Make it tight, protect with might, and try not to hurt anyone. Michael Johnson, MMPC



Similar documents
Meng-Chow Kang, CISSP, CISA (ISC) 2 Asia Advisory Board. Chief Security Advisor Microsoft Greater China Region

BCS IT User Syllabus IT Security for Users Level 2. Version 1.0

Sophos Endpoint Security and Control Help. Product version: 11

STANDARD ON CONTROLS AGAINST MALICIOUS CODE

How to easily clean an infected computer (Malware Removal Guide)

Technical Product Overview. Employing cloud-based technologies to address security risks to endpoint systems

Sophos Endpoint Security and Control Help

Problematic, Unloved and Argumentative: What is a potentially unwanted application (PUA)?

Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them

Internet tools and techniques at this level will be defined as advanced because:

Avira Server Security. HowTo

ESET NOD32 Antivirus. Table of contents

Spyware. Michael Glenn Technology Management 2004 Qwest Communications International Inc.

McAfee Labs Combating Fake Alert infections. - Amith Prakash, Global Threat Response

Trend Micro OfficeScan Best Practice Guide for Malware

Installation Guide. NOD32 Typical. Proactive protection against Viruses, Spyware, Worms, Trojans, Rootkits, Adware and Phishing

Sophos for Microsoft SharePoint startup guide

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:

Sophos Anti-Virus for Windows, version 7 user manual. For Windows 2000 and later

Guideline for Prevention of Spyware and other Potentially Unwanted Software

Sophos for Microsoft SharePoint Help

Frequent Smart Updates: Used to detect and guard against new infections as well as adding enhancements to Spyware Doctor.

Introduction. PCI DSS Overview

When you listen to the news, you hear about many different forms of computer infection(s). The most common are:

Section 12 MUST BE COMPLETED BY: 4/22

Sophos for Microsoft SharePoint Help. Product version: 2.0

HoneyBOT User Guide A Windows based honeypot solution

AVG File Server. User Manual. Document revision ( )

Malware, Spyware, Adware, Viruses. Gracie White, Scott Black Information Technology Services

DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Threat and Vulnerability Management V1.0 April 21, 2014

User Manual. HitmanPro.Kickstart User Manual Page 1

Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012

Symantec Mail Security for Domino

What's the difference between spyware and a virus? What is Scareware?

Contents. McAfee Internet Security 3

How to Use Windows Firewall With User Account Control (UAC)

FAKE ANTIVIRUS MALWARE This information has come from - a very useful resource if you are having computer issues.

Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines

ESET NOD32 ANTIVIRUS 9

Microsoft Security Essentials Installation and Configuration Guide

ESET NOD32 ANTIVIRUS 8

Client Guide for Symantec Endpoint Protection and Symantec Network Access Control

N-CAP Users Guide. Everything You Need to Know About Using the Internet! How Worms Spread via (and How to Avoid That)

K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS. v.109

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security

ESET NOD32 Antivirus 4

Cisco IPS Tuning Overview

KUB Website Troubleshooting

System Administrator Guide

ESET CYBER SECURITY PRO for Mac Quick Start Guide. Click here to download the most recent version of this document

Phone Fax

Malware Trend Report, Q April May June

Medical Networks and Operating Systems

Integrated Protection for Systems. João Batista Territory Manager

GFI Cloud User Guide A guide to administer GFI Cloud and its services

MCTS Guide to Microsoft Windows 7. Chapter 7 Windows 7 Security Features

Virtual Desktops Security Test Report

Remove ANY TOOLBAR from Internet Explorer, Firefox and Chrome

Best Practice Configurations for OfficeScan (OSCE) 10.6

Faronics Anti-Virus User Guide

AVG File Server User Manual. Document revision (11/13/2012)

ESET Security Solutions for Your Business

How To Audit The Mint'S Information Technology

FIREWALL POLICY November 2006 TNS POL - 008

Welcome to Part 2 of the online course, Spyware and Adware What s in Your Computer?

Spyware Doctor Enterprise Technical Data Sheet

Module 5: Analytical Writing

Desktop and Laptop Security Policy

AVG File Server User Manual. Document revision (8/19/2011)

Client Guide for Symantec Endpoint Protection and Symantec Network Access Control

SERVICES BRONZE SILVER GOLD PLATINUM. On-Site emergency response time 3 Hours 3 Hours 1-2 Hours 1 Hour or Less

Sophos Enterprise Console Help

WEBTHREATS. Constantly Evolving Web Threats Require Revolutionary Security. Securing Your Web World

COMPUTER-INTERNET SECURITY. How am I vulnerable?

Computer Viruses: How to Avoid Infection

Get Started Guide - PC Tools Internet Security

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

Maintaining, Updating, and Protecting Windows 7

Managed Antivirus Quick Start Guide

PATCH MANAGEMENT POLICY PATCH MANAGEMENT POLICY. Page 1 of 5

Controlling Risk, Conserving Bandwidth, and Monitoring Productivity with Websense Web Security and Websense Content Gateway

(12) United States Patent

Net Protector Admin Console

SIMATIC. Process Control System PCS 7 Configuration Symantec Endpoint Protection (V12.1) Preface 1. Virus scanner administration 2.

Security A to Z the most important terms

McAfee Total Protection Reduce the Complexity of Managing Security

Kaspersky Security. for Virtualization 1.1 and Trend Micro Deep. Security 8.0 virtual environment detection rate and performance testing by AV-Test

PTSv2 in pills: The Best First for Beginners who want to become Penetration Testers. Self-paced, online, flexible access

Transcription:

Make it tight, protect with might, and try not to hurt anyone Michael Johnson, MMPC

Topic In 2012 the MMPC decided to change our approach to potentially unwanted software (PUS) This presentation talks about how we approached those changes and the changes that we made

Reasons for change Our mission: Protect our customers without interfering with their Windows experience Internal: Researchers were working on PUS cases

Terms Potentially unwanted software (PUS) behavior [that] may impact the user's privacy, security, or computing experience, (MMPC Glossary, 2013) Categorically speaking: Adware, BrowserModifier, Dialer, MonitoringTool, Program, RemoteAccess, SettingsModifier, SoftwareBundler, Spyware, and Tool Malicious software Backdoor, Constructor, Exploit, HackTool, Joke, PWS, Rogue, Trojan, TrojanClicker, TrojanDownloader, TrojanDropper, TrojanProxy, TrojanSpy, VirTool, Virus and Worm

Theory of change Realize the need for change Define what we want to achieve Understand what we currently do Assess what we do against our goals Assess the risks of making changes Document and communicate Implement the changes Measure the results Define process for making future changes

Realize the need for change Our detection criteria was not inline with our mission to protect our customers without interfering with their Windows experience We were warning our customers of programs that posed no threat alone but: May indicate a security issue May have been used my malware on this or some other machine The PUS research process was not clear.

Define what we want to achieve Detect only those programs that pose a security risk or interfere with the customer s Windows experience Make the PUS research process more accessible to all of the researchers

Understand what we currently do Documenting what you do, if you have not already For us, we already had documents outlining the behaviours that we detected and what their severity was We had to understand: How the researchers used the current documentation How they did their research

Assess what we do against our goals Compare the list of PUS behaviours that we detected against our goal of protection without interference We had to decide if the behaviour was a threat to the customer or only there to inform the customer of a program s presence We identified a few more behaviours that we added to our list of criteria

Assess the risks of making changes We had to answer questions that asked if these changes pose a: Risk to Microsoft Risk to our customers Some of these questions were answered by talking to the legal department and they helped us to understand the risk of our changes

Document and communicate We documented everything We prepared a PUS course, a series of documents and had trainings Communicate internally and externally Ensure one specialized PUS researcher in each of our labs to answer local questions and communicate problems and changes Externally, we have updated our objective criteria page: http://www.microsoft.com/security/portal/mmpc/shared/objectivecriteria.aspx

Implement the changes Comparing all of our past detections against our revised criteria Rename or remove detection as appropriate It was done in stages because it was too big a job to do all at once

Measure the results Internal goals: Measuring the number of researchers that add PUS detections Researcher satisfaction Measure the consistency of PUS conclusions External: Measuring what our customers think of our new approach is more difficult

Define process for making future changes You may not get it right the first time It will be easier to make future changes if you have a formal process in place We have used our process to refine some of our criteria and it was much more streamlined with a formal process in place

What did we change in PUS Behaviour changes Category changes Remediation changes

PUS severity levels - explanation PUS detections have associated severity levels and default remediation actions with them Can be applied by category, family, or by variant Can be assigned by the researcher when they add detection These severity levels determine how the user is notified and can be used to control what the default actions for remediation are Severities can be Low, Medium, High or Severe Default actions can be to Notify the user, Quarantine or Delete

PUS behaviour changes To achieve our mission of protection without interference : Removed all behaviours that were at severity levels Moderate or Low, except those related to Adware Reclassified remaining behaviours into categories that were more verbose

Redistributed PUS categories PUS categories contained only Moderate and Low behaviours: Tool Program RemoteAccess

Redistributed PUS examples Behaviours no longer detected: Tool:Win32/Miniftp Configurable FTP server Program:Win32/TinyProxy Stand alone configurable proxy RemoteAccess:Win32/RealVNC Commercially written remote access tool Detection signatures removed

Redistributed PUS examples Behaviours detected as different category: Program:Win32/FakeAdpro Displays false malware reports. Moved to Rogue category. RemoteAccess:Win32/SubSeven Hacker-written backdoor. Moved to Backdoor category. Program:Win32/RegCure System optimization tool that makes misleading claims about system files. Moved to Misleading category. Detection signatures moved

Active PUS categories Adware BrowserModifier Misleading (new) MonitoringTool SoftwareBundler

PUS remediation changes Previously: Behaviours determined severity level Now: Categories determine severity level As a result: Only Adware and SoftwareBundler prompt the customer

PUS remediation changes - example Old method: Exhibits behaviour 1 with severity Low that falls under category Program Exhibits behaviour 2 with severity Moderate that falls under category BrowserModifier Would be classified as a BrowserModifier with severity Moderate

PUS remediation changes - example New method: Not exhibiting any detectable behaviours detected Would be classified as a Clean

PUS remediation changes - example Old method: Exhibits behaviour 3 with severity High and falls under category BrowserModifier Exhibits behaviour 4 with severity Low and falls under category Program Exhibits behaviour 5 with severity Low and falls under category BrowserModifier Would be classified as a BrowserModifier with severity High

PUS remediation changes - example New method: Exhibits behaviour 3 with that falls under category BrowserModifier Would be classified as a BrowserModifier with severity High Easier

Points to remember about change Making changes: Define what you want to achieve before you start Understand what you do now Documentation is essential Changes made: MMPC removed Low and Moderate PUS behaviours except for Adware category Realigned signatures for Tool, Program and RemoteAccess