Defender for Business brings EDR and threat monitoring features found in more expensive Windows licenses to smaller organizations. Credit: IDG / Microsoft At its recent Ignite conference, Microsoft announced a new product targeted to businesses with less than 300 users or seats called Microsoft Defender for Business. Any small businesses that does not have an automated way to investigate intrusions and other security issues, or any sort of endpoint detection and response (EDR) technology in place should evaluate it. So should managed service providers that support small business or have connections to a small business that supplies to your firm.Defender for Business ensures that you can monitor and control the native antivirus protection and pull in cloud protections and detections as Microsoft receives the security information from across its cloud properties. For small businesses that have not invested in EDR, the console will point out anomalies and identify when unusual events have occurred. The timeline functionality allows you to review processes on systems to determine what has occurred on systems and keeps a cloud forensic version of the workstation processes so that you can review it later.Microsoft is also working on overview platforms for managed service providers that will allow them to monitor and proactively manage many customers at the same time. Called Microsoft 365 Lighthouse, it gives you a view of security incidents and alerts across customers onboarded into Lighthouse. An upcoming Microsoft seminar will provide more information for Microsoft Defender for Business.If your business has access to Microsoft 365 E5 licenses and the Microsoft Defender Security Center, you are already familiar with the technologies bundled with this new offering. Any firm that has a license to Microsoft 365 Business Premium, this new offering will be included. If they do not, it can be added on with a $3 per user fee. Microsoft Defender for Business includes the Threat and Vulnerability Management console that showcases weaknesses in the network so that firms can prioritize actions to take. This dashboard provides an overall exposure score of the issues in your network. It also provides a score of the risks for your devices that provides the risks to your applications, the operating system, network, accounts and security controls. This provides actionable information to ensure that small businesses are not entry points into larger enterprises.Microsoft Defender for Business security recommendationsDefender for Business’s consoles provide actionable security choices to make in a network to make it less susceptible to attacks. Security recommendations for applications include: Disable running or installing downloaded software with invalid signatureBlock outdated ActiveX controls for Internet ExplorerDisable ‘Password Manager.Recommendations for operating system protections include Enable Local Security Authority (LSA) protection. This recommends setting a policy that forces LSA to run as protected process light (PPL). According to MITRE ATT&CK this mitigation “protects processes with high privileges that can be used to interact with critical system components through use of protected process light, anti-process injection defenses, or other process integrity enforcement measures.”Network recommendations include:Set LAN Manager authentication level to ‘Send NTLMv2 response only. Refuse LM & NTLMDisable SMBv1 client driverMoving away from SMBv1 can greatly harden your network to ransomware attacks.Recommendations for accounts include:Disable the local storage of passwords and credentialsSet ‘Account lockout threshold’ to 1-10 invalid login attempts.Recommendations for security controls include attack surface reduction (ASR) rules such as:Block all Office applications from creating child processesBlock JavaScript or VBScript from launching downloaded executable contentBlock executable files from running unless they meet a prevalence, age, or trusted list criterionMonitor attack surface reduction rulesDefender for Business will allow you to easily monitor ASR rules. While Windows 10 Professional machines can do this through Group Policy, it’s not monitored and reported on unless you have an Enterprise license. Attackers often use Office as an entry point into networks and reviewing the ASR rules can better protect you from Office entry points. ASR rules are also a key method to protect against ransomware attacks. For example, one rule that you should deploy as soon as possible is “Block all Office applications from creating child processes”. This Palantir Blog showcased many of these settings that can easily be deployed to better protect networks and which ones are easier to deploy.Normally you need a Windows Enterprise license to enable and track all ASR rules. Using Microsoft Defender for Business will enable full tracking even without an Enterprise license. ASR rules include:Block abuse of exploited vulnerable signed driversBlock executable content from email client and webmailBlock all Office applications from creating child processesBlock Office applications from creating executable contentBlock Office applications from injecting code into other processesBlock JavaScript or VBScript from launching downloaded executable contentBlock execution of potentially obfuscated scriptsBlock Win32 API calls from Office macroUse advanced protection against ransomwareBlock credential stealing from the Windows local security authority subsystem (lsass.exe)Block process creations originating from PSExec and WMI commandsBlock untrusted and unsigned processes that run from USBBlock executable files from running unless they meet a prevalence, age, or trusted list criteriaBlock Office communication applications from creating child processesBlock Adobe Reader from creating child processesBlock persistence through WMI event subscriptionTest these rules before deploying widely.Microsoft Defender for Business for primary antivirus protectionI recommend using Defender as your primary antivirus protection especially if you stay current with feature releases. I’ve tracked side effects with service packs and feature releases and interaction with third-party antivirus software over the years. If you plan to deploy Windows 11 or roll out Windows 10 feature releases faster in the future, I recommend standardizing on Windows Defender. Microsoft tests Defender when it tests feature releases, so side effects are either non-existent or identified quickly and silently fixed. For some key features and protections, you must have Defender as your default antivirus. For example, Defender must be your default antivirus to use ASR rules. Related content news analysis Water system attacks spark calls for cybersecurity regulation The Iranian CyberAv3ngers group’s simplistic exploitation of Unitronics PLCs highlights the cybersecurity weaknesses in US water utilities, the need to get devices disconnected from the internet, and renewed interest in regulation. By Cynthia Brumfield Dec 11, 2023 11 mins Regulation Cyberattacks Critical Infrastructure feature Accenture takes an industrialized approach to safeguarding its cloud controls Security was once a hindrance for Accenture developers. But since centralizing the company's compliance controls, the process has never been simpler. By Aimee Chanthadavong Dec 11, 2023 8 mins Application Security Cloud Security Compliance news analysis LogoFAIL attack can inject malware in the firmware of many computers Researchers have shown how attackers can deliver malicious code into the UEFI of many PCs though BIOS splash screen graphics. By Lucian Constantin Dec 08, 2023 8 mins Malware Vulnerabilities news Google expands minimum security guidelines for third-party vendors Google's updated Minimum Viable Secure Product (MVSP) program offers advice for working with researchers and warns against vendors charging extra for basic security features. By John P. Mello Jr. Dec 08, 2023 4 mins Application Security Supply Chain Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe