{"id":4085,"date":"2015-06-19T15:54:38","date_gmt":"2015-06-19T15:54:38","guid":{"rendered":"http:\/\/kasperskydaily.com\/b2b\/?p=4085"},"modified":"2019-11-15T13:58:08","modified_gmt":"2019-11-15T11:58:08","slug":"windows-10-promised-security-improvements","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.za\/blog\/windows-10-promised-security-improvements\/4085\/","title":{"rendered":"Windows 10: promised security improvements"},"content":{"rendered":"<p>Windows 10 is upon us, coming to crash the party by the end of July. In this post we\u2019re going to take a look at the announced security enhancements. Is anybody surprised? :-) For now Microsoft has pulled the wraps from some novel features intended to protect all future OS users from threats, existing and prospected.<\/p>\n<p><strong>Dominant species<\/strong><\/p>\n<p>With Windows being the dominant OS worldwide, it\u2019s hard to overestimate the importance of its cybersecurity. For quite a while, the Windows family was a common <a href=\"https:\/\/business.kaspersky.com\/where-have-all-those-malware-epidemics-gone\/2571\" target=\"_blank\" rel=\"noopener nofollow\">source of bugs and flaws, vigorously exploited by hackers of all kinds and skill levels<\/a>.<\/p>\n<p>But over the early aughts,\u00a0Microsoft invested a tremendous amount of effort to improve the security of its OS. At a certain point it even became a bit of overkill: users described Windows Vista\u2019s security approach as \u201calmost paranoid\u201d as the number of authorization prompts for User Account Control was \u00a0too excessive. Among other things, this made Vista one of the least successful Windows versions. Lessons were learned and Windows 7 UAC was way less intrusive, without sacrificing security.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>#Windows10: promised #security improvements<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2FJyU3&amp;text=%23Windows10%3A+promised+%23security+improvements\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>But, again, it is Windows 10 we\u2019re talking about. In October 2014, Microsoft published a blog post dedicated to the security features slated to arrive with the new operating system \u2013 <a href=\"http:\/\/blogs.windows.com\/business\/2014\/10\/22\/windows-10-security-and-identity-protection-for-the-modern-world\/\" target=\"_blank\" rel=\"noopener nofollow\">Windows 10: Security and Identity Protection for the Modern World<\/a>.<\/p>\n<p>\u201cWith Windows 10 we\u2019re actively addressing modern security threats with advancements to strengthen identity protection and access control, information protection, and threat resistance. With this release we will have nearly everything in place to move the world away from the use of single factor authentication options, like passwords. We are delivering robust data loss prevention right into the platform itself, and when it comes to online threats, such as malware, we\u2019ll have a range of options to help enterprises protect against common causes of malware infection on PC\u2019s\u201d, wrote Microsoft\u2019s Jim Alcove.<\/p>\n<p>Now, that\u2019s impressive.<\/p>\n<p><strong>More details<\/strong><\/p>\n<p>Microsoft announced three essential security improvements. First and foremost, Identity Protection \u2013 \u00a0a compulsory two-factor authentication for every Windows 10-based device, whether it is PC or something else. The second factor will be a PIN or biometric, such as fingerprint. Users can enroll each of their devices with their new credentials, or turn their smartphone into a \u201cmobile credential\u201d, as Mr. Alcove put it. This will allow users to sign-in to all of their PCs, networks, and web services as long as their mobile phone is nearby. Essentially, it will behave as a remote smartcard.<\/p>\n<p>According to Microsoft\u2019s description, the credential itself can either be a cryptographically generated key pair (private and public keys) generated by Windows itself or it can be \u201ca certificate provisioned to the device from existing PKI infrastructures\u201d. In short, this will make Windows 10 suitable for both organizations with existing PKI investments and consumers.<\/p>\n<p>As for Access Control, it is all about protecting user access tokens which are generated once your users have been authenticated.<\/p>\n<p>According to Jim Alcove, these tokens are increasingly under attack using techniques such as Pass the Hash, Pass the Ticket. Microsoft\u2019s countermeasure? \u201cAn architectural solution that stores user access tokens within a secure container running on top of Hyper-V technology\u201d. In other words, these tokens remain non-extractable from devices even if the Windows kernel itself has been compromised. Mr. Alcove specifically mentions APTs in that context.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>#Windows10: unified platform, separated data. #security<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2FJyU3&amp;text=%23Windows10%3A+unified+platform%2C+separated+data.+%23security\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p><strong>Data separation<\/strong><\/p>\n<p>The next announced feature is Data Loss Prevention capability that separates corporate and personal data and helps protect it using containment. This is a specific business-oriented feature introduced to Windows 10 with BYOD in mind. Separating personal and corporate data is a best practice recommended to prevent leaks of sensitive information from lost or stolen personal devices.<\/p>\n<p>DLP is integrated into <a href=\"https:\/\/business.kaspersky.com\/windows-merge-so-what-about-security-after-all\/2304\" target=\"_blank\" rel=\"noopener nofollow\">Windows 10 platform<\/a>, and there will be no need for the users \u201cto switch modes, or apps in order to protect corporate data.\u201d Users can help keep data safe without changing their behavior. Even more interesting:<\/p>\n<p>\u201cWindows 10 enables automatic encryption of corporate apps, data, email, website content and other sensitive information, as it arrives on the device from corporate network locations\u201d. Thus it is kept separate from the user\u2019s own original content, although companies can designate all new content created on the device as corporate, and set policy to prevent data from being copied from corporate content to non-corporate documents or external locations on the web such as social networks. This may sound overly restrictive, but it\u2019s about securing critical data.<\/p>\n<p>Speaking of BYOD, the same DLP functions will be available on both desktop\/laptop and Windows Phone-based mobiles. There is also interoperability promised that will enable the protected documents to be accessed across multiple platforms.<\/p>\n<p>\u201cLastly on data protection in Windows 10 organizations can define which apps have access to corporate data via policy. We took this capability a little further and extended these polices to address VPN requirements that many of you have shared with us,\u201d Mr. Alcove wrote. According to him, there will be \u201ca spectrum of VPN control options\u201d with app-allow and app-deny lists, allowing IT professionals to define \u201cwhich apps are authorized to access the VPN and can be managed through MDM solutions for both desktop and universal apps. \u201d<\/p>\n<p>For administrators, there\u2019s even more \u201cgranular\u201d controls available \u2013 they can restrict access by specific ports or IP addresses.<\/p>\n<p>As an additional means Windows 10 will be allowing only the trusted apps \u2013 apps that are signed using a Microsoft provided signing service \u2013 \u201cto be run on specially configured devices\u201d. Configured by the OEM, to be more specific.<\/p>\n<p><strong>For admins: SSH is in<\/strong><\/p>\n<p>Earlier this month, Microsoft announced it is finally planning to support SSH in Windows and the company\u2019s engineers also will contribute to the OpenSSH project.<\/p>\n<p>SSH (Secure Shell), a cryptographic network protocol, is a popular tool for remote login and command execution on many Unix and Linux systems; it had not been supported by Microsoft for various reasons\u2026 until now.<\/p>\n<p>\u201cA popular request the PowerShell team has received is to use Secure Shell protocol and Shell session (aka SSH) to interoperate between Windows and Linux \u2013 both Linux connecting to and managing Windows via SSH and, vice versa, Windows connecting to and managing Linux via SSH. Thus, the combination of PowerShell and SSH will deliver a robust and secure solution to automate and to remotely manage Linux and Windows systems,\u201d Angel Calvo, a group software engineering manager on Microsoft\u2019s PowerShell team, said (via Threatpost) https:\/\/threatpost.com\/microsoft-to-support-ssh-in-windows\/113120<\/p>\n<p><strong>Stay aware<\/strong><\/p>\n<p>As we see, the described above features are mostly business-oriented, as they address the primary IT security problems businesses have to face today. And judging by the announcement, they address the issues properly, protecting the information and not just certain devices. Hopefully there will be no huge failures with the implementation.<\/p>\n<p>The security improvements of the software platforms are a good thing on their own, but surprisingly they may work against themselves: People get used to relying on the \u201cdefault\u201d security means and often ignore even those threats these default tools are incapable of addressing, or make mistakes which effectively cancel out these improvements.<\/p>\n<p>The only proper course of action here is to stay aware of the threats existence and rely, first and foremost, on reason and common sense.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Most of the security announcements surrounding Windows 10 business-oriented, as they address the primary IT security problems businesses have to face. Judging by those announcements, Microsofts seems to address the issues properly.<\/p>\n","protected":false},"author":209,"featured_media":15657,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3021],"tags":[415,97,2316],"class_list":{"0":"post-4085","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-byod","10":"tag-security-2","11":"tag-windows10"},"hreflang":[{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/windows-10-promised-security-improvements\/4085\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/windows-10-promised-security-improvements\/4085\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/windows-10-promised-security-improvements\/4085\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.za\/blog\/tag\/byod\/","name":"BYOD"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/4085","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/users\/209"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/comments?post=4085"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/4085\/revisions"}],"predecessor-version":[{"id":24578,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/4085\/revisions\/24578"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/media\/15657"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/media?parent=4085"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/categories?post=4085"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/tags?post=4085"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}