Skip to content

Commit 05a3c12

Browse files
Merge pull request #2113 from MicrosoftDocs/main
Publish main to live, 12/05/24, 3:30 PM PT
2 parents 51907ca + ce0748b commit 05a3c12

File tree

8 files changed

+99
-32
lines changed

8 files changed

+99
-32
lines changed
30.9 KB
Loading
32.1 KB
Loading
Lines changed: 50 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,50 @@
1+
---
2+
# Required metadata
3+
# For more information, see https://review.learn.microsoft.com/en-us/help/platform/learn-editor-add-metadata?branch=main
4+
# For valid values of ms.service, ms.prod, and ms.topic, see https://review.learn.microsoft.com/en-us/help/platform/metadata-taxonomies?branch=main
5+
6+
title: 'Security Assessment: Prevent Certificate Enrollment with arbitrary Application Policies (ESC15)'
7+
description: 'This recommendation directly addresses the recently published CVE-2024-49019, which highlights security risks associated with vulnerable AD CS configurations. '
8+
author: LiorShapiraa # GitHub alias
9+
ms.author: liorshapira
10+
ms.service: microsoft-defender-for-identity
11+
ms.topic: article
12+
ms.date: 12/04/2024
13+
---
14+
15+
# Security assessment: Prevent Certificate Enrollment with arbitrary Application Policies (ESC15)
16+
17+
This article describes Microsoft Defender for Identity's Prevent Certificate Enrollment with arbitrary Application Policies (ESC15) security posture assessment report.
18+
19+
## Why is it important to review the Certificate templates?
20+
21+
This recommendation directly addresses the recently published [CVE-2024-49019](https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2024-49019)__,__ which highlights security risks associated with vulnerable AD CS configurations. This security posture assessment lists all vulnerable certificate templates found in customer environments due to unpatched AD CS servers.
22+
23+
Certificate templates that are vulnerable to [CVE-2024-49019](https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2024-49019) allow an attacker to issue a certificate with arbitrary Application Policies and Subject Alternative Name. The certificate can be used to escalate privileges, possibly resulting with full domain compromise. 
24+
25+
These certificate templates expose organizations to significant risks, as they enable attackers to issue certificates with arbitrary Application Policies and Subject Alternative Names (SANs). Such certificates can be exploited to escalate privileges and potentially compromise the entire domain. In particular, these vulnerabilities allow non-privileged users to issue certificates that can authenticate as high-privileged accounts, posing a severe security threat.
26+
27+
## Prerequisites
28+
29+
This assessment is available only to customers who installed a sensor on an AD CS server. For more information, see [New sensor type for Active Directory Certificate Services (AD CS)](/defender-for-identity/whats-new).
30+
31+
## **How do I use this security assessment to improve my organizational security posture?**
32+
33+
1. Review the recommended action at [Prevent Certificate Enrollment with arbitrary Application Policies (ESC15)](https://security.microsoft.com/securescore?viewid=actions).
34+
35+
2. **Identify the vulnerable certificate templates:**
36+
- Remove enrollment permission for unprivileged users.
37+
- Disable the **“Supply in the request”** option.
38+
39+
3. Identify the AD CS servers which are vulnerable to CVE-2024-49019 and apply the relevant patch.
40+
41+
For example:
42+
43+
:::image type="content" source="media/prevent-certificate-enrollment-esc15/image.png" alt-text="Screenshot of servers." lightbox="media/prevent-certificate-enrollment-esc15/image.png":::
44+
45+
## Next steps
46+
47+
- [Learn more about Microsoft Secure Score](/microsoft-365/security/defender/microsoft-secure-score)
48+
49+
- [Check out the Defender for Identity forum!](https://aka.ms/MDIcommunity)
50+

ATPDocs/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -216,6 +216,8 @@ items:
216216
href: security-assessment-edit-misconfigured-enrollment-agent.md
217217
- name: Overly permissive certificate template with privileged EKU (ESC2)
218218
href: security-assessment-edit-overly-permissive-template.md
219+
- name: Prevent Certificate Enrollment with arbitrary Application Policies (ESC15)
220+
href: prevent-certificate-enrollment-esc15.md
219221
- name: Prevent requests for certificates valid for arbitrary users (ESC1)
220222
href: security-assessment-prevent-users-request-certificate.md
221223
- name: Remove local admins on identity assets

defender-endpoint/amsi-on-mdav.md

Lines changed: 30 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -1,38 +1,44 @@
11
---
22
title: "Anti-malware Scan Interface (AMSI) integration with Microsoft Defender Antivirus"
33
description: Describes fileless malware and how Microsoft Defender Antivirus uses AMSI to protect against hidden threats.
4-
author: YongRhee-MSFT
5-
ms.author: yongrhee
4+
author: denisebmsft
5+
ms.author: deniseb
66
manager: deniseb
7-
ms.date: 02/27/2024
7+
ms.reviewer: yongrhee
8+
ms.date: 12/05/2024
89
ms.topic: conceptual
910
ms.service: defender-endpoint
1011
ms.subservice: ngp
11-
ms.custom: QuickDraft
12+
ms.custom:
13+
- QuickDraft
14+
- partner-contribution
1215
search.appverid: MET150
1316
f1.keywords:
14-
audience:
17+
audience: ITPro
18+
ms.collection:
19+
- m365-security
20+
- tier2
1521
ai-usage: ai-assisted
1622
---
1723

1824
# Anti-malware Scan Interface (AMSI) integration with Microsoft Defender Antivirus
1925

20-
__Applies to:__
26+
**Applies to**:
2127

2228
- Microsoft Defender XDR
2329
- Microsoft Defender Antivirus
2430
- Microsoft Defender for Endpoint P1 & P2
2531
- Microsoft Defender for Business
2632
- Microsoft Defender for Individuals
2733

28-
__Platforms:__
34+
**Platforms**:
2935

3036
- Windows 10 and newer
3137
- Windows Server 2016 and newer
3238

3339
Microsoft Defender for Endpoint utilizes the anti-malware Scan Interface (AMSI) to enhance protection against fileless malware, dynamic script-based attacks, and other nontraditional cyber threats. This article describes the benefits of AMSI integration, the types of scripting languages it supports, and how to enable AMSI for improved security.
3440

35-
## What is Fileless malware?
41+
## What is fileless malware?
3642

3743
Fileless malware plays a critical role in modern cyberattacks, using stealthy techniques to avoid detection. Several major ransomware outbreaks used fileless methods as part of their kill chains.
3844

@@ -42,22 +48,26 @@ Because memory is volatile, and fileless malware doesn't place files on disk, es
4248

4349
Attackers use several fileless techniques that can make malware implants stealthy and evasive. These techniques include:
4450

45-
- **Reflective DLL injection** Reflective DLL injection involves the manual loading of malicious DLLs into a process' memory without the need for said DLLs to be on disk. The malicious DLL can be hosted on a remote attacker-controlled machine and delivered through a staged network channel (for example, Transport Layer Security (TLS) protocol), or embedded in obfuscated form inside infection vectors like macros and scripts. This results in the evasion of the OS mechanism that monitors and keeps track of loading executable modules. An example of malware that uses Reflective DLL injection is HackTool:Win32/Mikatz!dha.
51+
- **Reflective DLL injection**: Reflective DLL injection involves the manual loading of malicious DLLs into a process memory without the need for said DLLs to be on disk. The malicious DLL can be hosted on a remote attacker-controlled machine and delivered through a staged network channel (for example, Transport Layer Security (TLS) protocol), or embedded in obfuscated form inside infection vectors, like macros and scripts. This configuration results in the evasion of the OS mechanism that monitors and keeps track of loading executable modules. An example of malware that uses Reflective DLL injection is `HackTool:Win32/Mikatz!dha`.
4652

47-
- **Memory exploits** Adversaries use fileless memory exploits to run arbitrary code remotely on victim machines. For example, the UIWIX threat uses the EternalBlue exploit, which was used by both Petya and WannaCry, to install the DoublePulsar backdoor, which lives entirely in the kernel's memory (SMB Dispatch Table). Unlike Petya and Wannacry, UIWIX doesn't drop any files on disk.
53+
- **Memory exploits**: Adversaries use fileless memory exploits to run arbitrary code remotely on victim machines. For example, the UIWIX threat uses the EternalBlue exploit, which was used by both Petya and WannaCry, to install the DoublePulsar backdoor, and lives entirely in the kernel's memory (SMB Dispatch Table). Unlike Petya and Wannacry, UIWIX doesn't drop any files on disk.
4854

49-
- **Script-based techniques** Scripting languages provide powerful means for delivering memory-only executable payloads. Script files can embed encoded shell codes or binaries that they can decrypt on the fly at run time and execute via .NET objects or directly with APIs without requiring them to be written to disk. The scripts themselves can be hidden in the registry, read from network streams, or run manually in the command-line by an attacker, without ever touching the disk.
55+
- **Script-based techniques**: Scripting languages provide powerful means for delivering memory-only executable payloads. Script files can embed encoded shell codes or binaries that they can decrypt on the fly at run time and execute via .NET objects or directly with APIs without requiring them to be written to disk. The scripts themselves can be hidden in the registry, read from network streams, or run manually in the command-line by an attacker, without ever touching the disk.
5056

51-
> [!NOTE]
52-
> Do not disable PowerShell as a means to block fileless malware. PowerShell is a powerful and secure management tool and is important for many system and IT functions. Attackers use malicious PowerShell scripts as post-exploitation technique that can only take place after an initial compromise has already occurred. Its misuse is a symptom of an attack that begins with other malicious actions like software exploitation, social engineering, or credential theft. The key is to prevent an attacker from getting into the position where they can misuse PowerShell.
57+
> [!NOTE]
58+
> Do not disable PowerShell as a means to block fileless malware. PowerShell is a powerful and secure management tool and is important for many system and IT functions. Attackers use malicious PowerShell scripts as post-exploitation technique that can only take place after an initial compromise has already occurred. Its misuse is a symptom of an attack that begins with other malicious actions like software exploitation, social engineering, or credential theft. The key is to prevent an attacker from getting into the position where they can misuse PowerShell.
5359
54-
- **WMI persistence** Some attackers use the Windows Management Instrumentation (WMI) repository to store malicious scripts that are then invoked periodically using WMI bindings.
60+
> [!TIP]
61+
> Reducing the number of unsigned Powershell scripts in your environment helps with increasing your security posture.
62+
> Here are instructions on how you could add signing to the Powershell scripts used in your environment
63+
> [Hey, Scripting Guy! How Can I Sign Windows PowerShell Scripts with an Enterprise Windows PKI? (Part 2 of 2) | Scripting Blog](https://devblogs.microsoft.com/scripting/hey-scripting-guy-how-can-i-sign-windows-powershell-scripts-with-an-enterprise-windows-pki-part-2-of-2/)
5564
65+
- **WMI persistence**: Some attackers use the Windows Management Instrumentation (WMI) repository to store malicious scripts that are then invoked periodically using WMI bindings.
5666
Microsoft Defender Antivirus blocks most malware using generic, heuristic, and behavior-based detections, as well as local and cloud-based machine learning models. Microsoft Defender Antivirus protects against fileless malware through these capabilities:
5767

58-
- Detecting script-based techniques by using AMSI, which provides the capability to inspect PowerShell and other script types, even with multiple layers of obfuscation
59-
- Detecting and remediating WMI persistence techniques by scanning the WMI repository, both periodically and whenever anomalous behavior is observed
60-
- Detecting reflective DLL injection through enhanced memory scanning techniques and behavioral monitoring
68+
- Detecting script-based techniques by using AMSI, which provides the capability to inspect PowerShell and other script types, even with multiple layers of obfuscation
69+
- Detecting and remediating WMI persistence techniques by scanning the WMI repository, both periodically and whenever anomalous behavior is observed
70+
- Detecting reflective DLL injection through enhanced memory scanning techniques and behavioral monitoring
6171

6272
## Why AMSI?
6373

@@ -72,15 +82,15 @@ AMSI provides a deeper level of inspection for malicious software that employs o
7282
- .NET Framework 4.8 or newer (scanning of all assemblies)
7383
- Windows Management Instrumentation (WMI)
7484

75-
If you use Microsoft Office 365, AMSI also supports JavaScript, VBA, and XLM.
85+
If you use Microsoft 365 Apps, AMSI also supports JavaScript, VBA, and XLM.
7686

7787
AMSI doesn't currently support Python or Perl.
7888

7989
### Enabling AMSI
8090

81-
To enable AMSI, you need to enable Script scanning. See [Configure scanning options for Microsoft Defender Antivirus](configure-advanced-scan-types-microsoft-defender-antivirus.md)
91+
To enable AMSI, you need to enable script scanning. See [Configure scanning options for Microsoft Defender Antivirus](configure-advanced-scan-types-microsoft-defender-antivirus.md).
8292

83-
Also see [Defender Policy CSP - Windows Client Management](/windows/client-management/mdm/policy-csp-defender)
93+
Also see [Defender Policy CSP - Windows Client Management](/windows/client-management/mdm/policy-csp-defender).
8494

8595
### AMSI resources
8696

defender-endpoint/hardware-acceleration-and-mdav.md

Lines changed: 10 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -7,13 +7,16 @@ manager: deniseb
77
ms.reviewer: yongrhee
88
ms.service: defender-endpoint
99
ms.topic: overview
10-
ms.date: 09/18/2024
10+
ms.date: 12/05/2024
1111
ms.subservice: ngp
12+
ms.collection:
13+
- m365-security
14+
- tier2
15+
audience: ITPro
1216
ms.localizationpriority: medium
1317
ms.custom: partner-contribution
1418
search.appverid: MET150
1519
f1 keywords: NOCSH
16-
audience: ITPro
1720
---
1821

1922
# Hardware acceleration and Microsoft Defender Antivirus
@@ -40,16 +43,16 @@ This table shows the Intel TDT technologies Microsoft collaborated with Intel on
4043

4144
|Available since |Intel TDT technology | Intel Threat Detection Technology (TDT) available on|
4245
|:---|:---|:---|
43-
|2018|Intel TDT – Accelerated Memory Scanning (AMS)|Intel integrated graphic 6th Gen Core (circa 2015) or newer family of processors, running on laptops, tablets, and desktop systems.|
44-
|2021|Intel TDT - Cryptojacking detector| Intel 6th Gen Core (circa 2015) or newer family of processors, running on laptops, tablets, and desktop systems.|
45-
|2022|Intel TDT - Ransomware detector| Intel 8th Gen Core or newer family of processors.|
46+
|2018|Intel TDT – Accelerated Memory Scanning (AMS)|Intel integrated graphic sixth Gen Core (circa 2015) or newer family of processors, running on laptops, tablets, and desktop systems.|
47+
|2021|Intel TDT - Cryptojacking detector| Intel sixth Gen Core (circa 2015) or newer family of processors, running on laptops, tablets, and desktop systems.|
48+
|2022|Intel TDT - Ransomware detector| Intel eighth Gen Core or newer family of processors.|
4649

4750
**Intel Threat Detection Technology (TDT) - Accelerated Memory Scanning (AMS):** Introduced extra memory scanning capabilities to detect fileless attacks that are expensive on the Central Processing Unit (CPU), and then offload them to the integrated Graphics Processor Unit (integrated GPU). Two benefits are:
4851

4952
- lower CPU consumption
5053
- A reduction of System-on-a-chip (SoC) power consumption leading to longer battery life on laptops and tablets
5154

52-
**Intel Threat Detection Technology (TDT) - Cryptojacking:** Enhanced detection by leveraging Intel's Central Processing Unit (CPU) performance monitoring unit (PMU) and offloading to the integrated Graphics Processor Unit (integrated GPU) to detect the malware code execution (fingerprint) of repeated mathematical operations at runtime. The signals are processed by a layer of machine learning with minimal overhead.
55+
**Intel Threat Detection Technology (TDT) - Cryptojacking:** Enhanced detection by using Intel's Central Processing Unit (CPU) performance monitoring unit (PMU) and offloading to the integrated Graphics Processor Unit (integrated GPU) to detect the malware code execution (fingerprint) of repeated mathematical operations at runtime. Machine learning processes signals with minimal overhead.
5356

5457
### How do you enable Intel TDT AMS or Cryptojacking integration?
5558

@@ -61,7 +64,7 @@ The regular Microsoft Defender Antivirus Event ID **1116**.
6164

6265
### What type of attacks does it help with?
6366

64-
- We use the Intel TDT - Cryptojacking detector to thwart various cryptojacking mallards. The following Coinminer campaigns were successfully detected and blocked using the TDT Cryptojacking detector: [YouTube Pirated Software Videos Deliver Triple Threat: Vidar Stealer, LaPlasa Clipper, XMRig Miner](https://www.fortinet.com/blog/threat-research/youtube-pirated-software-videos-deliver-triple-threat-vidar-stealer-laplas-clipper-xmrig-miner)
67+
- We use the Intel TDT - Cryptojacking detector to thwart various cryptojacking malware. The following Coinminer campaigns were successfully detected and blocked using the TDT Cryptojacking detector: [YouTube Pirated Software Videos Deliver Triple Threat: Vidar Stealer, LaPlasa Clipper, XMRig Miner](https://www.fortinet.com/blog/threat-research/youtube-pirated-software-videos-deliver-triple-threat-vidar-stealer-laplas-clipper-xmrig-miner)
6568

6669
- We use the Intel TDT detector to identify instances of CryptoJacking malware abusing Windows binaries (lolbins), and then employ Defender behavior monitoring to prevent and block such activities effectively. For more information, see [Hardware-based threat defense against increasingly complex cryptojackers](https://www.microsoft.com/security/blog/2022/08/18/hardware-based-threat-defense-against-increasingly-complex-cryptojackers/).
6770

defender-vulnerability-management/tvm-block-vuln-apps.md

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.collection:
1313
- Tier1
1414
ms.topic: conceptual
1515
search.appverid: met150
16-
ms.date: 01/18/2024
16+
ms.date: 12/05/2024
1717
---
1818

1919
# Block vulnerable applications
@@ -80,8 +80,10 @@ For both actions, you can customize the message the users see. For example, you
8080

8181
8. Review the selections you made and **Submit request**. On the final page, you can choose to go directly to the remediation page to view the progress of remediation activities and see the list of blocked applications.
8282

83-
> [!IMPORTANT]
84-
> Based on the available data, the block action will take effect on endpoints in the organization that have Microsoft Defender Antivirus. Microsoft Defender for Endpoint will make a best attempt effort of blocking the applicable vulnerable application or version from running.
83+
> [!NOTE]
84+
> Beginning December 3, 2024, expect to see a reduction in the number of file indicators that are created by new application block policies. To reduce your current indicator usage, unblock any blocked applications, and create new block policies.
85+
>
86+
> Based on the available data, the block actions take effect on endpoints that have Microsoft Defender Antivirus. Microsoft Defender for Endpoint makes a best-attempt effort of blocking applicable vulnerable applications or versions from running.
8587
8688
If additional vulnerabilities are found on a different version of an application, you get a new security recommendation, asking you to update the application, and you can choose to also block this different version.
8789

0 commit comments

Comments
 (0)