This is a continuation of a series of articles on
operational engineering aspects of Azure public cloud computing that included
the most recent discussion on controlled folder access. This article talks about cloud protection.
Cloud protection is part of the next-generation portfolio
of technologies in Microsoft Defender Antivirus that provides near-instant
automated protection against new and emerging threats and vulnerabilities. The
definitions are kept up to date in the cloud, but their role does not stop
there. The Microsoft Intelligent Security Graph includes large sets of
interconnected data as well as powerful artificial intelligence systems driven
by advanced machine learning models. It works together with Microsoft Defender
Antivirus to deliver accurate, real-time intelligent protection.
Cloud protection consists of the following features:
-
Checking against metadata in the
cloud
-
Cloud protection and sample
submission
-
Tamper protection enforcement
-
Block at first sight
-
Emergency signature updates
-
Endpoint detection and response in
block mode
-
Attack surface reduction rules
-
Indicators of compromise (IoCs)
These are enabled by default. If for any reason, they get
turned off, then the organization can enforce turning in back on using the
Windows Management Instruction, Group Policy, PowerShell or with MDM
configuration service providers.
Fixes for threats and vulnerabilities are delivered in
real-time with Microsoft Defender Antivirus, unlike waiting for the next update
in its absence.
5 billion threats to devices are caught every month.
Windows Defender Antivirus does it under the hood. It uses multiple engines to
detect and stop a wide range of threats and attacker techniques at multiple
points. They provide industry with the best detection and blocking
capabilities. Many of these engines are local to the client. If the threats are
unknown, the metadata or the file itself is sent to the cloud service. The
cloud service is built to be accurate, realtime and intelligent. While trained
models can be hosted anywhere, they are run efficiently in the cloud with the
transfer of input and prediction between the client and the cloud. Threats are
both common and sophisticated and some are even designed to slip through
protection. The earliest detection of a threat is necessary to ensure that not
even a single endpoint is affected. With the models hosted in the cloud,
protection is even more enriched and made more efficient. The latest strains of
malware and attack methods are continuously included in the engines.
These cloud-based engines include:
-
Metadata based ML engine – Stacked
set of classifiers evaluate file-types, features, sender-specific signatures,
and even the files themselves to combine results from these models to make a
real-time verdict which allow or block files pre-execution.
-
Behavior based ML engine where the
suspicious behavior sequences and advanced attack techniques are monitored to
trigger analysis. The techniques span attack chain, from exploits, elevation
and persistence all the way through to lateral movement and data exfiltration.
-
AMSI paired ML engine – where pairs
of client-side and cloud side models perform advanced analysis of scripting
behavior pre- and post- execution to catch advanced threats like fileless and
in-memory attacks
-
File-classification ML Engine - where
deep neural network examine full file contents. Suspicious files are held from
running and submitted to the cloud protection service for classification. The predictions determine whether the file
should be allowed or blocked from execution.
-
Detonation-based ML Engine - a
sandbox is provided where suspicious files are detonated so that classifiers
can analyze the observed behaviors to block attacks.
-
Reputation ML engine – which utilizes
sources with domain expert reputations and models from across Microsoft, to
block threats that are linked to malicious URLs, domains, emails, and files.
-
Smart rules engine - which features
expert written smart rules that identify threats based on researcher expertise
and collective knowledge of threats.
These technologies are industry recognized and proven to
come with customer satisfaction.
No comments:
Post a Comment