Jump to content

Search the Community

Showing results for tags 'application guard'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Site Related
    • News & Updates
    • Site / Forum Feedback
    • Member Introduction
  • News
    • General News
    • FileSharing News
    • Mobile News
    • Software News
    • Security & Privacy News
    • Technology News
  • Downloads
    • nsane.down
  • General Discussions & Support
    • Filesharing Chat
    • Security & Privacy Center
    • Software Chat
    • Mobile Mania
    • Technology Talk
    • Entertainment Exchange
    • Guides & Tutorials
  • Off-Topic Chat
    • The Chat Bar
    • Jokes & Funny Stuff
    • Polling Station

Categories

  • Drivers
  • Filesharing
    • BitTorrent
    • eDonkey & Direct Connect (DC)
    • NewsReaders (Usenet)
    • Other P2P Clients & Tools
  • Internet
    • Download Managers & FTP Clients
    • Messengers
    • Web Browsers
    • Other Internet Tools
  • Multimedia
    • Codecs & Converters
    • Image Viewers & Editors
    • Media Players
    • Other Multimedia Software
  • Security
    • Anti-Malware
    • Firewalls
    • Other Security Tools
  • System
    • Benchmarking & System Info
    • Customization
    • Defrag Tools
    • Disc & Registry Cleaners
    • Management Suites
    • Other System Tools
  • Other Apps
    • Burning & Imaging
    • Document Viewers & Editors
    • File Managers & Archivers
    • Miscellaneous Applications
  • Linux Distributions

Categories

  • General News
  • File Sharing News
  • Mobile News
  • Software News
  • Security & Privacy News
  • Technology News

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Found 3 results

  1. Microsoft announces general availability of Application Guard for Office Microsoft unveiled a couple of security features for Microsoft 365 early in 2020, which included Application Guard. Today, the company announced that Application Guard for Office has hit general availability. The feature basically puts documents from untrusted sources in a container before opening them in order to ward off malicious threats. Microsoft also noted that it analyzes every malicious attack contained by Application Guard to bolster its threat intelligence. Your files are also protected from kernel-based attacks since it uses Hyper-V-based containers. Unlike Protected View which opens documents in read-only mode, Application Guard opens files in a virtualized sandbox where you can still edit and print documents in a limited capacity without leaving the container. These files include those coming from untrusted sites, files stored in potentially unsafe folders or network, and documents blocked by File Block. That said, you can still choose to disable protection for a specific file if necessary, provided you're confident that it's safe. Prior to opening that file, it will be scanned with the Safe Documents feature if it's enabled. In addition to documents, emails are protected as well with combined security from Application Guard and Microsoft Defender for Office 365. The new feature is turned off by default and administrators will need to set the right policy for each user in an organization. It's available to customers on Current Channel and Monthly Enterprise Channel while a rollout in Semi-Annual Enterprise Channel is scheduled later this year. Microsoft announces general availability of Application Guard for Office
  2. Using separate add-ons for the Chrome and Firefox browsers, Microsoft has connected those browsers with Windows 10's advanced security technology. Thinkstock / Microsoft Microsoft earlier this month released a pair of add-ons for Google's Chrome and Mozilla's Firefox to cobble together an unwieldy connection between those browsers, Edge and Windows 10's advanced security technology, Windows Defender Application Guard (WDAG). The debut of the browser extensions - separate add-ons for Chrome and Firefox - was quietly plugged at the end of a March 15 blog post relating a recent Windows Insider build. That build, 18358, will lead, presumably next month, to Windows 10's next feature upgrade, labeled 1903 and also Windows 10 April 2019 Update. It's unclear whether the extensions - or the Windows Store companion app users must also install - are dependent on 1903 and later; they're currently available to PCs running older SKUs (stock-keeping units) of Windows 10. According to Microsoft, the combination of companion app and browser add-on for Chrome or Firefox "automatically redirect untrusted navigations to Windows Defender Application Guard for Microsoft Edge." Redirect..., say what? Microsoft hasn't brought Chrome and Firefox under the Windows Defender Application Guard (WDAG) roof or woven the technology into the browser rivals of Edge. But users should be excused for thinking that's what the Redmond, Wash. company did: More than a few news stories and blog posts breezed over the fact that WDAG will remain Edge-only. Even Microsoft's account of the necessary Windows 10 app was vague enough to be mistaken as a porting of WDAG to Chrome and Firefox. "This companion app enables browsers other than Microsoft Edge to work with Windows Defender Application Guard," the app's Store description read. In point of fact, Chrome or Firefox simply pass along an untrusted site to Edge, which then opens it in a virtualized container, just as if Edge had been steered to the site directly while protected by WDAG. "When users navigate to a site, the extension checks the URL against a list of trusted sites defined by enterprise administrators," wrote Microsoft employees Dona Sarkar and Brandon LeBlanc in the blog post. "If the site is determined to be untrusted, the user is redirected to an isolated Microsoft Edge session." Meanwhile, the Windows Store app handles "the communication between the browser [Chrome, Firefox] and the device's Application Guard settings," Sarkar and LeBlanc explained. Rather than grant Chrome and Firefox the power to use WDAG - something that may, in fact, be extremely difficult or even impossible - Microsoft is simply shunting a URL entered in one browser to another browser, where it's opened. In that way, it's reminiscent of a Windows 10 feature available since the operating system's mid-2015 debut: Enterprise Mode. That feature was meant to ease the transition to Windows 10 by letting IT administrators set sites that would be opened, not in 10's default Edge but in Internet Explorer 11 (IE11), the legacy browser retained for support of technologies - notably ActiveX - and document modes Edge dumped. In Enterprise Mode, sites and apps fingered as IE11-only opened in that browser; all others appeared in Edge. Why did Microsoft do this? Sarkar and LeBlanc said the move was prompted "to extend our container technology to other browsers and provide customers with a comprehensive solution to isolate potential browser-based attacks." As is typical, there's almost certainly more to Microsoft's rationale than that customer-first partnership with rivals. First of all, adopting the two competitors, especially Chrome with its 67% user share, was yet another acknowledgement by Microsoft that its own Edge has been a flop. Much like the Redmond, Wash. company's decision late last year to abandon its own browser technology for Chromium, the open-source foundation of Chrome, this move was an admission of Edge's anemic growth; only about 12% of Windows 10 users ran Edge in February, according to Net Applications. If users wouldn't come to Edge and WDAG, Microsoft would bring the browser and defensive technology to Windows 10 users by co-opting Chrome and Firefox. But why bother? Because WDAG is one of the defining enterprise security technologies of Windows 10, and if few are using it - because few run Edge - Microsoft needs to go where the users are to insure customers work with WDAG enough to value it. What happens to WDAG when Microsoft goes 'full-Chromium' on Edge? The big question underlying the add-on offer is what Microsoft will do with WDAG when it takes Edge "full-Chromium" by using the same rendering and JavaScript engines as Chrome. It's not known if Microsoft can replicate WDAG on a non-EdgeHTML browser (EdgeHTML is the name of Edge's original, Microsoft-made rendering engine). The two, WDAG and Edge, may be too intertwined to transport the former to, say, Chrome or a Chromium-based browser. The add-on approach, a sub-optimal process that results in two browsers and two browsers' user interfaces - with users being to-and-froed between them - would seem to be a tacit confession that WDAG can't be made native to Chrome. If that's that case, then this may be how WDAG survives the Chromium-ization of Edge. When Edge is full-Chromium, the same extension just issued for Chrome will also work on that Edge. WDAG would be called up when necessary by the same mechanism, where an instance of Edge - the original EdgeHTML Edge - runs the untrusted site in isolation. That, of course, would require Windows 10 to retain the underlying technology of "original Edge," just as it has retained IE11. In turn, that would require Microsoft to patch three browsers inside Windows 10: IE11 for as long as it's supported, original Edge and full-Chromium Edge. Source: Microsoft connects rival browsers to Windows 10's Application Guard (Computerworld - Gregg Keizer)
  3. Including step-by-step instructions. ## Microsoft's Windows Defender Application Guard has been added to the upcoming Chromium-based Microsoft Edge. This security feature allows you to securely browse the web without fear of becoming infected by malicious sites. Windows Defender Application Guard is a Windows 10 feature that enables Microsoft Edge to launch in an environment that is walled off from the rest of the operating system. This sandbox allows users to open web pages and perform other activities online without fear of infecting the operating system. In order to utilize Application Guard in the new Microsoft Edge, the Windows 10 feature first needs to be installed via the Windows Features control panel. Once Application Guard is installed, a new flag will be available in edge://flags called "Microsoft Edge Application Guard" as shown below. To enable this feature, set this flag to Enabled and restart the browser. Now that Application Guard is enabled, if you click on the Edge menu you will see an option labeled "New Application Guard windows" as shown below. When you click the New Application Guard window option, the browser will prepare the Application Guard sandbox and launch a new Chromium Edge session inside it. When Microsoft Edge is running under Application Guard, it is indicated by an icon with a shield to the right of the address bar. If you click on this icon, it will indicate that it is an Application Guard session. Not 100% finished While Application Guard is now integrated into the new Microsoft Edge, it is still not 100% finished. Edge sessions will be launched into sandboxed environments and downloads will be prevented from being launched, but the browser will not display an error message indicating why a download or some other insecure action was blocked. Normally when you try to open a downloaded file in an Application Guard session, Edge will display a warning that you are not allowed to do so. The new Edge does not have these warnings added as of yet. It is still promising to see the Edge team integrate features that are unique to Microsoft and Windows 10. With this feature added, the new Microsoft Edge continue to move further away from other Chromium-based browsers and allows it to stand out as a unique and worthy contender to Google Chrome. ** Source (Bleeping_Computer)
×
×
  • Create New...