Security and Assurance
Updated: November 28, 2015
Applies To: Windows Server Technical Preview
This collection contains detailed information about security solutions and features for the IT professional to deploy in your datacenter and cloud environment. The following are security technologies and documentation for Windows Server 2016 Technical Preview.
In this 6-minute video, Anders Vinberg provides an overview of Microsoft’s security and assurance strategy. Vinberg discusses industry trends and landscape shifts as they relate to security, and then focuses on Microsoft’s key initiatives to protect workloads from the underlying fabric, protect against direct attacks from privileged accounts, and, should intrusions happen, he explains how new detection and forensic capabilities can help better identify the threat. |
|
Shielded Virtual Machines in Windows Server video walkthrough |
This video walkthrough shows how the Host Guardian Service, a new role available in Windows Server 2016 Technical Preview, enables shielded virtual machines so that sensitive data is protected from unauthorized access by Hyper-V host administrators. |
Protecting Your Datacenter and Cloud from Emerging Threats blog post |
This blog post discusses how you can use Microsoft technologies to protect your datacenter and cloud investments from emerging threats. |
This article discusses features and capabilities included in Microsoft Identity Manager, including support for Just In Time (JIT) Privileged Access Management. |
|
This blog post discusses the steps required to set up Just Enough Administration (JEA) in your environment. |
|
This document shares the vision and technical details of Just Enough Administration (JEA), a PowerShell toolkit designed to help organizations reduce risk by restricting operators to the only access required to perform specific tasks. |
|
Platform Vision & Strategy (5 of 7): Security and Assurance Overview (Ignite Video) |
This Ignite session addresses persistent threats, insider breaches, organized cybercrime, and securing the Microsoft Cloud Platform (on-premises and connected services with Azure). It includes scenarios for securing workloads, large enterprise tenants, and service providers. |
Harden the Fabric: Protecting Tenant Secrets in Hyper-V (Ignite Video) |
This Ignite presentation discusses enhancements in Hyper-V, Virtual Machine Manager, and a new Guardian Server role to enable shielded VMs. |
This Ignite presentation discusses how you can use the Just Enough Administration PowerShell Toolkit to control administrator access and reduce breach expansion. |
|
Protecting Windows and Microsoft Azure Active Directory with Privileged Access Management |
This Ignite presentation covers Microsoft’s strategy and investments in Windows Server, PowerShell, Active Directory, Identity Manager, and Azure Active Directory for addressing the risks of administrator access through stronger authentication and managing access using Just in Time and Just Enough Administration. |
Security Threat Analysis Using Microsoft Azure Operational Insights |
This Ignite presentation discusses how you can use Operational Insights to perform security threat analysis. |
This blog post discusses Microsoft Advanced Threat Analytics, an on-premises product that uses Active Directory network traffic and SIEM data to discover and alert on potential threats. |
|
The Microsoft Operations Management Suite (OMS) Security and Audit solution processes security logs and firewall events from on-premises and cloud environments to analyze and detect malicious behavior. |
|
This overview discusses Datacenter Firewall, a network layer, 5-tuple (protocol, source and destination port numbers, source and destination IP addresses), stateful, multitenant firewall. |
|
Shielded VMs and Guarded Fabric Step-by-step deployment guides |
These guides provide installation and validation information for Windows Server 2016 Technical Preview and System Center Virtual Machine Manager for Guarded Fabric Hosts and Shielded VMs. Guide versions: |
This guide provides best practices and recommendations for how to configure your Shielded VM environment, including information specific to Guarded Hosts and tenants. |
|
This guide provides information about how to resolve issues you may encounter in your Shielded VM environment. |