{"id":89351,"date":"2019-05-15T09:00:18","date_gmt":"2019-05-15T16:00:18","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\/?p=89351"},"modified":"2023-08-07T15:36:15","modified_gmt":"2023-08-07T22:36:15","slug":"announcing-new-attack-surface-analyzer-2-0","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/05\/15\/announcing-new-attack-surface-analyzer-2-0\/","title":{"rendered":"Announcing the all new Attack Surface Analyzer 2.0"},"content":{"rendered":"

Few of us know what is really happening on our systems when we install new software from new or untrusted sources. This is important because most installation processes require elevated privileges, which can lead to undesired system configuration changes. Knowing what changes have been made is vital to maintaining the security of your system, data, and networks. Identifying those changes can be challenging and time consuming without a little help.<\/p>\n

The classic Attack Surface Analyzer 1.0 was released in 2012 to help software developers and IT professionals identify changes made to Windows operating systems during application installations. This year, we decided to rewrite the tool to take advantage of modern, cross-platform technologies like .NET Core and Electron. Attack Surface Analyzer 2.0<\/a> now runs on Windows, Linux, and macOS and is available as an open source project on GitHub<\/a>.<\/p>\n

Attack Surface Analyzer 2.0<\/a> can help you identify potential security risks introduced by changes to an operating system’s security configuration by identifying changes in key areas, including:<\/p>\n