Navigating a shiftingworld
The nature of business
and work have changed
Conventional security tools
have not kept pace
Cost of breaches and
regulations are increasing
3.
Today’s threats: criminalgroups follow opportunities
Malware encounters align with news headlines
Source: Microsoft Digital Defense Report 2020
80K
70K
60K
50K
40K
30K
20K
10K
0K
FEBRUARY MARCH APRIL MAY JUNE
JAN 30 WHO declares a
global health emergency
FEB 11 WHO names the
new disease COVID-19
FEB 29 First confirmed death in the US
MAR 11 WHO declares COVID-19 a pandemic
MAR 14 US announces travel ban to Europe
MAR 26 US surpasses China for most cases
MAY 1 States begin to reopen
Total encounters
Unique encounters
COVID-themed attacks: United States
4.
Why we’re different
Rapidlystop threats
Prevent breaches and rapidly
stop attacks with cloud native
capabilities powered by the
industry’s biggest threat
optics and intelligence
Scale your security
Maximize, scale,
and dramatically simplify
your security approach
with comprehensive
endpoint security
Evolve your defenses
Take your security to the next
level with a layered and highly
extensible solution that builds
the foundation for XDR
and Zero Trust
5.
An industry leaderin endpoint security
Forrester names
Microsoft a Leader in
2021 Endpoint Security
Software as a Service
Wave
Forrester names
Microsoft a Leader in
2020 Enterprise
Detection
and Response Wave
Forrester names
Microsoft a Leader in
Extended Detection and
Response
Q4 2021
Gartner names
Microsoft a Leader
in 2022 Endpoint
Protection Platforms
Magic Quadrant
Our anti-malware
capabilities consistently
achieve high scores
in independent tests
Microsoft won six
security awards with
Cyber Defense
Magazine at RSAC 2021
Microsoft leads in
real-world detection
in MITRE ATT&CK
evaluation
Microsoft Defender for
Endpoint awarded a
perfect 5-star rating by SC
Media in 2020 Endpoint
Security Review
6.
Delivering endpoint securityacross platforms
Endpoints and servers Mobile device OS
Virtual desktops
Azure
Virtual Desktop
Network devices
Cisco
Juniper Networks
HP Enterprise
Palo Alto Networks
7.
Microsoft Defender forEndpoint
Threats are no match.
Vulnerability
management
Attack surface
reduction
Next generation
protection
Endpoint detection
& response
Auto investigation
& remediation
Microsoft
Security Experts
Centralized configuration & administration
APIs & integration
8.
Microsoft Defender forEndpoint
Threats are no match.
Vulnerability
management
Attack surface
reduction
Next generation
protection
Endpoint detection
& response
Auto investigation
& remediation
Microsoft
Security Experts
Centralized configuration & administration
APIs & integration
Threat & vulnerability management overview
9.
Key customer painpoints
Discover
Periodic scanning
Blind spots
No run-time info
“Static snapshot”
Prioritize
Based on severity
Missing org context
No threat view
Large threat reports
Compensate
Waiting for a patch
No IT/Security bridge
Manual process
No validation
Bottom line: Organizations remain highly vulnerable, despite high maintenance costs
10.
Vulnerability management
A risk-basedapproach to prioritize and remediate your vulnerabilities
Continuous real-time discovery
Context-aware prioritization
Built-in end-to-end remediation process
Powered by Microsoft Defender Vulnerability
Management
11.
Continuous discovery
Extensive vulnerabilityassessment across the entire stack
1
Hardest to discover
Easiest to exploit
Application extension vulnerabilities
Application-specific vulnerabilities that relate to component within the application.
For example: Grammarly Chrome Extension (CVE-2018-6654)
Application run-time libraries vulnerabilities
Reside in a run-time libraries which is loaded by an application (dependency).
For example: Electron JS framework vulnerability (CVE-2018-1000136)
Application vulnerabilities (first-party and third-party)
Discovered and exploited on a daily basis.
For example: 7-zip code execution (CVE-2018-10115)
OS kernel vulnerabilities
Becoming more and more popular in recent years due to OS exploit mitigation controls.
For example: Win32 elevation of privilege (CVE-2018-8233)
Hardware vulnerabilities (firmware)
Extremely hard to exploit, but can affect the root trust of the system.
For example: Spectre/Meltdown vulnerabilities (CVE-2017-5715)
Threat and businessprioritization (“TLV”)
Helping customers focus on the right things at the right time
Threat landscape
Vulnerability characteristics (CVSS score, days vulnerable)
Exploit characteristics (public exploit and difficulty, bundle)
EDR security alerts (Active alerts, breach history)
Threat analytics (live campaigns, threat actors)
Breach likelihood
Current security posture
Internet facing
Exploit attempts in the org
Business value
HVA analysis (WIP, HVU, critical process)
Run-time and dependency analysis
2
T
L
V
14.
Automated compensation
Simplifying thehandover from Security to IT teams
Game changing bridge between IT and Security teams
3
1-click
remediation
requests via
Intune/SCCM
Automated task
monitoring via
run-time
analysis
Tracking
Mean-time-
to-mitigate
KPIs
Rich exception
experience to
mitigate/accept
risk
Ticket
management
integration (Intune,
Planner, Service
Now, JIRA)
15.
Microsoft Defender forEndpoint
Threats are no match.
Threat & vulnerability
management
Attack surface
reduction
Next generation
protection
Endpoint detection
& response
Auto investigation
& remediation
Microsoft
Threat Experts
Centralized configuration & administration
APIs & integration
Attack surface reduction overview
16.
Key customer painpoints
Zero days
Zero days continue to
plague the industry
Network boundaries
Perimeters are eroding,
unique solutions are
required to harden
Cross-platform
Heterogeneous
environments make
it challenging
Bottom line: Organizations struggle to proactively adjust their security posture
17.
Attack surface reduction
Eliminaterisks by reducing the surface area of attack
System hardening without disruption
Customization that fits your organization
Visualize the impact and simply turn it on
18.
Attack surface reduction
Resistattacks and exploitations
HW-based isolation
Application control
Exploit protection
Network protection
Controlled folder access
Device control
Web protection
Ransomware protection
Isolate access to untrusted sites
Isolate access to untrusted Office files
Host intrusion prevention
Exploit mitigation
Ransomware protection for your files
Block traffic to low reputation
destinations
Protect your legacy applications
Only allow trusted applications to run
19.
Attack surface reduction(ASR) rules
Minimize the attack surface
Signature-less, control entry vectors, based on cloud intelligence.
Attack surface reduction (ASR) controls, such as behavior of Office macros.
Productivity apps rules
• Block Office apps from creating executable content
• Block Office apps from creating child processes
• Block Office apps from injecting code into other processes
• Block Win32 API calls from Office macros
• Block Adobe Reader from creating child processes
Email rule
• Block executable content from email client and webmail
• Block only Office communication applications from creating child processes
Script rules
• Block obfuscated JS/VBS/PS/macro code
• Block JS/VBS from launching downloaded executable content
Polymorphic threats
• Block executable files from running unless they meet a prevalence
(1000 machines), age (24hrs), or trusted list criteria
• Block untrusted and unsigned processes that run from USB
• Use advanced protection against ransomware
• Block abuse of exploited vulnerable signed drivers
Lateral movement and credential theft
• Block process creations originating from PSExec and WMI commands
• Block credential stealing from the Windows local security authority
subsystem (lsass.exe)
• Block persistence through WMI event subscription
Network protection
Perimeter-less networkprotection
(“SmartScreen in the box”) preventing
users from accessing malicious or suspicious
network destinations, using any app on
the device and not just Microsoft Edge
Customers can add their own TI in additional
to trusting our rich reputation database
Allow, audit and block
Microsoft
Next generation protectionoverview
Microsoft Defender for Endpoint
Threats are no match.
Vulnerability
management
Attack surface
reduction
Next generation
protection
Endpoint detection
& response
Auto investigation
& remediation
Microsoft
Security Experts
Centralized configuration & administration
APIs & integration
27.
Key customer painpoints
Solutions that depend on regular updates cannot protect against the 7
million unique threats that emerge per hour
The game has shifted from blocking recognizable executable files to
malware that uses sophisticated exploit techniques (e.g: fileless)
While Attack Surface Reduction can dramatically increase your security
posture you still need detection for the surfaces that remain
We live in a world of hyper polymorphic threats with 5 billion unique
instances per month
28.
Static versus dynamic
Option2
Ineffective
Static signatures:
focus on a file
Hashes
Strings
Emulators
Effective
Dynamic heuristics:
focus on run-time behaviors
Behavior monitoring
Memory scanning
AMSI
Command-line scanning
29.
Next generation protection
Blocksand tackles sophisticated threats and malware
Behavioral based real-time protection
Blocks file-based and fileless malware
Stops malicious activity from trusted
and untrusted applications
“Aced protection tests 12 months in a row.”
Proven protection in the field, backed up by
consistent top rankings on industry comparison
tests (AV-TEST, SE Labs).
30.
Microsoft Defender forEndpoint next
generation protection engines
Metadata-based ML
Stops new threats quickly
by analyzing metadata
Behavior-based ML
Identifies new threats
with process trees and
suspicious behavior
sequences
AMSI-paired ML
Detects fileless and
in-memory attacks using
paired client and cloud
ML models
File classification ML
Detects new malware by
running multi-class, deep
neural network classifiers
Detonation-based ML
Catches new malware by
detonating unknown files
Reputation ML
Catches threats
with bad reputation,
whether direct or
by association
Smart rules
Blocks threats using
expert-written rules
Cloud
Client
ML
Spots new and unknown
threats using client-
based ML models
Behavior monitoring
Identifies malicious
behavior, including
suspicious runtime
sequence
Memory scanning
Detects malicious code
running in memory
AMSI integration
Detects fileless and in-
memory attacks
Heuristics
Catches malware variants
or new strains with
similar characteristics
Emulation
Evaluates files based on
how they would behave
when run
Network monitoring
Catches malicious
network activities
31.
Innovations in
fileless protection
Dynamicand in context URL
analysis to block call to
malicious URL
AMSI-paired machine learning
uses pairs of client-side and cloud-
side models that integrate with
Antimalware Scan Interface (AMSI)
to perform advanced analysis
of scripting behavior
DNS exfiltration analysis
Deep memory analysis
Type III
Files required to achieve
fileless persistence
Type I
No file activity
performed
Type II
No file written
on disk, but some
files used indirectly
Flash
Java
Exe
Remote
attacker
Docs
LNK,
Scheduled
Task, Exe
Docs
MBR
VBR
Service
Registry
WMI Repo
Shell
Hypervisor
Mother-
board
firmware
BadUSB
Circuitry
backdoors
IME
Network
card,
Hard disk
Taxonomy of
fileless threats
32.
Microsoft Defender forEndpoint’s NGP protection pipeline
Malware
Malware
encounter
Highly stealthy threats
Client
Heuristics,
behavior, and
local ML models
Cloud
metadata
ML-powered
cloud rules
Sample
Suspicious files
uploaded for
inspection by
multiclass, deep
neural network
classifier
Detonation
Suspicious files
are executed in
a sandbox for
dynamic analysis
Big data
Automatically
classify threats
based on signals
across Microsoft
33.
Dynamic: behavior monitoring
Option2
Monitors activity on:
Files
Registry keys
Processes
Network (basic HTTP inspection)
…and few other specific activities
Heuristics can:
Detect sequences of events
E.g., a file named “malware.exe” is created
Inspect event data
E.g., an AutoRun key is created and contains “malware.exe”
Correlate with other static signals
E.g., “malware.exe” has an attribute indicating
it is a DotNet executable
Perform some basic remediation
E.g., delete “malware.exe” if the BM event
reported infection
Request memory scan of running processes
34.
Sandboxing of theantivirus engine
Then Now
Read the blog for more details
2
35.
Tamper protection: thefirst step in ransomware protection
Seamless, secure and
password less configuration
Threat & vulnerability management
– Security recommendation
Tampering alert based on System
Guard and EDR signals
Advanced hunting
Read the blog for more details
36.
Firmware and
hardware protections
UEFIscanner reads firmware file system at runtime by
interacting with the motherboard chipset, performing
dynamic analysis using multiple solution components:
• UEFI anti-rootkit, which reaches the firmware through
Serial Peripheral Interface (SPI)
• Full filesystem scanner, which analyzes content inside
the firmware
• Detection engine, which identifies exploits and
malicious behaviors
Read the blog for more details
Scanning and detection
Microsoft Defender Security Center
37.
Behavioral blocking andcontainment
Immediately stops threat before it can progress
Microsoft has the unique ability to scan signals across
kill chains and payloads (endpoints, Office, Identity,
etc.)
Some highlights:
• Pre and post breach AI- and ML- based behavioral blocking
and containment
• Detect malware after first sight and block it on other endpoints
within minutes (1 – 5 minutes)
• Microsoft Defender for Endpoint provides an additional
protection layer by blocking/preventing malicious behavior
even if we are not the primary AV
Read the blog for more details
Pre-execution sensors Post-execution sensors
Next-generation
protection
Endpoint detection
and response
Pre-execution
blocking
Behavioral blocking
and containment
Alert
38.
Endpoint detection &response overview
Microsoft Defender for Endpoint
Threats are no match.
Vulnerability
management
Attack surface
reduction
Next generation
protection
Endpoint detection
& response
Auto investigation
& remediation
Microsoft
Security Experts
Centralized configuration & administration
APIs & integration
39.
Key customer painpoints
As attacks become more complex and multi-staged,
it’s difficult to make sense of the threats detected
Click on a URL
Exploitation
Installation
C&C channel
Persistency
Privilege escalation
Reconnaissance
Lateral movement
46% of compromised
systems had no malware
on them
Following an advanced
attack across the network
and different sensors can
be challenging
Collecting evidence
and alerts, even from one
infected device, can be a long
time-consuming process
Living off the land – attackers
use evasion-techniques
40.
Endpoint detection &response
Detect and investigate advanced persistent attacks
Correlated behavioral alerts
Investigation and hunting
over six months of data
Rich set of response actions
Demonstrated industry-leading optics and
detection capabilities in MITRE ATT&CK-based
evaluation
Triage and investigation
Understandwhat was alerted
Alert investigation experience provides
detailed description, rich context, full process
execution tree
Investigate device activity
Full machine timeline to drill into activities,
filter and search
Rich supporting data and tools
Supporting profiles for files, IPs, URLs
including org and world prevalence, deep
analysis sandbox
Expand scope of breach
In-context pivoting to other affected
machines/users
43.
Incidents
Narrate the end-to-endattack story
Reconstructing the story
The broader attack story is better described
when relevant alerts and related entities are
brought together
Incident scope
Analysts receive better perspective on the
purview of complex threats containing
multiple entities
Higher fidelity, lower noise
Effectively reduces the load and effort required
to investigate and respond to attacks
Read the blog for more details
Live response
Real-time liveconnection to a remote system
Leverage Microsoft Defender for Endpoint
Auto IR library (memory dump, MFT analysis,
raw filesystem access, etc.)
Extended remediation command + easy undo
Full audit
Extendable (write your own command, build
your own tool)
RBAC+ Permissions
Git-Repo (share your tools)
46.
Threat analytics
Delivering insighton major threats
to your organization
Threat to posture view
See how you score against significant and
emerging campaigns with interactive reports
Identify unprotected systems
Get real-time insights to assess the impact
of the threat on your environment
Get guidance
Provides recommended actions to increase
security resilience, to prevention, or contain
the threat
47.
Auto investigation &remediation overview
Microsoft Defender for Endpoint
Threats are no match.
Vulnerability
management
Attack surface
reduction
Next generation
protection
Endpoint detection
& response
Auto investigation
& remediation
Microsoft
Security Experts
Centralized configuration & administration
APIs & integration
48.
Key customer painpoints
More threats, more alerts
leads to analyst fatigue
Alert investigation
is time-consuming
Expertise is expensive
Manual remediation
requires time
Talent shortage in
cybersecurity
Analysts overwhelmed by manual alert
investigation & remediation
Alert queue
Analyst 1 Analyst 2
Option 1
49.
Security automation is…
mimickingthe ideal steps a human
would take to investigate and
remediate a cyber threat
When we look at the steps an analyst is taking
as when investigating and remediating threats
we can identify the following high-level steps:
Security automation is not…
if machine has alert auto-isolate
Determining
whether the threat
requires action
Performing necessary
remediation actions
Deciding what
additional investigations
should be next
Repeating this as many
times as necessary
for every alert
What is Defender for
Endpoint Auto IR?
Option 2
1 2
3 4
50.
Auto investigation &remediation
Automatically investigates alerts and
remediates complex threats in
minutes
Mimics the ideal steps analysts would take
Tackles file or memory-based attacks
Works 24x7, with unlimited capacity
Microsoft Threat Expertsoverview
Microsoft Defender for Endpoint
Threats are no match.
Vulnerability
management
Attack surface
reduction
Next generation
protection
Endpoint detection
& response
Auto investigation
& remediation
Microsoft
Security Experts
Centralized configuration & administration
APIs & integration
54.
Key customer painpoints
As threats are becoming complex, I need additional
context and guidance on alert handling
Click on
a URL
Installatio
n
Exploitation C&C channel Persistency
?
Reconnaissance
Lateral
movement
Need for additional
threat context
No threat expert to
contact when needed
Missing guidance
on alert handling
Important alerts
might get missed
Does this alert or event
really matter to my
org?
55.
Microsoft Security Experts
Bringdeep knowledge and proactive threat hunting to your SOC
Expert level threat monitoring and
analysis
Environment-specific context via alerts
Direct access to world-class hunters
56.
Microsoft Security Experts
Anadditional layer of oversight and analysis to help ensure that threats don’t get missed
Targeted attack notifications
Threat hunters have your back
Microsoft Security Experts proactively hunt to
spot anomalies or known malicious behavior
in your unique environment
Experts on demand
World-class expertise at your fingertips
Got questions about alert, malware,
or threat context? Ask a seasoned
Microsoft Security Expert
61.
Centralized configuration andadministration
Microsoft Defender for Endpoint
Threats are no match.
Vulnerability
management
Attack surface
reduction
Next generation
protection
Endpoint detection
& response
Auto investigation
& remediation
Microsoft
Security Experts
Centralized configuration & administration
APIs & integration
62.
Historical roles andfriction
Security Team
Responsible for security monitoring
and reducing risk
Analyze threats, security incidents,
exposure and identify mitigations
Define security policies
Priority is on quick remediation
on impacted devices/users
IT Team
Responsible for policy configuration
including security policies
Analyzes change impact and stages
rollout of global policies
Priority is a stable IT environment and
low costs
63.
Customer needs
Simple, cross-platform,
unifiedendpoint security
management console
Intuitive, advanced
policy management
capabilities
Security controls
granularity and
completeness
Continuous
assessment and
reporting of endpoint
state
Seamless and frictionless
64.
Security settings management
Usea single portal to manage all security
settings across your devices
Secure your multiplatform enterprise
seamlessly with native support for
Windows, macOS and Linux devices
Enroll your devices with ease using a
simplified management experience that
removed identify-based requirements
Streamline policy management by
creating, modifying, and pushing policies
directly from the Defender portal.
Operate security and IT in lockstep with a
single source of truth for endpoint settings
and policy management
Note: Only Microsoft Intune endpoint security policies will populate in the Defender portal. Mobile device policies, SCCM policies, GPO policies, manually configured policies (PowerShell scripts, etc.) and policies from third-party Mobile Device Management will not populate in the portal.
Manage all security settings natively from Defender for Endpoint
65.
Endpoint security management
Alldevices Sec Admin experiences
Security baselines Security tasks
Target security policy to any device across Windows, Mac, Linux, Android, or iOS
APIs and integration
Vulnerability
management
Attacksurface
reduction
Next generation
protection
Endpoint detection
& response
Auto investigation
& remediation
Microsoft
Security Experts
Centralized configuration & administration
APIs & integration
Microsoft Defender for Endpoint
Threats are no match.
68.
Microsoft Defender
for Endpoint
Connectingwith the platform
Threats are no match.
Vulnerability
management
Attack surface
reduction
Next generation
protection
Endpoint detection
& response
Auto investigation
& remediation
Microsoft
Security Experts
APIs &
integration
Devices
Reporting
Apps
SIEM data
Tools
69.
Microsoft Defender forEndpoint through ecosystem and API
Enable managed service provider offerings
on top of Microsoft Defender for Endpoint
Security analytics
and operations
SOAR
ITSM
Threat intelligence
Endpoint security
solutions
Attack simulation
MTD
Network
Custom reporting
and analytics
Orchestration
and automation
Service
providers
(MSSP,
MDR)
SDK
APIs
Technology
partners
Apps
Customer
apps
Query API
Streaming API
Actions API
Threat intel API, Vulnerability API
Application connectors (PBI, Flow, SNOW)
Microsoft Security Graph connector
AAD authentication and authorization
RBAC controls
Developer kit
Partner integration kit
Developer License
Done
70.
Supercharging Defender forEndpoint with Zeek
Enriches context by combining
endpoint and network-based
signals
Enhances detection capabilities
by aggregating network protocol
across an entire TCP/UDP session
Exposes device communications
across incoming and outgoing
network traffic
Enforces new detection using
Zeek scripts when reacting to
emerging threats (Log4Shell &
PrintNightmare)
Expands Endpoint and IoT
discovery to detect across NTLM,
SSH, & FTP
71.
Defender for EndpointAPIs and partners
Easy development and tracking of connected solutions
API Explorer
Explore various Defender for Endpoint APIs interactively
Integrated compliance assessment
Track apps that integrates with Defender for Endpoint
platform in your organization
Data Export API
Configure Defender for Endpoint to stream
Advanced Hunting events to your storage account
Microsoft Defender forEndpoint (Mac)
The first step in our cross-platform journey
Threat prevention
• Realtime MW protection for
Mac OS
• Malware detection alerts visible
in the Microsoft Defender for
Endpoint console
Rich cyber data enabling attack
detection and investigation
• Monitors relevant activities including files,
processes, network activities
• Reports verbose data with full-scope of
relationships between entities
• Provides a complete picture of what’s
happening on the device
Enterprise Grade
• Lightweight deployment and
onboarding process
• Performant, none intrusive
• Aligned with compliance,
privacy and data sovereignty
requirements
Seamlessly integrated with Microsoft
Defender for Endpoint capabilities
• Detection dictionary across the kill chain
• Six months of raw data on all machines inc Mac OS
• Reputation data for all entities being logged
• Single pane of glass across all endpoints Mac OS
• Advanced hunting on all raw data including Mac OS
• Custom TI
• API access to the entire data model inc Mac OS
• SIEM integration
• Compliance and privacy
• RBAC
74.
Microsoft Defender forEndpoint (Linux)
On the client:
• AV prevention
• Full command
line experience
(scanning, configuring,
agent health)
In the Microsoft Defender Security Center,
you'll see basic alerts and machine information.
EDR functionality will be gradually lit up in upcoming waves.
Antivirus alerts:
Severity
Scan type
Device information
(hostname, machine
identifier, tenant identifier,
app version, and OS type)
File information
(name, path, size, and
hash)
Threat information
(name, type, and state)
Device information:
Machine identifier
Tenant identifier
App version
Hostname
OS type
OS version
Computer model
Processor architecture
Whether the device is a
virtual machine
75.
Microsoft Defender forEndpoint (Android) current offering
Web
Protection
Malware
Scan
Single Pane of
Glass
Reporting
Conditional
Access
Supported
Configuration
s
Licensed by
Microsoft
Anti-phishing
Block unsafe
network connections
Custom indicators:
allow/block URLs
Alerts for malware,
PUA
Files scan
Storage and memory
peripheral scans
Alerts for phishing
Alerts for
malicious apps
Auto-connection
for reporting in
Microsoft
Defender Security
Center
Block risky devices
Mark devices
non-compliant
Device Administrator
Android Enterprise
(Work Profile)
Included in per user
licenses that offer
Microsoft Defender
for Endpoint
Part of the five
qualified devices
for eligible
licensed users
Reach out to your
account team or CSP
76.
Microsoft Defender forEndpoint (iOS) current offering
Web
Protection
Single Pane of
Glass Reporting
Supported
Configurations
Licensed by
Microsoft
Anti-phishing
Block unsafe
network connections
Custom indicators:
allow/block URLs
Alerts for phishing
Auto connection for
reporting in Microsoft
Defender Security
Center
Supervised
Unsupervised
Included in per user
licenses that offer
Microsoft Defender
for Endpoint
Part of the five qualified
devices for eligible
licensed users
Reach out to your
account team or CSP
Evaluation lab andtutorials
Setup
Simulation
Reports
• Latest OS version
• Pre-configured to security baseline
• Onboarded to Microsoft Defender for Endpoint
• Full audit mode across the stack.
• Pre-populated with evaluation tools
• Multiple interconnected devices (lateral movement)
• Microsoft Defender for Endpoint pre-made simulations
“Do it yourself” scenarios
• Wizard-based experience (walk customers through
product capabilities)
• Full flexibility (real-machine RDP accessible)
• Training and education is a critical part of successful PoC
• Guided experience
• Report is generated in real-time
• Results are self-contained (separate customer tenant data)
• Summary report
• Highlighting additional Microsoft Defender for Endpoint relevant
features
79.
Using Microsoft Defenderfor Endpoint?
Turn on Public Preview features
Not yet a customer? Sign up for a trial: aka.ms/MDEtrial
Stay up to date on the latest: aka.ms/MDEblog
#2 Talk track:
We are in an era of unprecedented economic uncertainty. Many organizations face constrained resources as they navigate new business challenges. Virtually overnight, companies have seen the need to accelerate digital transformation, which ensures worker productivity and responds to rapidly shifting customer expectations. As the technology, business models, and overall landscape evolves, the way people work has changed: we no longer expect to access the myriad of corporate resources solely from the office and on company-owned devices. In many ways, every company is now a technology company, providing services for their customers and employees. And as security teams are charged with protecting an ever-growing digital footprint, they now face added pressure to cut costs.
To secure their environments, organizations must develop new digital capabilities and break down data silos. Data and information are the lifeblood of the transformation, but they also increasingly attract cybercriminal activity. Traditional security approaches have failed us. A hardened perimeter (privileged corporate network) is, at best, a psychological security blanket, but it won’t hold. Siloed on-premises tools and datasets hinder visibility, correlation, and automation. Paradoxically, adding more tools typically makes you less secure due to compatibility issues and assumptions about your coverage.
On top of all of this—and perhaps because of it—the cost and number of breaches increase every year. As governments try to keep up, regulatory rules are constantly changing, and the cost of compliance increases as well. Over 1,000 regulatory bodies around the world release an average of 217 updates per day.1 Keeping up isn’t easy. Since you can’t be compliant without first being secure, everything starts with security.
1 https://images.marketing.refinitiv.com/Web/ThomsonReutersFinancialRisk/%7Bf798765e-1a9b-4975-98c9-a133945d21e8%7D_Cost_of_compliance_2020_FINAL230620.pdf
#3 Criminal groups are evolving their techniques
Criminal groups are skilled and relentless. They have become adept at evolving their techniques to increase success rates, whether by experimenting with different phishing lures, adjusting the types of attacks they execute, or finding new ways to hide their work. They move quickly to discover new threat vectors, use new exploits, and respond to new defenses.
The lack of basic security hygiene in any given ecosystem continues to enable cybercriminals to use well-known vulnerabilities—or new variants of them—to exploit their environments. They were observed to leverage the fear and uncertainty associated with COVID-19 with great success. Our tracking of COVID-19-themed attacks shows how rapidly cybercriminals move to adapt their lures to the topics of the day.
In this graph you can see instances of malware encounters in relation to local news events of the day. For example, as the World Health Organization (WHO) declared COVID-19 a pandemic on March 11, there’s a corresponding uptick in COVID-themed lures. Similarly, as lockdowns were relaxed, and some states began to re-open (May 1, US chart), there’s a corresponding decline in the number of COVID-themed encounters.
#4 Microsoft Defender for Endpoint is built into Windows 10 1703 and up and Windows Server 2019. It does not require any agents to be installed on these versions.
#6 Defender for Endpoint provides a centralized security operations experience for Windows and non-Windows platforms. You'll be able to see alerts from various supported operating systems (OS) in Microsoft 365 Defender and better protect your organization's network.
Supported platforms include:
Endpoints and servers:
Windows
MacOS
Linux
Mobile threat defense:
Android
iOS
Virtual Desktops:
Windows 365
Azure Virtual Desktop
Network devices:
Cisco IOS, IOS-XE, NX-OS
Juniper JUNOS
HPE ArubaOS, Procurve Switch Software
Palo Alto Networks PAN-OS
#37 Pre and Post breach AI and ML based behavioral blocking and containment
Cloud EDR ML based behavior anomaly detection
Auto IR
Rapid Protection Feedback Loop- EDR detects on patient 0 to AV blocks on patient 0 and plus (1-5 minutes) - blog
Shadow Protection (In preview) - Microsoft Defender for Endpoint provides an additional protection layer by blocking/preventing malicious behavior in the background even when third party AV is primary AV.
#64 The native security settings management experience provides a consistent, single source of truth for managing endpoint security settings across Windows, macOS, and Linux devices that is native within the Microsoft Defender portal.
This new experience is built natively into Microsoft Defender for Endpoint and all endpoint settings can now be managed exclusively in the portal without any Microsoft Intune dependencies. At the same time, customers who have also deployed Microsoft Intune have the flexibility to continue to use it, thanks to a synchronized device inventory and settings management experience across both portals.
Note: 1Only Microsoft Intune endpoint security policies will populate in Microsoft 365 Defender. Mobile device policies, SCCM policies, GPO policies, manually configured policies (PowerShell scripts, etc) and policies from third-party Mobile Device Management will not populate in the portal.
Cross-platform support for Windows, macOS, and Linux
Automatic ingestion of existing endpoint security policies into the Microsoft 365 Defender portal
Ability to create and edit AV policies
Automatic policy synchronization with Microsoft Intune, relevant for customers who choose to deploy Microsoft Intune (optional)
A new list on the device page in the Microsoft 365 Defender portal – showing all security policies and their settings
Simplified device onboarding – removing Azure Active Directory hybrid join as a management prerequisite
At GA (Mid-October ETA), additional features will become available:
Windows – Create/Edit policies for firewall, attack surface reduction, endpoint detection and response, ASR Rules, antivirus exclusions and firewall rules
MacOS and Linux – Create/Edit policies for antivirus exclusions and endpoint detection and response
#70 Administrators onboarding endpoints to Defender for Endpoint can now monitor inbound and outbound traffic with a novel engine that is capable of:
Session Awareness - Being able to aggregate network protocol data across an entire TCP/UDP session, such as NTLM and Kerberos authentications, SSH sessions, FTP connections, and RPC. These aggregated protocol insights provide much richer metadata and extracted payloads that can be used to enhance the detection capabilities of network-based attacks, as well as the passive classification of discovered devices.
Dynamic Protocol Detection - Being able to detect attacks even on non-default ports, a common pattern attackers use to hide their network traffic.
Dynamic Scripting Content - Being able to add new detections on the fly using Zeek scripts, backed by a wide community of security advocates. This unlocks the ability to react to emerging network-based threats such as Log4Shell and PrintNightmare at unprecedented speed. In a reality where new vulnerabilities are discovered on a weekly basis, this is a true game changer.
Discovering Network-Based Malicious Activity
Providing visibility into the network layer, using both incoming and outgoing traffic from each endpoint, broadens the ability to protect devices operating on the network even if they are not onboarded to Defender for Endpoint, by detecting attacks initiated by these devices, as well as discovering vulnerable services and operating system versions running on them.
PrintNightmare detection - This detection identifies PrintNightmare exploitation attempts. The PrintNightmare Zeek script identifies the usage of the RPC functions used to install a remote printer driver. We further contextualize this action with additional endpoint and network-based telemetry and rely on the behavioral profiles of existing network entities in the organization to cover both inbound and outbound attacks and reduce false positive rates to the lowest possible extent.
Proprietary password spray detection - Using Zeek’s out-of-the-box NTLM analyzer, Microsoft Defender for Endpoint can now identify attackers that are trying to authenticate to a machine with many different users as part of a password spray attack, while using different NTLM-based protocols such as SMB, Telnet, HTTP, RPC, or WINRM. Zeek’s ability to provide the session context comes into play and allows the detection logic to take different handshake parameters into account, thus making it much more accurate.
Device Discovery Enhancements
In addition to these new detections, the integration also enhances Defender for Endpoint’s passive device discovery capabilities by utilizing many widely used protocols that are supported out of the box, including the below:
NTLM - The NTLM authentication protocol involves both client and server devices sending their hostname, domain name, and operating system version. This is highly valuable data when it comes to device discovery. Zeek aggregates and reports this information for both sides on the NTLM transaction.
SSH - Zeek monitors SSH protocol traffic and parses out the server version string. This string often includes the version of the SSH server software and the host operating system version.
FTP - FTP servers usually respond with a code 220 response after a successful TCP handshake. This means that the server is ready to serve a new user. As part of the code 220 response, a response message is sent which typically contains identifying information about the FTP server.
#75 The current functionality in public preview will be included in the Microsoft Defender for Endpoint license with 5 devices entitlement. This includes what is coming out soon for iOS as well.
#81 Step 1: Settings management enabled – Security administrator enables security settings management in the Defender portal
Step 2: Policy creation - Security administrator creates a policy in the Defender portal and targets it to Entra ID groups. Policies created and modified in the Defender portal will reflect in Microsoft Intune and vice versa.
Step 3: Policy delivery – The policy is delivered to the device via Defender for Endpoint agent
#82 Step 1: Settings management enabled – Security administrator enables security settings management in the Defender portal
Step 2: Device reported to Intune - Defender for Endpoint communicates with Microsoft Intune
Step 3: Synthetic registration is created - Microsoft Intune checks with Entra ID (formerly Azure AD) if the device is already registered with Entra ID. If not, a 'placeholder identity' is created in Entra ID.
Step 4: Policy creation - Security administrator creates a policy in the Defender portal and targets it to Entra ID groups. Policies created and modified in the Defender portal will reflect in Microsoft Intune and vice versa.
Step 5: Policy delivery – The policy is delivered to the device via Defender for Endpoint agent
Note: Steps 1 and 4 are the only two steps that require admin intervention
#85 Defender for Endpoint will manage the endpoint by creating a ‘placeholder’ identity in the Entra ID tenant that’s affiliated to Defender for Endpoint.
The endpoint will not be fully registered—e.g., IT admins can’t configure conditional access policies.
The endpoint will be able to be grouped in Entra ID and will be able to receive Intune/Defender for Endpoint security policies.