SlideShare une entreprise Scribd logo
1  sur  32
Télécharger pour lire hors ligne
Microsoft Tech Summit 2017本情報の内容(添付文書、リンク先などを含む)は、Microsoft Tech Summit 2017 開催日(2017 年 11 月 8日 - 9 日)時点のものであり、予告なく変更される場合があります。
Ransomware: last 22 months
6,700
65,400
1 2
ランサムウェア検出台数 (国内)
X9
出典:トレンドマイクロ 2016年 年間セキュリティラウンドアップ
App Locker
Windows
Defender AV
Bit Locker
TPM
Windows Hello
LAPS
PAW
Credential
Guard
Device Guard
EMET
UAC
Windows
Firewall
Smart Screen
Defender ATP
Application
Guard
Exploit Guard
GPO
Audit Policy
LSA
Protection
Windows
Update
Secure Boot
IPSEC
Windows
Information Protection
Thin Client
AutoVPN
OneDrive
MDM
DEP
O F F
M A C H I N E
O N
M A C H I N E
P R E - B R E A C H
Windows Defender
Antivirus
Behavioral Engine
(Behavior Analysis)
▪ Process tree
visualizations
▪ Artifact searching
capabilities
▪ Machine Isolation
and quarantine
Windows
Defender ATP
(Advanced Threat
Protection)
▪ Enhanced behavioral
and machine
learning detection
▪ Memory scanning
capabilities
O365 (Email)
▪ Reducing email
attack vector
▪ Advanced sandbox
detonation
Edge (Browser)
▪ Browser hardening
▪ Reduce script based
attack surface
▪ App container
hardening
▪ Reputation based
blocking for
downloads
▪ SmartScreen
P O S T - B R E A C H
End to End Protection
O F F
M A C H I N E
Windows Defender
Antivirus
(AV)
▪ Improved ML and
heuristic protection
▪ Instantly protected
with the cloud
▪ Enhanced Exploit Kit
Detections
One Drive
(Cloud Storage)
▪ Reliable versioned
file storage in the
cloud
▪ Point in time file
recovery
App Guard
(Virtualized Security)
▪ App isolation
Locked Down
Devices
▪ Windows 10S
▪ Device Guard
▪ Credential Guard
▪ VSM
Windows
Defender Exploit
Guard
(HIPS)
Attack Surface
Reduction
• Set of rules to
customize the attack
surface
Controlled Folder
Access
• Protecting data
against access by
untrusted process
Exploit Protection
• Mitigations against
memory based
exploits
Network
Protection
• Blocking outbound
traffic to low rep
sources
Application Control
(Whitelisting)
▪ Whitelisting
application
Attack Surface Reduction
Exploit Protection
脅威へのアクセス制限
Network Protection
Controlled Folder Access
WINDOWS
DEVICES
APPS
ANALYZE
ATTACKS
BUILD
MITIGATIONS
Data driven
Software defense
EVALUATE
MITIGATIONS
Exploit Protection
Exploit Protection の軽減策
 OS レベルでの
ブロックを実現
Office rules
Email rule
Script rules
1.
2.
•
•
 •
■
 https://docs.microsoft.com/en-us/windows/device-security/windows-security-baselines
■ Security baseline for Windows 10 “Fall Creators Update” (v1709) – FINAL
 https://blogs.technet.microsoft.com/secguide/2017/10/18/security-baseline-for-windows-10-fall-creators-update-v1709-final/
■
 https://blogs.technet.microsoft.com/jpsecurity/2017/09/14/moving-beyond-emet-ii-windows-defender-exploit-guard/
■
 https://docs.microsoft.com/ja-jp/windows/threat-protection/windows-defender-exploit-guard/windows-defender-exploit-guard
[Japan Tech summit 2017] SEC 003

Contenu connexe

En vedette

En vedette (20)

[Japan Tech summit 2017] PRD 011
[Japan Tech summit 2017] PRD 011[Japan Tech summit 2017] PRD 011
[Japan Tech summit 2017] PRD 011
 
[Japan Tech summit 2017] SEC 004
[Japan Tech summit 2017] SEC 004[Japan Tech summit 2017] SEC 004
[Japan Tech summit 2017] SEC 004
 
[Japan Tech summit 2017] SEC 007
[Japan Tech summit 2017] SEC 007[Japan Tech summit 2017] SEC 007
[Japan Tech summit 2017] SEC 007
 
[Japan Tech summit 2017] SEC 009
[Japan Tech summit 2017] SEC 009[Japan Tech summit 2017] SEC 009
[Japan Tech summit 2017] SEC 009
 
[Japan Tech summit 2017] SEC 005
[Japan Tech summit 2017] SEC 005[Japan Tech summit 2017] SEC 005
[Japan Tech summit 2017] SEC 005
 
[Japan Tech summit 2017] PRD 001
[Japan Tech summit 2017] PRD 001[Japan Tech summit 2017] PRD 001
[Japan Tech summit 2017] PRD 001
 
[Japan Tech summit 2017] SEC 012
[Japan Tech summit 2017] SEC 012[Japan Tech summit 2017] SEC 012
[Japan Tech summit 2017] SEC 012
 
[Japan Tech summit 2017] DEP 009
[Japan Tech summit 2017] DEP 009[Japan Tech summit 2017] DEP 009
[Japan Tech summit 2017] DEP 009
 
[Japan Tech summit 2017] SEC 006
[Japan Tech summit 2017] SEC 006[Japan Tech summit 2017] SEC 006
[Japan Tech summit 2017] SEC 006
 
[Japan Tech summit 2017] SEC 001
[Japan Tech summit 2017] SEC 001[Japan Tech summit 2017] SEC 001
[Japan Tech summit 2017] SEC 001
 
[Japan Tech summit 2017] PRD 005
[Japan Tech summit 2017] PRD 005[Japan Tech summit 2017] PRD 005
[Japan Tech summit 2017] PRD 005
 
[Japan Tech summit 2017] DEP 02
[Japan Tech summit 2017] DEP 02[Japan Tech summit 2017] DEP 02
[Japan Tech summit 2017] DEP 02
 
[Japan Tech summit 2017] SPL 004
[Japan Tech summit 2017] SPL 004[Japan Tech summit 2017] SPL 004
[Japan Tech summit 2017] SPL 004
 
[Japan Tech summit 2017] DEP 008
[Japan Tech summit 2017] DEP 008[Japan Tech summit 2017] DEP 008
[Japan Tech summit 2017] DEP 008
 
[Japan Tech summit 2017] DEP 001
[Japan Tech summit 2017] DEP 001[Japan Tech summit 2017] DEP 001
[Japan Tech summit 2017] DEP 001
 
[Japan Tech summit 2017] MAI 003
[Japan Tech summit 2017] MAI 003[Japan Tech summit 2017] MAI 003
[Japan Tech summit 2017] MAI 003
 
[Japan Tech summit 2017] MAI 005
[Japan Tech summit 2017] MAI 005[Japan Tech summit 2017] MAI 005
[Japan Tech summit 2017] MAI 005
 
[Japan Tech summit 2017] SPL 005
[Japan Tech summit 2017] SPL 005[Japan Tech summit 2017] SPL 005
[Japan Tech summit 2017] SPL 005
 
[Japan Tech summit 2017] SPL 002
[Japan Tech summit 2017] SPL 002[Japan Tech summit 2017] SPL 002
[Japan Tech summit 2017] SPL 002
 
エニグマ暗号とは何だったのか
エニグマ暗号とは何だったのかエニグマ暗号とは何だったのか
エニグマ暗号とは何だったのか
 

Similaire à [Japan Tech summit 2017] SEC 003

Microsoft Platform Security Briefing
Microsoft Platform Security BriefingMicrosoft Platform Security Briefing
Microsoft Platform Security Briefing
technext1
 

Similaire à [Japan Tech summit 2017] SEC 003 (20)

"Evolving Cybersecurity Strategies" - Threat protection and incident managment
"Evolving Cybersecurity Strategies" - Threat protection and incident managment"Evolving Cybersecurity Strategies" - Threat protection and incident managment
"Evolving Cybersecurity Strategies" - Threat protection and incident managment
 
Cisco Security Presentation
Cisco Security PresentationCisco Security Presentation
Cisco Security Presentation
 
Defending the Endpoint with Next-Gen Security
Defending the Endpoint with Next-Gen SecurityDefending the Endpoint with Next-Gen Security
Defending the Endpoint with Next-Gen Security
 
An introduction to Defender for Business
An introduction to Defender for BusinessAn introduction to Defender for Business
An introduction to Defender for Business
 
Limitless xdr meetup
Limitless xdr meetupLimitless xdr meetup
Limitless xdr meetup
 
Gartner Security & Risk Management Summit 2018
Gartner Security & Risk Management Summit 2018Gartner Security & Risk Management Summit 2018
Gartner Security & Risk Management Summit 2018
 
Palestra Filipi Pires - Ransomware – Existe proteção para isso?
Palestra Filipi Pires - Ransomware – Existe proteção para isso?Palestra Filipi Pires - Ransomware – Existe proteção para isso?
Palestra Filipi Pires - Ransomware – Existe proteção para isso?
 
Splunk für Security
Splunk für SecuritySplunk für Security
Splunk für Security
 
【HITCON Hackathon 2017】 TrendMicro Datasets
【HITCON Hackathon 2017】 TrendMicro Datasets【HITCON Hackathon 2017】 TrendMicro Datasets
【HITCON Hackathon 2017】 TrendMicro Datasets
 
Elastic Security Brochure
Elastic Security BrochureElastic Security Brochure
Elastic Security Brochure
 
Microsoft Threat Protection
Microsoft Threat ProtectionMicrosoft Threat Protection
Microsoft Threat Protection
 
Turning the tables talk delivered at CCISDA conference
Turning the tables talk delivered at CCISDA conferenceTurning the tables talk delivered at CCISDA conference
Turning the tables talk delivered at CCISDA conference
 
Esteban Próspero
Esteban PrósperoEsteban Próspero
Esteban Próspero
 
How to protect my cloud workload from Ransomware?
How to protect my cloud workload from Ransomware?How to protect my cloud workload from Ransomware?
How to protect my cloud workload from Ransomware?
 
ESET on cybersecurity.
ESET on cybersecurity.ESET on cybersecurity.
ESET on cybersecurity.
 
Microsoft Platform Security Briefing
Microsoft Platform Security BriefingMicrosoft Platform Security Briefing
Microsoft Platform Security Briefing
 
Splunk Discovery Day Hamburg - Security Session
Splunk Discovery Day Hamburg - Security SessionSplunk Discovery Day Hamburg - Security Session
Splunk Discovery Day Hamburg - Security Session
 
Cloudbrew 2019 - Threat hunting with the Microsoft Cloud
Cloudbrew 2019 - Threat hunting with the Microsoft CloudCloudbrew 2019 - Threat hunting with the Microsoft Cloud
Cloudbrew 2019 - Threat hunting with the Microsoft Cloud
 
AWS re:Invent 2016: Predictive Security: Using Big Data to Fortify Your Defen...
AWS re:Invent 2016: Predictive Security: Using Big Data to Fortify Your Defen...AWS re:Invent 2016: Predictive Security: Using Big Data to Fortify Your Defen...
AWS re:Invent 2016: Predictive Security: Using Big Data to Fortify Your Defen...
 
Security Lock Down Your Computer Like the National Security Agency (NSA)
Security Lock Down Your Computer Like the National Security Agency (NSA)Security Lock Down Your Computer Like the National Security Agency (NSA)
Security Lock Down Your Computer Like the National Security Agency (NSA)
 

Plus de Microsoft Tech Summit 2017

Plus de Microsoft Tech Summit 2017 (11)

[Japan Tech summit 2017] APP 006
[Japan Tech summit 2017]  APP 006[Japan Tech summit 2017]  APP 006
[Japan Tech summit 2017] APP 006
 
[Japan Tech summit 2017] SEC 011
[Japan Tech summit 2017] SEC 011[Japan Tech summit 2017] SEC 011
[Japan Tech summit 2017] SEC 011
 
[Japan Tech summit 2017] SEC 010
[Japan Tech summit 2017] SEC 010[Japan Tech summit 2017] SEC 010
[Japan Tech summit 2017] SEC 010
 
[Japan Tech summit 2017] MAI 007
[Japan Tech summit 2017] MAI 007[Japan Tech summit 2017] MAI 007
[Japan Tech summit 2017] MAI 007
 
[Japan Tech summit 2017] DAL 005
[Japan Tech summit 2017] DAL 005[Japan Tech summit 2017] DAL 005
[Japan Tech summit 2017] DAL 005
 
[Japan Tech summit 2017] DEP 006
[Japan Tech summit 2017] DEP 006[Japan Tech summit 2017] DEP 006
[Japan Tech summit 2017] DEP 006
 
[Japan Tech summit 2017] DEP 005
[Japan Tech summit 2017] DEP 005[Japan Tech summit 2017] DEP 005
[Japan Tech summit 2017] DEP 005
 
[Japan Tech summit 2017] DEP 003
[Japan Tech summit 2017]  DEP 003[Japan Tech summit 2017]  DEP 003
[Japan Tech summit 2017] DEP 003
 
[Japan Tech summit 2017] DEP 007
[Japan Tech summit 2017] DEP 007[Japan Tech summit 2017] DEP 007
[Japan Tech summit 2017] DEP 007
 
[Japan Tech summit 2017] MAI 002
[Japan Tech summit 2017]  MAI 002[Japan Tech summit 2017]  MAI 002
[Japan Tech summit 2017] MAI 002
 
[Japan Tech summit 2017] MAI 001
[Japan Tech summit 2017]  MAI 001[Japan Tech summit 2017]  MAI 001
[Japan Tech summit 2017] MAI 001
 

Dernier

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Dernier (20)

MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 

[Japan Tech summit 2017] SEC 003

  • 1. Microsoft Tech Summit 2017本情報の内容(添付文書、リンク先などを含む)は、Microsoft Tech Summit 2017 開催日(2017 年 11 月 8日 - 9 日)時点のものであり、予告なく変更される場合があります。
  • 2.
  • 3. Ransomware: last 22 months 6,700 65,400 1 2 ランサムウェア検出台数 (国内) X9 出典:トレンドマイクロ 2016年 年間セキュリティラウンドアップ
  • 4.
  • 5.
  • 6.
  • 7.
  • 8. App Locker Windows Defender AV Bit Locker TPM Windows Hello LAPS PAW Credential Guard Device Guard EMET UAC Windows Firewall Smart Screen Defender ATP Application Guard Exploit Guard GPO Audit Policy LSA Protection Windows Update Secure Boot IPSEC Windows Information Protection Thin Client AutoVPN OneDrive MDM DEP
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16. O F F M A C H I N E O N M A C H I N E P R E - B R E A C H Windows Defender Antivirus Behavioral Engine (Behavior Analysis) ▪ Process tree visualizations ▪ Artifact searching capabilities ▪ Machine Isolation and quarantine Windows Defender ATP (Advanced Threat Protection) ▪ Enhanced behavioral and machine learning detection ▪ Memory scanning capabilities O365 (Email) ▪ Reducing email attack vector ▪ Advanced sandbox detonation Edge (Browser) ▪ Browser hardening ▪ Reduce script based attack surface ▪ App container hardening ▪ Reputation based blocking for downloads ▪ SmartScreen P O S T - B R E A C H End to End Protection O F F M A C H I N E Windows Defender Antivirus (AV) ▪ Improved ML and heuristic protection ▪ Instantly protected with the cloud ▪ Enhanced Exploit Kit Detections One Drive (Cloud Storage) ▪ Reliable versioned file storage in the cloud ▪ Point in time file recovery App Guard (Virtualized Security) ▪ App isolation Locked Down Devices ▪ Windows 10S ▪ Device Guard ▪ Credential Guard ▪ VSM Windows Defender Exploit Guard (HIPS) Attack Surface Reduction • Set of rules to customize the attack surface Controlled Folder Access • Protecting data against access by untrusted process Exploit Protection • Mitigations against memory based exploits Network Protection • Blocking outbound traffic to low rep sources Application Control (Whitelisting) ▪ Whitelisting application
  • 17. Attack Surface Reduction Exploit Protection 脅威へのアクセス制限 Network Protection Controlled Folder Access WINDOWS DEVICES APPS ANALYZE ATTACKS BUILD MITIGATIONS Data driven Software defense EVALUATE MITIGATIONS
  • 20.
  • 23.
  • 24.
  • 25.
  • 28.
  • 29.
  • 30.
  • 31. ■  https://docs.microsoft.com/en-us/windows/device-security/windows-security-baselines ■ Security baseline for Windows 10 “Fall Creators Update” (v1709) – FINAL  https://blogs.technet.microsoft.com/secguide/2017/10/18/security-baseline-for-windows-10-fall-creators-update-v1709-final/ ■  https://blogs.technet.microsoft.com/jpsecurity/2017/09/14/moving-beyond-emet-ii-windows-defender-exploit-guard/ ■  https://docs.microsoft.com/ja-jp/windows/threat-protection/windows-defender-exploit-guard/windows-defender-exploit-guard