Windows Defender Is Becoming the Powerful Antivirus That Windows 10 Needs

Discussion in 'other anti-virus software' started by Secondmineboy, Jan 30, 2016.

  1. __Nikopol

    __Nikopol Registered Member

    Joined:
    Aug 13, 2008
    Posts:
    630
    Location:
    Germany
    I was thinking that it maybe wouldn't be able to see everything - at least right now when it isn't mainstream - or some things won't work.
     
  2. cheater87

    cheater87 Registered Member

    Joined:
    Apr 22, 2005
    Posts:
    3,291
    Location:
    Pennsylvania.
    This is quite an interesting development. Wonder how it will play out.
     
  3. WildByDesign

    WildByDesign Registered Member

    Joined:
    Sep 24, 2013
    Posts:
    2,587
    Location:
    Toronto, Canada
    Low Privilege AppContainer too which is more secure and more granular capability control in comparison to traditional AppContainer. Very impressive news.
     
  4. Tyreman

    Tyreman Registered Member

    Joined:
    Feb 3, 2003
    Posts:
    145
    Location:
    Cambridge Ontario,Canada
    Turned on Sandbox thingie here and restarted will see how its goes
     
  5. wat0114

    wat0114 Registered Member

    Joined:
    Aug 5, 2012
    Posts:
    4,065
    Location:
    Canada
    From reading the blog post, it seems that MS invested a lot of time and effort - carefully taking everything into consideration - in ensuring detection rates and other important technical requirements of the antivirus would not suffer with the sandbox enabled. Time will tell, of course, but I'm sure *hope* they'll promptly address any issues discovered.
     
  6. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    17,559
    Location:
    The Netherlands
    LOL, to me it's definitely funny. No wonder they score so bad in false positives tests. :D

    Wow, this is pretty impressive.
     
  7. shmu26

    shmu26 Registered Member

    Joined:
    Jul 9, 2015
    Posts:
    1,550
    Question to those who tried out WD sandboxing; does it affect system responsiveness? Does it slow system startup, or launching of programs?
     
  8. wat0114

    wat0114 Registered Member

    Joined:
    Aug 5, 2012
    Posts:
    4,065
    Location:
    Canada
    So far after a few hours enabled, I haven't noticed any hit on system performance.
     
  9. imuade

    imuade Registered Member

    Joined:
    Aug 4, 2016
    Posts:
    751
    Location:
    Italy
    Just set and running fine

    Immagine1.jpg

    Immagine2.jpg
     
  10. 142395

    142395 Guest

    It seems they're going in the right direction tho a bit late. How about other major players? Despite they have been making serious blunder repeatedly (some of them are rediculously elementary), most of them yet haven't utilized PPL nor CFG, and last I checked, they have more priv than unsandboxed WD. I don't name them but it's easy for anyone to confirm.
    Tavis Ormandy, who have found a number of vuln in AVs including WD is known to be a strong opponent to AV, yet only AV he has reluctantly recommended twice is WD. For those of us who adopted tight ctrl AV is nothing more than Additional Vuln. Yet, attack against AV will probably seen in targeted attack which most of us won't encounter at least as a personal user.
     
  11. wat0114

    wat0114 Registered Member

    Joined:
    Aug 5, 2012
    Posts:
    4,065
    Location:
    Canada
    What do you mean by that? Apparently they're the first to harness this capability, and if it makes the product better then it's never too late.
     
  12. Azure Phoenix

    Azure Phoenix Registered Member

    Joined:
    Nov 22, 2014
    Posts:
    1,560
  13. Nightwalker

    Nightwalker Registered Member

    Joined:
    Nov 7, 2008
    Posts:
    1,387
    To be fair, is Falcon Prevent really a complete av solution with a fully functional emulator and virus disinfection capability? Even if positive, it doesnt take Microsoft merit.


    Ps: I think Falcon Prevent is somewhat similar to Cylance Protect, so I dont think it is a complete av solution.
     
    Last edited: Oct 27, 2018
  14. elapsed

    elapsed Registered Member

    Joined:
    Apr 5, 2004
    Posts:
    7,076
    https://twitter.com/taviso/status/1055876544768425985
     
  15. shmu26

    shmu26 Registered Member

    Joined:
    Jul 9, 2015
    Posts:
    1,550
    WD needed it more badly than the other AVs. It was an urgent issue for WD.
     
  16. Sampei Nihira

    Sampei Nihira Registered Member

    Joined:
    Apr 7, 2013
    Posts:
    3,365
    Location:
    Italy
    Hi.
    Is the "MsMpEng.exe" process protected as in the image below?


    Immagine.jpg

    The same protection is applied to the Network Realtime Service "NisSrv.exe".
     
  17. imuade

    imuade Registered Member

    Joined:
    Aug 4, 2016
    Posts:
    751
    Location:
    Italy
    First question: yes
    Second question: no
     
  18. Sampei Nihira

    Sampei Nihira Registered Member

    Joined:
    Apr 7, 2013
    Posts:
    3,365
    Location:
    Italy
  19. Tyreman

    Tyreman Registered Member

    Joined:
    Feb 3, 2003
    Posts:
    145
    Location:
    Cambridge Ontario,Canada
    Since my last post turning on the sandbox in 10 its been very good
    Can't really tell its affecting performance yet it is there
    All Good So Far
     
  20. Nightwalker

    Nightwalker Registered Member

    Joined:
    Nov 7, 2008
    Posts:
    1,387
    No doubt about that, its was something critical for Windows security.
     
  21. imuade

    imuade Registered Member

    Joined:
    Aug 4, 2016
    Posts:
    751
    Location:
    Italy
    That's network protection indeed, but not sandboxed, otherwise you'd see "AppContainer" instead of "System level"
     
  22. shmu26

    shmu26 Registered Member

    Joined:
    Jul 9, 2015
    Posts:
    1,550
    So it looks like the sandbox does not impair system performance, and that's good.
    The only remaining question in my mind is whether WD actually works as intended...
     
  23. Sampei Nihira

    Sampei Nihira Registered Member

    Joined:
    Apr 7, 2013
    Posts:
    3,365
    Location:
    Italy
    I was referring to the "PsProtectedSignerAntimalware-Light" protection of the MsMpEng.exe process.
     
  24. WildByDesign

    WildByDesign Registered Member

    Joined:
    Sep 24, 2013
    Posts:
    2,587
    Location:
    Toronto, Canada
    If anyone is curious to know which processes are protected by regular AppContainer sandbox or the latest Low Privilege AppContainer (LP-AC), I only know of one program so far that can show this. Process Explorer and other programs don't define it yet.

    NtObjectManager by Google Project Zero's James Forshaw (Chrome's sandboxing wizard) is a PowerShell script which is powerful beyond words. You can view details on the PowerShell Gallery page: https://docs.microsoft.com/en-us/powershell/module/powershellget/install-module?view=powershell-6

    However, for this latest capability, you need the latest compiled version which is not yet uploaded to the gallery. You would need to grab the latest script from here (NtObjectManager.psm1): https://github.com/googleprojectzer...ce-analysis-tools/tree/master/NtObjectManager

    You have to do the typical permission changes to allow PowerShell scripts to run (temporarily, change back after using). If you have got that far and have the script working, all you need to do is this:

    Code:
    PS> # Save the current execution policy so it can be reset
    PS> $SaveExecutionPolicy = Get-ExecutionPolicy
    PS> Set-ExecutionPolicy RemoteSigned -Scope Currentuser
    PS> Import-Module NtObjectManager
    PS> Get-NtProcessMitigations -Name MsMpEngCP.exe
    PS> # Reset the execution policy to the original state
    PS> Set-ExecutionPolicy $SaveExecutionPolicy -Scope Currentuser

    Code:
    Get-NtProcessMitigations -Name MsMpEngCP.exe
    You can try this on other processes as well. For example, the latest Chrome GPU AppContainer process is LP-AC as well. Although the chrome.exe renderer processes and PPAPI process are all still regular AppContainer. Upcoming chrome.exe utility processes will be LP-AC too.

    Example output:

    LP-AC.png


    There are a ridiculous amount of Process Mitigations and other protection mechanisms as well that show in the full output. So many mitigations which I am not even familiar with entirely.

    You can always count on James Forshaw when it comes to Windows sandboxing and mitigations. His blog, his research, his open source tools, the Chrome sandbox, etc.
     
  25. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
    I believe any AppContainer process using SID, S-1-16-4096, is using low-level:

    IE_App_LL.png
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.