We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message
78,785 News Articles

Analysis: exploring Vista's security features

How Microsoft's next OS has developed

We've been using several versions of Microsoft's Windows Vista for the past few months. Although any beta's feature set is not locked into stone until the release-to-manufacturing date, here's a recap of some of the security changes as we know them now.

UAC (User Account Control) is probably the most welcome security update. A large portion of today's malware requires that the user executing the malware be logged in with administrative privileges. Unfortunately, for one reason or another, many of today's users are logged in as administrators all the time.

UAC will avoid that problem by running most programs in a more restricted context (actually, it's an expansion of the Restricted SID, or Security ID, feature available in XP today), even when the user is an administrator. For example, if you are logged in as an administrator, your Internet Explorer session will still run as a non-admin user. To accomplish admin-level tasks, you'll be prompted to re-enter your password.

On a related note, a privilege is being added so that non-admin users can adjust the system's time zone settings. This is a welcome addition for travelling users.

Spy where?

Microsoft's AntiSpyware software will be integrated into Windows Vista. This should prevent more malware from successfully deploying. And Registry redirection features will offer an extra layer of protection against malware, too: pre-Vista applications that expect to write directly to protected system Registry locations will instead be transparently redirected to virtual registries.

Vista also has Secure Startup. On Enterprise versions, this means the entire hard drive can be encrypted prior to boot, and the encryption key will be securely stored inside a Trusted Platform Module chip on the motherboard. Many of the methods used to circumvent permissions using NTFS-aware boot disks will no longer work.

There's improved auditing all the way around, including the ability to kick off external programs (such as a sniffer) when a specified event type is noted. You'll also have improved support for non-password authentication mechanisms (smartcards, fingerprint readers and so on). On a related note, EFS (Encrypting File System) keys can be stored on smartcards.

Windows services, often an entry point for buffer overflows and malware, will be hardened. Although Vista will include more services than any of its predecessors, more of them will run in the Local Service and Network Service contexts (instead of Local System), along with a complete code inspection and rewrite of vulnerable services. Each service will be given its own SID, allowing permissions, privileges and firewall settings to be set per service.

Microsoft has added a new NTFS ACE (access control entry) permission called Creator Owner. It will allow more granular permissions to be set ahead of time for new objects and their owners. Currently, NTFS permissions can be given to the Creator Owner's group. This new ACE permission is the opposite – it will allow for a permission called Creator Owner to be given to another security principal.

The Power Users group will be degraded or removed. The Windows Firewall will do outbound blocking, and the new version will alert the user when an unapproved program attempts to connect to an internet location or attempts to set up a listening service.

Firewall changes

On new OS installs, the Windows Firewall will be enabled with no exceptions allowed until after patching is completed. This feature is already built into Windows Server 2003 SP1, and it prevents roving malware from exploiting Windows prior to patches being installed.

There will be an entirely new console, called the Windows Firewall with Advanced Security, for configuring and better integrating both IPSec and the firewall. It looks to be much easier to use, requiring much less effort to configure.

Vista will not rely on MD5 or SHA-1 hashing. Since both hash algorithms have been found to have cryptographically easy collisions, Microsoft will be using stronger hashes, including SHA-256.

On the patch front, Vista supports patch-in-place features: you can patch and then reboot the box with all current applications open, and Vista will restore the current application sessions upon reboot. Of course, it would be nicer if patches didn't require a reboot in the first place.

A new Network Center application will allow all things networking to be viewed, configured, and managed in a central location. There's also an improved NAP (Network Access Protection) client. NAP is a network access control (also known as network quarantining) client. When the server side is enabled on Windows Server 2003, NAP can prevent unauthorised and ill-configured clients from connecting to a production network. Microsoft's current implementation of NAP is not user-friendly or overly useful in most environments.

Vista will also include the much-improved Internet Explorer 7.0, which includes more than a dozen new security enhancements. And, of course, there will be hundreds of new GPO (group policy objects) settings regarding security, but they are too numerous to cover here. We'll take a look at these new technologies as details emerge during the year.


IDG UK Sites

3 of the best portable chargers: a solar power charger, a hand-cranked charger, and how to charge...

IDG UK Sites

iOS 8 review: Hands on with the iOS 8 beta

IDG UK Sites

Thinking robots: The philosophy of artificial intelligence and evolving technology

IDG UK Sites

Sharknado 2 VFX: how The Asylum created CG flying man-eating sharks