- Mar 9, 2014
- 697
- 2,219
- 1,268
- 43
- Content source
- https://www.youtube.com/watch?v=aeva-kN4bBQ
Windows 11 has come a long way security wise but there are still major risks with Microsoft Windows like Defender Exclusions and LOLBINS.
Windows 11 has come a long way security wise but there are still major risks with Microsoft Windows like Defender Exclusions and LOLBINS.
Microsoft made Admin account the default.If an adversary has Administrator (Windows) or root (Linux) access, the game is already over. You are complaining that the fire sprinklers didn't go off after you personally handed the arsonist the keys to the water main and showed them how to shut the valve.
Security software runs on the OS. If you execute a command with the highest privileges the OS offers, you are telling the OS, "I outrank the security software. Kill it."
This is not "exclusive" to Microsoft Defender. If I have root on a Linux box, I can kill -9 your precious SELinux or AppArmor processes, unload kernel modules, or rewrite the config files. If I have Admin on Windows, I can instruct the service control manager to stop a third-party AV service just as easily as Defender, provided Tamper Protection isn't effectively hardened.
Stop treating "Admin Access" as a vulnerability in the software. It is a vulnerability in the chain of command. If you let a saboteur into the command tent, don't blame the perimeter guards for not shooting him inside.
Microsoft recommends Standard User accounts because they adhere to the Principle of Least Privilege.Microsoft made Admin account the default.
Well, other security software can be protected from changing settings, smart security apps outrank Windows.Security software runs on the OS. If you execute a command with the highest privileges the OS offers, you are telling the OS, "I outrank the security software. Kill it."
I have installed Win a billion times and not once have I seen any recommendation by MS about using a standard account not during installation nor after it.Microsoft recommends Standard User accounts because they adhere to the Principle of Least Privilege.
They provide the tools to secure the house (Standard Accounts, UAC, AppLocker), but they leave the front door unlocked by default because most users would rather be robbed eventually than inconvenienced immediately.
In a corporate environment (AD/Intune), no one gets Admin rights by default. That is a disciplined environment. Home usage is the Wild West.
Some apps do not behave properly on SUA, even if installed through Admin A.I have installed Win a billion times and not once have I seen any recommendation by MS about using a standard account not during installation nor after it.
The Windows OOBE (Out of Box Experience) is designed to get a user from "Box" to "Desktop" with minimum friction. It is not a security audit. Relying on the installation wizard for security advice is like relying on a car salesman for driving lessons.I have installed Win a billion times and not once have I seen any recommendation by MS about using a standard account not during installation nor after it.
Yes you are right and there is also PPL (Protected Process Light)Well, other security software can be protected from changing settings, smart security apps outrank Windows.
You claim these apps are protected from changing settings?Well, other security software can be protected from changing settings, smart security apps outrank Windows.
Standar user account is offered by MS to limit the ability of inexperienced users to make changes to settings, while keeping this right to those who know (Admin account).@Divergent has a pointseriously
yes he does
In Windows UAC is not a security boundary, Standard User is. Also even when you run Admin with UAC it is better use a different Admin account for daily usage because of creator/owner Access Control Lists rights. When you run mostly Microsoft applications (like my wife on her laptop) and use your PC as end user (not as a hobbyist) you can use standard user account without any problems when you enable the "Allow non-admins to receive update notifications" option in group policy.
Some AVs prevent even uninstallation and they run as System not Admin, so they can not be easily terminated. Admin can not access WindowsApps by default.The ultimate setting change is uninstallation. If I am Admin, I can run the uninstaller.
You claim Standard User Accounts (SUA) are merely for "inexperienced users." This is functionally incorrect regarding OS architecture.Standar user account is offered by MS to limit the ability of inexperienced users to make changes to settings, while keeping this right to those who know (Admin account).
Of course it might limit post-execution damage, but this is not its main use, otherwise MS would make it the default account on Windows install to keep its OS secure.
@Shadowra can tell how many samples were blocked using SUA compared to Admin account (repeat the test one time for each type of accounts).
SUA is still estimated today to reduce risk by 80–95%, especially combined with other mitigations.Standar user account is offered by MS to limit the ability of inexperienced users to make changes to settings, while keeping this right to those who know (Admin account).
Of course it might limit post-execution damage, but this is not its main use, otherwise MS would make it the default account on Windows install to keep its OS secure.
@Shadowra can tell how many samples were blocked using SUA compared to Admin account (repeat the test one time for each type of accounts).
You point to the WindowsApps folder as proof that Administrators have limits.Some AVs prevent even uninstallation and they run as System not Admin, so they can not be easily terminated. Admin can not access WindowsApps by default.
I think many people are confusing certain points.@Shadowra can tell how many samples were blocked using SUA compared to Admin account (repeat the test one time for each type of accounts).
A Rootkit, by definition, requires deep system integration, usually installing a kernel-mode driver or modifying the Master Boot Record. A Standard User cannot do this.I think many people are confusing certain points.
Yes, switching to a limited account can reduce the attack surface (obviously, each action will need to be validated with an administrator password).
However, you've forgotten one type of malware: Rootkits
This malware seeks to hijack administrator rights in order to prepare for subsequent attacks.
So yes, it can reduce the risk, but it's not a complete defense against everything.
How much is the percentage of Rootkits among the total malware samples encountered by home user?However, you've forgotten one type of malware: Rootkits
This malware seeks to hijack administrator rights in order to prepare for subsequent attacks.