Category: Microsoft|Sep 11, 2020 | Author: Admin

Microsoft puts Application Guard for Office into public preview

Share on

The defensive technology walls off untrusted Office documents to prevent attack code carried by malicious files from reaching the operating system or its apps.

Microsoft has launched a public preview of "Microsoft Defender Application Guard for Office," a defensive technology that quarantines untrusted Office documents so that attack code carried by malicious files can't reach the operating system or its applications.

On Monday, a senior cybersecurity engineer with the Redmond, Wash. company explained how Application Guard for Office worked and more importantly, walked customers through its operation – something that existing documentation omitted when the public preview was launched late last month.

"Microsoft Office will open files from potentially unsafe locations in Microsoft Defender Application Guard, a secure container, that is isolated from the device through hardware-based virtualization," John Barbare wrote in a post to a Microsoft blog. "When Microsoft Office opens files in Microsoft Defender Application Guard, a user can then securely read, edit, print, and save the files without having to re-open files outside of the container."

Application Guard has some history. The feature debuted in 2018 and was originally designed for Edge, Microsoft's Windows 10 browser. (We're talking about the original Edge here, the one using Microsoft's own technologies, including the EdgeHTML rendering engine.)

Application Guard creates a disposable instance of both Windows and Edge – very condensed versions of the OS and the browser – in a virtualized environment using Windows' baked-in HyperVisor technology. Every opening between the pseudo machine, the virtual machine, and the real deal is bricked up, barring almost all interaction between the web session and the physical device.

Users can then browse in a more secure environment because it prevents malware from reaching the real operating system and real applications on the real device (as opposed to the virtual instance). When the user is finished, the virtualized Windows+Edge is discarded. Think of it as a very brutal quarantine that erases the patient if he or she gets sick.

Works with Word, Excel, and PowerPoint
Application Guard for Office works in much the same way, but rather than protect Edge, it isolates certain files opened in Word, Excel, or PowerPoint. Documents obtained from the general Internet – intranet domains or domains that have not been marked as trusted – files from potentially unsafe areas and attachments received via Outlook are opened in a virtualized environment, or sandbox, where malicious code can't wreak havoc.

For the public preview, customers must be running Windows 10 Enterprise 2004 or later, the Office Beta Channel build 2008 16.0.13212 or later, this update, and a license for Microsoft 365 E5 (the most comprehensive, most expensive edition) or Microsoft 365 E5 Mobility + Security.

Unlike the much older Protected View, another Office defensive feature, which opens potentially dangerous documents as read-only, files opened in Application Guard can be manipulated. They can be printed, edited, and saved. When saved, however, they remain in the isolation container and when reopened later, again are quarantined in that sandbox.

Word, Excel, or PowerPoint indicates that the current document has been opened within Application Guard with several visual signals, including a pop-up notice in the app's ribbon and a differently-marked icon in the Windows taskbar.

If the user decides to definitely trust the document – which may be the weak link in Application Guard's protection – he or she can move it out of quarantine and deposit it in a local or network folder. (Confirmations are required here, though, so at least the user is prompted to reconsider before pulling the trust trigger.)

IT administrators can control much of this, and more, through Application Guard's configuration settings, which range from copy-paste (allow/not allow) and printing (limit to, say, print-as-PDF only) to making it even more difficult for employees to open a file outside of Application Guard.

Step-by-Step
Barbare's blog post should be valuable to both users and IT admins.

Technically-savvy workers could be pointed to the post for both the background of the Application Guard and the workings of the Office-specific edition now available as a public preview. (This assumes that IT switches on Application Guard via group policy or a PowerShell command.) Armed with the post, they could be let loose without any assistance.

IT administrators preparing their charges for the roll-out of Application Guard could use Barbare's post to construct help desk documents and how-tos to distribute to those who will use the feature, repurposing his screenshots, for instance, or using them as a guide to craft company-specific step-by-step instructions.

(There are several bits of Application Guard documentation on Microsoft's site, but the best is this "Application Guard for Office (public preview) for admins," which was also posted Monday.)

Barbare did not say when Application Guard for Office will wrap up the public preview and shift to general availability for Windows 10 Enterprise and Microsoft 365 E5 users. (Or perhaps others as well; Microsoft began Application Guard as a Windows 10 Enterprise-only feature, but later expanded it to include Windows 10 Pro.)

Microsoft's roadmap, however, currently lists a December 2020 release.

Sponsored Ads:

Comments:


Nebraska Man pleads guilty to $3.5 million cryptojacking scheme

Category: IT|Dec 6, 2024 | Author: Admin

Microsoft says having a TPM is "non-negotiable" for Windows 11

Category: Microsoft|Dec 5, 2024 | Author: Admin

Japan warns of IO-Data zero-day router flaws exploited in attacks

Category: IT|Dec 4, 2024 | Author: Admin

Korea arrests CEO for adding DDoS feature to satellite receivers

Category: IT|Dec 3, 2024 | Author: Admin

Google Chrome’s AI feature lets you quickly check website trustworthiness

Category: Google|Dec 2, 2024 | Author: Admin

Novel phising campaign uses corrupted Word documents to evade security

Category: IT|Dec 1, 2024 | Author: Admin

SpyLoan Android malware on Google play installed 8 million times

Category: Google|Nov 30, 2024 | Author: Admin

New Windows Server 2012 zero-day gets free, unofficial patches

Category: Microsoft|Nov 29, 2024 | Author: Admin

Microsoft re-releases Exchange updates after fixing mail delivery

Category: Microsoft|Nov 28, 2024 | Author: Admin

Cloudflare says it lost 55% of logs pushed to customers for 3.5 hours

Category: IT|Nov 27, 2024 | Author: Admin

Hackers exploit critical bug in Array Networks SSL VPN products

Category: IT|Nov 26, 2024 | Author: Admin

Microsoft 365 outage impacts Exchange Online, Teams, Sharepoint

Category: Microsoft|Nov 25, 2024 | Author: Admin

Meta removes over 2 million accounts pushing pig butchering scams

Category: IT|Nov 24, 2024 | Author: Admin

Hackers abuse Avast anti-rootkit driver to disable defenses

Category: IT|Nov 23, 2024 | Author: Admin

Windows 11 KB5046740 update released with 14 changes and fixes

Category: Microsoft|Nov 22, 2024 | Author: Admin
more