OK....Then which thread would you suggest is more appropriate?This is not the right thread for such discussion.![]()
OK....Then which thread would you suggest is more appropriate?This is not the right thread for such discussion.![]()
https://malwaretips.com/threads/configuredefender-utility-for-windows-10.79039/OK....Then which thread would you suggest is more appropriate?
That certainly shows on VT with the samples quoted earlier on post #74 and Microsoft being 1 of a handful showing detected when I looked some 6 hours ago.In the case of Defender, such a massive campaign can be significantly damped by post-execution detection. After successfully infecting a few computers, the unknown threat is quickly recognized as ransomware due to the telemetry sent to the cloud or via detonation in the cloud sandbox. Such behavior was explained in the Microsoft articles, and some MT members reported that it really works. In this way, the users are protected against the concrete threat several minutes after the first attack. The post-execution detections are especially effective for ransomware attacks because ransomware actions are easy to detect.
I though you were supposed to be a Windows Defender expert, the Cloud is sevelery delayed for Home Users, with Business under ATP taking priority (is actually one of the selling points), I guarantee you it will you more than a few minutes.Unfortunately, such malware like Magniber has a high chance to compromise any protection. It is delivered to users who are already convinced that they are going to install a benign update. So even if it will be blocked by something like default-deny or restricted sandbox, the user will turn off the protection and will be infected. More chances can have AVs that can detect the threat as the ransomware, but even then some users can ignore the detection.
In the case of Defender, such a massive campaign can be significantly damped by post-execution detection. After successfully infecting a few computers, the unknown threat is quickly recognized as ransomware due to the telemetry sent to the cloud or via detonation in the cloud sandbox. Such behavior was explained in the Microsoft articles, and some MT members reported that it really works. In this way, the users are protected against the concrete threat several minutes after the first attack. The post-execution detections are especially effective for ransomware attacks because ransomware actions are easy to detect.
The post-execution detection is less effective in the targeted attacks, because the first victim can be also the last one.
Edit.
If I correctly remember also Kaspersky and Bitdefender can use post-execution detection against ransomware, but I am not sure if the free versions can do it (probably yes).
Depending on how often they are being pounded with the sample and the overall prevalence of the specific attack the response from MSFT is often quick but varies widely. A variant put into the Wild earlier this week (identified by having a valid certificate from YWB Consulting) took over 48 hours before a signature was available.the users are protected against the concrete threat several minutes after the first attack
I see, it’s always the same debate when certain people here talking about MD, so obviously makes no sense further discussing about this points of MD protection on tweaked settings only, otherwise this thread is another endless discussion as we seen for several times in the past on other MD threads in different forums sections...I should be more precise and write "The same is true for any free AV" on default settings.
The additional features seem do not make a practical difference in the Real-World tests. The test results are very clear. For home users, other scenarios are mostly unimportant, except for people who use pirated software, game mods, etc.
In fact, Defender includes some of these features at the cloud backend. Many malware can be detected at the post-execution stage which is often done in other AVs by behavior or advanced threat protection modules.
Well, in the Hub, we are already testing even "free AVs“ for example, Bitdefender Free new version has been tested first by @Faybert and recently myself does the job, I will continue testing it on the long run over more months of this year.If you would test Microsoft Defender in Malware Hub, then probably there could be some advantage. Maybe it is time to test free AVs in Malware Hub. The MH testing scenario is closer to a business environment or using the computer for hybrid work.
It is possible that free versions of Avast, Bitdefender, and Kaspersky are better designed for hybrid work. Also, Microsoft seems to notice, that for hybrid work the Defender protection should be extended (Smart App Control).
I think that you refer to local or cloud signatures. But, the protection I posted about is not based on malware signatures (local or cloud). The malware is blocked when the user is trying to run the malware and metadata from the client (including the hash of the file) is sent to the cloud. This works even if there is no signature in the cloud. The malware signature is created later.Depending on how often they are being pounded with the sample and the overall prevalence of the specific attack the response from MSFT is often quick but varies widely. A variant put into the Wild earlier this week (identified by having a valid certificate from YWB Consulting) took over 48 hours before a signature was available.
I do not see a reason to treat Defender users differently from 3rd party AV users. Microsoft Defender is just another AV. There is a free version and some commercial versions. Of course, the MH tests are voluntary and the testers can choose the AV they like. I think that testing free AVs together, on the same samples, would be interesting. We already know, how is the detection in the Real-World scenario. Maybe the MH tests can show any real difference. I suspect that 3rd party AVs can score better in MH tests, for reasons I posted in this thread.There is a "problem" with MD testing in the Hub, I guess MD users want to see rather tweaked protection settings of MD, but as same as for the most official AV-Test-Labs.
Hub testers should testing AVs mainly on default settings, just check MT Hub tests, even for almost all AVs paid versions are tested on default settings.