IEs Protected Mode in Windows Vista TM January 20, 2006 Marc Silbey Program Manager.

Slides:



Advertisements
Similar presentations
Windows Vista Security Tidbits
Advertisements

MFA for Business Banking – Security Questions with Reset Multifactor Authentication: Quick Tip Sheets Note to Financial Institutions: We are providing.
How to Look at ExBPA Files Exchange Tech Talk 10/04/2004.
Where Developers Matter Vista Enable Your Applications Fredrik Haglund, Regional Developer Evangelist
Auditing Microsoft Active Directory
17 Copyright © 2005, Oracle. All rights reserved. Deploying Applications by Using Java Web Start.
©2011 Quest Software, Inc. All rights reserved.. Andrei Polevoi, Tatiana Golubovich Program Management Group ActiveRoles Add-on Manager Overview.
®® Microsoft Windows 7 for Power Users Tutorial 7 Enhancing Your Computers Security.
Services Course Windows Live SkyDrive Participant Guide.
20 is the magic number! There are 20 phone preparation steps.
APP-V 5.0 SP2 (MDOP 2013 R2) Presenter - Fred
©2006 Microsoft Corporation. All rights reserved. Windows Vista Security Tidbits Steve Riley Senior Security Strategist Microsoft Corporation
Building on the Foundation of Windows Vista: Introduction to Windows 7: Security and Management Dan Stolts IT Pro Evangelist Microsoft
Configuring Windows Internet Explorer 7 Security Lesson 5.
Windows Vista Security model and vulnerabilities.
Configuring Windows Vista Security Chapter 3. IE7 Pop-up Blocker Pop-up Blocker prevents annoying and sometimes unsafe pop-ups from web sites Can block.
Changes in Windows XP Service Pack 2
Chapter 6: Configuring Security. Group Policy and LGPO Setting Options Software Installation not available with LGPOs Remote Installation Services Scripts.
Installation Requirements. Agenda Installation requirements Installation options Installing to correct folder locations Installing Windows resources Creating.
File sharing. Connect the two win 7 systems with LAN card Open the network.
Internet Explorer 7 Security Features Steve Lamb Technical Security Microsoft Ltd
Sharepoint Portal Server Basics. Introduction Sharepoint server belongs to Microsoft family of servers Integrated suite of server capabilities Hosted.
Cracking Windows Access Control Andrey Kolishchak Hack.lu 2007.
11 SUPPORTING INTERNET EXPLORER IN WINDOWS XP Chapter 11.
Windows 10 Remediation 1 Upgrading to Windows 10 with Norton Installed OEM Team.
Cyra Richardson Microsoft Corporation Internet Explorer 7.
Microsoft ® Official Course Module 9 Configuring Applications.
Microsoft ® Office 2007 Training Security II: Turn off the Message Bar and run code safely John Deere presents:
Working with Applications Lesson 7. Objectives Administer Internet Explorer Secure Internet Explorer Configure Application Compatibility Configure Application.
WebFOCUS Developer Studio Update Dimitris Poulos Technical Director September 3, 2015 Copyright 2009, Information Builders. Slide 1.
1 Group Account Administration Introduction to Groups Planning a Group Strategy Creating Groups Understanding Default Groups Groups for Administrators.
Windows Vista User Account Control (UAC) and Delphi Fredrik Haglund Developer Evangelist.
Raiders of the Elevated Token: Understanding User Account Control and Session Isolation Raymond P.L. Comvalius Independent IT Infrastructure Architect.
Chapter Fourteen Windows XP Professional Fault Tolerance.
Section 2: Using Group Policy Management Tools Local vs. Domain Policies Editing Local Policies Managing Domain Policies Understanding Group Policy Refresh.
Troubleshooting Windows Vista Security Chapter 4.
Testing Applications on Windows Vista TM Edited By Michael Shaw.
CSAS 2009 Running Windows as a Non- Administrator or how I learned to love “User” By: Kasey Dennler.
CN1176 Computer Support Kemtis Kunanuraksapong MSIS with Distinction MCT, MCTS, MCDST, MCP, A+
CMPF124 Personal Productivity with Information Technology Chapter 1 – Part 4 Introduction To Windows Operating Systems Basic Windows Admin Introduction.
Chapter 13 Users, Groups Profiles and Policies. Learning Objectives Understand Windows XP Professional user accounts Understand the different types of.
Overview Introduction to Managing User Environments Introduction to Administrative Templates Using Administrative Templates in Group Policy Assigning Scripts.
MCTS Guide to Microsoft Windows Server 2008 Applications Infrastructure Configuration (Exam # ) Chapter Four Windows Server 2008 Remote Desktop Services,
Mark Aslett Microsoft Introduction to Application Compatibility.
User Account Control Requirements. Agenda Introducing UAC The shield icon UAC manifests Least User Access (LUA) predictor tool Partitioning an application.
Windows Vista Inside Out Ch 10: Ch 10: Security Essentials Last modified
Compatibility and Interoperability Requirements
SQL Server Windows Vista TM & Windows Server Longhorn Brad Sarsfield Test Lead, SQL Server.
Section 9: Configuring Roaming Profiles and Folder Redirection Managing User Profiles Configuring Folder Redirection Using Folder Redirection and Roaming.
Getting Ready for Windows Vista ® Chuck Walbourn SDE, Game Technology Group.
Sudarshan Yadav Sr. Program Manager, Microsoft
VistA Imaging Workstation Configuration. October The information in this documentation includes functionality of the software after the installation.
Section 11: Implementing Software Restriction Policies and AppLocker What Is a Software Restriction Policy? Creating a Software Restriction Policy Using.
Troubleshooting Security Issues Lesson 6. Skills Matrix Technology SkillObjective Domain SkillDomain # Monitoring and Troubleshooting with Event Viewer.
WCL310-R. Disabled by Default in Windows 7 and Vista Most Secure – Best Choice for IT Windows 7 and Vista - Default XP Default The Administrator The.
The world leader in serving science Overview of Thermo 21 CFR Part 11 tools Overview of software used by multiple business units within the Spectroscopy.
Windows Vista: User Account Protection Securing Your Application with Least Privilege User Account Steve Hiskey FUN 406 Lead Program Manager, SBTU - Security.
Internet Explorer 7 Updated Advice for the NHS 04 February 2008 Version 1.3.
Active X and Signed Applets Chad Bollard. Overview ActiveX  Security Features  Hidden Problems Signed Applets  Security Features  Security Problems.
ITMT Windows 7 Configuration Chapter 7 – Working with Applications.
CACI Proprietary Information | Date 1 PD² SR13 Client Upgrade Name: Semarria Rosemond Title: Systems Analyst, Lead Date: December 8, 2011.
Windows Vista Configuration MCTS : Internet Explorer 7.0.
Windows Vista Configuration MCTS : User Account Security.
11 DEPLOYING AN UPDATE MANAGEMENT INFRASTRUCTURE Chapter 6.
Lesson 19: Configuring and Managing Updates
TechEd /20/2018 7:32 PM © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks.
Backstage view in word 2010.
MOAC : Configuring Windows 8.1
Lesson #8 MCTS Cert Guide Microsoft Windows 7, Configuring Chapter 8 Configuring Applications and Internet Explorer.
Windows Vista Inside Out
Presentation transcript:

IEs Protected Mode in Windows Vista TM January 20, 2006 Marc Silbey Program Manager

2 Agenda Goals Protected Mode Summary Architectural Overview Compat Features Getting in-proc add-ons to work Options for out-of-proc add-ons Becoming a Low Integrity Level client

3 Goals of Protected Mode Reduce the severity of threats to IE and threats to add-ons running in IE by eliminating the silent install of malicious code through software vulnerabilities Preserve compatibility whenever possible Provide the capability and guidance for add-ons to restore functionality Minimize required user involvement

4 Protected Mode Summary Protected Mode restricts IE from writing or sending window messages outside of low integrity resources like Temporary Internet Files (TIF) folder IEs process has less write-privileges than UAC It builds on the Mandatory Integrity Control (MIC) which restricts writes to higher integrity securable objects like files and reg keys It builds on the UI Privilege Isolation (UIPI) which restricts certain window messages to higher integrity processes This means Protected Mode is Windows Vista only Protected Mode uses COM to call two new broker processes which allow IE to write outside of the TIF A compatibility layer allows add-ons to elevate Integrity Levels Privilege High IL Admin Medium IL User Low IL Low

5 Enabling UIPI in the builds Toggle UIPI via the following regkey [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights] ON "EnableLowDesktopIL"=dword: Sets Protected Modes Desktop Integrity to Low OFF "EnableLowDesktopIL"=dword: Sets Protected Modes Desktop Integrity to Medium Protected Mode always runs with a Low Process Integrity and the MIC restricts writes outside of low locations

6 Download and Install of new ActiveX Same as XPSP2 with a new UAP credential prompt

7 Download and Install of New Toolbars Same as XPSP2 with a new UAP credential prompt

8 Architectural Overview

9 Compatibility Features In-proc add-ons (ActiveX controls, toolbars, etc) Have the same privileges as Protected Mode File system writes get re-routed to the TIF via a Compat Layer Can call Save As API to save files outside of the TIF Out-of-proc add-ons (Doc object servers, etc) Get Protected Modes restrictions by default Can elevate privilege Internet and Intranet sites run in Protected Mode Navigation between these zones and the Internet, Intranet or restricted sites zone spawn a new window Admins can change this through Group Policy Trusted Sites/Local Machine zone dont run in Protected Mode

10 In-proc: Compatibility Layer Redirects file and registry key writes to a virtualized, Low IL location HKCU\Software\Microsoft\Internet Explorer\Low Rights\Virtual Documents and Settings\%user profile%\Local Settings\Temporary Internet Files\Virtual Virtualized path is the full pathname added to the virtualized directory If Protected Mode tries to write here… …the virtualized write goes here: HKCU\Software\FooBar\ HKCU\Software\MS\IE\Low Rights\Virtual\Software\FooBar C:\Documents and Settings\%user profile%\FooBar C:\Documents and Settings\%user profile%\Local Settings\Temporary Internet Files\Virtual\FooBar

11 In-proc: Two Step Save As API to save files outside of the TIF Step 1: Call IEShowSaveFileDialog() with target location User is prompted with Save As dialog Returns the user-chosen target path Step 2: Call SaveFile() with source (low integrity location) to tell the User Broker to copy the file to the Target location

12 Out-of-Proc: Register to elevate out of Protected Mode Register your process name if your add-on launches a process that needs to elevate out of Protected Mode and run with Medium integrity (UAC Level) To minimize the need for additional end user involvement we will ship Windows Vista with the registry pre-populated Default behavior: If not on the allow list, IE displays an dialog

13 Out-of-Proc: Add Admin to the app manifest to elevate out of UAP *The Admin token should only be used for installing software Update install package to include new application manifest Mark application manifest as Admin by adding a requestedExecutionLevel=Administrator in the AdminBroker manifest Details are available in the UAP How To Document UAP How To DocumentUAP How To Document Example XML format: <security><requestedPrivileges> </requestedPrivileges></security></trustInfo> No need to add reg key to CreateProcess or CoCreateInstance list

14 Out-of-proc: Two Steps to run your software with Low IL like Protected Mode Step 1: During set-up, change the file or registry keys security descriptor to Low IL by: Retrieve Sacl from file handle Create new security descriptor with Low IL Create a new Sacl with Low IL SID and copy original Sacl info into new Sacl Step 2: Create Low IL process Create a SID with Low IL using TokenInformationClass = TokenIntegrityLevel Use ConvertStringSidToSid with SDDL_IL_LOW ConvertStringSidToSid

15 Builds and Documents Protected Mode is in Decembers CTP Build UIPI is not turned on by default in the builds You can get updated builds through the TechBeta program Documentation Protected Mode Tech Article Protected Mode Tech Article Protected Mode API Reference Protected Mode API Reference

Questions?

Appendix

18 FAQs What additional value does Protected Mode add above UAP? User Profile protection. For example, it restricts a BO in IE from overwriting My Docs Is there UI indicating that the user is in Protected Mode Yes, when Protected Mode is enabled for a zone the zone icon will have a Checked Shield icon overlay. Protected Mode IE IE in UAP Files downloaded from respective zone Created with Low integrity level Created with Medium integrity level Able to modify My documents NoYes Perform cross-process UI interaction with other applications on the desktop NoYes Inject a DLL and create a remote thread in another process NoYes Used to render.htm file in local machine zone YesYes