Get free, hands-on experience with Windows 10 virtual labs

vlabs_featured
vlabs_featured

I’m happy to announce the availability of 10 new Windows 10 virtual labs so you can get hands-on experience with Windows as a service, Windows security technologies, and new deployment scenarios before you do a full-scale rollout in your organization. These labs have been specifically designed to address your feedback regarding top deployment blockers and…

2

Simplified servicing for Windows 7 and Windows 8.1: the latest improvements

Today, we are providing insight into two recent and upcoming modifications to the servicing model for Windows 7 SP1, Windows 8.1, Windows Server 2008 R2, Windows Server 2012, and Windows Server 2012 R2. Customers using Windows Update and connected directly to Microsoft for updates (such as consumer PCs) will not be impacted by these changes,…

11

Achieving Assurance with Windows 10 Security

group-in-conference
group-in-conference

Guest author: Chris Hallum Microsoft has a long history pursuing security certifications for our products, and in particular for Windows. Every major version of Windows since Windows 2000 has been validated against FIPS 140 and against the Common Criteria (CC). The relevance of these certifications is most applicable to IT organizations that have procurement policies…

0

Introducing Windows Information Protection

post1
post1

Guest author: Chris Hallum With Windows 10 we made it a goal to make security one of the biggest benefits and one of the most compelling reasons to migrate from Windows 7. As you may have seen in our blogs released earlier today, the Windows 10 Anniversary Update continues to make big investments across our…

4

Post Breach Detection with Windows Defender Advanced Threat Protection

post3
post3

Guest author: Heike Ritter 71% of C-level IT and security executives put endpoints at the top of their most vulnerable list, as reported in November 2015. This growing concern is primarily attributed to Advanced Persistent Threats (APTs): sophisticated attacks, carried out by nation-state or politically motivated groups of hackers, that target enterprise intellectual property and…

0