Windows Defender Is Becoming the Powerful Antivirus That Windows 10 Needs

Discussion in 'other anti-virus software' started by Secondmineboy, Jan 30, 2016.

  1. __Nikopol

    __Nikopol Registered Member

    I was thinking that it maybe wouldn't be able to see everything - at least right now when it isn't mainstream - or some things won't work.
     
  2. cheater87

    cheater87 Registered Member

    This is quite an interesting development. Wonder how it will play out.
     
  3. WildByDesign

    WildByDesign Registered Member

    Low Privilege AppContainer too which is more secure and more granular capability control in comparison to traditional AppContainer. Very impressive news.
     
  4. Tyreman

    Tyreman Registered Member

    Turned on Sandbox thingie here and restarted will see how its goes
     
  5. wat0114

    wat0114 Registered Member

    From reading the blog post, it seems that MS invested a lot of time and effort - carefully taking everything into consideration - in ensuring detection rates and other important technical requirements of the antivirus would not suffer with the sandbox enabled. Time will tell, of course, but I'm sure *hope* they'll promptly address any issues discovered.
     
  6. Rasheed187

    Rasheed187 Registered Member

    LOL, to me it's definitely funny. No wonder they score so bad in false positives tests. :D

    Wow, this is pretty impressive.
     
  7. shmu26

    shmu26 Registered Member

    Question to those who tried out WD sandboxing; does it affect system responsiveness? Does it slow system startup, or launching of programs?
     
  8. wat0114

    wat0114 Registered Member

    So far after a few hours enabled, I haven't noticed any hit on system performance.
     
  9. imuade

    imuade Registered Member

    Just set and running fine

    Immagine1.jpg

    Immagine2.jpg
     
  10. 142395

    142395 Guest

    It seems they're going in the right direction tho a bit late. How about other major players? Despite they have been making serious blunder repeatedly (some of them are rediculously elementary), most of them yet haven't utilized PPL nor CFG, and last I checked, they have more priv than unsandboxed WD. I don't name them but it's easy for anyone to confirm.
    Tavis Ormandy, who have found a number of vuln in AVs including WD is known to be a strong opponent to AV, yet only AV he has reluctantly recommended twice is WD. For those of us who adopted tight ctrl AV is nothing more than Additional Vuln. Yet, attack against AV will probably seen in targeted attack which most of us won't encounter at least as a personal user.
     
  11. wat0114

    wat0114 Registered Member

    What do you mean by that? Apparently they're the first to harness this capability, and if it makes the product better then it's never too late.
     
  12. Azure Phoenix

    Azure Phoenix Registered Member

  13. Nightwalker

    Nightwalker Registered Member

    To be fair, is Falcon Prevent really a complete av solution with a fully functional emulator and virus disinfection capability? Even if positive, it doesnt take Microsoft merit.


    Ps: I think Falcon Prevent is somewhat similar to Cylance Protect, so I dont think it is a complete av solution.
     
    Last edited: Oct 27, 2018
  14. elapsed

    elapsed Registered Member

    https://twitter.com/taviso/status/1055876544768425985
     
  15. shmu26

    shmu26 Registered Member

    WD needed it more badly than the other AVs. It was an urgent issue for WD.
     
  16. Sampei Nihira

    Sampei Nihira Registered Member

    Hi.
    Is the "MsMpEng.exe" process protected as in the image below?


    Immagine.jpg

    The same protection is applied to the Network Realtime Service "NisSrv.exe".
     
  17. imuade

    imuade Registered Member

    First question: yes
    Second question: no
     
  18. Sampei Nihira

    Sampei Nihira Registered Member

  19. Tyreman

    Tyreman Registered Member

    Since my last post turning on the sandbox in 10 its been very good
    Can't really tell its affecting performance yet it is there
    All Good So Far
     
  20. Nightwalker

    Nightwalker Registered Member

    No doubt about that, its was something critical for Windows security.
     
  21. imuade

    imuade Registered Member

    That's network protection indeed, but not sandboxed, otherwise you'd see "AppContainer" instead of "System level"
     
  22. shmu26

    shmu26 Registered Member

    So it looks like the sandbox does not impair system performance, and that's good.
    The only remaining question in my mind is whether WD actually works as intended...
     
  23. Sampei Nihira

    Sampei Nihira Registered Member

    I was referring to the "PsProtectedSignerAntimalware-Light" protection of the MsMpEng.exe process.
     
  24. WildByDesign

    WildByDesign Registered Member

    If anyone is curious to know which processes are protected by regular AppContainer sandbox or the latest Low Privilege AppContainer (LP-AC), I only know of one program so far that can show this. Process Explorer and other programs don't define it yet.

    NtObjectManager by Google Project Zero's James Forshaw (Chrome's sandboxing wizard) is a PowerShell script which is powerful beyond words. You can view details on the PowerShell Gallery page: https://docs.microsoft.com/en-us/powershell/module/powershellget/install-module?view=powershell-6

    However, for this latest capability, you need the latest compiled version which is not yet uploaded to the gallery. You would need to grab the latest script from here (NtObjectManager.psm1): https://github.com/googleprojectzer...ce-analysis-tools/tree/master/NtObjectManager

    You have to do the typical permission changes to allow PowerShell scripts to run (temporarily, change back after using). If you have got that far and have the script working, all you need to do is this:

    Code:
    PS> # Save the current execution policy so it can be reset
    PS> $SaveExecutionPolicy = Get-ExecutionPolicy
    PS> Set-ExecutionPolicy RemoteSigned -Scope Currentuser
    PS> Import-Module NtObjectManager
    PS> Get-NtProcessMitigations -Name MsMpEngCP.exe
    PS> # Reset the execution policy to the original state
    PS> Set-ExecutionPolicy $SaveExecutionPolicy -Scope Currentuser

    Code:
    Get-NtProcessMitigations -Name MsMpEngCP.exe
    You can try this on other processes as well. For example, the latest Chrome GPU AppContainer process is LP-AC as well. Although the chrome.exe renderer processes and PPAPI process are all still regular AppContainer. Upcoming chrome.exe utility processes will be LP-AC too.

    Example output:

    LP-AC.png


    There are a ridiculous amount of Process Mitigations and other protection mechanisms as well that show in the full output. So many mitigations which I am not even familiar with entirely.

    You can always count on James Forshaw when it comes to Windows sandboxing and mitigations. His blog, his research, his open source tools, the Chrome sandbox, etc.
     
  25. itman

    itman Registered Member

    I believe any AppContainer process using SID, S-1-16-4096, is using low-level:

    IE_App_LL.png
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.
    Dismiss Notice