by h0ek on 3/6/22, 7:37 PM with 285 comments
by inglor on 3/6/22, 8:19 PM
We ended up absorbing and acquiring a few companies to provide a better offering and a lot of re-branding happened. For example Security Center's old portal for active threat protection, automatic remediation, incident investigation etc is all now absorbed into (the better) security.microsoft.com which is (to my understanding, just an engineer) the current and last (for the foreseeable future) rebrand. The team I work at started as one person working on the frontend for MDE (Microsoft Defender for Endpoint) and now has hundreds of people working on the security portal across India, Israel and the US (as well as a few other smaller sites contributing).
Also, as an engineer I have to say the offering is good. The anti-virus and the telemetry is worked on by some really smart people. Client information is sacred, logging into production takes multiple audits and PII is scrubbed (heavily) any time logs are needed. We still have a lot of room to improve but I am confident in Microsoft both delivering a good product and acting in good faith (and there is a clear business incentive in the enterprise security space to do so rather than benevolence).
by technion on 3/6/22, 11:07 PM
https://www.theverge.com/2021/3/8/22319934/microsoft-hafnium...
In quite a few cases, we identified that ultimately a server has been popped using this unknown zero day, but never before seen webshells and Cobalt strike droppers all ended up dropped on servers and then deleted by Windows Defender. We recommended rebuilds regardless but the product clearly provided more security than people give it credit for.
Then we identified a number of places it didn't appear to work. Why? The answer was people following "best practices" of adding AV exclusions for the whole web root folder, and for some reason the whole user profile folder.
That big Kaseya hack? Every Kaseya user was told by Kaseya to add exclusions for every folder used by the product.
One of the understated issues with modern EDR products is people simply following vendor advise and making it useless. I've got a software product that handles payment details that randomly drops EICAR test files in random folders all of the user PC while it's running just so it can shut itself down if it detects Defender in use "for support reasons".
All the top EDR products in the world and all the hardening advice you can find can go down the toilet pretty quickly if you let vendors tell you how to run these products - ignoring them is a highly rated hardening tip.
by sumthinprofound on 3/6/22, 8:12 PM
by fuzzy2 on 3/6/22, 8:24 PM
With Office 365 ATP, things get even slower, too, which is not so great on my work device.
Detection rate is one thing. Performance is another. Both are important.
by alwaysanon on 3/6/22, 10:37 PM
The idea that pushed me over the edge to try it again was that, this time, I'd try disabling Defender (as I was 1/2 convinced the Linux performance boost was not having AV) and keep a fresh/clean install strictly limited to Chrome (now that I had gotten used to just using the web versions of everything like Slack, Spotify, etc.), VS Code, WSL2 and that's it. Basically what I'd been doing with Linux. And so far that's been great - better performance, runs cooler and quieter, longer battery life etc. than I ever used to have with Windows. It is like a whole new machine.
Knowing I don't have Defender I am even more careful about what I download (these days almost nothing - especially on the Windows side rather than the WSL2 Ubuntu dev side) and about ensuring everything is patched. But it is such a game-changer I am not going back...
by joe-collins on 3/6/22, 8:45 PM
> Run this bat file!
by 0xbadc0de5 on 3/6/22, 8:04 PM
by tehdgvtd on 3/7/22, 2:16 AM
Why the convoluted scripts to get admin? Why execing file with "~3" in the name when you can use the proper one? So much needles silly steps, too little actual explaining of anything that would matter.
Also, following that will just ensure you can never download curl or nmap lol. ...i guess, maybe i got the whole thing wrong. Who knows. I don't.
by jve on 3/7/22, 11:11 AM
And attack surface reduction rules (which you must configure) - which greatly reduces office worker possibility of catching some nasty stuff:
Block abuse of exploited vulnerable signed drivers
Block Adobe Reader from creating child processes
Block all Office applications from creating child processes
Block credential stealing from the Windows local security authority subsystem (lsass.exe)
Block executable content from email client and webmail
Block executable files from running unless they meet a prevalence, age, or trusted list criterion
Block execution of potentially obfuscated scripts
Block JavaScript or VBScript from launching downloaded executable content
Block Office applications from creating executable content
Block Office applications from injecting code into other processes
Block Office communication application from creating child processes
Block persistence through WMI event subscription * File and folder exclusions not supported.
Block process creations originating from PSExec and WMI commands
Block untrusted and unsigned processes that run from USB
Block Win32 API calls from Office macros
Use advanced protection against ransomware
by badrabbit on 3/6/22, 11:07 PM
Let's say you're a journalist at an important news org. Even for your personal devices, the builtin defender isn't enough.
There is a fundamental principle for sophisticated actors, that prevention is not enough. Your security software should do monitoring (off device) and do that very well. You are already compromised, you should be looking into the collected data to see where, when and by whom so you can do something about it. Unfortunately in the last fee years the line has been getting very blurry between sophisticated nation state actors and criminals and common criminals trying to score as much loot as possible (mostly due to being forced to use sophisticated tools and techniques because solutions like Defender have gotten very good).
You maybe an average joe and still be a target for "sophisticated" actors or you may think you are an "average joe" but your pwnage offers a strategic value to someone resourceful,
My advice is to take inventory of the data and resources you have access to and see (with help if needed) what threat model fits your use case. MS does offer a Defender ATP that's basically turning on few more switches and sending them a log of everything happening your machine.
Back tracking a bit: Defender is really good. Cloud based protection is their secret sauce, turn it on and pretend they are to be trusted with collecting random files from your PC.
by ec109685 on 3/6/22, 8:42 PM
by Angostura on 3/7/22, 12:15 AM
by benbristow on 3/6/22, 8:39 PM
Bypassing other AVs would really be a 'nice to have'
by jrm4 on 3/6/22, 10:19 PM
by Comevius on 3/6/22, 8:00 PM
I think sandboxes are better for software you don't trust. I imagine antivirus heuristics are only useful against a handful of common threats, if at all.
by asmr on 3/7/22, 3:07 PM
https://gist.github.com/superswan/1d6ed59e75273f90a481428964...
by jmrm on 3/6/22, 9:20 PM
Aside from clearly aimed ransomeware, today's pretty difficult to have virus problems in Windows. Most of the time I have to repair any Windows machine is due to a driver install problem (specially sound cards) or a system update problem.
by HeavyStorm on 3/7/22, 7:27 PM
On the other hand, whenever I use a machine with an antivirus, I want to quit my job. Those things are slow. Very slow.
My work machine has a multitude of security software that I can't disable, heck, I can't even touch. Doing a pip install on a common program takes 10, 15 minutes. The same installation on my personal machine takes about one minute. The culprit? The 3 different agents that spins out of control scanning my disk.
by 4oo4 on 3/6/22, 8:20 PM
by thrower123 on 3/6/22, 8:09 PM
I've had an incredible number of problems caused by antivirus software interfering with legitimate software.
by heavyset_go on 3/6/22, 10:44 PM
by caymanjim on 3/6/22, 10:01 PM
by alexklark on 3/8/22, 12:29 PM
by kubb on 3/6/22, 9:35 PM
What?
by ZYinMD on 3/7/22, 3:24 AM
by galaxyLogic on 3/7/22, 1:56 AM
I have never seen a message saying "Defender does not recognize this application, are you sure you want to start it?"
Also there's a lot of downloadable Open Source software where users are asked to "verify the keys". Couldn't Windows do this kind of thing automatically, or at least make it easy?
by kimown on 3/7/22, 3:10 AM
by Tempest1981 on 3/6/22, 9:47 PM
by Joe_Boogz on 3/7/22, 5:07 AM
Looks really good, i'd like to create something similar for my site.
by 9wzYQbTYsAIc on 3/6/22, 9:00 PM
by fomine3 on 3/7/22, 1:19 AM
by icare_1er on 3/7/22, 12:55 PM
by Terry_Roll on 3/6/22, 11:48 PM
by AniseAbyss on 3/7/22, 7:48 AM
It is enough for your average user though I'll give it that.
by trifit on 3/6/22, 7:55 PM
by 323 on 3/6/22, 8:29 PM
For example, if you write a simple keylogger using the Windows API in C++/Python/..., compile it and run it, an antivirus like BitDefender will block it by default. It's up to you then to allow it or not.
So it can sometimes detect and block unknown malware, a thing that Windows Defender can't. So for some people it might make sense to have a more "strict" antivirus.