Defender System Guard Secure Launch, first introduced in Windows 10 version 1809, aims to alleviate these issues by leveraging a technology known as the Dynamic Root of Trust for Measurement (DRTM).
|
||||||
|
DRTM lets the system freely boot into untrusted code initially, but shortly after launches the system into a trusted state by taking control of all CPUs and forcing them down a well-known and measured code path.
|
||||||
|
This has the benefit of allowing untrusted early UEFI code to boot the system, but then being able to securely transition into a trusted and measured state.
|
||||||
|
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
Secure Launch simplifies management of SRTM measurements because the launch code is now unrelated to a specific hardware configuration. This means the number of valid code measurements is small, and future updates can be deployed more widely and quickly.
|
||||||
|
|
||||||
|
### System Management Mode (SMM) protection
|
||||||
|
|
||||||
|
System Management Mode (SMM) is a special-purpose CPU mode in x86 microcontrollers that handles power management, hardware configuration, thermal monitoring, and anything else the manufacturer deems useful.
|
||||||
|
Whenever one of these system operations is requested, a non-maskable interrupt (SMI) is invoked at runtime, which executes SMM code installed by the BIOS.
|
||||||
|
SMM code executes in the highest privilege level and is invisible to the OS, which makes it an attractive target for malicious activity. Even if DRTM is used to late launch, SMM code can potentially access hypervisor memory and change the hypervisor.
|
||||||
|
To defend against this, two techniques are used:
|
||||||
|
|
||||||
|
1. Paging protection to prevent inappropriate access to code and data
|
||||||
|
2. SMM hardware supervision and attestation
|
||||||
|
|
||||||
|
Paging protection can be implemented to lock certain code tables to be read-only to prevent tampering.
|
||||||
|
This prevents access to any memory that has not been specifically assigned.
|
||||||
|
|
||||||
|
A hardware-enforced processor feature known as a supervisor SMI handler can monitor the SMM and make sure it does not access any part of the address space that it is not supposed to.
|
||||||
|
|
||||||
|
SMM protection is built on top of the Secure Launch technology and requires it to function.
|
||||||
|
In the future, Windows 10 will also measure this SMI Handler’s behavior and attest that no OS-owned memory has been tampered with.
|
||||||
|
|
||||||
|
## Validating platform integrity after Windows is running (run time)
|
||||||
|
|
||||||
|
While Windows Defender System Guard provides advanced protection that will help protect and maintain the integrity of the platform during boot and at run time, the reality is that we must apply an "assume breach" mentality to even our most sophisticated security technologies. We should be able to trust that the technologies are successfully doing their jobs, but we also need the ability to verify that they were successful in achieving their goals. When it comes to platform integrity, we can’t just trust the platform, which potentially could be compromised, to self-attest to its security state. So Windows Defender System Guard includes a series of technologies that enable remote analysis of the device’s integrity.
|
||||||
|
|
||||||
|
As Windows 10 boots, a series of integrity measurements are taken by Windows Defender System Guard using the device’s Trusted Platform Module 2.0 (TPM 2.0). This process and data are hardware-isolated away from Windows to help ensure that the measurement data is not subject to the type of tampering that could happen if the platform was compromised. From here, the measurements can be used to determine the integrity of the device’s firmware, hardware configuration state, and Windows boot-related components, just to name a few.
|
||||||
|
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
After the system boots, Windows Defender System Guard signs and seals these measurements using the TPM. Upon request, a management system like Intune or System Center Configuration Manager can acquire them for remote analysis. If Windows Defender System Guard indicates that the device lacks integrity, the management system can take a series of actions, such as denying the device access to resources.
|
||||||
|
|
After Width: | Height: | Size: 152 KiB |
After Width: | Height: | Size: 240 KiB |
After Width: | Height: | Size: 35 KiB |
After Width: | Height: | Size: 47 KiB |
After Width: | Height: | Size: 47 KiB |
After Width: | Height: | Size: 62 KiB |
After Width: | Height: | Size: 46 KiB |
After Width: | Height: | Size: 41 KiB |
After Width: | Height: | Size: 69 KiB |
@ -0,0 +1,66 @@
|
|||||||
|
---
|
||||||
|
title: System Guard Secure Launch and SMM protection (Windows 10)
|
||||||
|
description: Explains how to configure System Guard Secure Launch and System Management Mode (SMM protection) to improve the startup security of Windows 10 devices.
|
||||||
|
search.appverid: met150
|
||||||
|
ms.prod: w10
|
||||||
|
ms.mktglfcycl: deploy
|
||||||
|
ms.sitesec: library
|
||||||
|
ms.pagetype: security
|
||||||
|
ms.localizationpriority: medium
|
||||||
|
author: justinha
|
||||||
|
ms.date: 02/14/2019
|
||||||
|
---
|
||||||
|
|
||||||
|
# System Guard Secure Launch and SMM protection
|
||||||
|
|
||||||
|
This topic explains how to configure System Guard Secure Launch and System Management Mode (SMM) protection to improve the startup security of Windows 10 devices.
|
||||||
|
|
||||||
|
## How to enable System Guard Secure Launch
|
||||||
|
|
||||||
|
You can enable System Guard Secure Launch by using any of these options:
|
||||||
|
|
||||||
|
- [Mobile Device Management (MDM)](#mobile-device-management)
|
||||||
|
- [Group Policy](#group-policy)
|
||||||
|
- [Windows Security app](#windows-security-app)
|
||||||
|
- [Registry](#registry)
|
||||||
|
|
||||||
|
### Mobile Device Management
|
||||||
|
|
||||||
|
System Guard Secure Launch can be configured for Mobile Device Management (MDM) by using DeviceGuard policies in the Policy CSP, specifically [DeviceGuard/ConfigureSystemGuardLaunch](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-deviceguard#deviceguard-configuresystemguardlaunch).
|
||||||
|
|
||||||
|
### Group Policy
|
||||||
|
|
||||||
|
1. Click **Start** > type and then click **Edit group policy**.
|
||||||
|
2. Click **Computer Configuration** > **Administrative Templates** > **System** > **Device Guard** > **Turn On Virtualization Based Security** > **Secure Launch Configuration**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
### Windows Security app
|
||||||
|
|
||||||
|
Click **Start** > **Settings** > **Update & Security** > **Windows Security** > **Open Windows Security** > **Device security** > **Core isolation** > **Firmware protection**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
### Registry
|
||||||
|
|
||||||
|
1. Open Registry editor.
|
||||||
|
2. Click **HKEY_LOCAL_MACHINE** > **SYSTEM** > **CurrentControlSet** > **Control** > **DeviceGuard** > **Scenarios**.
|
||||||
|
3. Right-click **Scenarios** > **New** > **Key** and name the new key **SystemGuard**.
|
||||||
|
4. Right-click **SystemGuard** > **New** > **DWORD (32-bit) Value** and name the new DWORD **Enabled**.
|
||||||
|
5. Double-click **Enabled**, change the value to **1**, and click **OK**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
## How to verify System Guard Secure Launch is configured and running
|
||||||
|
|
||||||
|
To verify that Secure Launch is running, use System Information (MSInfo32). Click **Start**, search for **System Information**, and look under **Virtualization-based Security Services Running** and **Virtualization-based Security Services Configured**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|