TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Introducing Windows Defender Application Guard for Microsoft Edge

61 pointsby inianover 8 years ago

13 comments

CurtHagenlocherover 8 years ago
Microsoft&#x27;s excellent word salad naming engine strikes again!<p>(Disclosure: Microsoft is my employer.)
评论 #12590974 未加载
评论 #12591097 未加载
dahjelleover 8 years ago
Am I reading correctly: WDAGfME (for lack of a better acronum) is essentially starting a VM with a fresh copy of Windows <i>for every site that it is protecting</i>? Does this happen for every open &amp; protected tab&#x2F;window? What kind of overhead does it have?<p>The idea sounds similar to Qubes OS, with the exception that it&#x27;s transparent to the user and doesn&#x27;t have to be configured by the end-user.<p>I presume this kills any of the offline-storage approaches?
评论 #12591192 未加载
评论 #12591452 未加载
评论 #12591146 未加载
chrismorganover 8 years ago
Fewest vulnerabilities: I suspect that Chrome and Firefox being open source is a factor here. Thus it seems possible to me that they actually have <i>fewer</i> vulnerabilities than Edge—Edge’s just haven’t been found yet.<p>This is pure speculation on my part; I have no evidence nor any investigation, deep or otherwise.
评论 #12591643 未加载
评论 #12592586 未加载
评论 #12591784 未加载
评论 #12593065 未加载
transputeover 8 years ago
Two related projects, both with copy-on-write &quot;forks&quot; of disk storage and OS memory, creating disposable VMs with hardware-enforced memory isolation.<p>Cappsule (open-source for Linux), <a href="https:&#x2F;&#x2F;cappsule.github.io" rel="nofollow">https:&#x2F;&#x2F;cappsule.github.io</a><p><pre><code> virtualize any software on the fly (e.g. web browser, office suite, media player) into lightweight VMs called cappsules. Attacks are confined inside cappsules and therefore don’t have any impact on the host OS. Applications don’t need to be repackaged, and their usage remain the same for the end user: it’s completely transparent. Moreover, the OS doesn’t need to be reinstalled nor modified. </code></pre> Bromium (proprietary for Windows, based on open-source Xen), <a href="https:&#x2F;&#x2F;blogs.bromium.com&#x2F;2016&#x2F;09&#x2F;26&#x2F;introducing-virtualization-based-security-next&#x2F;" rel="nofollow">https:&#x2F;&#x2F;blogs.bromium.com&#x2F;2016&#x2F;09&#x2F;26&#x2F;introducing-virtualizat...</a><p><pre><code> Bromium and Microsoft partnered in 2015 .. extends VBS – isolating the execution of targeted applications such as the browser, documents, executables, downloads, attachments and media files .. to all vulnerable applications on all Windows 7, 8 and 10 endpoints</code></pre>
评论 #12597106 未加载
jasonkostempskiover 8 years ago
&quot;We’re determined to make Microsoft Edge the safest and most secure browser.&quot;<p>Then open source the whole thing, not just little parts of it. It has the lowest number of vulnerabilities in the National Vulnerability Database because it has the least number of eyes able to look for them.
评论 #12591127 未加载
评论 #12591043 未加载
评论 #12591701 未加载
bborehamover 8 years ago
I sense this is the same feature that is used to implement Docker containers. Possibly browser isolation was the primary driver and it got co-opted for the server.
nickpsecurityover 8 years ago
The one good thing about this is that they&#x27;re relying on Hyper-V. It <i>may</i> end up much more secure than solutions like Xen simply because Microsoft is investing in so much verification. That started with Verisoft project where they started using their VCC tool to verify the C-level source against specifications. They later extended the tool for assembly. The first report I saw indicated 20% was verified against its spec. So, it should get more robust overtime.<p>People interested in Microsoft Research&#x27;s work on secure browsers should look at Gazelle browser and Xax plugin architecture:<p><a href="https:&#x2F;&#x2F;www.microsoft.com&#x2F;en-us&#x2F;research&#x2F;wp-content&#x2F;uploads&#x2F;2016&#x2F;02&#x2F;gazelle.pdf" rel="nofollow">https:&#x2F;&#x2F;www.microsoft.com&#x2F;en-us&#x2F;research&#x2F;wp-content&#x2F;uploads&#x2F;...</a><p><a href="https:&#x2F;&#x2F;www.microsoft.com&#x2F;en-us&#x2F;research&#x2F;wp-content&#x2F;uploads&#x2F;2016&#x2F;02&#x2F;xax-osdi08.pdf" rel="nofollow">https:&#x2F;&#x2F;www.microsoft.com&#x2F;en-us&#x2F;research&#x2F;wp-content&#x2F;uploads&#x2F;...</a>
kenrick95over 8 years ago
It&#x27;s using Hyper-V, so does that mean this only applies to Pro and Enterprise edition of Windows 10?
评论 #12591153 未加载
评论 #12591158 未加载
评论 #12591163 未加载
mtgxover 8 years ago
Why is this an enterprise-only feature? Do regular user not deserve the same level of security for their browsers? Will this tech even be available to non-Microsoft apps in the future?
评论 #12591836 未加载
评论 #12592032 未加载
behmover 8 years ago
So just to be clear, this is basically another sandbox, which starts a private browsing session implicitly for each site and disables the entire password manager?
webwanderingsover 8 years ago
&gt; We’re determined to make Microsoft Edge the safest and most secure browser.<p>You should enable Ad&#x2F;tracker-block by default and across the board.
lawnchair_larryover 8 years ago
Ugh, they should know better than to use CVE as a metric. Should we assume that Opera is the most secure browser then?
zmanianover 8 years ago
Why is this enterprise only?