Security News > 2020 > September > Using virtualization to isolate risky applications and other endpoint threats
Microsoft Defender Application Guard, brings hypervisor-based isolation to Microsoft Edge and Microsoft Office applications.
While Application Guard works well with Edge and Office, it doesn't support other applications.
What about downloaded applications? Applications are not allowed to run inside the container.
Application Guard can't isolate non-Microsoft applications that the organization chooses to use but not trust.
Wouldn't it be great if users could easily open any risky document in an isolated environment, e.g., through a context menu? Or if administrators could configure any risky website, document, or application to be automatically transferred and opened in an isolated environment? And maybe also to have corporate websites to be automatically opened back on the host OS, to avoid mixing sensitive information and corporate credentials with non-corporate work?
News URL
http://feedproxy.google.com/~r/HelpNetSecurity/~3/umm0ugiVTb0/