25.07.2017 Views

MICROSOFT_PRESS_EBOOK_INTRODUCING_WINDOWS_10

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

During the sign-in process, the Windows <strong>10</strong> PC can connect using Bluetooth to access Microsoft<br />

Passport on the user’s Windows <strong>10</strong> Mobile device, which is generally in the user’s possession. The<br />

combination of an enrolled device and a PIN or biometric proof of identity enables sign-in to all<br />

PCs, networks, and web services, locally or remotely. And none of those devices, networks, or services<br />

require that a password be stored or transmitted. That makes it impossible for a thief to steal<br />

credentials using phishing techniques, keyloggers, or other attacks.<br />

Blocking malware<br />

Successfully resisting malware and phishing attacks starts with some fundamental security features that<br />

have protected the core of the operating system for several years. The first two features are designed<br />

to protect against exploits that use vulnerabilities such as buffer overruns in the operating system and<br />

in applications:<br />

■■<br />

Address Space Layout Randomization (ASLR) This feature randomizes how and where<br />

important data is stored in memory, making it more likely that attacks that try to write directly<br />

to system memory will fail because the malware can’t find the specific location it needs to attack.<br />

Windows 8.1 and Windows <strong>10</strong> increase the level of entropy significantly from Windows 7,<br />

making it more difficult for most exploits to succeed. In addition, ASLR is unique across devices,<br />

making it more difficult for an exploit that works on one device to also work on another.<br />

■■<br />

Data Execution Prevention (DEP) This feature substantially reduces the range of memory<br />

that code (including malicious code) can run in. Beginning with Windows 8, hardware-based<br />

DEP support is a requirement; Windows <strong>10</strong> will not install on a device that lacks this feature. DEP<br />

uses the Never eXecute (NX) bit on supported CPUs to mark blocks of memory so that they can<br />

store data but never run code. Therefore, even if malicious users succeed in loading malicious<br />

code into memory, they are unable to run it.<br />

Windows Defender<br />

In Windows 7, Windows Defender is the name of a limited antispyware solution. Beginning with<br />

Windows 8 and continuing in Windows <strong>10</strong>, Windows Defender is a full-featured security solution (and<br />

the successor to Microsoft Security Essentials) capable of detecting all sorts of malicious software.<br />

Because it supports the ELAM feature, described earlier in this chapter, it also prevents rootkits that try<br />

to infect third-party boot drivers. In Windows <strong>10</strong>, Windows Defender also includes network behavior<br />

monitoring.<br />

Windows Defender is designed to be unobtrusive, updating automatically and providing messages<br />

only when required to do so. It is intended primarily for use in unmanaged PCs. In enterprise settings,<br />

you’ll probably want to use an alternative antimalware solution. Microsoft’s System Center Endpoint<br />

Protection, which uses the same engine as Windows Defender and also includes support for ELAM,<br />

is designed for use with enterprise-management tools. A number of third-party solutions that meet<br />

those same criteria are also available.<br />

CHAPTER 5 Security and privacy in Windows <strong>10</strong> 69

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!