Windows 10

Windows 10 Redstone 2: Edge Gets New Security Features To Combat Malicious Websites

Edge hero

With the release of Window 10, Microsoft introduced a new browser called Edge. As the successor to IE, the browser stripped away legacy code in favor of a modern environment that the company hoped would be a success with consumers and the enterprise but the initial reception was not as warm as they had hoped.

The release of the Anniversary update included a number of new features for Edge such as extension and at Ignite this week, the company has started to detail new features coming with the next major release of Windows arriving  in 2017. Like many of the topics this week at Ignite, Edge is getting a new security feature that will better protect corporate networks.

Windows Defender Application Guard is coming to Edge in 2017, Windows Insiders will gain access to the feature much sooner if they are running the Enterprise SKU, and it utilizes virtualization-based security technology that uses isolated containers built directly into the hardware to prevent malicious code from moving across employee devices and the corporate network.

Sponsored Content

Maximize Value from Microsoft Defender

In this ebook, you’ll learn why Red Canary’s platform and expertise bring you the highest possible value from your Microsoft Defender for Endpoint investment, deployment, or migration.

How it works is that if a user clicks on a link that goes to a domain that is not on an approved list, as determined by network administrators, Edge will open the link in an isolated container, at the hardware level, to keep any malicious attacks generated by the user clicking on a link, to be contained in a locked-down instance of the browser. The goal is to contain any potential threat that may arise by the user clicking the link and if needed, to be able to quickly eliminate it in the isolated environment.

When talking to Microsoft about this new feature, they highlighted some challenges that they have to overcome; namely performance. Once a user launches a page in this mode, things like hardware acceleration no longer function which means videos and pages with lots of graphics will have degraded performance.

Windows Defender Application Guard is still in the early phases of development and the company hopes to make the new feature appear more fluid to the user by the time this feature reaches production. For now, know that they company is working on a new way to help stop one of the most pervasive threats to corporate network integrity: users clicking on malicious links.

Putting a browser in a container to isolate a threat is not a new idea but Microsoft claims that they have built a better mousetrap. They state that current browsers that try to do this method to protect the end user don’t protect from 90 percent of the most prevalent security attacks because they don’t offer hardware-based protection.

At this time, this feature is not explicitly stated to come to the consumer version of Windows 10; this feature will be for the E5 SKU of Windows 10 Enterprise. That being said, it’s hard to image that Microsoft would keep this feature locked to the Enterprise SKU forever and they could bring a streamlined version of the feature to consumers once they perfect the functionality of the virtualization component but for now, the company has nothing to announce on this front.

Related Topics:


Don't have a login but want to join the conversation? Sign up for a Petri Account

Comments (0)

Leave a Reply

Brad Sams has more than a decade of writing and publishing experience under his belt including helping to establish new and seasoned publications From breaking news about upcoming Microsoft products to telling the story of how a billion dollar brand was birthed in his book, Beneath a Surface, Brad is a well-rounded journalist who has established himself as a trusted name in the industry.
External Sharing and Guest User Access in Microsoft 365 and Teams

This eBook will dive into policy considerations you need to make when creating and managing guest user access to your Teams network, as well as the different layers of guest access and the common challenges that accompany a more complicated Microsoft 365 infrastructure.

You will learn:

  • Who should be allowed to be invited as a guest?
  • What type of guests should be able to access files in SharePoint and OneDrive?
  • How should guests be offboarded?
  • How should you determine who has access to sensitive information in your environment?

Sponsored by:

Office 365 Coexistence for Mergers & Acquisitions: Don’t Panic! Make it SimpleLive Webinar on Tuesday, November 16, 2021 @ 1 pm ET

In this session, Microsoft MVPs Steve Goodman and Mike Weaver, and tenant migration expert Rich Dean, will cover the four most common steps toward Office 365 coexistence and explain the simplest route to project success.

  • Directory Sync/GAL Sync – How to prepare for access and awareness
  • Calendar Sharing – How to retrieve a user’s shared calendar, or a room’s free time
  • Email Routing – How to guarantee email is routed to the active mailbox before and after migration
  • Domain Sharing – How to accommodate both original and new SMTP domains at every stage

Aimed at IT Admins, Infrastructure Engineers and Project Managers, this session outlines both technical and project management considerations – giving you a great head start when faced with a tenant migration.the different layers of guest access and the common challenges that accompany a more complicated Microsoft 365 infrastructure.

Sponsored by: