windows-itpro-docs/windows/device-security/device-guard/introduction-to-device-guard-virtualization-based-security-and-code-integrity-policies.md

14 KiB
Raw Blame History

title, description, keywords, ms.prod, ms.mktglfcycl, ms.localizationpriority, author, ms.date
title description keywords ms.prod ms.mktglfcycl ms.localizationpriority author ms.date
Introduction to Windows Defender Device Guard - virtualization-based security and code integrity policies (Windows 10) Microsoft Windows Defender Device Guard is a feature set that consists of both hardware and software system integrity hardening features that revolutionize the Windows operating systems security. virtualization, security, malware w10 deploy high brianlic-msft 10/20/2017

Introduction to Windows Defender Device Guard: virtualization-based security and Windows Defender Application Control

Applies to

  • Windows 10
  • Windows Server 2016

With thousands of new malicious files created every day, using traditional methods like antivirus solutions—signature-based detection to fight against malware—provides an inadequate defense against new attacks. Windows Defender Device Guard changes from a mode where apps are trusted unless blocked by an antivirus or other security solution, to a mode where the operating system trusts only apps authorized by your enterprise. You designate these trusted apps by creating Windows Defender Application Control (WDAC) policies.

Note

Prior to Windows 10, version 1709, Windows Defender Application Control was known as configurable code integrity policies.

On hardware that includes CPU virtualization extensions (called "Intel VT-x" or "AMD-V") and second-level address translation (SLAT), Windows Defender Device Guard can also use Virtualization Based Security (VBS) to run the Code Integrity service alongside the kernel in a Windows hypervisor-protected container, which increases the security of code integrity policies. On hardware that includes input/output memory management units (IOMMUs), Windows Defender Device Guard can also help protect against DMA attacks. The following table provides more information about how Windows Defender Device Guard and these hardware features can help protect against various threats.

When Windows Defender Application Control and hardware-based security features are combined, Windows Defender Device Guard provides a locked-down configuration for computers.

How Windows Defender Device Guard features help protect against threats

The following table lists security threats and describes the corresponding Windows Defender Device Guard features:

Security threat in the enterprise How a Windows Defender Device Guard feature helps protect against the threat
Exposure to new malware, for which the "signature" is not yet known Windows Defender Application Control (WDAC):  You can maintain a whitelist of software that is allowed to run (a configurable code integrity policy), rather than constantly update a list of "signatures" of software that should be blocked. This approach uses the trust-nothing model well known in mobile device operating systems.
Only code that is verified by WDAC, usually through the digital signature that you have identified as being from a trusted signer, is allowed to run. This allows full control over allowed code in both kernel and user mode.

Specialized hardware required? No security-related hardware features are required, but WDAC is strengthened by such features, as described in the next rows.

[!NOTE] Prior to Windows 10, version 1709, Windows Defender Application Control was known as configurable code integrity policies.
Exposure to unsigned code (most malware is unsigned) WDAC plus catalog files as needed:  Because most malware is unsigned, WDAC can immediately help protect against a large number of threats. For organizations that use unsigned line-of-business (LOB) applications, you can use a tool called Package Inspector to create a catalog of all deployed and executed binary files for your trusted applications. After you sign and distribute the catalog, your trusted applications can be handled by WDAC in the same way as any other signed application. With this foundation, you can more easily block all unsigned applications, allowing only signed applications to run.

Specialized hardware required? No, but WDAC and catalogs are strengthened by the hardware features, as described in the next rows.
Malware that gains access to the kernel and then, from within the kernel, captures sensitive information or damages the system Virtualization-based protection of code integrity:  This is protection that uses Windows 10s new virtualization-based security (VBS) feature to help protect the kernel and other parts of the operating system. When virtualization-based protection of code integrity (also known as hypervisor-protected code integrity, or HVCI) is enabled, it strengthens either the default kernel-mode code integrity policy (which protects against bad drivers or system files), or the configurable code integrity policy that you deploy.
With HVCI, even if malware gains access to the kernel, the effects can be severely limited because the hypervisor can prevent the malware from executing code. The hypervisor, the most privileged level of system software, enforces R/W/X permissions across system memory. Code integrity checks are performed in a secure environment which is resistant to attack from kernel mode software, and page permissions for kernel mode are set and maintained by the hypervisor. Even if there are vulnerabilities that allow memory modification, like a buffer overflow, the modified memory cannot be executed.

Specialized hardware required? Yes, VBS requires at least CPU virtualization extensions and SLAT, as described in Hardware, firmware, and software requirements for Windows Defender Device Guard.
DMA-based attacks, for example, attacks launched from a malicious device that reads secrets from memory, making the enterprise more vulnerable to attack Virtualization-based security (VBS) using IOMMUs:  With this type of VBS protection, when the DMA-based attack makes a memory request, IOMMUs will evaluate the request and deny access.

Specialized hardware required? Yes, IOMMUs are a hardware feature that supports the hypervisor, and if you choose hardware that includes them, they can help protect against malicious attempts to access memory.
Exposure to boot kits or to a physically present attacker at boot time Universal Extensible Firmware Interface (UEFI) Secure Boot:   Secure Boot and related methods protect the boot process and firmware from tampering. This tampering can come from a physically present attacker or from forms of malware that run early in the boot process or in the kernel after startup. UEFI is locked down (Boot order, Boot entries, Secure Boot, Virtualization extensions, IOMMU, Microsoft UEFI CA), so the settings in UEFI cannot be changed to compromise Windows Defender Device Guard security.

Specialized hardware required? UEFI Secure Boot has firmware requirements. For more information, see Hardware, firmware, and software requirements for Windows Defender Device Guard.

In this guide, you learn about the individual features found within Windows Defender Device Guard as well as how to plan for, configure, and deploy them. Windows Defender Device Guard with WDAC is intended for deployment alongside additional threat-mitigating Windows features such as Windows Defender Credential Guard and AppLocker.

New and changed functionality

Prior to Windows 10, version 1709, Windows Defender Application Control (WDAC) was known as configurable code integrity policies.

Beginning with Windows 10, version 1703, you can use WDAC not only to control applications, but also to control whether specific plug-ins, add-ins, and modules can run from specific apps (such as a line-of-business application or a browser). For more information, see Use a Windows Defender Application Control policy to control specific plug-ins, add-ins, and modules.

Tools for managing Windows Defender Device Guard features

You can easily manage Windows Defender Device Guard features by using familiar enterprise and client-management tools that IT pros use every day:

  • Group Policy. Windows 10 provides an administrative template to configure and deploy the configurable WDAC policies for your organization. Another template allows you to specify which hardware-based security features you would like to enable and deploy. You can manage these settings along with your existing Group Policy Objects (GPOs), which makes it simpler to implement Windows Defender Device Guard features. In addition to these WDAC and hardware-based security features, you can use Group Policy to help you manage your catalog files.

  • Microsoft System Center Configuration Manager. You can use System Center Configuration Manager to simplify deployment and management of catalog files, WDAC policies, and hardware-based security features, as well as provide version control. For more information, see Deploy catalog files with System Center Configuration Manager.

  • Microsoft Intune. You can use Microsoft Intune to simplify deployment and management of WDAC policies, as well as provide version control. In a future release of Microsoft Intune, Microsoft is considering including features that will support the deployment and management of catalog files.

  • Windows PowerShell. You can use Windows PowerShell to create and service WDAC policies. For more information, see Deploy Windows Defender Application Control: steps.

These options provide the same experience you're used to in order to manage your existing enterprise management solutions.

For more information about the deployment of Windows Defender Device Guard features, see:

Other features that relate to Windows Defender Device Guard

Windows Defender Device Guard with AppLocker

Although AppLocker is not considered a new Windows Defender Device Guard feature, it complements Windows Defender Device Guard functionality when WDAC cannot be fully implemented or its functionality does not cover every desired scenario. There are many scenarios in which WDAC would be used alongside AppLocker rules. As a best practice, you should enforce WDAC at the most restrictive level possible for your organization, and then you can use AppLocker to fine-tune the restrictions to an even lower level.

Note

  One example of how Windows Defender Device Guard functionality can be enhanced by AppLocker is when you want to apply different policies for different users on the same device. For example, you may allow your IT support personnel to run additional apps that you do not allow for your end-users. You can accomplish this user-specific enforcement by using an AppLocker rule.

AppLocker and Windows Defender Device Guard should run side-by-side in your organization, which offers the best of both security features at the same time and provides the most comprehensive security to as many devices as possible. In addition to these features, we recommend that you continue to maintain an enterprise antivirus solution for a well-rounded enterprise security portfolio.

Windows Defender Device Guard with Windows Defender Credential Guard

Another Windows 10 feature that employs VBS is Windows Defender Credential Guard. Windows Defender Credential Guard provides additional protection to Active Directory domain users by storing domain credentials within the same type of VBS virtualization container that hosts code integrity when HVCI is enabled. By isolating these domain credentials from the active user mode and kernel mode, they have a much lower risk of being stolen. For more information about Windows Defender Credential Guard (which is not a feature within Windows Defender Device Guard), see Protect derived domain credentials with Windows Defender Credential Guard.

Windows Defender Credential Guard is targeted at resisting pass-the-hash and pass-the-ticket techniques. By employing multifactor authentication with Windows Defender Credential Guard, organizations can gain additional protection against such threats.