Application Security

02:30 PM
Josh Mayfield
Josh Mayfield
Connect Directly
E-Mail vvv

5 Essentials for Securing and Managing Windows 10

It's possible to intelligently deploy and utilize Windows 10's many security enhancements while avoiding common and costly migration pitfalls.

With upward of 700 million devices running Windows 10, it's the most rapidly adopted version of the operating system since Windows 95, proving the allure of its updated features, including security enhancements such as virtualization-based security, kernel isolation, and recursive data encryption. In fact, 85% of organizations had started their Windows 10 migration by the end of 2017, according to a Gartner survey.

But many are experiencing challenges, including 21% of migrating users experiencing software compatibility issues such as programs not working properly or at all. Today's hybridized environments involve multiple operating systems across managed devices, bring-your-own-device, and other non-managed devices where people tend to update to Windows 10 quickly, treating their machine like their mobile device. Migration complexities for Windows 7 stragglers are compounded by pressures to rush the upgrade to meet Microsoft's January 2020 deadline for end of life.

When it comes to the security and manageability of Windows 10, there are five key essentials to assist the migration.

1. See everything, get smarter: It's important to understand your environment, your hardware, and its compatibility with the OS. This also means going beyond the device itself to include intelligence around the applications or software on the device, looking at whether a certain application is being used by an individual, whether it needs to be migrated, and whether it will be compatible once migrated. All of this insight helps you assess risk and understand where your gaps are, and helps you plan for filling those gaps.

2. Protections and controls: Let's not forget the data that's on the device. Organizations rely on access to that data; often it's sensitive and needs protecting while the organization gives users the data access they need to do their jobs. Organizations benefit from this intent-based approach. Not only is it less wasteful — you're not overbuying on hardware and software — but you also eliminate many of the security risks by factoring the user persona and business purpose.

But Windows 10 adds complexity and requires decision-making related to policies, configurations, settings, apps, and which services in the OS support your business intent. For example, Credential Guard (which separates login information from the rest of the OS) is attractive to most IT and security pros, with its hardened enclave away from the host OS. But Credential Guard relies on Defender ATP, which is problematic for those who prefer a third-party anti-malware vendor. Running multiple anti-malware tools erases any simplicity you were expecting, which confounds the decision process. This leads to a trade-off between business intent and Microsoft dependence.

3. Monitoring progress and transition: The transition to Windows 10 is really a journey, and it won't work at the flip of a switch. You need to look at all the rich data available to you throughout this journey, understanding where you are in the process, and watching for new variations as they come online. If a certain user brings in a new device, you must understand if it's compatible with Windows 10 and with the applications the user requires.

4. Reduce complexity and risk: As migration nears completion, complexities are often introduced. For example: endpoints are like snowflakes. They are all composed of the same material, but they're arranged in unique ways. If that set of attributes changes in any way — and this is inevitable — you need to maintain visibility and be quickly informed if changes have occurred. It may mean your security and risk posture is drifting toward more exposure.

I also recommend evolving the definition of "asset" and moving to align it with the way real-world security teams define this term within the endpoint domain, which is to encompass devices, data, users, and apps. We must be aware of the interplay between all four components because you could easily find yourself in a situation where controls may be in place and apps are all consistent, but a particular user is utilizing those tools and technologies differently from another. You have to monitor the entire environment on the endpoint to reduce complexity and risk associated with all of the variables. 

5. Don't Set It and Forget It: It's not enough to set and forget security controls. Not only do devices experience natural decay of security controls over time, but this reality is accelerated because of the complexities and dependencies addressed above. It's not just a matter of installing encryption, but you need to make sure it's active and that if something does change on that device you can bring it back to health. Once you work through the Windows 10 migration, it's important to think about how to make sure your devices are hardened with security controls that remain on the devices and stay healthy.  

There are a lot of utopian aspects to Windows 10 and the potential big payoff after migration. Despite the migration journey posing challenges for IT and security teams, it's possible to intelligently deploy and utilize Windows 10's many security enhancements while avoiding common and costly migration pitfalls. Ultimately, the goal here is to reap the new OS gains and sustain them over time, too.

Related Content:



Join Dark Reading LIVE for two cybersecurity summits at Interop 2019. Learn from the industry's most knowledgeable IT security experts. Check out the Interop agenda here.

Josh Mayfield is Absolute's Director of Security Strategy and works with Absolute customers to leverage technology for stronger cybersecurity, continuous compliance, and reduced risk on the attack surface. He has spent years in cybersecurity with a special focus on network ... View Full Bio
Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Crowdsourced vs. Traditional Pen Testing
Alex Haynes, Chief Information Security Officer, CDL,  3/19/2019
BEC Scammer Pleads Guilty
Dark Reading Staff 3/20/2019
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Well, at least it isn't Mobby Dick!
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2019-03-23
SoftNAS Cloud 4.2.0 and 4.2.1 allows remote command execution. The NGINX default configuration file has a check to verify the status of a user cookie. If not set, a user is redirected to the login page. An arbitrary value can be provided for this cookie to access the web interface without valid user...
PUBLISHED: 2019-03-23
A sandbox information disclosure exists in Twig before 1.38.0 and 2.x before 2.7.0 because, under some circumstances, it is possible to call the __toString() method on an object even if not allowed by the security policy in place.
PUBLISHED: 2019-03-22
Cross-site scripting (XSS) vulnerability in OpenText Portal 7.4.4 allows remote attackers to inject arbitrary web script or HTML via the vgnextoid parameter to a menuitem URI.
PUBLISHED: 2019-03-22
A vulnerability in the web-based management interface of Session Initiation Protocol (SIP) Software for Cisco IP Phone 7800 Series and Cisco IP Phone 8800 Series could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition or execute arbitrary code. The vulnerability ...
PUBLISHED: 2019-03-22
A vulnerability in the web-based management interface of Session Initiation Protocol (SIP) Software for Cisco IP Phone 8800 Series could allow an unauthenticated, remote attacker to bypass authorization, access critical services, and cause a denial of service (DoS) condition. The vulnerability exist...