- Protect the OS through baseline security measures for users of modern hardware and Windows versions. This includes safeguarding the integrity of core OS components from bootkits (Windows Defender System Guard); running Microsoft's browsers in a hypervisor-enforced sandbox (Windows Defender Application Guard); and implementing exploit mitigation (Windows Defender Exploit Guard: Exploit Protection). Providing a robust operating environment for its users has become too important to delegate such tasks to third-parties.
- Motivate other vendors to innovate beyond the commodity security controls that Microsoft offers for its modern OS versions. Windows Defender Antivirus and Windows Defender Firewall with Advanced Security (WFAS) on Windows 10 are examples of such tech. Microsoft has been expanding these essential capabilities to be on par with similar features of commercial products. This not only gives Microsoft control over the security posture of its OS, but also forces other vendors to tackle the more advanced problems on the basis of specialized expertise or other strategic abilities.
- Expand the revenue stream from enterprise customers. To centrally manage Microsoft's endpoint security layers, organizations will likely need to purchase System Center Configuration Manager (SCCM) or Microsoft Intune. Obtaining some Microsoft's security technologies, such as the EDR component of Windows Defender Advanced Threat Protection, requires upgrading to the high-end Windows Enterprise E5 license. By bundling such commercial offerings with other products, rather than making them available in a standalone manner, the company motivates customers to shift all aspects of their IT management to Microsoft.
- Centrally managing and overseeing these components is difficult for companies that haven't fully embraced Microsoft for all their IT needs or that lack expertise in technologies such as Group Policy.
- Making sense of the security capabilities, interdependencies and licensing requirements is challenging, frustrating and time-consuming.
- Most of the endpoint security capabilities worth considering are only available for the latest versions of Windows 10 or Windows Server 2016. Some have hardware dependencies are incompatible with older hardware.
- Several capabilities have dependencies that are incompatible with other products. For instance, security features that rely on Hyper-V prevent users from using the VMware hypervisor on the endpoint.
- Some technologies are still too immature or impractical for real-world deployments. For example, using my Windows 10 system after enabling the Controlled folder access feature became unbearable after a few days.
- The layers fit together in an awkward manner at times. For instance, Microsoft provides two app whitelisting technologies—Windows Defender Application Control (WDAC) and AppLocker—that overlap in some functionality.
- Microsoft created the Antimalware Scan Interface (AMSI) for integrations. For instance, when a third-party product stops a threat not detected by Windows Defender Antivirus, the product can use AMSI to notify Microsoft's tech about the event.
- The company also announced the Microsoft Intelligent Security Association. Members of this invitation-only club can share threat intel by way of Microsoft's Intelligent Security Graph and collaborate in other unstated ways.
Updated August 17, 2018