[Japan Tech summit 2017] SEC 003

M
Microsoft Tech Summit 2017Microsoft Tech Summit 2017
Microsoft Tech Summit 2017本情報の内容(添付文書、リンク先などを含む)は、Microsoft Tech Summit 2017 開催日(2017 年 11 月 8日 - 9 日)時点のものであり、予告なく変更される場合があります。
[Japan Tech summit 2017] SEC 003
Ransomware: last 22 months
6,700
65,400
1 2
ランサムウェア検出台数 (国内)
X9
出典:トレンドマイクロ 2016年 年間セキュリティラウンドアップ
[Japan Tech summit 2017] SEC 003
[Japan Tech summit 2017] SEC 003
[Japan Tech summit 2017] SEC 003
[Japan Tech summit 2017] SEC 003
App Locker
Windows
Defender AV
Bit Locker
TPM
Windows Hello
LAPS
PAW
Credential
Guard
Device Guard
EMET
UAC
Windows
Firewall
Smart Screen
Defender ATP
Application
Guard
Exploit Guard
GPO
Audit Policy
LSA
Protection
Windows
Update
Secure Boot
IPSEC
Windows
Information Protection
Thin Client
AutoVPN
OneDrive
MDM
DEP
[Japan Tech summit 2017] SEC 003
[Japan Tech summit 2017] SEC 003
[Japan Tech summit 2017] SEC 003
[Japan Tech summit 2017] SEC 003
[Japan Tech summit 2017] SEC 003
[Japan Tech summit 2017] SEC 003
[Japan Tech summit 2017] SEC 003
O F F
M A C H I N E
O N
M A C H I N E
P R E - B R E A C H
Windows Defender
Antivirus
Behavioral Engine
(Behavior Analysis)
▪ Process tree
visualizations
▪ Artifact searching
capabilities
▪ Machine Isolation
and quarantine
Windows
Defender ATP
(Advanced Threat
Protection)
▪ Enhanced behavioral
and machine
learning detection
▪ Memory scanning
capabilities
O365 (Email)
▪ Reducing email
attack vector
▪ Advanced sandbox
detonation
Edge (Browser)
▪ Browser hardening
▪ Reduce script based
attack surface
▪ App container
hardening
▪ Reputation based
blocking for
downloads
▪ SmartScreen
P O S T - B R E A C H
End to End Protection
O F F
M A C H I N E
Windows Defender
Antivirus
(AV)
▪ Improved ML and
heuristic protection
▪ Instantly protected
with the cloud
▪ Enhanced Exploit Kit
Detections
One Drive
(Cloud Storage)
▪ Reliable versioned
file storage in the
cloud
▪ Point in time file
recovery
App Guard
(Virtualized Security)
▪ App isolation
Locked Down
Devices
▪ Windows 10S
▪ Device Guard
▪ Credential Guard
▪ VSM
Windows
Defender Exploit
Guard
(HIPS)
Attack Surface
Reduction
• Set of rules to
customize the attack
surface
Controlled Folder
Access
• Protecting data
against access by
untrusted process
Exploit Protection
• Mitigations against
memory based
exploits
Network
Protection
• Blocking outbound
traffic to low rep
sources
Application Control
(Whitelisting)
▪ Whitelisting
application
Attack Surface Reduction
Exploit Protection
脅威へのアクセス制限
Network Protection
Controlled Folder Access
WINDOWS
DEVICES
APPS
ANALYZE
ATTACKS
BUILD
MITIGATIONS
Data driven
Software defense
EVALUATE
MITIGATIONS
Exploit Protection
Exploit Protection の軽減策
[Japan Tech summit 2017] SEC 003
 OS レベルでの
ブロックを実現
Office rules
Email rule
Script rules
1.
2.
[Japan Tech summit 2017] SEC 003
[Japan Tech summit 2017] SEC 003
[Japan Tech summit 2017] SEC 003
•
•
 •
[Japan Tech summit 2017] SEC 003
[Japan Tech summit 2017] SEC 003
[Japan Tech summit 2017] SEC 003
■
 https://docs.microsoft.com/en-us/windows/device-security/windows-security-baselines
■ Security baseline for Windows 10 “Fall Creators Update” (v1709) – FINAL
 https://blogs.technet.microsoft.com/secguide/2017/10/18/security-baseline-for-windows-10-fall-creators-update-v1709-final/
■
 https://blogs.technet.microsoft.com/jpsecurity/2017/09/14/moving-beyond-emet-ii-windows-defender-exploit-guard/
■
 https://docs.microsoft.com/ja-jp/windows/threat-protection/windows-defender-exploit-guard/windows-defender-exploit-guard
[Japan Tech summit 2017] SEC 003
1 de 32

Recomendados

Стратегия Cisco в ЦОД (доклад на английском языке) por
Стратегия Cisco в ЦОД (доклад на английском языке)Стратегия Cisco в ЦОД (доклад на английском языке)
Стратегия Cisco в ЦОД (доклад на английском языке)Cisco Russia
1.9K visualizações28 slides
Launching a Highly-regulated Startup in the Public Cloud por
Launching a Highly-regulated Startup in the Public CloudLaunching a Highly-regulated Startup in the Public Cloud
Launching a Highly-regulated Startup in the Public CloudPoornaprajna Udupi
253 visualizações27 slides
Access Security - Hybrid Identity por
Access Security - Hybrid IdentityAccess Security - Hybrid Identity
Access Security - Hybrid IdentityEng Teong Cheah
76 visualizações12 slides
Cisco web ex cloud security por
Cisco web ex cloud securityCisco web ex cloud security
Cisco web ex cloud securityebingeorge2010
2.9K visualizações12 slides
Pantech- Dotnet projects 2016-2017 por
Pantech- Dotnet projects 2016-2017Pantech- Dotnet projects 2016-2017
Pantech- Dotnet projects 2016-2017Java Team
81 visualizações4 slides
Minio scale 15 x por
Minio scale 15 xMinio scale 15 x
Minio scale 15 xMinio
846 visualizações14 slides

Mais conteúdo relacionado

Destaque

[Japan Tech summit 2017] PRD 011 por
[Japan Tech summit 2017] PRD 011[Japan Tech summit 2017] PRD 011
[Japan Tech summit 2017] PRD 011Microsoft Tech Summit 2017
482 visualizações19 slides
[Japan Tech summit 2017] SEC 004 por
[Japan Tech summit 2017] SEC 004[Japan Tech summit 2017] SEC 004
[Japan Tech summit 2017] SEC 004Microsoft Tech Summit 2017
7K visualizações104 slides
[Japan Tech summit 2017] SEC 007 por
[Japan Tech summit 2017] SEC 007[Japan Tech summit 2017] SEC 007
[Japan Tech summit 2017] SEC 007Microsoft Tech Summit 2017
462 visualizações46 slides
[Japan Tech summit 2017] SEC 009 por
[Japan Tech summit 2017] SEC 009[Japan Tech summit 2017] SEC 009
[Japan Tech summit 2017] SEC 009Microsoft Tech Summit 2017
518 visualizações55 slides
[Japan Tech summit 2017] SEC 005 por
[Japan Tech summit 2017] SEC 005[Japan Tech summit 2017] SEC 005
[Japan Tech summit 2017] SEC 005Microsoft Tech Summit 2017
1.1K visualizações66 slides
[Japan Tech summit 2017] PRD 001 por
[Japan Tech summit 2017] PRD 001[Japan Tech summit 2017] PRD 001
[Japan Tech summit 2017] PRD 001Microsoft Tech Summit 2017
467 visualizações30 slides

Destaque(20)

エニグマ暗号とは何だったのか por Takahiro (Poly) Horikawa
エニグマ暗号とは何だったのかエニグマ暗号とは何だったのか
エニグマ暗号とは何だったのか
Takahiro (Poly) Horikawa56K visualizações

Similar a [Japan Tech summit 2017] SEC 003

"Evolving Cybersecurity Strategies" - Threat protection and incident managment por
"Evolving Cybersecurity Strategies" - Threat protection and incident managment"Evolving Cybersecurity Strategies" - Threat protection and incident managment
"Evolving Cybersecurity Strategies" - Threat protection and incident managmentDean Iacovelli
151 visualizações42 slides
Cisco Security Presentation por
Cisco Security PresentationCisco Security Presentation
Cisco Security PresentationSimplex
3.9K visualizações52 slides
Defending the Endpoint with Next-Gen Security por
Defending the Endpoint with Next-Gen SecurityDefending the Endpoint with Next-Gen Security
Defending the Endpoint with Next-Gen SecuritySophos Benelux
70 visualizações21 slides
An introduction to Defender for Business por
An introduction to Defender for BusinessAn introduction to Defender for Business
An introduction to Defender for BusinessRobert Crane
2.6K visualizações21 slides
Limitless xdr meetup por
Limitless xdr meetupLimitless xdr meetup
Limitless xdr meetupDaliya Spasova
319 visualizações12 slides
Gartner Security & Risk Management Summit 2018 por
Gartner Security & Risk Management Summit 2018Gartner Security & Risk Management Summit 2018
Gartner Security & Risk Management Summit 2018Paula Januszkiewicz
3.3K visualizações64 slides

Similar a [Japan Tech summit 2017] SEC 003(20)

"Evolving Cybersecurity Strategies" - Threat protection and incident managment por Dean Iacovelli
"Evolving Cybersecurity Strategies" - Threat protection and incident managment"Evolving Cybersecurity Strategies" - Threat protection and incident managment
"Evolving Cybersecurity Strategies" - Threat protection and incident managment
Dean Iacovelli151 visualizações
Cisco Security Presentation por Simplex
Cisco Security PresentationCisco Security Presentation
Cisco Security Presentation
Simplex3.9K visualizações
Defending the Endpoint with Next-Gen Security por Sophos Benelux
Defending the Endpoint with Next-Gen SecurityDefending the Endpoint with Next-Gen Security
Defending the Endpoint with Next-Gen Security
Sophos Benelux70 visualizações
An introduction to Defender for Business por Robert Crane
An introduction to Defender for BusinessAn introduction to Defender for Business
An introduction to Defender for Business
Robert Crane2.6K visualizações
Limitless xdr meetup por Daliya Spasova
Limitless xdr meetupLimitless xdr meetup
Limitless xdr meetup
Daliya Spasova319 visualizações
Gartner Security & Risk Management Summit 2018 por Paula Januszkiewicz
Gartner Security & Risk Management Summit 2018Gartner Security & Risk Management Summit 2018
Gartner Security & Risk Management Summit 2018
Paula Januszkiewicz3.3K visualizações
Palestra Filipi Pires - Ransomware – Existe proteção para isso? por BHack Conference
Palestra Filipi Pires - Ransomware – Existe proteção para isso?Palestra Filipi Pires - Ransomware – Existe proteção para isso?
Palestra Filipi Pires - Ransomware – Existe proteção para isso?
BHack Conference121 visualizações
Splunk für Security por Splunk
Splunk für SecuritySplunk für Security
Splunk für Security
Splunk692 visualizações
【HITCON Hackathon 2017】 TrendMicro Datasets por Hacks in Taiwan (HITCON)
【HITCON Hackathon 2017】 TrendMicro Datasets【HITCON Hackathon 2017】 TrendMicro Datasets
【HITCON Hackathon 2017】 TrendMicro Datasets
Hacks in Taiwan (HITCON)619 visualizações
Elastic Security Brochure por Joseph DeFever
Elastic Security BrochureElastic Security Brochure
Elastic Security Brochure
Joseph DeFever171 visualizações
Microsoft Threat Protection por Thierry DEMAN
Microsoft Threat ProtectionMicrosoft Threat Protection
Microsoft Threat Protection
Thierry DEMAN393 visualizações
Turning the tables talk delivered at CCISDA conference por Dean Iacovelli
Turning the tables talk delivered at CCISDA conferenceTurning the tables talk delivered at CCISDA conference
Turning the tables talk delivered at CCISDA conference
Dean Iacovelli112 visualizações
Esteban Próspero por ClusterCba
Esteban PrósperoEsteban Próspero
Esteban Próspero
ClusterCba954 visualizações
How to protect my cloud workload from Ransomware? por Raphael Bottino
How to protect my cloud workload from Ransomware?How to protect my cloud workload from Ransomware?
How to protect my cloud workload from Ransomware?
Raphael Bottino418 visualizações
ESET on cybersecurity. por SOCIALware Benelux
ESET on cybersecurity.ESET on cybersecurity.
ESET on cybersecurity.
SOCIALware Benelux134 visualizações
Microsoft Platform Security Briefing por technext1
Microsoft Platform Security BriefingMicrosoft Platform Security Briefing
Microsoft Platform Security Briefing
technext11.4K visualizações
Splunk Discovery Day Hamburg - Security Session por Splunk
Splunk Discovery Day Hamburg - Security SessionSplunk Discovery Day Hamburg - Security Session
Splunk Discovery Day Hamburg - Security Session
Splunk333 visualizações
Cloudbrew 2019 - Threat hunting with the Microsoft Cloud por Tom Janetscheck
Cloudbrew 2019 - Threat hunting with the Microsoft CloudCloudbrew 2019 - Threat hunting with the Microsoft Cloud
Cloudbrew 2019 - Threat hunting with the Microsoft Cloud
Tom Janetscheck184 visualizações
AWS re:Invent 2016: Predictive Security: Using Big Data to Fortify Your Defen... por Amazon Web Services
AWS re:Invent 2016: Predictive Security: Using Big Data to Fortify Your Defen...AWS re:Invent 2016: Predictive Security: Using Big Data to Fortify Your Defen...
AWS re:Invent 2016: Predictive Security: Using Big Data to Fortify Your Defen...
Amazon Web Services1K visualizações
Security Lock Down Your Computer Like the National Security Agency (NSA) por José Ferreiro
Security Lock Down Your Computer Like the National Security Agency (NSA)Security Lock Down Your Computer Like the National Security Agency (NSA)
Security Lock Down Your Computer Like the National Security Agency (NSA)
José Ferreiro829 visualizações

Mais de Microsoft Tech Summit 2017

[Japan Tech summit 2017] APP 006 por
[Japan Tech summit 2017]  APP 006[Japan Tech summit 2017]  APP 006
[Japan Tech summit 2017] APP 006Microsoft Tech Summit 2017
2.3K visualizações79 slides
[Japan Tech summit 2017] SEC 011 por
[Japan Tech summit 2017] SEC 011[Japan Tech summit 2017] SEC 011
[Japan Tech summit 2017] SEC 011Microsoft Tech Summit 2017
1.7K visualizações67 slides
[Japan Tech summit 2017] SEC 010 por
[Japan Tech summit 2017] SEC 010[Japan Tech summit 2017] SEC 010
[Japan Tech summit 2017] SEC 010Microsoft Tech Summit 2017
1.1K visualizações38 slides
[Japan Tech summit 2017] MAI 007 por
[Japan Tech summit 2017] MAI 007[Japan Tech summit 2017] MAI 007
[Japan Tech summit 2017] MAI 007Microsoft Tech Summit 2017
414 visualizações92 slides
[Japan Tech summit 2017] DAL 005 por
[Japan Tech summit 2017] DAL 005[Japan Tech summit 2017] DAL 005
[Japan Tech summit 2017] DAL 005Microsoft Tech Summit 2017
384 visualizações64 slides
[Japan Tech summit 2017] DEP 006 por
[Japan Tech summit 2017] DEP 006[Japan Tech summit 2017] DEP 006
[Japan Tech summit 2017] DEP 006Microsoft Tech Summit 2017
395 visualizações42 slides

Mais de Microsoft Tech Summit 2017(11)

Último

METHOD AND SYSTEM FOR PREDICTING OPTIMAL LOAD FOR WHICH THE YIELD IS MAXIMUM ... por
METHOD AND SYSTEM FOR PREDICTING OPTIMAL LOAD FOR WHICH THE YIELD IS MAXIMUM ...METHOD AND SYSTEM FOR PREDICTING OPTIMAL LOAD FOR WHICH THE YIELD IS MAXIMUM ...
METHOD AND SYSTEM FOR PREDICTING OPTIMAL LOAD FOR WHICH THE YIELD IS MAXIMUM ...Prity Khastgir IPR Strategic India Patent Attorney Amplify Innovation
25 visualizações9 slides
Perth MeetUp November 2023 por
Perth MeetUp November 2023 Perth MeetUp November 2023
Perth MeetUp November 2023 Michael Price
15 visualizações44 slides
Web Dev - 1 PPT.pdf por
Web Dev - 1 PPT.pdfWeb Dev - 1 PPT.pdf
Web Dev - 1 PPT.pdfgdsczhcet
55 visualizações45 slides
ChatGPT and AI for Web Developers por
ChatGPT and AI for Web DevelopersChatGPT and AI for Web Developers
ChatGPT and AI for Web DevelopersMaximiliano Firtman
181 visualizações82 slides
Report 2030 Digital Decade por
Report 2030 Digital DecadeReport 2030 Digital Decade
Report 2030 Digital DecadeMassimo Talia
14 visualizações41 slides
Beyond the Hype: What Generative AI Means for the Future of Work - Damien Cum... por
Beyond the Hype: What Generative AI Means for the Future of Work - Damien Cum...Beyond the Hype: What Generative AI Means for the Future of Work - Damien Cum...
Beyond the Hype: What Generative AI Means for the Future of Work - Damien Cum...NUS-ISS
34 visualizações35 slides

Último(20)

Perth MeetUp November 2023 por Michael Price
Perth MeetUp November 2023 Perth MeetUp November 2023
Perth MeetUp November 2023
Michael Price15 visualizações
Web Dev - 1 PPT.pdf por gdsczhcet
Web Dev - 1 PPT.pdfWeb Dev - 1 PPT.pdf
Web Dev - 1 PPT.pdf
gdsczhcet55 visualizações
ChatGPT and AI for Web Developers por Maximiliano Firtman
ChatGPT and AI for Web DevelopersChatGPT and AI for Web Developers
ChatGPT and AI for Web Developers
Maximiliano Firtman181 visualizações
Report 2030 Digital Decade por Massimo Talia
Report 2030 Digital DecadeReport 2030 Digital Decade
Report 2030 Digital Decade
Massimo Talia14 visualizações
Beyond the Hype: What Generative AI Means for the Future of Work - Damien Cum... por NUS-ISS
Beyond the Hype: What Generative AI Means for the Future of Work - Damien Cum...Beyond the Hype: What Generative AI Means for the Future of Work - Damien Cum...
Beyond the Hype: What Generative AI Means for the Future of Work - Damien Cum...
NUS-ISS34 visualizações
How to reduce cold starts for Java Serverless applications in AWS at JCON Wor... por Vadym Kazulkin
How to reduce cold starts for Java Serverless applications in AWS at JCON Wor...How to reduce cold starts for Java Serverless applications in AWS at JCON Wor...
How to reduce cold starts for Java Serverless applications in AWS at JCON Wor...
Vadym Kazulkin75 visualizações
Special_edition_innovator_2023.pdf por WillDavies22
Special_edition_innovator_2023.pdfSpecial_edition_innovator_2023.pdf
Special_edition_innovator_2023.pdf
WillDavies2216 visualizações
Combining Orchestration and Choreography for a Clean Architecture por ThomasHeinrichs1
Combining Orchestration and Choreography for a Clean ArchitectureCombining Orchestration and Choreography for a Clean Architecture
Combining Orchestration and Choreography for a Clean Architecture
ThomasHeinrichs169 visualizações
Upskilling the Evolving Workforce with Digital Fluency for Tomorrow's Challen... por NUS-ISS
Upskilling the Evolving Workforce with Digital Fluency for Tomorrow's Challen...Upskilling the Evolving Workforce with Digital Fluency for Tomorrow's Challen...
Upskilling the Evolving Workforce with Digital Fluency for Tomorrow's Challen...
NUS-ISS28 visualizações
AI: mind, matter, meaning, metaphors, being, becoming, life values por Twain Liu 刘秋艳
AI: mind, matter, meaning, metaphors, being, becoming, life valuesAI: mind, matter, meaning, metaphors, being, becoming, life values
AI: mind, matter, meaning, metaphors, being, becoming, life values
Twain Liu 刘秋艳35 visualizações
The Importance of Cybersecurity for Digital Transformation por NUS-ISS
The Importance of Cybersecurity for Digital TransformationThe Importance of Cybersecurity for Digital Transformation
The Importance of Cybersecurity for Digital Transformation
NUS-ISS27 visualizações
Digital Product-Centric Enterprise and Enterprise Architecture - Tan Eng Tsze por NUS-ISS
Digital Product-Centric Enterprise and Enterprise Architecture - Tan Eng TszeDigital Product-Centric Enterprise and Enterprise Architecture - Tan Eng Tsze
Digital Product-Centric Enterprise and Enterprise Architecture - Tan Eng Tsze
NUS-ISS19 visualizações
Black and White Modern Science Presentation.pptx por maryamkhalid2916
Black and White Modern Science Presentation.pptxBlack and White Modern Science Presentation.pptx
Black and White Modern Science Presentation.pptx
maryamkhalid291614 visualizações
Understanding GenAI/LLM and What is Google Offering - Felix Goh por NUS-ISS
Understanding GenAI/LLM and What is Google Offering - Felix GohUnderstanding GenAI/LLM and What is Google Offering - Felix Goh
Understanding GenAI/LLM and What is Google Offering - Felix Goh
NUS-ISS41 visualizações
[2023] Putting the R! in R&D.pdf por Eleanor McHugh
[2023] Putting the R! in R&D.pdf[2023] Putting the R! in R&D.pdf
[2023] Putting the R! in R&D.pdf
Eleanor McHugh38 visualizações
Future of Learning - Yap Aye Wee.pdf por NUS-ISS
Future of Learning - Yap Aye Wee.pdfFuture of Learning - Yap Aye Wee.pdf
Future of Learning - Yap Aye Wee.pdf
NUS-ISS41 visualizações
Igniting Next Level Productivity with AI-Infused Data Integration Workflows por Safe Software
Igniting Next Level Productivity with AI-Infused Data Integration Workflows Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Safe Software225 visualizações
How the World's Leading Independent Automotive Distributor is Reinventing Its... por NUS-ISS
How the World's Leading Independent Automotive Distributor is Reinventing Its...How the World's Leading Independent Automotive Distributor is Reinventing Its...
How the World's Leading Independent Automotive Distributor is Reinventing Its...
NUS-ISS15 visualizações
SAP Automation Using Bar Code and FIORI.pdf por Virendra Rai, PMP
SAP Automation Using Bar Code and FIORI.pdfSAP Automation Using Bar Code and FIORI.pdf
SAP Automation Using Bar Code and FIORI.pdf
Virendra Rai, PMP19 visualizações

[Japan Tech summit 2017] SEC 003

  • 1. Microsoft Tech Summit 2017本情報の内容(添付文書、リンク先などを含む)は、Microsoft Tech Summit 2017 開催日(2017 年 11 月 8日 - 9 日)時点のものであり、予告なく変更される場合があります。
  • 3. Ransomware: last 22 months 6,700 65,400 1 2 ランサムウェア検出台数 (国内) X9 出典:トレンドマイクロ 2016年 年間セキュリティラウンドアップ
  • 8. App Locker Windows Defender AV Bit Locker TPM Windows Hello LAPS PAW Credential Guard Device Guard EMET UAC Windows Firewall Smart Screen Defender ATP Application Guard Exploit Guard GPO Audit Policy LSA Protection Windows Update Secure Boot IPSEC Windows Information Protection Thin Client AutoVPN OneDrive MDM DEP
  • 16. O F F M A C H I N E O N M A C H I N E P R E - B R E A C H Windows Defender Antivirus Behavioral Engine (Behavior Analysis) ▪ Process tree visualizations ▪ Artifact searching capabilities ▪ Machine Isolation and quarantine Windows Defender ATP (Advanced Threat Protection) ▪ Enhanced behavioral and machine learning detection ▪ Memory scanning capabilities O365 (Email) ▪ Reducing email attack vector ▪ Advanced sandbox detonation Edge (Browser) ▪ Browser hardening ▪ Reduce script based attack surface ▪ App container hardening ▪ Reputation based blocking for downloads ▪ SmartScreen P O S T - B R E A C H End to End Protection O F F M A C H I N E Windows Defender Antivirus (AV) ▪ Improved ML and heuristic protection ▪ Instantly protected with the cloud ▪ Enhanced Exploit Kit Detections One Drive (Cloud Storage) ▪ Reliable versioned file storage in the cloud ▪ Point in time file recovery App Guard (Virtualized Security) ▪ App isolation Locked Down Devices ▪ Windows 10S ▪ Device Guard ▪ Credential Guard ▪ VSM Windows Defender Exploit Guard (HIPS) Attack Surface Reduction • Set of rules to customize the attack surface Controlled Folder Access • Protecting data against access by untrusted process Exploit Protection • Mitigations against memory based exploits Network Protection • Blocking outbound traffic to low rep sources Application Control (Whitelisting) ▪ Whitelisting application
  • 17. Attack Surface Reduction Exploit Protection 脅威へのアクセス制限 Network Protection Controlled Folder Access WINDOWS DEVICES APPS ANALYZE ATTACKS BUILD MITIGATIONS Data driven Software defense EVALUATE MITIGATIONS
  • 31. ■  https://docs.microsoft.com/en-us/windows/device-security/windows-security-baselines ■ Security baseline for Windows 10 “Fall Creators Update” (v1709) – FINAL  https://blogs.technet.microsoft.com/secguide/2017/10/18/security-baseline-for-windows-10-fall-creators-update-v1709-final/ ■  https://blogs.technet.microsoft.com/jpsecurity/2017/09/14/moving-beyond-emet-ii-windows-defender-exploit-guard/ ■  https://docs.microsoft.com/ja-jp/windows/threat-protection/windows-defender-exploit-guard/windows-defender-exploit-guard